Академический Документы
Профессиональный Документы
Культура Документы
12. A) Software that allows users and devices to communicate over a network.
B) A software or hardware that makes the network.
13. Peer-to-Peer and Client/server.
14. A) the physical components of a network.
B) A node is a location on the network capable of processing information.
C) A star topology is attached to a hub.
D) A ring topology forms a loop.
E) Physical topology is where it is the physical components that make up a
network. A Logical topology how is appears connected to the user.
15. A topology loop
16. Because the circuits on the IC have one of two steps, On or Off.
17. A) 11
B) 42
18. A digital code that uses a set of sixteen 1s and 0s to form a 16 bit binary code.
19. A) 2147483648 Bytes
B) 536870912000 Bytes
20. A) an overflow error occurs when the number of bits that are needed to
represent the integer is greater than four bytes.
B) Numbers that contain decimal points.
C) A round off error occurs when there are not enough bits to hold the mantissa.
21. A) A text file is in English and a binary file is in 0s and 1s.
B) Is determines what application can read the file.
C) Everything would be in one place for that category and not all over the place.
22. External or internal. External hard drive like a USB. A internal hard drive like a
SSD.
23. Be careful when putting disk in tray, Try not to scratch the back on the disk,
Hold CD/DVD by the edges, Store CD/DVD in sleeves.
31. A) how easy is it to use? How much effort is in the website? How modern dose it
look? Dose the website own all the content on the website.
B) So if the content is not yours then the credit goes to the person that worked
hard and made the piece.
C) The page was not found.
32. A) A marketing technique that collects online data about consumers.
B) Text file created by the server computer when user enters information into a
website.
C) A tiny, transparent graphic located on a webpage used to collect data about
the webpage user.
D) The website administrator.
33. http://www.shell.ca/en/about-our-website/privacy-policy.html
34. Email, if website offers email we may collect the information.
35. To prevent students for going to websites that are not allowed in school, to
prevent students from downloading games, to prevent students from getting off
task from their work.
36. You can try a different bank.
37. A) If the use of work protected by copyright law without permission.
B) They must get the records copyrighted.
39. You must be able to help people out and work well with others. You must be able
to do what your told.
B) True
C) True
D) True
E) True
F) False, It gose from one peer to the other.
G) True
H) True
I) true
J) True
K) True