New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
computer science
business data networks
Business Data Networks and Security 11th Edition Raymond R. Panko, Julia L. Panko - Solutions
Explain the key general principle of network design and why you should follow it.
a. If I wish to connect two switches with fiber at a speed of 30 Gbps, what options do I have?b. Which would you choose? Justify your answer.12b.) I can connect two switches that are 200 m apart at a speed of 20 Gbps, I should use _______.a. 10GBASE-SRb. 100GBASE-SRc. 10GBASE-SR with bondingd.
a. If I wish to run Ethernet over fiber using 1000BASE-SX signaling over 500 meters, what are my options?11a.) _____ fiber is being sold today.a. OM2b. OM4c. Both A and Bd. Neither A nor Bb. Which should I choose? Justify your answer.11b.) If a physical link can use either 4-pair UTP, multi mode
a. What is a mode?10a.) When the light energies of two pulses arrive at the far end at overlapping times, this is ______.a. Multi mode transmissionb. Modal bandwidthc. Modal dispersiond. Modal interferenceb. What is multi mode fiber?10b1.) Light rays entering a fiber’s core at different angles
a. How does fiber usually transmit a 1?9a.) In optical fiber, light travels through the ______.a. Coreb. Claddingc. Both A and Bb. How do fiber cords typically provide full-duplex transmission?9b.) Optical fiber cords typically have two fiber strands. This is done to allow ______.a. Redundancyb.
a. For what specific purpose were the 2.5GBASE-T and 5GBASE-T standards developed?8a.) For what specific purpose were the 2.5GBASE-T and 5GBASE-T standards developed?a. General growth in demand for Ethernet speedb. Serving access pointsc. To provide lower-cost service than 10G-BASE-Td. None of the
You connect two switches in a large Ethernet switch with 32 switches. You are using 4-pair UTP. Immediately after you make the connection, the network stops transmitting traffic. What do you think might have happened? Do not do other steps in the troubleshooting process.
a. If you need to transmit 600 million bits per second 90 meters, what signaling standard and UTP quality standard would you use?7a1.) UTP categories rate the ______ of UTP cabling.a. Qualityb. Speedc. Quality-of-service performanced. Error performance7a2.) CAT 5e and CAT 6 wiring can carry
Add to your design in the previous question. Add another client next to the first client. Both connect to the same switch. This second client will also communicate with the server and will also need 800 Mbps in transmission speed. Again, your design will specify the locations of switches and the
a. How many wires are there in Ethernet cable?6a1.) What type of copper wiring is widely used in Ethernet?a. Optical fiberb. 4-pair UTPc. Both A and Bd. Neither A nor B6a2.) How many wires are there in a UTP Ethernet cord?a. 1b. 2c. 4d. 8b. How is each pair organized?6b.) In 4-pair UTP, what is
Design an Ethernet network to connect a single client PC to a single server. Both the client and the server will connect to their work group switches via UTP. The two devices are 900 meters apart. They need to communicate at 800 Mbps. Your design will specify the locations of any switches and the
a. Distinguish between binary and digital signaling.5a1.) In digital signaling there is(are) _______ state(s).a. Oneb. Twoc. A small number ofd. An infinite number of5a2.) In binary signaling there is(are) _______ state(s).a. Oneb. Twoc. A number ofd. An infinite number ofb. If you wish to
Can you think of a way to allow a client on one virtual LAN to communicate with a server on another VLAN? Switches typically have no way of doing it. It involves an access control list or some other type of device. The ACL permits specific client-server host pairs to communicate.
a. What four things do physical layer standards govern?4a.) Physical layer standards govern ________.a. Signalingb. Physical connectorsc. Both A and Bd. Neither A nor B4b.) Physical layer standards govern ________.a. Signalingb. Framesc. Packetsd. All of the above
In ARP cache poisoning, the attacker poisons the victim’s ARP cache. This allows the attacker to read frames that the victim sends to the router. How can it read the frames that the victim receives from the router?
a. _______ switches connect users to the network.3a.) What type of switch connects users to the network?a. User switchesb. Core switchesc. Access switchesd. Work group switchesb. _______ switches connect switches to other switches.3b.) What type of switch connects switches to other switches?a.
What Work Group of the 802 LAN/MAN Standards Committee developed the 802.1X and 802.1A E standards? This working group, by the way, creates security and management standards for use in all other Working Groups.
a. At what layers are Ethernet standards defined?2a1.) Ethernet standards are specified at the ______ layer.a. Physicalb. Internetc. Both A and Bd. Neither A nor B2a2.) Ethernet standards are specified at the ______ layer.a. Physicalb. Data linkc. Both A and Bd. Neither A nor B2a3.) Ethernet
a. If both UTP and optical fiber can be used for a particular physical link, which should I choose? Why?b. If both OM3 fiber and OM4 fiber can be used for a particular physical link, which should I choose? Why?c. Some companies are now installing OM4 even when OM3 can do the job. Why do you think
a. What is a local area network (LAN)?1a.) A local area network operates .a. On a customer premisesb. Between customer premisesc. Both A and Bd. Neither A nor B
a. Distinguish between what firewalls look at and what antivirus programs look at.29a.) ______ look at ______, and ______ mostly look at ______.a. Antivirus programs, packets, firewalls, packetsb. Antivirus programs, files, firewalls, filesc. Antivirus programs, packets, firewalls, filesd.
a .Do IDSs stop packets?28a.) If a packet is highly suspicious but not a provable attack packet, a(n) ______ may drop it.a. SPI firewallb. IDSc. NGFWd. None of the aboveb. Why are they painful to use?28b.) Which of the following is the most frustrating to use?a. IDSsb. Opaque filteringc. SPI
a. Why are SPI firewalls limited in their ability to detect attack packets?27a.) SPI firewalls are being replaced in large part because they are limited in their ability to detect _______.a. NATb. Piggybackingc. Port spoofingd. None of the aboveb. How do NGFWs address this problem?27b1.) Which type
a. In Figure 4-18, explain why Rule 1 brings more security than Rule 2.26a.) In SPI firewalls, ACLs are used for packets in the _______ state.a. Connection-openingb. Ongoing communicationc. Both A and Bd. Neither A nor Bb. Explain why the last rule in an ACL should deny anything not previously
a. Why are stateful packet inspection (SPI) firewalls attractive?25a.) Stateful packet inspection firewalls are attractive because of their _________.a. Low cost for a given traffic volumeb. Ability to base rules on specific application programsc. Both A and Bd. Neither A nor Bb. What are the two
a. What does a firewall do when an arriving packet is definitely an attack packet?24a.) When a firewall identifies an attack packet, it ________.a. Discards the packetb. Copies information about the packet into a log filec. Both A and Bd. Neither A nor Bb. Does a firewall drop a packet if it
a. What characteristic of the true party is used in access card authentication, iris authentication, and digital certificate authentication?b. Which form of authentication that we looked at depends on the supplicant proving that it knows something that only the true party should know?23b.) Which
a. In digital certificate authentication, what does the supplicant do?22a.) In digital certificate authentication, the supplicant encrypts the challenge message with ______.a. The supplicant's private keyb. The verifier's private keyc. The true party's private keyd. None of the aboveb. What does
a. How do you authenticate yourself with an access card?b. What is biometrics?21b.) Using bodily measurements for authentication is ______.a. Illegalb. Biometricsc. Mandatory for good securityd. All of the abovec. Why may fingerprint recognition be acceptable for user authentication to a laptop
a. What was the traditional recommendation for passwords?20a.) Traditionally, we have told users that passwords ________.a. Should have a mix of characters (uppercase and lowercase letters, digits, other keyboard characters)b. Should be easy to rememberc. Both A and Bd. Neither A nor Bb. What is
a. What is authentication?19a.) Requiring someone prove his or her identity is _______.a. Confidentialityb. Authenticationc. Authorizationd. Both B and Cb. Distinguish between the supplicant and the verifier.19b.) In authentication, the _______ is the party trying to prove his or her identity.a.
a. Distinguish between private networks and virtual private networks.18a.) The messages of VPNs ________.a. Share the same transmission lines used by other VPNsb. Are encryptedc. Both A and Bd. Neither A nor Bb. Why is SSL/TLS attractive for VPNs to connect browsers to web servers?18b1.)
a. What two protections do electronic signatures provide?17a1.) Electronic signatures provide message-by-message __________.a. Authenticationb. Confidentialityc. Both A and Bd. Neither A nor B17a2.) Electronic signatures also provide __________ in addition to authentication.a. Message integrityb.
a. What protection does confidentiality provide?16a.) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is _______.a. Authenticationb. Confidentialityc. Both A and Bd. Neither A nor Bb. What is a cipher?16b.) A specific encryption method
a. What are cyber terror and cyber war attacks?15a.) Cyber war attacks are made by ______.a. major cyber criminal gangsb. national governmentsc. Both A and Bd. Neither A nor Bb. Why are cyber war attacks especially dangerous?15b.) What type of attackers can do the most damage?a. Criminal
What three types of attacks may come from your firm’s business competitors?
a. Why may employees attack?13a.) Employees often attack _______.a. For revengeb. For moneyc. Both A and Bd. Neither A nor Bb. For what four reasons are employees especially dangerous?13b.) For what reason are employees especially dangerous?a. They are technically sophisticated.b. They are
a. What type of adversary are most hackers today?12a.) What type of attacker are most attackers today?a. Disgruntled employees and ex-employeesb. Career criminalsc. Hackers motivated by a sense of powerd. Cyber terroristsb. Why is this type of attacker extremely dangerous?12b.) _______ attackers
a. Explain “advanced” in the term advanced persistent threat.11a.) Advanced persistent threats are ________.a. Inexpensive for the attackerb. Extremely dangerous for the victimc. Both A and Bd. Neither A nor Bb. Explain “persistent” in the context of APTs.11b.) ________ attacks typically
a. What is the purpose of a denial-of-service attack?10a.) DoS attacks attempt to ________.a. Hack a computerb. Reduce the availability of a computerc. Steal information from a computerd. Delete files on a computerb. Which programs directly attack the victim in a distributed denial-of-service
a. What is the definition of hacking?9a1.) Hacking is defined as using a computer resource without authorization or in excess of authorization.a. Trueb. False9a2.) Which of the following meets the definition of hacking?a. To intentionally use a computer resource without authorizationb. To
Keys and passwords must be long. Yet most personal identification numbers (PINs) that you type when you use a debit card are only four or six characters long. Yet this is safe. Why?
a. What are payloads?8a.) Pieces of code that are executed after the virus or worm has spread are called _______.a. Vulnerabilitiesb. Exploitsc. Compromisesd. Payloadsa. What is ransomware?8b.) In a _______ attack, the attacker encrypts some or all of the victim’s hard drive.a. Virusb. DoSc.
When a sales clerk accepts a credit card payment, he or she should type the last four digits of the credit card into the terminal in order for the terminal to verify that the last four digits on the card are the same as on the magnetic stripe. Why should the sales clerk not ask the customer what
a. How do viruses and worms differ?7a1.) _____ are full programs.a. Virusesb. Wormsc. Both A and Bd. Neither A nor B7a2.) Which of the following attach themselves to other programs?a. Virusesb. Wormsc. Both A and Bd. Neither A nor Bb. How do viruses and worms propagate using social engineering?7b.)
a. If someone in your firm gives you his or her password and you log into that person’s account, is this hacking? Justify your answer in terms of the definition of hacking.b. If you think someone in your office is sending slanderous e-mail about you, is it hacking if you break into that
a. What kind of attack may succeed against a system with no technological vulnerabilities?6a.) What kind of attack is most likely to succeed against a system with no technological vulnerabilities?a. Malwareb. Social engineeringc. Both A and Bd. Neither A nor Bb. What is the goal of social
What are the implications for digital certificate authentication if the true party’s private key is stolen?
a. What is a vulnerability?5a1.) The general name for a security flaw in a program is a _________.a. Virusb. Malwarec. Security faultd. Vulnerability5a2.) A _________ is a flaw in a program that permits a specific attack or set of attacks against this program.a. Malwareb. Security errorc.
In digital certificate authentication, the supplicant could impersonate the true party by doing the calculation with the true party’s private key. What prevents impostors from doing this?
a. What is malware?4a.) The general name for evil software is ________.a. Virusb. Wormc. Malwared. All of the aboveb. What are the most frequent types of attacks on companies?4b.) The most frequent type of attack that companies experience is the ________ attack.a. DoSb. Hackingc. Ransomwared.
Is the supplicant the true party or an impostor?
a. How does security thinking differ from network thinking?3a.) In __________ thinking, the opponent is primarily an intelligent attacker.a. networkingb. securityc. Both A and Bd. Neither A nor B
What is the promise of newer authentication systems?
a. How was Target damaged by the breach?2a.) Which of the following probably suffered the MOST financial damage from the Target breach?a. Targetb. banksc. consumersd. retailersb. Were banks and credit card bureaus damaged by the breach?2b.) Which of the following were able to recoup most of the
a. What form of authentication would you recommend for relatively unimportant resources? Justify your answer.b. What form of authentication would you recommend for your most sensitive resources?
a. How did the attackers gain access to Target’s network?1) The Target attackers probably first broke into Target using the credentials of a(n) _______.a. Low-level Target employeeb. Target IT employeec. Target security employeed. Employee in a firm outside Targetb. List the internal Target
What are your choices if you are hit by ransomware? Which would you recommend?
a. What are the benefits of Software-Defined Networking?15a1.) SDN holds the promise of bringing ______.a. Lower costsb. Lower agilityc. Both A and Bd. Neither A nor B15a2.) SDN can ______.a. Permit routing rules to be changed rapidlyb. Reduce router costsc. Both A and Bd. Neither A nor Bb.
a. Why is the automation of network management tasks important?b. Why are standard configurations desirable?14b.) Using standard configurations ______.a. Saves moneyb. Gives management agilityc. Both A and Bd. Neither A nor B
a. List the main elements in SNMP.13a.) Which of the following is NOT governed by the SNMP standard?a. Agentsb. The MIBc. The network management programd. The network visibility programb. Does the SNMP manager communicate directly with the managed device? Explain.13b.) In SNMP, the manager
a. If you Ping a host and it does not respond, what can you conclude?12a.) To determine if a host is reachable, you would send a(n) ______.a. SNMP SET commandb. MIBc. Trapd. Pingb. What two things does Ping tell you about a host that replies?12b.) Ping tells you ______ .a. That a host is
a. What do network visibility tools allow a manager to do?11a.) SNMP agents communicate with the _________.a. Network visibility programb. Network management programc. MIBd. All of the aboveb. Do they cost more money than they save? Explain.11.b) SNMP network management _________.a. Increases total
a. Distinguish between chronic lack of capacity and momentary traffic peaks.10a.) _______ can be addressed by using prioritya. Chronic lacks of capacityb. Momentary traffic peaksc. Both A and Bd. Neither A nor Bb. How long do momentary traffic peaks last?10b.) Momentary traffic peaks usually last a
a. What leased line do you need if you have a capacity requirement for 2 Gbps?b. For 500 Mbps?c. For the situation in Figure 3-9, what leased line would the link require?d. Repeat for Figure 3-12. Do this for all links.
a. If the backup line in Figure 3-14 were to connect Seattle and Dublin instead of Honolulu and Ogden, list the path that traffic would take between Honolulu and Dublin if the line between Seattle and Ogden failed.b. Repeat for traffic between Seattle and Ogden.c. In the network in the lower half
a. Complete the traffic table in Figure 3-13.b. In Figure 3-12, add 392 Mbps of traffic for Seattle-Ogden communication. Using a picture like the one in the figure, show your work.c. Do it again with a traffic table.d. In Figure 3-10, remove the link between Q and R but add a link between Q
a. What are service level agreements?6a.) Guarantees for quality of service are called ________.a. QoSb. QoS metricsc. SLAsd. QoS guaranteesb. Does an SLA measure the best case or the worst case?6b.) An SLA should specify the ________.a. Best caseb. Worst casec. Both A and Bd. Neither A nor Bc.
a. What is availability?5a1.) ________ is the percentage of time that a network is available to users.a. Availabilityb. Downtimec. QoSd. None of the above5a2.) Which of the following usually has higher availability?a. Data networksb. Public Switched Telephone Networkc. Both of the above usually
a. Why must the forwarding function remain on the network device? (This will require you to speculate.)b. What might be holding back SDN in many firms? (This will also require you to speculate.)
a. Distinguish between dedicated and multiplexed transmission links.4a.) Trunk lines in the Internet core are ____________.a. Dedicatedb. Multiplexedc. Both A and Bd. Neither A nor Bb. If 100 conversations averaging 50 Mbps are multiplexed on a transmission line, will the required transmission line
Figure 3-28 has data from a Traceroute analysis. a. Add a third column showing the change in latency between the router in that row and the router in the preceding row. (Check figure: The change for Router 3 from Router 2 is zero.). Shade the row for any large latency problem or problems you
a. Distinguish between rated speed and throughput.3a.) Throughput is ________.a. The speed a network actually provides to usersb. A network's rated speedc. Both A and Bd. Neither A nor Bb. Distinguish between individual and aggregate throughput.3b.) Users of an access point share the transmission
Figure 3-27 shows four sites communicating. Each site needs to communicate with each other site at 2 Mbps, except for Paris. Paris needs to communicate with each other site at 5 Gbps. Create a traffic table and solve it. (For LondonMunich, the total traffic is 5.004 Gbps.) Munich Boston
a. Is transmission speed usually measured in bits per second or bytes per second?2a.) Transmission speed is normally measured in ______.a. Bits per secondb. Bytes per secondc. Octets per secondd. None of the aboveb. For the HDTV program in Figure 3-3, which of the speeds shown will allow real-time
Redo the analysis in Figure 3-12. Remove the link between Ogden and Seattle but add a link between Seattle and Dublin. On each link, what traffic capacity will be needed, and what leased line would you select for it? Use a traffic table to do the analysis. Seattle-Dublin Honolulu- Seattle Ogden-
a. What are QoS metrics? (Do not just spell out the acronym.)1a.) In QoS, the S stands for ______.a. Softwareb. Securityc. Serviced. Satisfactionb. Why are QoS metrics important?1b.) QoS is quantified through ______ .a. Criteriab. Consensusc. Metricsd. None of the above
Your home is connected to the Internet. You get to create SL As that the ISP must follow. Being reasonable, write SLAs you would like to have for the following things: a) Write an SLA for speed. b) Write an SLA for availability. c) Write an SLA for latency. Do not just say what
a. What protocols that we saw in this chapter are reliable?26a.) Which of the following protocols is reliable?a. IPb. TCPc. Both A and Bd. Neither A nor Bb. Why aren’t all protocols reliable?26b.) Not making all protocols reliable _________.a. Reduces costb. Is very dangerousc. I widely viewed as
a. In TCP, port number fields are 16 bits long. How many possible port numbers are there?25a.) In TCP, port number fields are 16 bits long. How many possible port numbers are there?a. 16b. 1,024c. 16,384d. 64,536b. IPv6 addresses are 128 bits long. How many IPv6 addresses are there? Just represent
a. How many alternatives can you represent with a 4-bit field? 24a.) A 5-bit field can represent ______ alternatives or different combinations.a. 8b. 16c. 32d. 64b. For each bit you add to an alternatives field, how many additional alternatives can you represent?24b.) If you add one bit to an
a. What is an integer?23a.) Which of the following is an integer?a. 4,307b. 45.7c. Both A and Bd. Neither A nor Bb. Is 4,307 an integer?23b.) Which of the following is an integer?a. 5,280b. 98.6c. Both A and Bd. Neither A nor Bc. Is 45.7 an integer?d. To encode a decimal number into binary, is the
a. What is alphanumeric information?b. Explain how many bytes it will take to transmit “Go team” without the quotation marks. 22b.) How many bytes will it take to transmit "Brain Dead" without the quotation marks?a. 2b. 3c. 9d. None of the abovec. Explain how many bytes it will take to
a. What is encoding?21a.) Converting application messages into bits is called ________.a. Encapsulationb. Encryptionc. Encodingd. Exchangeb. At what layer is the encoding of application messages done?21b.) At what layer is encoding done?a. Applicationb. Transportc. Internetd. None of the above
a. How is the syntax of Ethernet Ⅱ frames depicted?20a1.) "Octet" is the same as _______.a. "bit"b. "byte"c. Either A or B, depending on the contextd. Neither A nor B20a2.) Ethernet syntax is displayed 32 bits on a line.a. Trueb. Falseb. In what field is the I P packet carried in Ethernet Ⅱ
a. What is the syntax of a socket?19a1.) The source socket is 60.171.18.22:2707. The source is a(n) ______.a. Clientb. Serverc. Well-known serverd. Ephemeral server19a2.) The destination socket is 60.171.18.22:161. The destination host is a(n) ______.a. Clientb. Serverc. Well-known serverd.
a. What type of port numbers do servers use for common server programs?18a.) On a server, well-known port numbers indicate _______.a. Applicationsb. Connections with client computersc. Both A and Bd. Neither A nor Bb. What type of port numbers do clients use when they communicate with server
a. What are the four fields in a UDP header?17a.) The UDP header has ______ fields.a. 4b. 8c. 16d. 32b. Describe the third.c. Describe the fourth.d. UDP does error detection and discarding but does not do the retransmission of damaged or lost data-grams. Is UDP reliable? Explain.17d.) UDP ______.a.
a. What are 1-bit fields called?16a.) T C P has single-bit fields in its headers; these single-bit fields are called ________ fields.a. Portb. Flagc. ACKd. Binaryb. If someone says that a flag field is set, what does this mean?16b.) If someone says that a 1-bit flag is set, this means that it is
a. List the first bit number on each IPv4 header row in 2-12, not including options. (Remember that the first bit in Row 1 is Bit 0.)15a.) In IP, the first bit in the second row is ________.a. 0b. 31c. 32d. None of the aboveb. What is the bit number of the first bit in the Destination IP Address
a. What are the three general parts of messages?14a.) Which of the following is NOT one of the three general parts of messages?a. Address fieldb. Headerc. Data fieldd. Trailerb. What higher-layer content does the data field contain?14b.) The ______ contains the content being delivered by a
a. What are the four steps in the four-way close?13a.) In a four-step close, which side transmits a FIN segment?a. The side that initiates the closeb. The other sidec. Both A and Bd. Neither A nor Bb. When the side that initiates the close sends its FIN segment, does it stop transmitting more TCP
a. What kind of message does the destination host send if it receives an error-free segment?12a.) If a destination host receives a correct segment, it will transmit ________.a. An ACK segmentb. A NAC segmentc. An RSND segmentd. None of the aboveb. What kind of message does the destination host send
a. Is TCP connection-oriented or connection less?11a.) TCP is a connection-oriented protocol.a. Trueb. Falseb. What benefits do sequence numbers bring?c. How many segments are transmitted to open a connection?11c.) During a connection opening, how many TCP segments will the side that initiates the
a. What do we call TCP messages?10a.) TCP messages are called ______.a. Framesb. Packetsc. Segmentsd. Fragmentsb. Describe the three-step opening in TCP.10b.) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ______ segment.a. ACKb. SYNc.
a. In HTTP, which application program initiates an interaction?9a.) In an HTTP, which one (browser or Webserver application program) transmits message first?a. Browserb. Webserver application programc. They transmit simultaneously.d. It depends on the situation.9a1.) In HTTP, which program may
a. If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host?8a.) If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host?b. How many frames?8b.) If two hosts are
a. The port number fields in TCP and UDP are 16 bits long. How many port numbers can they represent?b. In IP, the Time to Live Field is 8 bits in size. How many values can it represent?c. How many values can a flag field represent?
a. At what layer will you find standards for routers?7a.) At what layer will you find standards for routers?a. Transportb. Internetc. Both A and Bd. Neither A nor Bb. Wireless access points?7b.) At what layer will you find standards for access points?a. Physicalb. Data linkc. Both A and Bd. Neither
Do the following without using a calculator or a computer, but check your answers with a calculator or a computer. You need to represent 1,026 different city names. How many bits will this take if you give each city a different binary number? Explain your answer.10 bits will store 1,024 different
Showing 200 - 300
of 344
1
2
3
4
Step by Step Answers