Question

a) suggest five components of computer network

a) suggest five components of computer network

Homework Answers

Answer #1

Five computer network components are as follows:

Client: This coponent of computer network requests for the data to the server over the network through other networking devices.

Server: This is one of the main component od computer network which stores all the valuable data that can be transfer or share over the network to the destination.

Cables: These are the transmisson media to interconnect the two network devices with each other. e.g wires, coaxial wires, optical fibre cables.

Hub: Hubs are the networking devices especially to connect the computers in a LAN.

Switch: This device is used to connect other devices all in together which receive data from different input ports and transmit it to intended destination.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Explain crosstalk in computer media and suggest a remedy.
Explain crosstalk in computer media and suggest a remedy.
1. What components are required for a network to exist for three or more devices?
1. What components are required for a network to exist for three or more devices?
a) An IP address is a number that uniquely identifies a device within a computer network....
a) An IP address is a number that uniquely identifies a device within a computer network. This address can be derived from a General Network Address. i. Using any network address of your choice, explain how you would generate IP addresses by subnet masking. ii. Briefly explain the concept of Host Address and Network Address.
Internet is said to be a worldwide interconnected network of computers that allows a computer in...
Internet is said to be a worldwide interconnected network of computers that allows a computer in one part of the world to communicate with a computer located somewhere in the world but it cannot work alone. In a your own words identify and discuss all the : Technologies           Devices           Software           Applications that make the internet work
computer forensics question how would you use data about network traffic to defer attacks to the...
computer forensics question how would you use data about network traffic to defer attacks to the network?
A computer has three mutually independent components: a CPU, a MONITOR, and a KEYBOARD. The probability...
A computer has three mutually independent components: a CPU, a MONITOR, and a KEYBOARD. The probability of failure within six years for these components is given as 0.50, 0.20, and 0.10 respectively. What is the probability that the computer is fully functioning.
A lab network consisting of 20 computers was attacked by a computer virus. This virus enters...
A lab network consisting of 20 computers was attacked by a computer virus. This virus enters each computer with probability 0.8, independently of other computers. What are the expectation and variance of the number of attacked computers? Find the probability that the virus enters at most 18 computers. Show work below.  
Design an L-type network using discrete components (inductors and / or capacitors) to couple a load...
Design an L-type network using discrete components (inductors and / or capacitors) to couple a load of ZL = 150-j200 Ohms to a system with Zo = 100 Ohms. Please include Smith Chart if used
A system with five components, which functions if at least three of the components function, is...
A system with five components, which functions if at least three of the components function, is designed to work outdoors. Suppose that the components function with probability 0.9 if the temperature is above freezing, and they function with probability 0.7 if the temperature is below freezing. The weather forecast for tomorrow predicts there is a probability of 0.40 that the temperature will be below freezing. What is the probability that the system functions tomorrow?
How would you use data about network traffic to deter attacks to the network? This is...
How would you use data about network traffic to deter attacks to the network? This is a question based on computer forensics.