Question: Solve An intelligent network connecting device for s appropriate network is called A Switch B. Bridge C Router D. Gateway 2 A type of malicious

Solve

An intelligent network connecting device for s appropriate network is called A Switch B. Bridge C Router D. Gateway 2 A type of malicious program that does not need a host sitem and spread between systems and networks without user's action is called A Virus 8. Worm C. Ransomware D. Trojan horse 3. The OSI model layer that handles transmission errors as well as moving data into and out of the physical link in a network is called; A. Network layer B. Data link layer C. Transport layer D, presentation layer. 4. A digital transmission unit of data that is transmitted across a network is called A. Block B. Job C. Packet D. Frame. 5. The measure of the frequency of communication among processors during execution of tasks is called: A. Bandwidth B. Latency C. Speedup D. Overload 6. The time taken between submission of requests and first response to the request is called: A. waiting time B, turn-around time C. response time D. overhead time 7, In GSM communication, which ONE of the following is not one of the units contained in Network Switching Subsystem? A. home location register B, visitor location register C. server location register D. authentication center 8. The following are types of cloud computing EXCEPT: A. federated cloud B. private cloud C. analytic cloud D. hybrid cloud 9. Which of the following is NOT a type of wireless LAN? A. Bluetooth B. IEEE802 11 C. Ethemet D. hyperLAN 10. A collection of independent systems that cooperate together to solve problem that cannot be solved by individual system is known as: A grid computing B. mobile computing C. parallel computing D. distributed computing 11. Network security does NOT include which ONE of the following? A. protection B. detection C. adaptation D. reaction 12, Which ONE of the following is NOT an example of P2P architecture? A. big data analytics B, crypto-currency C. bit coin D. skype 13. A connection oriented protocol that offers end-to-end packet delivery in a network is called - 14. A wireless network characterized by dynamic topologies with no fixed infrastructure is called - 15. A connection-oriented protocol that offers end-to-end packet delivery in a network is called

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Mathematics Questions!