1.Why might a WAN be less reliable than a LAN?
2.How does a router enhance a network compared to a hub?
3.How does the processing function affect gaming performance?
4.Why have USB ports largely replaced parallel ports in modern computers?
5.What is a key security concern in a computer network, and how can it be addressed?
Ruwan Suraweera Changed status to publish 1 day ago
1.
Answer: WANs cover larger areas, increasing the risk of connection issues and latency.
Description: Wide Area Networks rely on external infrastructure (e.g., satellites), which can fail or slow down, unlike Local Area Networks, which are confined and easier to manage.
Description: Wide Area Networks rely on external infrastructure (e.g., satellites), which can fail or slow down, unlike Local Area Networks, which are confined and easier to manage.
2.
Answer: A router directs data intelligently to specific devices, while a hub broadcasts data to all devices.
Description: Routers use IP addresses to route traffic efficiently, reducing network congestion, whereas hubs simply share data, making them less efficient in larger networks.
Description: Routers use IP addresses to route traffic efficiently, reducing network congestion, whereas hubs simply share data, making them less efficient in larger networks.
3.
Answer: A stronger processor (CPU) handles complex calculations faster, improving game speed and graphics.
Description: The processing function, managed by the CPU, executes game logic and rendering. A high-performance CPU reduces lag and enhances the gaming experience.
Description: The processing function, managed by the CPU, executes game logic and rendering. A high-performance CPU reduces lag and enhances the gaming experience.
4.
Answer: USB ports are faster, smaller, and support hot-swapping, unlike parallel ports.
Description: Parallel ports were bulky and slow, used for printers in older systems. USBβs versatility and ease of use made it the standard for connecting devices today.
Description: Parallel ports were bulky and slow, used for printers in older systems. USBβs versatility and ease of use made it the standard for connecting devices today.
5.
Answer: Unauthorized access is a concern; it can be addressed with firewalls and encryption.
Description: Networks are vulnerable to hacking. Firewalls block unwanted traffic, and encryption scrambles data, ensuring only authorized users can access it.
Description: Networks are vulnerable to hacking. Firewalls block unwanted traffic, and encryption scrambles data, ensuring only authorized users can access it.
Β
Ruwan Suraweera Changed status to publish 2 days ago