100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
NSA COMPUTER NETWORK TEST EXAM WITH GUARANTEED ACCURATE ANSWERS $16.49
Add to cart

Exam (elaborations)

NSA COMPUTER NETWORK TEST EXAM WITH GUARANTEED ACCURATE ANSWERS

 0 purchase
  • Course
  • NSA COMPUTER NETWORK
  • Institution
  • NSA COMPUTER NETWORK

What are the 2 keys to decimal/hex/octal/binary conversions? - ACCURATE ANSWERS 1. Binary is the intermediary 2. BE CAREFUL What is endianness? - ACCURATE ANSWERS The order or sequence of bytes of a word of digital data in computer memory What is big endian? - ACCURATE ANSWERS The most signi...

[Show more]

Preview 4 out of 40  pages

  • November 21, 2024
  • 40
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • NSA COMPUTER NETWORK
  • NSA COMPUTER NETWORK
avatar-seller
GRADEUNITS
NSA COMPUTER NETWORK TEST
EXAM
NSA COMPUTER NETWORK TEST EXAM WITH GUARANTEED ACCURATE ANSWERS




What are the 2 keys to decimal/hex/octal/binary conversions? -
ACCURATE ANSWERS✔✔ 1. Binary is the intermediary
2. BE CAREFUL


What is endianness? - ACCURATE ANSWERS✔✔ The order or
sequence of bytes of a word of digital data in computer memory


What is big endian? - ACCURATE ANSWERS✔✔ The most significant
byte is stored at the smallest memory address and the least significant
byte is stored at the largest memory address

,What is little endian? - ACCURATE ANSWERS✔✔ The most
significant byte is stored at the largest memory address and the least
significant byte is stored at the smallest memory address


With regards to endianness, what is "network order?" - ACCURATE
ANSWERS✔✔ Network order refers to data being sent across a
medium in big endian (most significant byte first) in the Internet
Protocol


What is the endianness of most processor architectures, including Intel
x86, AMD x86-64, ARM, and RISK-V? - ACCURATE ANSWERS✔✔
Little endian


In what two situations is paying attention to endianness important? -
ACCURATE ANSWERS✔✔ 1. When sending data between two
different computers. The communication protocol must ensure that even
if the two computers' endianness differs, the data isn't corrupted. IP does
this by defaulting to network order.


2. When investigating memory dumps. You must understand the
endianness of the computer whom the memory dump comes from to
properly be able to analyze the dump.


4 part memory hierarchy - ACCURATE ANSWERS✔✔ 1. Registers
2. Caches
3. Main memory
4. Storage

,How many bytes are in a word? - ACCURATE ANSWERS✔✔ 2 bytes


How many bytes are in a single ASCII character? - ACCURATE
ANSWERS✔✔ 1 byte


How many bytes are in a single UTF-8 character? - ACCURATE
ANSWERS✔✔ 1 to 4 bytes (variable)


What are the 5 segments of a process's memory? - ACCURATE
ANSWERS✔✔ From low to high addresses:
1. Text segment (code / executable instructions)
2. Initialized data segment
3. Uninitialized data segment
4. Heap segment (dynamic memory allocations, grows toward high
addresses)
5. Stack segment (function arguments, local variables, grows toward low
addresses)


What is a *solid state drive*? - ACCURATE ANSWERS✔✔ An SSD is
a form of memory that uses integrated circuits for persistent memory
(flash memory)


What is a *hard disk drive*? - ACCURATE ANSWERS✔✔ An HDD is
a form of memory that uses magnetic properties to store and retrieve
digital data on spinning disks

, What is user space? - ACCURATE ANSWERS✔✔ The section of
memory in which normal user processes run. Processes running in this
space only have access to a limited part of this space (the process's own
space and any shared memory sections). Process in this space can only
access kernel space through controlled system calls.


What is kernel space? - ACCURATE ANSWERS✔✔ The section of
memory in which kernel processes run. Processes running in this space
have access to all memory spaces, user and kernel. Significantly higher
privilege than user space.


Name the seven layers of the *OSI model* - ACCURATE
ANSWERS✔✔ 1: Physical
2: Data Link
3: Network
4: Transport
5: Session
6: Presentation
7: Application


Name the four layers of the *TCP/IP model* - ACCURATE
ANSWERS✔✔ 1: Link
2: Internet
3: Transport
4: Application

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller GRADEUNITS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

69052 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$16.49
  • (0)
Add to cart
Added