The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.
The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.
Different types of connections are..
-A network is two or more devices connected through links.
-There are two possible types of connections: point-to-point and multipoint.
-A point-to-point connection provides a dedicated link between two devices.
Explain the different types of topologies
-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.
-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology
-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop
-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates
-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.
-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.
Different type of networks
-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.
-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).
-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.
-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.
-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office
-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.
-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.
-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.
-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.
Explain your own understand about protocol and standards
A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.
explain layers in OSI model
Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Explain layers in tcp/ip model
Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.
what are the peer to peer processing
In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data
Answer:
Hi there! Pseudocode is the process of writing out the high-level structure of the program in simple English terms which acts as a blueprint of how the program will work. The pseudocode for this question is written below.
Explanation:
Prompt user for input 1
Validate input 1
Prompt user for input 2
Validate input 2
Prompt user for input 3
Validate input 3
Perform checks:
If
1 and 2 equals 3
Or
1 and 3 equals 2
Or
2 and 3 equals 1
Display message to user
Answer:
lst = [11, 603, 99, 7, 582, 1];
print("The index of the middle element: " + str(int(len(lst)/2)))
print("The middle element: " + str(lst[int(len(lst)/2)]))
lst.sort()
sorted_lst = lst.reverse()
print("The list in descending order: " + str(lst))
first_number = lst.pop(0)
lst.append(first_number)
print("New lst: "+ str(lst))
Explanation:
- Initialize a list
- Find the middle index, int(len(lst)/2)
- Find the middle element, lst[int(len(lst)/2)]
- Sort the list in descending order (First sort the list in ascending order than reverse it)
- Get the first element using <em>pop</em> method, and append it to the end using <em>append</em> method
- - - - -
a) 0 == 1 == 2 --> Always evaluates false
b) 2 + (3 == 4) + 5 == 7 --> Evaluates true
c) 1 < -1 == 3 > 4 --> Always evaluates false