MyITLab Helpdesk

Ace your homework & exams now with Quizwiz!

what are logical ports

A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers.

what is an IP address and where I can find the IP address for my computer

An IP address is a unique number identification assigned to each computer, server, or device connected to the Internet. To find your IP address, go to Google and type "what is my IP."

how is an e-mail server different from a communications server

An e-mail server processes and delivers incoming and outgoing e-mail, whereas a communications server handles all communications between the network and other networks, including managing Internet connectivity.

is there an alternative to remembering IP addresses

Yes, you can use a domain name. A domain name is simply a name that takes the place of an IP address, making it easier to remember.

what are web servers

A web server is used to host a website so it will be available through the Internet.

once debugging is done, can the created software program be released

Actually, after debugging, the last step is to test and document the program

once I've defined my problem statement, can I start coding

Actually, after defining the problem statement, the next step in a programming project is for programmers to translate the programs into an algorithm.

how do I create fields in a database

Actually, you can create the fields manually by assigned field names.

what happens after programmers create an algorithm

After programmers create an algorithm, they select a programming language and translate the algorithm into that language.

what are authentication servers

Authentication servers keep track of who is logging on to the network.

how do I get started on creating a database

Before creating a database, you need to know the three main components of a database. These include fields, records, and tables.

when my friend connects to my computer, how is data transferred

Computers communicate efficiently using the communication methodology called packet switching.

but how do computers get the IP address from a domain name

Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses.

what are decision points

Decision points are points at which the program must choose from different actions, based on the value of its current inputs.

what do file servers do

File servers are used to store and manage files for network users.

what else can hackers do

Hackers can also launch an attack from your computer called a denial of service (DoS) attack. A DoS attack is an attack on a computer system launched from an unprotected computer.

once compilation is done, is the program finished

No, programmers still need to test the code to see whether the program behaves as it should

do database servers manage the network databases

Not really. Database servers provide client computers with access to information stored in a database.

after programmers finish coding, what do they do next

Once the algorithm has been coded into a programming language, the programmers have to run it through a compiler

how do packets travel through the internet

Packets are routed using Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is a suite of protocols used to route packets over the Internet.

once I download or buy the firewall software, how do I get it installed and tested

Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided and the user manual. you can test it by going to such sights as grc.com and running the shieldup test to see if you're safe

does the IP address remain the same or can it change automatically

The IP address changes automatically if your computer has a dynamic IP address. A dynamic IP address is a temporary IP address and is assigned by your ISP when your computer connects to the Internet.

what's the first step in programming

The first step in programming is to define the problem statement.

what are the different types of databases and which is most common

There are relational, object-oriented, and multidimensional databases. Of these, the relational database is most common.

is it important to have a firewall on a home network

To be safe, you should always have a firewall if you plan to connect to the Internet

do I need any special software to use dedicated servers

Yes. You need to install special network operating system (NOS) software on each client computer and server connected to the network to provide the services necessary for them to communicate.

are there different kinds of firewalls

You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

what data type can I use for a field if I have to store a page of text

You can use memo fields. They are text fields that are used to hold long pieces of text.

what server is used to store applications

You need to use an application server to store applications. When a client connects to the network and requests an application, the application server delivers the software to the client computer.

how do I create relationships between tables

You use primary and foreign key fields to create relationships between tables.

but how will a firewall help if I'm not exchanging any valuable information over the internet and you don't have any important files on my computer

a firewall protect your computer a screening data coming into the logical port and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft.

what is an IED

an integrated development environment is a development tool that helps programmers write, compile, and test their programs

besides committing identity theft, what else can hackers do

hackers can use Trojan horses to gain control of your computer without your knowledge. a trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious the background without your knowledge

is one table in a database enough to enter all my information in it and store all the fields

no, you need to create different tables and organize data to be stored in them

what if the IPS's web server cannot locate the IP information on the default DNS server

the default DNS server contacts one of the DNS servers. A root DNS server knows the location of all the DNS servers that contain the master listing for an entire top level domain

my office has shifted to a client /server Network and uses one server and the office - is that sufficient

the number and types of servers you need depends on the workload your network experiences

if data is broken into chunks and sent over various routes at the same time, how do you these packets reach their destination

the packets contains destination information in our reassembled when they all reach the destination

but, if I include the primary key of one table and the other table, won't I have two primary keys for a record

when the primary key of one table is included in another table to establish a relationship between the two tables, it is called a foreign key in a related table

what else can I store in a field besides text, numeric values, and contents of a calculation

you can store pictures and video clips using OLE object fields


Related study sets

PSM I: Practice Test Missed Questions

View Set

60's: Great Society-Voting Rights of 1965

View Set

100 Great Essays by Robert DiYanni

View Set

Mod 3: Musculoskeletal Conditions & Interventions Part 3

View Set

Financial Accounting - Module 4: Adjusting Journal Entries

View Set

Industry Knowledge + Contact Center Analytics

View Set

pathophysiology 3rd and 4th powerpoint stuff

View Set