Home
Q&A
Education
Technology
Credit
General
Health
Insurance
Questions
Ask a Question
What are Applications of Communication & Computer Network?
asked
Nov 7, 2020
in
Technology
by
JackTerrance
Applications of Communication & Computer Network
interview-question-answer
technology-questions-answers
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Nov 7, 2020
by
JackTerrance
Computer systems and peripherals are connected to form a network.They provide numerous advantages:
Resource sharing such as printers and storage devices
Exchange of information by means of e-Mails and FTP
Information sharing by using Web or Internet
Interaction with other users using dynamic web pages
IP phones
Video conferences
Parallel computing
Instant messaging
Related questions
0
votes
Q: Why to Learn Data Communication & Computer Network?
Why to Learn Data Communication & Computer Network?...
asked
Nov 7, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: What is Data Communication & Computer Network?
What is Data Communication & Computer Network?...
asked
Nov 7, 2020
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Communication between a computer and a keyboard involves ______________ transmission.
Communication between a computer and a keyboard involves ______________ transmission. Automatic Half-duplex Full-duplex Simplex...
asked
Jan 10, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Explain how principles of computer programming are applied in different languages to produce software applications.
Explain how principles of computer programming are applied in different languages to produce software applications. Select the correct answer from above options...
asked
Dec 9, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Explain how principles of computer programming are applied in different languages to produce software applications.
Explain how principles of computer programming are applied in different languages to produce software applications. Select the correct answer from above options...
asked
Dec 3, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?A) VirusesB) WormC) Trojans
Which of the following describes programs that can run independently travel from system to system and disrupt computer ... D) Droppers Select the correct answer from above options...
asked
Dec 24, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: The device which is used as a means of communication and the computer system is what
The device which is used as a means of communication and the computer system is what Select the correct answer from above options...
asked
Dec 24, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: What is data communication in principals of computer communication networks?
What is data communication in principals of computer communication networks? Select the correct answer from above options...
asked
Dec 21, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: interconnection of computer is possible only with help of:(A) cable(B) information technology(C) COMMUNICATION LINKS
interconnection of computer is possible only with help of: (A) cable (B) information technology (C) COMMUNICATION LINKS (D) PROCESSING Select the correct answer from above options...
asked
Dec 10, 2021
in
Education
by
JackTerrance
computer-science-interview-questions
computer-science-questions
0
votes
Q: Communication channel is shared by all the machines on the network in ________
Communication channel is shared by all the machines on the network in ________ broadcast network unicast network multicast network anycast network...
asked
Jan 10, 2021
in
Technology
by
JackTerrance
interview-question-answer
technology-questions-answers
0
votes
Q: Part of the social media sites are the various games & 3^rd party applications which helps ______________ to get access to your data.
Part of the social media sites are the various games & 3^rd party applications which helps ______________ to ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked
Oct 31, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: ____________ is an attack where the attacker is able to guess together with the sequence number of an in progress communication session & the port number.
____________ is an attack where the attacker is able to guess together with the sequence number of an in progress ... questions and answers pdf, mcq on Cyber Security pdf,...
asked
Nov 3, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: In port scanning, a port is always associated with the _____________ (typically of host system) & the type of ____________ employed for communication.
In port scanning, a port is always associated with the _____________ (typically of host system) & the type ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked
Nov 1, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: In port scanning, a _________ is always associated with an IP address (usually of the host system) & the type of protocol (UDP or TCP) employed for communication.
In port scanning, a _________ is always associated with an IP address (usually of the host system) & the ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked
Nov 1, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
0
votes
Q: ____________ is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.
____________ is the method for keeping sensitive information in email communication & accounts secure against ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked
Nov 1, 2021
in
Education
by
JackTerrance
essential-cyber-security-interview-questions
cyber-security-interview-questions-answers
cyber-security-multiple-choice-questions
cyber-security-mcq-with-answers
cyber-security-mcq
core-cyber-security-questions
...