Describe The Role Of A Host On A Network Case Study

Decent Essays
Q2. Describe the role of a host on a network
The role of the host is to provides services and connections to other computers on a network, it uses high-speed communication to transfer data and messages over a network. Q4. Define the terms, dongle and broadband. List popular wire and wireless broadband Internet services
Dongle is a wireless modem, it is a small device that when connected to a computer allows additional functions.

Broadband is when a user can connect to the internet, it has a fast transfer speed and it is alway-on connection. Through broadband Internet service users can do many things on their computers, such as download files from websites, play online games, communicate in real time with other users, which online videos
…show more content…
State the purpose of a DNS server
The purpose of a DNS server (Domain Name System) is to store the domain names and it’s corresponding IP addresses in the Internet. When a domain name is entered in a browser, the DNS translates the name to its associated IP address to be routed to the correct computer.

***Q14. Distinguish among the web, a webpage, a website, and a web server
Web (World Wide Web/WWW): consist of a worldwide collection of electronic documents.
Webpage: the electronic documents, which contains text, graphics, animation, audio, and video. Some webpage can be a static (fixed), in which visitors will see the same content each time nothing changes. While the dynamic (changing) webpage generates its contents each time a user displayed it, it may also contain customised contents, such as current time and date, featured stock, movies or tickets available for users be it a flight ticket or concert
…show more content…
For them to interact, retain the same information and perform the same tasks that they can do in a computer. However, in mobile apps it sometimes has fewer features than the web app contains.

Q22. Describe the purpose of GPS receivers, and why manufacturers embed them in smartphones
The purpose of GPS (Global positioning System) receivers is a navigation system that consists of many earth-based receivers that accept and analyse signals sent by satellites in order to determine the receiver’s geographic location. Manufacturers embed GPS in smartphones so that users can determine their location, obtain directions, and locate points that they wish to go.

**Q23. Explain the risks and concerns involved in letting app track your location. List any benefits
Apps can transmit a user’s location and personal information which risks having apps trade their location to the company and can even be hacked and retrain the location where they are.

Q24. Describe how to use a search engine. What are some ways you can refine a search?
To use a search engine, a user has to enter a word or phrase, called a search text to describe the item that they want to find.

Q25. Besides webpages, identify other items a search engine can

Related Documents

  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    3. IP Transit IP Transit, also known as Internet Transit, is what allows traffic from a network to cross or "transit" to a provider network. This type of service is generally used to connect one of the smaller internet service providers to the rest of the internet. 4. Dark Fibre Dark Fibre, also known as, unlit fibre, is an unused optical fibre that's commonly used in fibre-optic communication.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    However, mobile devices can actually pinpoint your location using the built-in GPS. The advantages of mapping and location-based software are, simple to use, multiple destinations, selective travel type, man useful information, and the creation of customized maps. Some disadvantages include, limited accuracy, used…

    • 223 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The Hypertext Transfer Protocol (HTTP) is basic block of data communication for the World Wide Web (WWW). The logical links between the nodes, containing text, is called hypertext. HTTP is the protocol to exchange or transfer hypertext. It defines how the web servers should act in response to various commands and how the messages have to be formatted and transmitted. HTTP is a stateless protocol because each command is executed individually independently •…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    Ajax AJAX stands for Asynchronous JavaScript + XML. This term was mentioned first in 18 February 2005 in an article of Jesse James titled “Ajax A New Approach to Web Applications”. AJAX was raised as a new development technique in 2005.many it is a highly responsive and interactive interface believe that it will blur the line between web-based and desktop application. This technology will change the web technology in future (Aune,…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    First to connect to the internet you need an internet service provider to have access to the internet which is a router to connect to your home network to the ISP. It can be wired or wireless connected to your home network. The web browser is a program which allows me to browse web pages such as my sync email account. You need a domain name to identify the IP address to have access; they are used in URLs to find particular web pages. URL first part is named a protocol finder and indicates what protocol should be used, the last part is a resource name and it identifies the IP address of where the resource is placed.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    to use. These are designed for the typical users to complete normal work, normally in the school’s network they will have limitations on student accounts, for example, there are many sites that they cannot access, and their computer will only hold the essential applications (software), etc. It is very common to see Windows operating system installed in these workstations however they might not be up to date as it can be costly, hence they would use older versions of windows operating system. • Interconnection devices are a physical piece of hardware used to connect the users to a network they are connected to, some examples of these interconnection devices are: o Routers – These devices uses protocols such as ICMP (Internet Control Message) Protocols, using these protocols, routers will search and determine the best path between the two hosts to send data packets back and forth. o Switches – While routers send data packets, switches filter these data packets and then send the data packet to its destination, however it has very limited functions, it is more advanced than a hub, however it is less compared to a router.…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Unit 1 P1 Research Paper

    • 744 Words
    • 3 Pages

    Wi-Fi – Allows devices to gain access to the internet wirelessly. IrDA - Cellular radio - GSM/UMTS - WAP - WML…

    • 744 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Blown To Bits Summary

    • 749 Words
    • 3 Pages

    Hal Abelson, Ken Ledeen, and Harry Lewis use their fourth chapter of their book Blown to Bits to discuss search engines. They describe how search engines work, and the possible problems that they could have. As was the case with the third chapter of Blown to Bits, I enjoyed reading this chapter. I felt that this chapter was not written to condemn technology, but rather to inform people about something that has become a vital element of human society. I was intrigued by the authors’ discussion of all of their topics.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    There are 7 different types of networks that you could work with, such as A LAN network (Local Area Network) or WAN network (Wide area network) those are the two most commonly used networks. The other included seven types are; • LAN (Local area network) this network is one that operates over and is limited to a relatively small area such as a school or office building. • WAN (Wide area network)…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Consequently, this is an opportunity of mobile phone companies, which support for this project for example, Verizon, AT&T or T-Mobile, have more channel for advertisements of their own promotion or new innovation. Moreover, another objective of this project is that to provide the Internet to needy people, who cannot afford to pay for high cost of network (LinkNYC benefits outweigh costs, 2014). This implies that Mobile phone companies will have more potentials to provide a service for people who have lower income or find new customers especially in a low income…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Unit 28 P1 And P3

    • 1265 Words
    • 6 Pages

    Unit 28 – P1 & M1 In this report I will explain the brief outline of the web architecture and components which allow the internet and website to function. I will construct a flow diagram to show the various different stages and processes that information must pass through to get from server to screen. Web Architecture Web architecture is the term used for web design, this is a method to plan and design websites. Web architecture focuses on the user and user requirements.…

    • 1265 Words
    • 6 Pages
    Decent Essays
  • Improved Essays

    Unit 6 Assignment 1

    • 666 Words
    • 3 Pages

    Additionally, there are probably many others that can determine my location, such as websites and the federal government. In an attempt to improve my privacy I rarely give apps the ability to access my location and I have the location feature disabled on my phone.…

    • 666 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Police officers have needed the information on electronic devices. They need this data for finding missing citizens and suspects. But have been stopped in their tracks countless times. They have been stopped by the owners and others that believe the 4th Amendment enables them to decline the seizing and search of their devices. They want officers to have a warrant.…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Outsourcing Trends

    • 1566 Words
    • 7 Pages

    Briefly describe the technologies that are leading businesses into the third wave of electronic commerce. The key technologies that are leading businesses into the third wave of electronic commerce include mobile phones and tablets along with high-speed networks that allow users to access the Internet and smart cards and radio frequency identification devices (RFID) that are being used with biometric technologies such as retina scanners and fingerprint readers. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.…

    • 1566 Words
    • 7 Pages
    Improved Essays