A. A video file B. A sound file When communication is in two directions but transmission is in one direction only at a time, we say that the transmission is: A Simplex B. Full-duplex c. Uni-duplex D....


Answer question 10, 11, 12 showing fully all the steps. Solution should be perfect(very correct), clear, brief and explicit enough!


A. A video file<br>B. A sound file<br>When communication is in two<br>directions but transmission is in one<br>direction only at a time, we say that<br>the transmission is:<br>A Simplex<br>B. Full-duplex<br>c. Uni-duplex<br>D. Half-duplex<br>Which one of the following terms<br>commonly refers to a network where<br>one computer provides shared<br>resources to other computers?<br>A. A client-user<br>1.<br>C. A bit-mapped file<br>D. A database file<br>9. Any system generally used for real time<br>applications id known ás<br>A. An expert system<br>B. An information system<br>C. An information retrieval system<br>D. An embedded system<br>10. It is a machine type which is<br>analogous fo parallel processing?<br>A. RISC<br>B. CISC<br>C. SIMD<br>D. MIMD<br>2.<br>B. Client-provider<br>c. Server-client<br>D. Client-server<br>3. Gaining access to some one's machine 11. Which of the following application<br>without authorization for fun is known<br>software packages is used fór<br>representatiön?<br>A. MS Power Point<br>B. Ms Word<br>OMs Publisher<br>D. MS Excel<br>The following transmission media are<br>ranked in increasing order of their<br>transmission rate<br>A. Optical fibres, UTP cables, Micro-<br>Waves<br>as:<br>A. Scamming<br>B. Cracking<br>C. Hacking<br>D. Spying<br>4. The differentiation of people nto<br>computer illiterates and computer<br>illiterates is known as<br>A. Digital gap<br>B. Computer literacy ine<br>C. Modern technology gap<br>D. Digital divide<br>5. It is a computer crime to<br>A. Download any file Trom the internet<br>B. Copy someone else's publication<br>C. Opening a pomographic website<br>D. Copying copyrighted material<br>One negative effects of the digital<br>divide is<br>AIncrease in money laundry<br>B. Rise in unemployment world wide<br>C. Further impoverishment of the poor<br>and under privileged people<br>D. Hunger<br>7. It is NOT a measure for data security<br>A. Looking up work premises after work<br>B. Introducing logins and passwords<br>C. Storing data in many places and<br>copies<br>D. Updating a database regularly<br>6. The file name VIEWER.WAV is a<br>B. Optical fibres, Micro-waves, UTP<br>cables<br>C. Micro-waves, Optical fibres, UTP<br>cables<br>D. Micro-waves, UTP cables, Optical<br>fibres<br>13. In a network topology<br>E. A computer is connected to all<br>other computers via internet<br>F. A computer is connected to all<br>other computers with the help of<br>switches<br>G.A computer is connected to each<br>and every other computers directly<br>H. A computer is connected to all<br>other computers via the<br>intermediary of some computers.<br>14. The protocol CSMA/CD is used in a<br>A. Shared media<br>B. Dedicated media<br>C. Giga Ethernet (optical fibres)<br>

Extracted text: A. A video file B. A sound file When communication is in two directions but transmission is in one direction only at a time, we say that the transmission is: A Simplex B. Full-duplex c. Uni-duplex D. Half-duplex Which one of the following terms commonly refers to a network where one computer provides shared resources to other computers? A. A client-user 1. C. A bit-mapped file D. A database file 9. Any system generally used for real time applications id known ás A. An expert system B. An information system C. An information retrieval system D. An embedded system 10. It is a machine type which is analogous fo parallel processing? A. RISC B. CISC C. SIMD D. MIMD 2. B. Client-provider c. Server-client D. Client-server 3. Gaining access to some one's machine 11. Which of the following application without authorization for fun is known software packages is used fór representatiön? A. MS Power Point B. Ms Word OMs Publisher D. MS Excel The following transmission media are ranked in increasing order of their transmission rate A. Optical fibres, UTP cables, Micro- Waves as: A. Scamming B. Cracking C. Hacking D. Spying 4. The differentiation of people nto computer illiterates and computer illiterates is known as A. Digital gap B. Computer literacy ine C. Modern technology gap D. Digital divide 5. It is a computer crime to A. Download any file Trom the internet B. Copy someone else's publication C. Opening a pomographic website D. Copying copyrighted material One negative effects of the digital divide is AIncrease in money laundry B. Rise in unemployment world wide C. Further impoverishment of the poor and under privileged people D. Hunger 7. It is NOT a measure for data security A. Looking up work premises after work B. Introducing logins and passwords C. Storing data in many places and copies D. Updating a database regularly 6. The file name VIEWER.WAV is a B. Optical fibres, Micro-waves, UTP cables C. Micro-waves, Optical fibres, UTP cables D. Micro-waves, UTP cables, Optical fibres 13. In a network topology E. A computer is connected to all other computers via internet F. A computer is connected to all other computers with the help of switches G.A computer is connected to each and every other computers directly H. A computer is connected to all other computers via the intermediary of some computers. 14. The protocol CSMA/CD is used in a A. Shared media B. Dedicated media C. Giga Ethernet (optical fibres)
Jun 03, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here