MGMT 54490

subject Type Homework Help
subject Pages 6
subject Words 443
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The three key objectives of computer security are confidentiality, integrity, and
availability.
It is desirable to have only one path from sender to receiver to avoid excess costs.
________ is an Internet-based standard and is the framework for developing a complete
range of computer communications standards.
A(n) _________ uses Internet technology and applications to provide in-house support
for distributed applications.
page-pf2
Typically, more complex routing protocols are used between autonomous systems
within a larger internet and relatively simple routing protocols are used within each
autonomous system.
The __________ is a data unit supplied by LLC. The maximum size of this field is
1500 octets for a basic frame, 1504 octets for a Q-tagged frame, and 1982 octets for an
envelope frame.
TCP/IP is a protocol architecture.
page-pf3
A disadvantage of sliding window flow control is that it is not supported by many data
link control protocols.
A _________ is a generalization of the firewall approach and takes advantage of IP
security capabilities to allow secure communications between external users and the
company's intranet.
Traditional client/server architecture is also called 3-tier architecture.
The _________ is the most widely publicized of a family of modern technologies
designed to provide high-speed digital data transmission over ordinary telephone wire.
page-pf4
When a _________ data processing strategy is followed, computers are dispersed
throughout an organization.
__________ is a common link protocol for all LANs and specifies the mechanisms for
addressing stations across the medium and for controlling the exchange of data between
two users.
The Internet grew out of a Department of Education project.
page-pf5
________ is a set of drivers, APIs, or other software that improves connectivity
between a client application and a server.
DNS is actually a huge collection of servers working together in hierarchy.
Refraction refers to the bending of the signal.
________ files contain very little formatting and do not support formatting such as
boldface, italics, or underline.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.