1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
5

Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology

: Mesh topology: ISP: Dial-up: DSL: Cable Broadband: Fiber Optic: Mobile: explain all pls
Computers and Technology
1 answer:
Alisiya [41]3 years ago
7 0

Answer:

IT terms Network:

Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.

Packet: Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.

Router: A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.

IP address: For the most part, an IP address tells you the city, ZIP code, or area code of your ISP, as well as your ISP's name. What can an IP address tell you? To some degree, your physical location and also the name of your ISP

Server: A server operating system, such as Windows Server or Linux, acts as the platform that enables applications to run. The operating system provides applications access to the hardware resources that they need and enables network connectivity. The application is what enables the server to do its job.

LAN: A local area network (LAN) consists of a series of computers linked together to form a network in a circumscribed location. The computers in a LAN connect to each other via TCP/IP ethernet or Wi-Fi. A LAN is normally exclusive to an organization, such as a school, office, association or church.

WAN: A wide area network (also known as WAN), is a large network of information that is not tied to a single location. WANs can facilitate communication, the sharing of information and much more between devices from around the world through a WAN provider.

Bus topology: also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

A ring topology: is a network configuration where each networked device is connected to two other devices on either side of it to form a circular “ring” data path. When data is transferred in a ring topology, the data is sent in one direction along the single continuous pathway.

Star topology: is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients.

A mesh topology: is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

Your ISP: is the company that gets you onto the Internet – your home Internet or mobile data provider. If your ISP is spying on you, it means they can use or sell your browsing history to others for things like creepy ads that follow you around the Internet or to junk mail providers.

Dial up: relating to or being a standard telephone line used for computer communications also : accessible via a standard telephone line a dial-up Internet provider.

DSL: DSL stands for Digital Subscriber Line, and describes a family of technologies used for digital data transmission and connection to the Internet. It is a type of broadband communication service available to homes and businesses that uses existing phone lines without interrupting telephone use.

Cable Broadband:  Cable broadband connects your home to a fibre cabinet in your area. However, instead of using copper wires, cable broadband uses coaxial cables to connect to the cabinet, giving you a much faster internet connection than the traditional copper phone line cables used for 'superfast' broadband connections (up to 60Mbps)

Fiber optics: is used for long-distance and high-performance data networking. It is also commonly used in telecommunication services, such as internet, television and telephones.

A mobile network (also wireless network) route's communications in the form of radio waves to and from users. It is composed of base stations that each cover a delimited area or "cell." When joined together these cells provide radio coverage over a wide geographic area.

Explanation:

You might be interested in
Write a function named max that accepts two integer values as arguments and returns the value that is the greater of the two. Fo
RoseWind [281]

Answer:

The solution code is written in Python

  1. def max(a, b):
  2.    if(a > b):
  3.        return a  
  4.    else:
  5.        return b
  6. num1 = int(input("Please input the first number: "))
  7. num2 = int(input("Please input the second number: "))
  8. print(max(num1, num2))

Explanation:

Firstly create a function max that accepts two input, a and b, as required by question (Line 1). In the function, create if statement to check if a greater than b return a and vice versa (Line 2 -5).

In the main program (Line 7 - 10), prompt user to input two numbers (Line 7 - 8). At last call the function by passing num1 and num2 as arguments and print the result (Line 10).

6 0
3 years ago
What are face shields intended to protect you from? (select best answer?
aivan3 [116]
Well it determends if there wearing them for sports or for fighting 
if it is for sports then they are protected from balls and such
if it is for fighting then they are protected from bullets arrows and anything else you could think of
they are used to shield your face
8 0
3 years ago
Read 2 more answers
Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
PIT_PIT [208]

Ill choose flowchart. Look picture for the answer

ask me if you have any doubts about my answer.

5 0
3 years ago
Why is body language an important factor in a business meeting
slava [35]

The importance of the body language in business. Body language is a language without spoken words, it is called non verbal communication. We use it all the time in our social life and business life so it is all about gestures movements and expressions made by people to deliver a specific message to other people. Business meetings are all about making a good impression.

5 0
3 years ago
How big is an iphone xr
Eddi Din [679]

Answer:

the iPhone xr display measure in at 6 .1 inches

8 0
3 years ago
Read 2 more answers
Other questions:
  • Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
    15·1 answer
  • Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic
    5·1 answer
  • The section of the browser window highlighted in yellow is the _____.
    11·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • James would like to send a document he has saved on the hard drive to coworkers in Ireland, Brazil, and India. These coworkers h
    6·2 answers
  • Rey is recording the dialogues and sound effects separately in the studio, as he is not happy with the sound quality recorded on
    9·1 answer
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • PLEASE HELP ILL GIVE BRAINLIEST IMMEDIATLEY TO THE CORRECT ;-;
    10·1 answer
  • All operations used to construct algorithms belong to one of three categories: sequential, conditional, or iterative. Below is a
    15·1 answer
  • A web server on your network hosts your company's public website. You want to make sure that an NIC failure doesn't prevent the
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!