what is network and also how many types of network are there as well

Answers

Answer 1

Answer:

Summary:

Type of computer networks can categorize according to their size as well as their purpose

PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant

LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area

WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area

A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region

WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.

SAN is a storage area network is a type of network which allows consolidated, block-level data storage

System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications

POLAN is a networking technology which helps you to integrate into structured cabling

Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home

Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations

Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area

A VPN is a private network which uses a public network to connect remote sites or users together

Explanation:

Answer 2

Answer: Network is what is making you ask these questions.

Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks


Related Questions

1) To point the lens of a camera up or down is called:
A) Arc
B)Dolly
C)Pan
D)tilt

Answers

Answer:

D)

Explanation:

Tilting is a cinematographic technique in which the camera stays in a fixed position but rotates up/down in a vertical plane.[1] Tilting the camera results in a motion similar to someone raising or lowering their head to look up or down. It is distinguished from panning in which the camera is horizontally pivoted left or right. Pan and tilt can be used simultaneously.[2] In some situations the lens itself may be tilted with respect to the fixed camera body in order to generate greater depth of focus. [3][4]

The camera's tilt will change the position of the horizon, changing the amount of sky or ground that is seen.[5] Tilt downward is usually required for a high-angle shot and bird's-eye view while a tilt upward is for a low-angle shot and worm's-eye view. The vertical offset between subjects can reflect differences in power, with superior being above.

You want to complete conversion tracking setup on your business website with Google Ads. You've already implemented a global sitewide tag. Your next step is to create event tags, which must be placed in the correct section of your web pages to properly function. Where's the event tag implemented on a web page?

Answers

Answer:

The answer is "Between the website tags immediately after the global site tag".

Explanation:

The event tag is used to log clicks as well as perceptions for adverts, not creative things, or to define the inventive data, It may insert more parameters.  

These Tags are code binder clips, that are added to the site and then sent to respondents to obtain and send data. In this users could use tags to monitor scrolls, track suitable formulation, gather feedback, start generating heat maps, display advertising, to your website for all kinds of applications. The API also sends event details to Google Ads, show & Video 360, Campaign Manager, Search Anzeigen 360, and google docs that use the international site tag in the JS tag.

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

Which function will add a grade to a student's list of grades in Python? add() append() print() sort()

Answers

Answer:

It will be add()

Answer:

A

Explanation:

i will mark brainalist! ​

Answers

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:

Order the steps a user needs to follow to preview and then print a document

Answers

Answer:

Click file tab, click print tab, preview document, print document.

Answer:

Click file tab, click print tab, preview document, print document.

Explanation:

Click file tab, click print tab, preview document, print document.

Give two examples of a large databases that might be used to help members of the public

Answers

Answer:

Examples of large database that might be used to help members of the public are;

1) Apple Healthkit, Carekit and Researchkit

2) IBM Deep Thunder

Explanation:

1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records

2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices

Answers

Complete Question:

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?

Group of answer choices

A. ARP

B. SMTP

C. SNMP

D. Telnet

Answer:

C. SNMP.

Explanation:

In this scenario, you administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. Also, you want the routers on the network to send you notices when they have exceeded specified performance thresholds. Hence, you should use the SNMP to enable the routers to send the notices.

SNMP is an acronym for simple network management protocol, which is a standardized application-layer protocol that is used for monitoring and organizing management information about network devices on either a wide area network (WAN) or local area network (LAN).

Basically, the SNMP helps to provide a common language for network devices such as switches, routers, printers, servers etc to share information with a network management system.

A simple network management protocol (SNMP) is part of the Transmission Control Protocol and Internet Protocol (TCP⁄IP) suite.

are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort

Answers

Answer:

Will have to run the net start spooler command.

Explanation:

The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

Answers

Answer:

The answer is "TLS and the DBMS".

Explanation:

In given- question there are two questions were included, which can be defined as follows:

The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of  SSL, and by encrypting information and data transfer.

The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders

Answers

to own businesses and to be responsible for employees

Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
Debug
Document
Error check
Restore

Answers

Answer: Debug

Debugging is the process of finding bugs and fixing them.

Answer:

Its A

Debug

Explanation:

I took the test

Why were most movies from the late 1890s until the early 1930s only filmed in black and white? The film used to make color motion pictures often overheated, which was a safety hazard, so it was generally not allowed. There were only a few people who could afford the technology to produce color motion pictures back then. Color films had to be hand-colored, frame by frame. Audiences did not want color motion pictures until later.

Answers

Answer:

Color films had to be hand-colored, frame by frame.

Explanation:

Colored films were a rarity during the late 18th and early 19th centuries. Most movies were produced in black and white as the production of colored films was a difficult task as the films have to be hand-colored, frame by frame.

However, things began to change with the development of art and technology. While the dye is used to tint the color of certain scenes before, the new development in the films allows the capture of all scenes in color. But this does not mean that all films are shot in color. Most films continued to be shot in black and white even after the development of colored films.  

Answer:

b

Explanation:

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

learn to accept your mistakes even when you have done your ​

Answers

Answer:

besttttttttttttttttttttttt

Answer: done your best :)

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?

Answers

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

What is the "online disinhibition effect"?​

Answers

Answer:

Online disinhibition is the lack of restraint one feels when communicating online in comparison to communicating in-person.

A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location

Answers

Answer: Transport layer

Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

ternary operators of computer

please explain. ​

Answers

Answer:

It's a compact way of doing an if-else statement.

General Format is

<condition> ? <if condition is true> : <else>;

Example:

I could rewrite:

  if(a==1) temp = 1;

  else     temp = 999;

as

  temp = (a==1) ? 1 : 999;

Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it

Answers

lol wym hack wifi? need more info lol

Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.

Which decimal value (base 10) is equal to the binary number 1012?

Answers

Answer:

The decimal value of 101₂² base 2 = 25 base 10

Explanation:

The number 101₂² in decimal value is found as follows;

101₂ × 101₂ = 101₂ + 0₂ + 10100₂

We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;

101₂ + 0₂ + 10100₂ = 11001₂

Therefore;

101₂² =  11001₂

We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;

Therefore converting 11001₂ to base 10 gives;

11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰

Which gives;

16 + 8 + 0 + 0 + 1 = 25₁₀.

The decimal value in base 10 that is equal to the binary number 101_2 is; 5

We want to convert 101_2 from binary to decimal.

To do this we will follow the procedure as follows;

(1 × 2²) + (0 × 2¹) + (1 × 2^(0))

>> (1 × 4) + (0 × 2) + (1 × 1)

>> 4 + 0 + 1

>> 5

In conclusion, the decimal value we got for the binary number 101_2 is 5

Read more about binary to decimal conversion at; https://brainly.com/question/17546250

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer:

The correct option is;

A) Agility

Explanation:

Business agility is a measure of the responsiveness of business to business opportunities that is the time lapse between the emergence of a business opportunity and the the business formerly responding to the opportunity.

By similar analogy, IT agility is about the responsiveness of an organizations IT infrastructure to external stimuli. As such IT agility measures the systems adaptability to change (which may involve scaling down) or how easily it is for the IT system to be able to produce new transferable opportunities which involves scaling up as needed.

What is computer Network?​

Answers

Answer:

[tex]\boxed{\sf {view \: explanation}}[/tex]

Explanation:

A computer network is a network of computers that can share data among the computers.

Other Questions
Consider a wire of a circular cross-section with a radius of R = 3.17 mm. The magnitude of the current density is modeled as J = cr2 = 9.00 106 A/m4 r2. What is the current (in A) through the inner section of the wire from the center to r = 0.5R? Which statement best explains how Srimati develops the themethat beauty without guidance and morality can bring ruin? Editing work occurs first. Check for wordiness and other sentence mistakes before you worry about content. Select one: True False A 3200-lb car is moving at 64 ft/s down a 30-degree grade when it runs out of fuel. Find its velocity after that if friction exerts a resistive force with magnitude proportional to the square of the speed with k Describe popes rebellion (quick summary would be extremely helpful!) Can someone please help me with this question? The y is throwing me off. Which transformations to the graph of j(x) would result in the graph of j(4x)-27 A semi-circular loop consisting of one turn of wire is place in the x-y plane. A constant magnetic field B=1.7T points along the negative z-axis(into the page), and a current I=0.7A flows counterclockwisefrom the positive z-axis. The net magnetic force on the circular section of the loop points in what direction? What is the net magnetice force on the circular section of the loop? Tybalt: This, by his voice, should be a Montague. Fetch me my rapier, boy. What! dares the slave Come hither, cover'd with an antick face, To fleer and scorn at our solemnity? Now, by the stock and honour of my kin, To strike him dead I hold it not a sin. Romeo and Juliet, William Shakespeare How does Tybalts relationship with Romeo affect his reaction to Romeo being at the party? He thinks Romeo is there to insult his family because of the ongoing feud. He thinks Romeo is there to wear a silly mask and dance because he is an entertainer. He thinks Romeo is there to work as a servant, because they are not equals. He thinks Romeo is there to challenge him to a fight because they hate each other. What is the equation of the line that passes through the point (8,3) and has a slopeof 1/4 Maria cut four equivalent lengths of ribbon. Each was 5 eighths of a yard long. How many yards of fabric did she cut? 11. Samantha was asked to measure out 10 g of salt in a lab. She mistakenly measures out 15 g instead. Calculatethe percent error. Make sure your answer has the correct number of significant figures! Please help! Ill mark you as brainliest if correct. The difference between a DC and an AC generator is that a. the DC generator has one unbroken slip ring. b. the AC generator has one unbroken slip ring c. the DC generator has one slip ring splitin two halves. d. the AC generator has one slip ring split in two halves. e The DC generator has twounbroken sip rings Which of the following correctly describes the process of Translation? I. tRNA anticodon bonds to mRNA codon II. Ribosome bonds to mRNA strand III. Ribosome reaches a STOP codon and detaches from the mRNA IV. Each tRNA adds an Amino Acid to the chain as the Ribosome moves along the mRNA V. Complimentary mRNA strand is made from DNA template The vapour pressure of pure benzene at a certain temperature is 0.850 bar. A non volatile, non electrolyte solid weighing 0.5 g is added to 39.0g of benzene. The vapour pressure of the solution then is 0.845 bar. What is the molecular mass of the solid substance A two digit number is such that the sum of the ones and the tens digits is tens.If the digits are reversed,the new number formed exceeds the originals numbers by 54.Find the number. What has a greater influence on protein levels? A. Protein degradation has a greater influence because they are denatured faster than the cell can produce them B. mRNA destroyer concentration has a greater influence because it is destroying mRNA before proteins can even be produced C. mRNA destroyer concentration has a greater influence because mRNA is destroyed right after the proteins are produced D. Protein degradation has a greater influence because outside factors like antibiotics can cause it, and it is difficult to recover from HELP!!!!!! Read and choose the option with the correct conjugations to complete the dialogue.-Pablo, -los grados cada da para tu clase en la escuela?-S, tengo la tarea de escribir los grados en Celsius y Fahrenheit hoy. what is the location in the base interface of the link tocreate a table using wizard?pls Answer me. I'll make as BRIANLIST.