The two most prominent LAN technologies in use today are Ethernet (supports bandwidths of up to 100 Gbps equivalent to 100,000 Mbps) and WLAN.

Ethernet operates in the data link layer and the physical layer. Ethernet sublayers are related to the frame fields. The Ethernet MAC address is used and a MAC address table is built up in a switch. On the switch ports there is forwarding methods and port settings available on Layer 2. Also switch speeds come into the methods.

Logic to physical to logic


Commands are case-sensitive. This is true.


When entering a command, do arguments or options typically come first? Options comes first.


Which command will print your current location in the filesystem? present working directory which is the command pwd


Which command will allow you to change your current directory? change directory which is the command cd.


Which of the following is not an example of an absolute path?  Documents is not an absolute path.

Integrity ensures that data remains unchanged and trustworthy. It is therefore an art to maintain the design, implementation and usage of any system that stores, processes, or transmits data. 

How do we create a digital signature? A code signing is a method of verifying code integrity. Digital signatures and certificates incorporates the data integrity controls to provide users a way of verifying the authenticity of messages and documents.

The the step by step process for creating a digital signature must take the following steps.