A Comprehensive Guide To Sliding Gate Doors

A Comprehensive Guide to Sliding Gate Doors

Sliding gate doors are a convenient and innovative way to add security and aesthetic appeal to a property. As the name suggests, these gates slide open rather than swinging outwards or inwards, offering a number of unique benefits. Whether you’re interested in adding a gate to a private residence or a commercial property, a sliding gate door might just be the perfect solution.

Sliding gate doors come in various materials and designs, with the capacity to suit any architectural style. Most commonly, they are manufactured from steel or aluminium, both of which offer excellent durability. Aluminium sliding gates are often favored for their lightweight and rust-resistant properties, while steel options are appreciated for their strength and robustness.

But incidentally, one brand that stands out in the world of sliding gate doors is the centsys sliding gates. With a blend of technology and innovation, this brand has become a popular choice for many property owners.

The centsys sliding gates are popular for their advanced features. They are fully automated, offering users the convenience of remote operation. The gate could be opened or closed without having to physically touch it. This makes it an ideal choice especially in adverse weather conditions where one might not want to step out of their vehicle to open the gate.

Moreover, the centsys sliding gates come with built-in anti-crushing technology for safety, ensuring that the gate does not close if an obstacle is detected in its path. Also equipped with speed control settings and smooth start-stop operations, these gates offer an extensive lifespan by reducing wear and tear on the mechanics of the gate system.

Aside from the choice of material and the automation features, sliding gate doors are popular because they require less space compared to their swinging counterparts. Since they slide along the fence or wall, rather than swinging outwards, they are a great solution for properties with limited driveway space. Additionally, these gates are resistant to wind and can’t be forced open by it. Therefore, they are a more resilient option in windy areas.

Installation of sliding gate doors is a major project that involves considering how the gate will fit within the surrounding landscape, deciding on the ideal operation method, and ensuring the ground is suitably level for a sliding action. Professional installation is typically recommended because a poorly installed sliding gate may not function properly, potentially causing problems down the line.

Sliding gate doors, with features like those offered by the centsys sliding gates, offer enhanced security. The very sight of such a solid gate often serves as a deterrent to potential intruders. Coupled with security cameras or intercom systems, they provide an additional layer of security for properties.

In conclusion, sliding gate doors offer a blend of convenience, safety, and visual appeal. They are suitable for a variety of settings, from residential to industrial premises, and can be customized to fit the ambiance of the property. Brands like centsys sliding gates are pushing the boundaries of what’s possible with their advanced features, making the sliding gate door a top choice for modern, security-conscious property owners.

Posted by Admin in Gates - Comments (0)
6 September

Coaching An Engineer: What Makes Top Performers Better?

Submitted by: Martina Carroll-Garrison

I had been an Engineer, Project Manager, and Program Manager (PM) for nine years. For the last three of them, my performance as a PM had reached a plateau. I would like to think it was a good thing that I had arrived at my professional peak early in my career.

Unfortunately, it seemed as if I had just stopped growing, and I felt as if I was stuck. During the first two or three years of my engineering career, my skills and confidence improved almost daily. Scope, schedule and budget were my stock, my value was high, and my end-users loved me because I delivered. I remember being 20-something and feeling invincible. The middle three years seemed to be about pushing through barriers and expanding my professional repertoire, while the last three years seemed to lack passion or engagement.

As an Engineer in the Facilities and Construction Industry, I have had a great team around me for most of my professional life. I recognized that I was stuck, especially when colleagues were moving ahead organizationally and professionally, while I appeared to have hit the proverbial brick-wall. My mentor suggested that I engage an Executive Coach; as he felt he was too close to give me objective advice about my professional stagnation. What? Engineers do not hire coaches I thought we are smart enough to figure this out for ourselves. I must admit that I found it ludicrous to pay someone to come into my worklife and coach me on my work methods, when I had already been successful. Fortunately, I had a strong mentor and reason prevailed, and I made the investment in myself. For me the investment in an Executive Coach was a watershed experience. Through coaching, I developed deep self-awareness, albeit the experience of learning about myself was excruciating. That first journey into self was the most revealing yet most difficult road my logical mind has ever travelled. Through the experience, I discovered that I had created my own professional brick-wall, and I was the only person impeding my professional advancement.

Through coaching, I experienced a tectonic shift in my professional wellbeing, which resulted in my accelerated transition from nine years of technical positions to emerging executive assignments within 12 months. I grew as a leader simply because I had excellent coaches who taught me how to know myself, or they taught me how to think as a leader of people rather than a leader of projects, scopes and schedules. There was no distinct formula for my coaches positive influence over my career, and I have engaged an Executive Coach several times. I suspect the secret to each successful coaching engagement is that I admired and respected each of them, and I listened to them. I understood that the coaches in my worklife were not infallible, and I had to learn how to apply their wisdom to my specific environment and work culture. Through remaining curious about their unique perspective, listening to and understanding their feedback, being open and transparent about testing their ideas, and using them to test my ideas or explore my fears, I was able to work through some sticky leadership issues. Unequivocally, I achieved personal and professional growth, and transitioned from being an Engineer to an Executive because of Executive Coaching. As I progressed professionally, I also discovered that as a leader, I was expected to be a coach to my team. I studied the art and science of coaching my team and I discovered that I excelled at coaching. I now pursue my second career as an Executive Coach and delight in working with Engineers and other high performing individuals who aspire to achieve greater executive influence. I could never have achieved such deep self-awareness or professional growth without the help of my various Executive Coaches.

Is Executive Coaching For Me and How Do I Use One?

Executive Coaching re-awakens passion, curiosity, engagement, and dreams, while also deepening your self-awareness and leadership capacity. An Executive Coach s job is to observe, to assess, and to guide your professional development. An Executive Coach will tell you what others will not or cannot about your leadership presence and your impact on others.

You are a young or mid-career Engineer who aspires to be an executive, and your mentor suggested that you hire an Executive Coach. Alternatively, your organization sees your leadership potential and engages an Executive Coach to help accelerate your executive growth. Although a less frequent scenario, your organization recruited you into an executive position, and now is offering you an Executive Coach to facilitate your transition from being an Engineer to an Executive. Regardless of how you have come to the coaching relationship, the top three coaching objectives are:

[youtube]http://www.youtube.com/watch?v=JrkJsEw8p5M[/youtube]

Develop self-awareness. By becoming more aware of your limitations and growth opportunities as a leader, and understanding the root cause of your behavior in the workplace and its impact on others.

Enhance life development. By balancing personal and professional roles more effectively, you increase your capacity for executive level performance.

Accelerate leadership capacity. By developing interpersonal and team leadership skills, you become more effective in leveraging influence within human systems at the executive level.

Use Your Executive Coach

Coaches come in all shapes and styles. Whether your Executive Coach is a seasoned professional, an internal asset, or an empathic listener and thought provocateur, or a combination of all three they all have one thing in common. An Executive Coach will assist you to lay the foundation for your accelerated learning. They help you to develop greater self-awareness, give you motivation, provide accountability and support, and they keep you focused while you are taking specific actions towards your professional goal.

10 Ways to Use Your Executive Coach

To optimize the relationship it is therefore important to understand how to use your Executive Coach by developing an effective coaching strategy

1. Choose to make the most of your Executive Coach. This is your decision alone and your attitude rather than your aptitude will make the difference to a successful coaching relationship. Accept that there is a teaching moment in every coaching conversation if your mind is open to learning. Making the most of your Executive Coaching relationship begins with choosing to do so. Every successful career journey you make begins with the end in mind, and so it is with your Executive Coaching journey. By reflecting upon why you need an Executive Coach and what issue or issues you want to explore with an Executive Coach you will have already begun your journey towards self-improvement.

2. Ain t nobody s business but your business because only you can change you. Your Executive Coach does not change you. Coaching is a one-on-one process in which your Executive Coach helps you to resolve your work related issues. An Executive Coach provides just-in-time training to help you to develop greater self-awareness. You should expect to receive motivation, accountability and support, towards keeping you focused while taking specific actions towards your goal. However, you define the goal, because the coaching outcome is unique and specific to you.

3. Seek pain. Change sucks, it can hurt and it s good for you! If your Executive Coaching relationship is not causing you some discomfort then you are missing the point. We like where we are because we are comfortable, or at least we have learned to tolerate it. Changing our situation causes so many other secondary impact spirals that we often forget the benefit of the original change. Thus, change becomes uncomfortable and even painful. Newton’s laws of motion remind us that a body at rest stays at rest and a body in motion stays in motion. Start moving, embrace the pain and work through it with your Executive Coach.

4. Demand accountability. The Executive Coach serves as your accountability partner. The Executive Coach gets you moving, but you are the one that endures the pain of flexing mental, emotional, spiritual and physical muscles you did not even realize you had. When the Executive Coach is working harder than you are, he/she will know they are in the wrong relationship and usually offer to resign.

5. Demand feedback. We know what we know about ourselves quiet well, but what we do not know is what causes us the most problems. Out blind spots are the reason we need an Executive Coach to provide us feedback on how others perceive us. Feedback can be uncomfortable but if you do not demand it from the safest relationship you will ever have you are missing the greatest growth opportunity of your life.

6. Test your learning. Your Executive Coach is not infallible, and sometimes may inadvertently substitute his/her coaching hat with a consultant hat. If you are uncomfortable with a new direction , test it before you deploy it. In coaching, one size does not fit all and you have to know how to interpret and adapt your learning within the culture and environment where you live and work. When I worked in Belgium it was normal to greet and kiss colleagues (both men and women) on the cheek, however as a coachee I would be very confused and even misled if my Executive Coach asked that I exhibit similar interpersonal behavior in New York or Atlanta.

7. Coaching styles are different. Do not be put off by them. My coaching style is one of gentle irreverence, as I will call you on your BS. This is my style and you may be uncomfortable with it, but this is the authentic version of me. You want to work with an authentic coach, not one who will change to meet every whim as they become too distracted to serve your real needs. Before you fire me ask yourself are you firing me because I am unable to coach you, or because my style irritates you. This is a life-test, as you face the same dilemma in your workplace and among your customers and clients. Learn from the experience and work through it by focusing on the goals and the outcomes.

8. Be transparent with your Executive Coach. While trust takes time to build, you can accelerate the process by being open and honest, as this will lead to a better relationship and a better coaching outcome. Be clear about what your personal value system is and share it with your Executive Coach. An authentic coach will know if there is disconnect and offer to remove himself or herself from the relationship. Likewise, an authentic coach should not take you outside the boundaries of your personal value system. Be open to exploring new ideas; however know where you stand and why you stand there.

9. Do not harbor resentment nor suffer in silence. If an Executive Coach does not meet your expectation, be direct. Unless you articulate to the Executive Coach when or how the relationship is not working he/she will not know how or when to fix the issue. This is a simple life-hack with application beyond the coaching relationship; do not assume that people know what you are thinking. A client once told me after the coaching engagement that I did not hold her accountable for assigned activities during our time apart, and she felt cheated. I had no idea that she felt this way in what was otherwise a very successful relationship.

10. Keep your eye on the prize. An Executive Coach s job is to help you to become unstuck, but does not give you the answers; rather an Executive Coach helps you to unlock the answers from within yourself. Through the process of coaching, you will discover there are many other questions that need to be asked and answered. Before you deploy on another coaching adventure be sure that are satisfied with the progress you have made on your first quest. Stay focused on the prize and on your contracted engagement.

.

About the Author: Dr. Martina Carroll-Garrison is an Executive Leadership Coach with the MCG Consulting Group, LLC at http://www.mcgconsultinggroup.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1897828&ca=Business+Management

Posted by Admin in Gates - Comments (0)
24 January

N10 006 Certification Guides}

N10-006 Certification Guides

by

Judith M. Ehlers

Question: 1

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

A. Add a router and enable OSPF.

B. Add a layer 3 switch and create a VLAN.

C. Add a bridge between two switches.

D. Add a firewall and implement proper ACL.

Answer: B

Explanation:

We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs.

A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.

Toallow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 2

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch

B. Proxy server

C. Layer 2 switch

D. Smart hub

Answer: A

Explanation:

The question states that the traffic being transported is a mixture of multicast and unicast signals. There are three basic types of network transmissions: broadcasts, which are packets transmitted to every node on the network; unicasts,which are packets transmitted to just one node; and multicasts, which are packets transmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 3

Which of the following network devices use ACLs to prevent unauthorized access into company systems?

A. IDS

B. Firewall

C. Content filter

D. Load balancer

Answer: B

Explanation:

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls arefrequently used to prevent unauthorized Internet users from accessing privatenetworks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question: 4

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

A. Traffic shaping

B. High availability

C. Load balancing

D. Fault tolerance

Answer: A

Explanation:

If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially.

Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

Question: 5

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

A. OSPF

B. VTP trunking

C. Virtual PBX

D. RADIUS

E. 802.1x

Answer: D,E

Explanation:

D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user accounts and passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISPs to authenticate their customers Internet connections.

Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network.

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device,such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server is the RADIUS server.

Question: 6

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

A. Multifactor authentication

B. ISAKMP

C. TACACS+

D. Network access control

[youtube]http://www.youtube.com/watch?v=nYVkyLefu2A[/youtube]

Answer: C

Explanation:

TACACS+ (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question: 7

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases

B. Helper addresses

C. Scopes

D. Reservations

Answer: D

Explanation:

A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address ofthe network interface card that should receive the IP address.

For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.

Question: 8

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE).

A. Default gateway

B. Subnet mask

C. Reservations

D. TFTP server

E. Lease expiration time of 1 day

F. DNS servers

G. Bootp

Answer: A,B,F

Explanation:

The question statesthat the client computers need to access the Internet as well as internal company servers. To access the Internet, the client computers need to be configured with an IP address with a subnet mask (answer B) and the address of the router that connects thecompany network to the Internet. This is known as the default gateway (answer A).

To be able to resolve web page URLs to web server IP addresses, the client computers need to be configured with the address of a DNS server (answer F).

Question: 9

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

A. Configure NAT on the firewall

B. Implement a split horizon DNS

C. Place the server in the DMZ

D. Adjust the proper internal ACL

Answer: B

Explanation:

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-basedseparation but is most commonly done in software.

In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. Forthe internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The external DNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.

Question: 10

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

A. Load balancer

B. FTP server

C. Firewall DMZ

D. Mail server

Answer: D

Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsiblefor accepting email for the recipients domain.

For example a user sends an email to recipient@somedomain.com. The sending users email server will query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the hostnameof the email server responsible for accepting email for the somedomain.com domain, for example, mailserver.somedomain.com. The sending email server will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address. The sending mailserver will then forward the email to the destination mail server.

Question: 11

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

A. BGP

B. OSPF

C. IS-IS

D. MPLS

Answer: D

Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.

MPLS works by prefixing packets with an MPLS header, containing one or more labels.

An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labels used to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward.

A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it off the outgoing packet.

When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

Question: 12

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch

B. Access point

C. Analog modem

D. DOCSIS modem

Answer: C

Explanation:

Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By todays standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps.

An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.

An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.

Question: 13

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?

A. RS-232

B. 802.3

C. ATM

D. Tokenring

Answer: A

Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the functions of the 9 pins in a DB-9 connector. The RS-232 standard was around long before computers. Its rare to see a new computer nowadays with a serial port but they were commonly used for connecting external analog modems, keyboards and mice to computers.

Question: 14

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?

A. 66 block

B. BNC

C. F-connector

D. RJ-11

Answer: B

Explanation:

A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial cable and BNC connectors.

Question: 15

An F-connector is used on which of the following types of cabling?

A. CAT3

B. Single mode fiber

C. CAT5

D. RG6

Answer: D

Explanation:

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and universally forsatellite television and cable modems, usually with RG-6/U cable or, in older installations, with RG-59/U cable.

Question: 16

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).

A. 1000Base-LR

B. 1000Base-SR

C. 1000Base-T

D. 10GBase-LR

E. 10GBase-SR

F. 10GBase-T

Answer: B,E

Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiberwith a distance capability between 220 meters and 550 meters.

10Gbase-SR’is a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short wavelength signaling.

Question: 17

CORRECT TEXT

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the ‘Submit Cable Test Analysis’ button.

Explanation:

A Cable Certifier provides Pass or Fail information in accordance with industry standards but can also show detailed information when a Fail occurs. This includesshorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.

Question: 18

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

A. Star

B. Bus

C. Ring

D. Mesh

Answer: C

Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a star topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.

To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a token. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data beforereleasing the token. Only a computer in possession of the token can transmit data onto the network.

Question: 19

A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?

A. Star

B. Ring

C. Mesh

D. Bus

Answer: A

Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network.

The switch forms the central component ofthe star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table to discover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

Question: 20

Which of the following network topologies has a central, single point of failure?

A. Ring

B. Star

C. Hybrid

D. Mesh

Answer: B

Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network.

The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table to discover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

The switch that forms thecentral component of a star network is a single point of failure. If the switch fails, no computers will be able to communicate with each other.

Question: 21

Which of the following refers to a network that spans several buildings that are within walking distance of each other?

A. CAN

B. WAN

C. PAN

D. MAN

Answer: A

Explanation:

CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often implement CANs to link the buildings in a network. The range of CAN is 1KMto 5KM. If multiple buildings have the same domain and they are connected with a network, then it will be considered as a CAN.

Question: 22

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?

A. PAN

B. LAN

C. WLAN

D. MAN

Answer: A

Explanation:

PAN stands for Personal Area Network. It is a network of devices in the area of a person typically within a range of 10 meters and commonly using a wirelesstechnology such as Bluetooth or IR (Infra-Red).

Question: 23

Which of the following describes an IPv6 address of ::1?

A. Broadcast

B. Loopback

C. Classless

D. Multicast

Answer: B

Explanation:

The loopback address is a special IP address thatis designated for the software loo

Test Information:Total Questions: 461Test Number: N10-006Vendor Name: COMPTIACert Name :.COMPTIA NETWORK+Test Name: COMPTIA NETWORK+ CERTIFICATION EXAMOfficial Site: http://www.examkill.co.ukFor More Details: http://www.examkill.co.uk/N10-006.htmlGet20% Immediate Discount on Full Training MaterialDiscount Coupon Code:3219R86596

Article Source:

eArticlesOnline.com}

Posted by Admin in Gates - Comments (0)
1 September