education

PAST QUESTION AND ANSWER FOR CTE 224 ( INTERNET TECHNOLOGY)

CTE 224


1A. Define protocol: Protocol are standard program developed to enhance the methods of transmitting and prescribing various kind of information from one device to another either through wired or wireless media.


1B. BRIEFLY EXPLAIN THE FOLLOWING PROTOCOLS


I. TCP/IP: ( Transmission control protocol and internet protocol) are often link together. The linking of server protocol is common since the function of different protocol can be complementary so that together they carry out some complete task. The combination of service protocols to carry out a particular task is often called a “stack” because it has layer of operation.
II. IMAP: Interactive mail access protocol allows the reading of individual mail boxes of a stage account and is more common in business environment.
1C. Highlight 4 obstacles of internet growth in Nigeria and the proferred solution to each obstacles


OBSTACLES OF INTERNET GROWTH IN NIGERIA


a. High cost of getting internet
b. Increasing competition
c. Pervasive power outages
d. Low speed and time consuming internet


SOLUTION TO THE 4 PROBLEM


a. Government policy
b. Improved power supply
c. Establishment of independent satellite
d. Provision of tellecommunication infrastructure
2A. DEFINE MODEM : Is a device that modulate an analog carrier signal to encode digital information and also demodulate such carrier signal to decode the transmitted information.


2B. MENTION AND EXPLAIN BRIEFLY THE THREE TYPES OF MODEM


a. External Modem
b. Internal Modem
c. PC Card Modem
a. External Modem: This is the simplest type of modem to install because you don’t have to open the computer before removing or putting it. External Modem have their own power supply and connected with a cable to a computer’s serial port.
b. Internal Modem: Most internal Modem installed in your computer. Internal Modem are directly integrated into the computer system and therefore did not need any special attention.
C. PC Card Modem: This Modem is designed for portable computer, it looks like the size of a credit card. It has the features of both external and internal Modem. The modem is removed when not used at the moment.


2C. MENTION THE SECURITY PROTOCOL USED TO SECURE WIRELESS COMPUTER NETWORK


I. Uniform resource local (URL)
II. Hypertext transfer protocol (HTTP)
III. File transfer protocol (FTP)
IV. TCP/IP (Transmission control protocol)


3A. DEFINE A COMPUTER NETWORK


Computer network is a group of computer system and other computing hardware devices that are linked together through communication channel to facilitate communication and resource sharing among a wide range of users.


3B. EXPLAIN 4 PROPERTIES OF COMPUTER NETWORK


I. IT FACILITATE COMMUNICATION: Using a network people can communicate effectively and easily via mail instant messaging chat room, video, telephone e.t.c
II. Permit sharing of files, data and other information in a network environment. Authorized users may access data and information stored on other computer on the network.
III. MAY BE DIFFICULT TO SETUP: It may be difficult and also very costly to setup on an effective computer network in a large organization or company
IV. MANY INTERFACE WITH OTHER TECHNOLOGY: Power line communication strongly disturb certain form of radio communication e.g armature radio

C. EXPLAIN TWO CLASSES OF TRANSMISSION MEDIA


I. Unguided media
II. Guildsd media
I. UNGUIDED MEDIA: They are not protected or bound to a channel to follow. The following are unguided media used for data communication computer are;
A. radio transmission
B. microwave
II. GUILDED MEDIA: Guilded transmission media as the name implies are the transmission media that contains a solid material or protected and bound to a channel. Example are;
A. optical fiber
B. unshielded twisted pair
C. shielded twisted pair


4A. DISTINGUISH BETWEEN INTERNET CAFE AND INTERNET CENTER


Internet cafe or cyber cafe is a place where people can get connected to the internet WHILE internet center people can get connected to the internet while eating or having a cup of tea using publicly accessible computer.


4B. STATE METCALFE’S LAW OR REED’S LAW


METCALFE’S LAW: state that the value of an on-demand point to point connection is proportional to the number of potential subscribers.
REED’S LAW : it stated that the value of a fully meshed network is proportional to the exponent number of subscribers assuming that communication group of any two end points, up to and including all the end points.


4C. STATE ANY THREE BENEFIT OF INTERNET


I. Provides fast communication channel
II. Provides latest news and online reference
III. Provides entertainment


5A. DEFINE NETWORK TOPOLOGY


A network topology is the schematic description of a network arrangements, connecting various node and device ( sender and receiver) through lines of connection.


5B. DISTINGUISH BETWEEN THE FOLLOWING


i. PHYSICAL AND LOGICAL TOPOLOGY
Physical topology: refer to the placement of the network various components including device location and cable installation.
Logical topology: it has a data flow within a network regardless of the physical design.


5Bii. PARTIAL MESH AND FULL MESH TOPOLOGY


PARTIAL MESH TOPOLOGY: In the following some of the system are connected in the same fashion as mesh topology but some devices are only connected to two or three device.
FULL MESH TOPOLOGY: each and every nodes or devices are connected to each other


5C. EXPLAIN RING NETWORK TOPOLOGY


RING NETWORK TOPOLOGY(Token Ring): is a network topology that is setup in a circular fashion in which data travels around the ring in one direction and each device on the right act as a repeater to keep the signal strong as it travels.

5D. STATE THE ADVANTAGES AND DISADVANTAGE OF RING NETWORK TOPOLOGY
STATE THE ADVANTAGES OF RING NETWORK TOPOLOGY


I. Cheap to install and expands
II. Transmitting network is not affected by high traffic or by adding nodes (as only the nodes having taken can transmit data)


STATE THE ADVANTAGES AND DISADVANTAGE OF RING NETWORK TOPOLOGY

I. Troubleshooting is difficult in ring topology.
II. Failure of one computer disturb the whole network.


6A. EXPLAIN THE TWO TYPES OF DATA TRANSMISSION WITH AN APPROPRIATE DIAGRAM FOR EACH TYPE

I.

DIGITAL TRANSMISSION
II. ANALOG TRANSMISSION

I. DIGITAL TRANSMISSION: is the physical transfer of data( a digital bit stream) over a point to point communication channel

Digital transmission diagram

II. ANALOG TRANSMISSION: is a transmission method of conveying voice, data, image, signal or video information using a continuous signal which varies in amplitude, phase, or some other properties in proportion to that of the variable
Analog transmission diagram
.


6B. EXPLAIN BRIEFLY THE THREE (3) MODE OF TRANSMISSION


I. SIMPLEX MODE: in the transmission media data can be sent only in one direction i.e communication is unidirectional but cannot be sent back to sender. Unidirectional is done in simplex system where command signal is sent and response is not expected.
II. HALF DUPLEX MODE: in this transmission media data, can be transmitted in both direction on a signal carrier but not of the same time.
That is, on a network using a technology that has half duplex transmission, one work station can send data on a line and then immediately receive data on the line from the same direction in which data was just transmitted.
III. FULL DUPLEX MODE: in this transmission media data, can be transmitted in the both direction as it is bidirectional at the same time. In other words data can be sent in both direction simultaneously.

Oluwamuyide Peter

My name is seyi, the main aim of creating this platform is to help users get information like school updates, electrical engineering topics and many more for free

Related Articles

Leave a Reply

Back to top button