• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/474

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

474 Cards in this Set

  • Front
  • Back
One perspective of data communications and networking as stated in the textbook, examines the management of networking technologies, including security, network design, and managing the network on a day-to-day basis and long term basis.
Answer:
True False
True
The application layer is the fifth layer of the Internet model and provides the end user's access to the network.
Answer:
True False
True
An Inter-Exchange Carrier (IXC) provides only local telephone services to homes and businesses.
Answer:
True False
False
Common carriers include the RBOCs, IXCs, and Cable TV companies.
Answer:
True False
True
ANSI is a voting participant in the ISO.
Answer:
True False
True
Telecommunications is the transmission of voice and video as well as data and implies transmitting a longer distance than in a data communication network.
Answer:
True False
False
Ano _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet.
Choose one answer.
a. WAN
b. BN
c. intranet
d. MAN
e. extranet
e. extranet
Pervasive networking means that:
Choose one answer.
a. the five-layer network model will be used to design all networks
b. the cost of computers will be higher in the future
c. cable companies will offer more than 150 network selections for viewers
d. virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates
e. all networks of the future will be developed by a monopolistic organization
d. virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates
Ano _________ develops a specific system and companies purchase the service without ever installing the system on their own computers.
Choose one answer.
a. application service provider
b. file server
c. open systems interconnection reference model
d. inter-exchange carrier
e. regional bell operating system
a. application service provider
Which of the following is not an important future trend in communication and networking?
Choose one answer.
a. integration of voice, video, and data
b. pervasive networking
c. provision of new information services on rapidly expanding networks
d. development of extremely high speed broadband networks
e. development of online batch systems
e. development of online batch systems
Networks that are designed to connect similar computers that share data and software with each other are called:
Choose one answer.
a. peer-to-peer networks
b. local area networks
c. client networks
d. host networks
e. client/server networks
a. peer-to-peer networks
In 1983, the Internet was split into two parts, one dedicated solely to the military and one dedicated to university research centers. The two parts were called:
Choose one answer.
a. Milnet and Internet
b. ARPANET and Milnet
c. BITNET and NSFNET
d. Intranet and Extranet
e. none of the above
a. Milnet and Internet
The fourth layer of the OSI model is called the __________ layer.
Choose one answer.
a. presentation
b. session
c. network
d. data link
e. transport
e. transport
The American National Standards Institute:
Choose one answer.
a. makes technical recommendations about global telephone rates
b. sets the standards that govern how much of the Internet will operate
c. is a professional society in the U.S. whose standards committees focus on local area network standards
d. is the coordinating organization for the United States' national system of standards
e. is an agency that develops federal information processing standards for the federal government
d. is the coordinating organization for the United States' national system of standards
The primary reason for networking standards is to:
Choose one answer.
a. simplify cost accounting for networks
b. make it more difficult to develop hardware and software that link different networks
c. ensure that hardware and software produced by different vendors can work together
d. ensure that all network components of a particular network can be provided by only one vendor
e. lock customers into buying network components from one vendor
c. ensure that hardware and software produced by different vendors can work together
A metropolitan area network is:
Choose one answer.
a. a network spanning a large geographical area (up to 1000s of miles).
b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.
c. a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.
d. a high speed central network, built with privately owned media, which connects other networks in a distance spanning up to several miles.
e. a network spanning exactly 543.56 miles with private media.
c. a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.
Which of the following is not true about ITU-T:
Choose one answer.
a. Its membership is limited to U.S. telephone companies
b. It is based in Geneva, Switzerland
c. Its membership is comprised of representatives from over 200 member countries
d. It is the International Telecommunications Union – Telecommunications Group
e. It is the technical standards-setting organization of the United Nations International Telecommunications Union
a. Its membership is limited to U.S. telephone companies
Ano _____________ is a company that provides a wide range of standardized information services, in the same manner that electric companies provide electricity.
Choose one answer.
a. host
b. IXC
c. file server
d. RBOC
e. information utility
e. information utility
Which of the following is true about ISO:
Choose one answer.
a. It is based in Geneva, Switzerland
b. It is one of the most important standards-making bodies
c. It makes technical recommendations about data communications interfaces
d. Its name stands for International Organization for Standardization
e. All of the above
e. All of the above
In 1970, a key decision regarding MCI:
Choose one answer.
a. set up the Telecommunications Competition and Deregulation Act
b. divided AT&T into two parts: one part for long distance service, and a second part, comprised of seven operating companies, for local telephone service
c. permitted MCI to provide limited long distance service in the U.S.
d. set up deregulation for international telecommunications markets in 68 countries
e. permitted telephone and/or computer equipment that was not manufactured by Bell Telephone to be connected to AT&T's network
c. permitted MCI to provide limited long distance service in the U.S.
Due to recent advances in high speed communication networks, the information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened.TF
T
The first electronic data communication system was the telephone developed by Alexander Graham Bell. TF
F - telegraph Morse
The first transcontinental telephone service was established in the 1940s.TF
F - 1915
The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET.TF
T
Telecommunications is the movement of computer information from one point to another by means of electrical or optical transmission systems.TF
F - this is data communications
A local area network (LAN) connects other LANs and BNs located in different areas to each other and to wide area networks in a span from 3 to 30 miles.TF
F
An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization.TF
F - internal only
A car manufacturer may give access to certain portions of its network to some of its suppliers via Internet. This is an example of an Extranet.TF
T
The OSI model is the most widely used network model to develop and build networks today. TF
F - Internet model is most widely used
The network layer is responsible for routing messages from the source computer to the destination computer.TF
T
At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller packets and opening a connection to a server for transferring the packets.TF
T
Ethernet is an example of a network layer protocol.TF
F - data link layer
Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.TF
T
The specification stage of the formal standardization process consists of developing nomenclature and identifying the problems to be addressed.TF
T
The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks.TF
T
An Application Service Provider (ASP) develops a specific system and companies purchase or rent the service without installing the system on their own computers.TF
T
Data communications and networking can be considered as a global area of study because:
a. new technologies and applications emerge from a variety of countries and spread around the world
b. the technologies enable global communication
c. the political and regulatory issues are exactly the same in every country
d. a and b
e. none of the above
d. a and b
new technologies and applications emerge from a variety of countries and spread around the world
the technologies enable global communication
In 1984, a federal judge broke up a highly contested telephone service monopoly and:
a. set up the Telecommunications Competition and Deregulation Act
b. permitted MCI to provide limited long distance service in the U.S.
c. permitted telephone and/or computer equipment that was not manufactured by Bell Telephone to be connected to AT&T’s network
d. divided AT&T into two parts: one part for long distance service, and a second part, comprised of seven regional operating companies, for local telephone service
e. set up deregulation for international telecommunications markets in 68 countries
d. divided AT&T into two parts: one part for long distance service, and a second part, comprised of seven regional operating companies, for local telephone service
In 1996, the U.S. Congress replaced all current laws, FCC regulations, and the consent decree for AT&T. It:
a. set up the Telecommunications Competition and Deregulation Act
b. permitted MCI to provide limited long distance service in the U.S.
c. permitted telephone and/or computer equipment that was not manufactured by Bell Telephone to be connected to AT&T’s network
d. divided AT&T into two parts: one part for long distance service, and a second part, comprised of seven operating companies, for local telephone service
e. set up deregulation for international telecommunications markets in 68 countries
a. set up the Telecommunications Competition and Deregulation Act
Modern (1990s and beyond) data communication networks are characterized by:
a. decks of punch cards
b. online terminals for batch processing
c. isolated (stand-alone) microcomputers
d. batch I/O devices
e. distributed systems that rely heavily on networking
e. distributed systems that rely heavily on networking
Which of the following is not true about a server?
a. stores data and software that can be accessed by the client.
b. is the pathway through which messages travel.
c. in client/server computing they work together over the network with client computers to support the business application.
d. can only perform one function on a network.
e. stores documents and graphics that can be accessed from any Web browser.
d. can only perform one function on a network.
The function of the file server is to :
a. store data and software programs that can be used by client computers on the network.
b. manage all printing requests from clients on the network.
c. transfer e-mail messages to other servers on the network.
d. store HTML documents for an Internet or intranet web site.
e. coordinate the communication of client and servers on the network.
a. store data and software programs that can be used by client computers on the network.
A local area network is:
a. a large central network that connects other networks in a distance spanning exactly 5 miles.
b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.
c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles).
d. a network spanning a large geographical area (up to 1000s of miles).
e. a network spanning exactly 10 miles with common carrier circuits.
b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.
A backbone network is:
a. a high speed central network that connects other networks in a distance spanning up to several miles.
b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.
c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles).
d. a network spanning a large geographical area (up to 1000s of miles).
e. a network spanning exactly 200 miles with common carrier circuits.
a. a high speed central network that connects other networks in a distance spanning up to several miles.
Which of the following is not a property of a WAN:
a. connects backbone networks and MANS.
b. spans hundreds or thousands of miles
c. provides data transmission speeds from 56Kbps to 10Gbps.
d. connects a group of computers in a small geographic area such as room, floor, building or campus.
e. uses lease lines from IXCs like ATT, MCI, Sprint.
d. connects a group of computers in a small geographic area such as room, floor, building or campus.
A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.
a. WAN
b. BN
c. extranet
d. intranet
e. MAN
d. intranet
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
a. presentation Layer
b. transport Layer
c. physical Layer
d. session Layer
e. application Layer
b. transport Layer
The ____________ layer of the OSI model is responsible for data format translation.

a. session
b. presentation
c. physical
d. application
e. transport
b. presentation
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.

a. data link and network
b. session, presentation and application
c. application layer
d. application and presentation
e. network, transport and presentation
b. session, presentation and application
The _________ layer performs error checking which is redundant with the function of the _________ layer.
a. application, presentation
b. physical, data link
c. transport, data link
d. presentation, transport
e. network, physical
c. transport, data link
The _________ layer is responsible for end-to-end transfer of messages from the sender to the final destination.
a. data communication layer
b. resident layer
c. application layer
d. network layer
e. physical layer
e. physical layer
Which of the following is not a function of the data link layer?
a. deciding when to transmit messages over the media
b. formatting the message by indicating where messages start and end, and which part is the address
c. detecting and correcting any errors that have occurred in the transmission of the message
d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it
e. controlling the physical layer by determining when to transmit
d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it (physical)
Which of the following is a term used to group together the physical and data link layers?
a. Internetwork layers
b. Hardware layers
c. Software layers
d. Middleware layers
e. Application layers
b. Hardware layers
Which of the following would be standard used at the Data Link layer of the Internet or OSI model?
a. IP
b. TCP
c. Ethernet
d. HTTP
e. FTP
a. IP
In which layer of the Internet model would the HTTP standard be used?
a. physical
b. application
c. transport
d. network
e. data link
b. application
A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.
a. agreement
b. standard
c. protocol
d. regulations
e. policy
c. protocol
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
a. TCP
b. HTTP
c. FTP
d. SMTP
e. IP
e. IP
Which of the following is not true about formal standards?
a. They are always developed before de facto standards.
b. One example exists for network layer software (IP).
c. They can be developed by an official industry body.
d. They can take several years to develop.
e. They can be developed by a government body.
a. They are always developed before de facto standards.
Which of the following is not true about de facto standards?
a. They never evolve into formal standards.
b. They are those standards that emerge in the marketplace.
c. They tend not to be developed by an official industry or government body.
d. They are generally supported by more than one vendor but de facto standards have no official standing.
e. They tend to emerge based upon the needs/response of the marketplace.
a. They never evolve into formal standards.
The three stages of the formal standardization process are ______________________.
a. specification, identification and acceptance.
b. planning, implementing and acceptance.
c. brainstorming, identification and implementing.
d. specification, formalization, and acceptance.
e. none of the above.
a. specification, identification and acceptance.
Which of the following is not an application layer standard?
a. HTTP
b. POP
c. T1
d. IMAP
e. HTML
c. T1
The term ______________ refers to high speed communication circuits such as DSL.
a. protocol stack
b. regional bell operating company
c. monopoly
d. broadband communications
e. print server
d. broadband communications
The integration of voice, video, and data communications is also known as __________.
a. convergence
b. peer-to-peer networks
c. metropolitan wide networks
d. regional bell operating company
e. intranet
a. convergence
What is APRANET
US dept defence in 69 - network of 4 computers
in 1983 it split - milnet for military, internet for university research
Telecommunications
transmission of data, voice, video (images and graphics) - usually over longer distances
Extranet
same tech as internet but includes invited users external to org
7 OSI layers
1. Physical layer
2. Data link layer
3. Network layer
4. Transport layer
5. Session
6. Presentation
7. Application
Pervasive networking
comms networks will one day be everywhere
Convergence
integration of voice, video, data
Internet model layers (5)
Physical
Data link
network
transport
application
3 stages of standardization process
specification, identification of choices, acceptance
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.TF
F - An application architecture is the way in which the functions of the application layer are performed by the clients and servers in the network
The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.TF
T
A cluster is a group of computers that are linked together so they act as a one computer.TF
T
A network computer is designed to support specific business transactions, such as Automatic Teller Machines and Point of Sale terminals.TF
F - A network computer is designed to communicate using internet based standards
A transaction terminal is designed to support specific business transactions, such as Automatic Teller Machines and Point of Sale terminals.
Host-based and client-based networks are similar in that the client computer performs most of the work.TF
F - server performs most of the work for host-based
As the demand for more and more network applications grow; host-based computing becomes the best solution.TF
False
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.TF
F - its an advantage
In a client-server network, the presentation logic is the responsibility of the client computerTF
T
Middleware is the software that sits between the application software on the client and the application software on the server.TF
T
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.TF
T
A “thin client” approach places most of the application logic on the client.TF
F
The application architecture called the distributed computing model uses the “thick” client approach.TF
F - uses thin client
Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. TF
T
A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands.TF
F - request HEADER contains optional info
the request LINE starts with a command, such as GET, and ends with the HTTP version number that the browser understands.
The Simple Mail Transfer Protocol is the least commonly used e-mail standard.TF
F
The two-tier e-mail architecture does not require any application software on the client computerTF
F
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. TF
F - message is copied to client and deleted from the server
With IMAP the e-mail messages remain on the server computer.
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.TF
T
FTP and Telnet are similar applications, because they allow you to download files from a remote computer to a local computer.TF
F
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.
a. workstation
b. transaction terminal
c. cluster
d. mainframe
e. microcomputer
d. mainframe
Which of the following is not the type of computer commonly used as a server:
a. microcomputer
b. network computer
c. minicomputer
d. mainframe computer
b. network computer
A _____________ is the type of computer you use in your home and is the most common type of client today.
a. microcomputer
b. mainframe
c. mini-computer
d. cluster
e. transaction terminal
a. microcomputer
Which of the following is not true a dumb terminal:
a. it has a monitor, keyboard and no CPU
b. all the processing takes place on the host computer.
c. it is less expensive than a microcomputer.
d. you can install your latest application software on it.
e. it is basically an input/output device.
d. you can install your latest application software on it.
_________ is an application program function that deals with storing and retrieving data.
a. data storage
b. data access logic
c. application logic
d. presentation logic
e. application access storage
a. data storage
An application program function is __________, or the processing required to access data.
a. data storage
b. data access logic
c. application logic
d. presentation logic
e. application access storage
b. data access logic
______________, or the algorithms or business rules programmed into the application, can be simple or complex depending on the application.
a. data storage
b. data access logic
c. application logic
d. presentation logic
e. application access storage
c. application logic
________ is the presentation of information to the user and the acceptance of the user’s commands.
a. data storage
b. data access logic
c. application logic
d. presentation logic
e. application access storage
d. presentation logic
One underlying problem with a host-based network is that:
a. there are economies of scale because all computer resources are centralized
b. the server can get overloaded since it must process all messages
c. the architecture is relatively simple and works well
d. the server is the one point of control which simplifies security
e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
b. the server can get overloaded since it must process all messages
In a client-server network, split up the application architecture functions of data access logic, data storage, and presentation logic:
a. the presentation logic and data storage are on the client, while the data access logic is on the server
b. the data storage, data access, and presentation logic are on the client
c. the presentation logic is on the client, while the data storage and data access logic are on the server
d. the data storage and data access logic are on the client, while the presentation logic are on the server
e. the presentation logic and data access logic are on the client, and the data storage is on the server
c. the presentation logic is on the client, while the data storage and data access logic are on the server
____________ is not an important middleware standard.
a. CORBA (Common Object Request Broker Architecture
b. Distributed Computed Environment (DCE)
c. Asynchronous Transfer Mode (ATM)
d. Open Database Connectivity (ODBC)
e. none of the above is an appropriate answer
c. Asynchronous Transfer Mode (ATM)
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.
a. one
b. two
c. three
d. five
e. n
b. two
One disadvantage of the ____________ architecture is that places a greater load on the network.

a. two-tier
b. three tier
c. one-tier
d. n-tier
e. layered
d. n-tier
A “thick client” architecture approach:
a. always is a two-tier network architecture
b. always is an n-tiered architecture
c. places all or almost all of the application logic on the client
d. places all or almost all of the application logic on the server
e. refers to the size of the cable connecting the clients to the network
c. places all or almost all of the application logic on the client
With the “thin client” architecture, when an application changes, only the _________ with the application logic needs to be updated.
a. client
b. server
c. middleware
d. hardware
e. software
b. server
The idea for a special hypertext network, called the World Wide Web, was conceived of by:
a. Microsoft in 1994 as part of the Windows 95 project
b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1990
c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET
d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC
e. the University of Minnesota as an extension of Gopher
b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1990
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.

a. browser
b. application web
c. web server
d. operating system
e. none of the above
c. web server
To get a page from the Web, a user must type in a URL, which stands for:
a. Unknown Resource Locator
b. Unknown Router Location
c. Uniform Router Location
d. Uniform Resource Locator
e. Uniform Resource Library
d. Uniform Resource Locator
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.

a. Hypertext Transfer Protocol
b. File Transfer Protocol
c. Simple Mail Transfer Protocol
d. Internet Message Access Protocol
e. Hyperlink Transfer Protocol.
a. Hypertext Transfer Protocol
There are optional and required parts of an HTTP request. They are:
a. request address, request body
b. request address, request header, request body
c. request line, request header
d. request line, request body
e. request line, request header, request body
e. request line, request header, request body
A response status code of 404 means:

a. the requested page was not found
b. the server is currently unavailable
c. the sever is currently busy
d. your browser is incompatible with the Web server software.
e. your browser needs to be updated to the latest version.
a. the requested page was not found
The acronym, HTML, refers to:
a. Header Markup Language
b. Hypertext Markup Locator
c. Hypertext Markup Language
d. Hypertext Markup Library
e. Hypertext Modulating Language
c. Hypertext Markup Language
Which of the following is not an advantage of e-mail?
a. It usually takes days for an e-mail message to be delivered to the recipient.
b. It is very effective for multi-national organizations whose employees work across different time zones.
c. It is cheaper than regular mail.
d. It is generally faster than snail-mail.
e. It helps people avoid telephone tag.
a. It usually takes days for an e-mail message to be delivered to the recipient.
The most commonly used e-mail standard is:
a. Simple Mail Transfer Protocol
b. X.400
c. CMC
d. Post Office Protocol
e. Telnet
a. Simple Mail Transfer Protocol
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:
a. message transfer agent
b. router agent
c. user agent
d. Webcast package
e. gateway agent
c. user agent
Another term for a user agent is:
a. message transfer agent
b. router agent
c. e-mail client
d. Webcast package
e. Web client
c. e-mail client
A _____________ , a mailing list of users who discuss some topic, has two parts: a processor and a mailer.
a. listserv
b. Gopher
c. TELNET
d. ADSL
e. FTP
a. listserv
The acronym, MIME, refers to:
a. Multimedia Internet Mail Enterprise
b. Multiple Internet Media Extension
c. Multipurpose Internet Mail Extension
d. Media Internet Mail Extension
e. Multimedia Internet Mime Extension
c. Multipurpose Internet Mail Extension
The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.
True
A network computer is designed primarily to communicate using Internet based standards, but has no hard disk. It has only limited functionality.
False
To use the Web, each client computer requires a data link layer software package called a Web browser.
False
The earliest data communications networks were client-server networks.
False
In a client-server network, the presentation logic is the responsibility of the client computer.
True
The World Wide Web was conceived at University of Utah as part of the development of the Internet.
False
The standard protocol for communication between a Web browser and a Web server is the web protocol.
False
A ________ is a group of computers linked together so that they act as one computer.
Choose one answer.
a. mainframe
b. handheld
c. transaction terminal
d. network computer
e. cluster
e. cluster
To interact with the World Wide Web, a client computer needs an application layer software package called a:
Choose one answer.
a. Telnet package
b. Uniform Resource Locator package
c. Web server
d. Router package
e. Web browser
e. Web browser
How are the application architecture functions split up in a client-server network?
Choose one answer.
a. the data storage, data access, and presentation logic are on the client
b. the presentation logic is on the client, while the data storage and data access logic are on the server
c. the presentation logic and data access logic are on the client, and the data storage is on the server
d. the data storage and data access logic are on the client, while the presentation logic are on the server
e. the presentation logic and data storage are on the client, while the data access logic is on the server
b. the presentation logic is on the client, while the data storage and data access logic are on the server
With respect to costs for a client-server network, which of the following is true?
Choose one answer.
a. None of the above
b. Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client.
c. Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power.
d. More network capacity, which costs more money, is required for client-server networks than for client-based networks.
e. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
e. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
An N-tiered architecture:
Choose one answer.
a. is generally less “scalable” than a three-tiered architecture
b. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers
c. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
d. is generally more “scalable” than a three-tiered architecture
e. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data
d. is generally more “scalable” than a three-tiered architecture
Which of the following is not a general function by any application program?
Choose one answer.
a. data storage
b. application logic
c. application access storage
d. presentation logic
e. data access logic
c. application access storage
Which of the following is not a user agent package?
Choose one answer.
a. Netscape Messenger
b. Microsoft Word
c. Outlook Express
d. Fedora Incorrect
e. Microsoft Outlook
b. Microsoft Word
Which of the following is not true about Telnet?
Choose one answer.
a. Telnet poses no security threat.
b. You are using a host-based architecture with Telnet.
c. One program that conforms to the Telnet standard is EWAN.
d. Telnet was designed in the early days of the Internet.
e. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer
a. Telnet poses no security threat
In a client-server network, _________ gets software from different vendors to work together.
Choose one answer.
a. a front-end processor
b. middleware
c. centerware
d. programmer
e. serverware
b. middleware
In the three tier architecture the software on the client computer is responsible for ____________.
Choose one answer.
a. data access logic
b. data storage
c. application storage
d. application logic
e. presentation logic
e. presentation logic
Marc Andreessen led a team that developed the first graphical Web browser, which was called:
Choose one answer.
a. Internet Explorer
b. Firebird
c. Mosaic
d. Mozilla
e. Netscape Navigator
c. Mosaic
IMAP (Internet Message Access Protocol):
Choose one answer.
a. is exactly the same as POP
b. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server
c. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
d. is exactly the same as SMTP
e. is a set of standards that define how email is to be processed between mail servers
c. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
Client-server architectures:
Choose one answer.
a. cannot connect computers that use different hardware
b. can use middleware to provide a standard way of communicating between software from more than one vendor
c. are one of the least used network architectures today
d. were the earliest type of network architectures
e. assign the responsibility for the presentation logic to the server
b. can use middleware to provide a standard way of communicating between software from more than one vendor
With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic.
Choose one answer.
a. Application; data access
b. Data access; presentation
c. Presentation; application storage
d. Presentation; data access
e. Application; presentation
d. Presentation; data access
With a client-based network, one fundamental problem is that:
Choose one answer.
a. all data on the server must travel to the client for processing
b. the clients each must store all the data
c. the host or server must perform presentation logic, application logic, and data access logic at the same time
d. the clients must perform the data storage logic
e. the server does not have any data storage capability
a. all data on the server must travel to the client for processing
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.
Choose one answer.
a. H.323
b. broadcasting
c. Net Meeting.
d. webcasting
e. instant messaging
d. webcasting
A “thin client” architecture approach:
Choose one answer.
a. places all or almost all of the application logic on the client
b. refers to the size of the cable connecting the clients to the network
c. always is an n-tiered architecture
d. always is a two-tier network architecture
e. places all or almost all of the application logic on the server
e. places all or almost all of the application logic on the server
Name the 4 functions of an app program
data storage, data access logic, application logic, presentation logic
Name the 4 application architectures
host-based, client-based, client server, peer-to-peer
Host-based architecture
4 application functions performed by server. Client records keystrokes. Puts strain on server
describe client-based architecture
client does presentation logic, application logic, data access logic. Server does storage
Describe client server architecture
client does presentation logic,
server does storage, data access logic
application logic can appear on either or both
Describe middleware
software that sits between the app software on client and app software on the server
Firstly provides a standard way of communicating that can translate between software from diff vendors
Secondly manages the message transfer between client and server. identifies and sends to the correct server
Describe 2 tier architecture
uses 2 sets of computers, one set of clients and one set of servers
Describe 3 tier architecture
3 sets of computers
client does app logic
app server does app logic
database server does data access and storage
describe n-tier architecture
more than 3 sets of computers involved
client does presentation logic
database server does data access logic and storage
multiple application servers share app logic
more scalable, load balances servers
more network traffic, harder to program
Name 3 parts of http request
request line - starts with command (GET) provides web page and ends with http version number
request header - optional info
request body - info such as user input
Name 3 parts of http response
response status - version + status code
header - optional info
body - the web page
Describe mail user agent
otherwise known as email client formats email into smtp packets
Describe mail transfer agent
mail server software reads smtp packet and sends and receives
Describe 3 tier email
Web- based email with web server and web browser
Describe the portions of a smtp packet
header, source and destination email addys, date, subject etc
body, the word DATA followed by the message
Describe telnet
allows login to servers. requires username + pwd.
host-based architecture
poses great security threat
Webcasting
one-directional videoconferencing from server to the user.
Describe distributed computing model
thin-client architecture
Data is physically transmitted from one computer or terminal to another in the ________ layer.
a. physical
b. transport
c. application
d. terminal
e. data link
a. physical
____________ refers to the transmission characteristics of the circuit.
a. handshaking
b. virtual circuit
c. bonding
d. logical circuit
e. physical circuit
d. logical circuit
Two fundamentally different types of data are:
a. DSL and ADSL
b. asymmetric and symmetric
c. Microsoft and IBM
d. digital and analog
e. local area and wide area
d. digital and analog
In general, networks designed to transmit primarily computer data are likely to be ________, while networks designed to transmit voice data are likely to be ________.
a. slow, fast
b. level 1, level 2
c. numeric, musical
d. direct, indirect
e. digital, analog
e. digital, analog
A(n) __________ circuit is another name for a multipoint configuration.
a. analog
b. dedicated
c. point-to-point
d. shared
e. simplex
d. shared
Which is not true about point-to-point circuits?
a. point-to-point circuits are dedicated to the use of the two computers.
b. point-to-point circuits are more expensive than multipoint circuits.
c. point-to-point circuits are called dedicated circuits.
d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.
e. Point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit.
d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.
Having a conversation with someone using a cellular phone is an example of _________ transmission.
a. simplex
b. full-duplex
c. half-duplex
d. analog
e. digital
b. full-duplex
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.
a. simplex
b. full-duplex
c. half-duplex
d. analog
e. digital
c. half-duplex
The two basic types of media are:
a. statistical and frequency
b. guided and wireless (radiated)
c. local and wide area
d. attenuator and Gaussian
e. duplexed and non-duplexed
b. guided and wireless (radiated)
The earliest type of fiber optic systems were:
a. Graded index multimode
b. Attenuated
c. Multimode
d. Single mode
e. Step mode
c. Multimode. light reflects inside the cable at many angles
Another term for the weakening of a signal over distance is:
a. turnaround time
b. propagation delay
c. dispersion
d. insulation
e. attenuation
e. attenuation
Which of the following media can best withstand harsh environmental conditions?
a. shielded twisted pair
b. unshielded twisted pair
c. Cat 5 twisted pair
d. coaxial cable
e. fiber optic cable
e. fiber optic cable
Microwave transmission:
a. is a type of high frequency radio communication
b. requires a clear line-of-sight path
c. is typically used for long distance data transmission
d. does not require the laying of any cable
e. all of the above
e. all of the above
______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
a. Line-of-sight effect
b. Multimode index
c. Saturation effect
d. Raindrop attenuation
e. Propagation delay
e. Propagation delay
Which of the following is not an important factor to consider when selecting media to be used in a network?
a. prestige value of the type of media
b. type of network
c. cost
d. transmission distance
e. security
a. prestige value of the type of media
Which of the following media is the least secure?
a. coaxial cable
b. unshielded twisted pair
c. shielded twisted pair
d. fiber optic cable
e. infrared
e. infrared
Which of the following media has the lowest error rates and the highest transmission speeds?
a. coaxial cable
b. unshielded twisted pair
c. shielded twisted pair
d. fiber optic cable
e. infrared
d. fiber optic cable
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.
a. 256
b. 20
c. 200
d. 512
e. 1024
e. 1024
The representation of the character A by the group of 8 bits, 10000001, is an example of:
a. digital coding
b. phase modulation
c. binary modulation
d. analog transmission
e. pitch variation
a. digital coding
When all bits of a character are transferred one after another, the bits are transferred in ___________ mode.
a. serial
b. frequency division
c. multiplexing
d. parallel
e. full complex
a. serial
Which type of digital signaling would experience fewer errors because it has more distinct signals?
a. unipolar
b. serial
c. bipolar
d. attenuation
e. Huffman encoding signal
c. bipolar
Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?
a. phase
b. attenuation
c. bipolar
d. bandwidth
e. codec
a. phase
The direction in which the sound wave begins is known as:
a. amplitude, which our ears detect as loudness
b. frequency, which our ears detect as pitch
c. phase
d. bandwidth
e. furlong
c. phase
The height of a sound wave is called its:
a. frequency
b. phase
c. amplitude
d. bandwidth
e. furlong
c. amplitude
____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0.
a. digitizing.
b. sampling
c. modulation
d. demodulation
e. shaping
c. modulation
With respect to converting digital data into analog signals, AM stands for:
a. Asynchronous Manchester
b. Analog Multimode
c. Amplitude Modulation
d. Anomaly Multiplexing
e. Analytical Mosaic
c. Amplitude Modulation
In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins?
a. bandwidth modulation
b. amplitude modulation
c. frequency modulation
d. phase modulation
e. codec modulation
d. phase modulation
When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______.
a. 24
b. 16
c. 2
d. 8
e. 4
b. 16
____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per wave, or symbol.
a. quadrature amplitude modulation
b. time division multiplexing
c. synchronous digital line control
d. pulse code modulation
e. baseband signaling
a. quadrature amplitude modulation
The _____________ of a circuit determines a circuit’s capacity.
a. frequency
b. bandwidth
c. phase
d. amplitude
e. loudness
b. bandwidth
The typical range of human hearing is:
a. 0 to 4,000 Hz
b. 0 to 1,200 Hz
c. 20 to 14,000 Hz
d. 0 to 300 Hz
e. 0 to 56,000 Hz
c. 20 to 14,000 Hz
To get more “bandwidth” in a digital transmission, you must:
a. increase the range of frequencies available for a transmission
b. increase the loudness per transmission
c. decrease the bits per second transmission speed
d. increase the phase shifts per transmission
e. increase the baud rate per transmission
a. increase the range of frequencies available for a transmission
Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.
a. voice converter
b. modem
c. codec
d. multiplexer
e. demodulator
c. codec
_____________ refers to the difference between the original analog data and the approximation of that data using the techniques for translating from analog data to digital signals.
a. quantizing error
b. handshaking phase
c. modulating frequency
d. POTS anomaly
e. amplitude Trellis effect
a. quantizing error
When converting analog voice data to digital signals, Pulse Code Modulation samples the incoming voice signal _______ times per second.
a. 8,000
b. 8
c. 18,000
d. 64
e. 256
a. 8,000
A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.
a. transponder
b. multiplexer
c. inverse multiplexer
d. codec
e. intelligent terminal
b. multiplexer
Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.
Answer:
True False
F
Radio, infrared, microwave and satellite are all examples of guided media.
Answer:
True False
F
Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency.
Answer:
True False
T
Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.
Answer:
True False
T
Propagation delay is negligible with satellite transmission.
Answer:
True False
F
Amplitude, frequency and phase are all characteristics of a sound wave.
Answer:
True False
T
Manchester encoding is a special type of bipolar signaling in which the signal is changed from high to low or from low to high in the middle of the signal.
Answer:
True False
T
A walkie-talkie is an example of half-duplex transmission.
Answer:
True False
T
Time division multiplexing is more efficient that frequency division multiplexing because the guardbands used in the frequency division multiplexing or not needed.
Answer:
True False
T
Baud rate is the number of bits transmitted per second.
Answer:
True False
F
One form of interference with satellite transmission is called raindrop attenuation in which the transmissions are absorbed by heavy rain.
Answer:
True False
T
Data compression can increase the throughput of a communication link.
Answer:
True False
T
A codec converts an incoming digital signal to an analog signal for transmission over an analog network.
Answer:
True False
F
Guided media refers to the type of media in which the message is broadcast through the air.
Answer:
True False
F
A physical circuit refers to the transmission characteristics of the connection.
Answer:
True False
F
How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels?
Choose one answer.
a. 32
b. 6
c. 64
d. 8
e. 16
b. 6
Inverse multiplexing means:
Choose one answer.
a. combining several low speed circuits to enable them to be transmitted across one high speed circuit
b. multiplexing to a codec, rather than to a modem
c. multiplexing from the terminal to the host, rather than from the host to the terminal
d. inverting the frequencies used for transmission across a low speed circuit for switching to a digital circuit
e. combining high speed circuits to enable them to be transmitted across one low speed circuit
a. combining several low speed circuits to enable them to be transmitted across one high speed circuit
_____________ is not a form of modulation used to transform digital data into analog signals.
Choose one answer.
a. amplitude modulation
b. phase modulation
c. synchronous time division
d. amplitude shift keying
e. frequency modulation
c. synchronous time division
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:
Choose one answer.
a. time division multiplexer
b. statistical frequency division multiplexer
c. statistical time division multiplexer
d. wavelength division multiplexer
e. frequency division multiplexer
d. wavelength division multiplexer
The type of media usually installed on homes and businesses by the telephone company is called ____________.
Choose one answer.
a. phone cable
b. twisted pair
c. phone wire
d. fiber optic cable
e. coaxial cable
b. twisted pair
____________ transmission is prone to interference from smoke, heavy rain and fog and requires line-of-sight.
Choose one answer.
a. radio
b. microwave
c. led
d. infrared
e. fiber optic
d. infrared
With which type of digital signaling does the signal always return to zero volts after each bit?
Choose one answer.
a. Return-to-zero signaling
b. Unipolar signaling
c. Non-return-to-zero signaling
d. Data rate signaling
e. Huffman encoding signal
a. Return-to-zero signaling
Two fundamentally different types of data are:
Choose one answer.
a. Microsoft and IBM
b. DSL and ADSL
c. asymmetric and symmetric
d. local area and wide area
e. digital and analog
e. digital and analog
Which of the following is not a key advantage of digital transmission?
Choose one answer.
a. It is more efficient.
b. It is simpler to integrate voice, video, and data on the same circuit.
c. It is more secure.
d. It permits only low transmission rates.
e. It produces fewer errors.
d. It permits only low transmission rates.
_________ is the basic physical layout of the circuit.
Choose one answer.
a. circuit design
b. circuit plan
c. configuration
d. circuit configuration
e. point-to-point configuration
d. circuit configuration
Ano ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.
Choose one answer.
a. multiplexer
b. transponder
c. intelligent terminal
d. codec
e. inverse multiplexer
a. multiplexer
Transmission speeds:
Choose one answer.
a. are not a factor in selecting a media because all media have more than enough speed to serve current communication demands
b. always have a direct correlation with security
c. are the same among all media
d. are a constant, 56Kbps, for all media types
e. differ widely among media
e. differ widely among media
___________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0.
Choose one answer.
a. sampling
b. demodulation
c. modulation
d. digitizing.
e. shaping
c. modulation
__________ is not a type of digital signaling technique.
Choose one answer.
a. Unipolar signaling
b. Data rate signaling
c. Return-to-zero signaling
d. Non-return-to-zero signaling
e. Manchester encoding
b. Data rate signaling
What is guided media
signal travels along an enclosed path - twisted pair, coaxial etc
What unguided media
no enclosed path - omidirectional or directional eg, radio, microwave
name the 5 benefits of digital over analog
1. fewer errors (binary errors easier to detect and fix)
2. higher max transmission rates
3. more efficient
4. more secure (easier to encrypt)
5. simpler integration of voice, data, video
describe 3 data transmission types
Simplex - one way
half-duplex - both ways but 1 at a time
full duplex - both ways any time
Describe multiplexing
breaks a single circuit into several lower speed logical circuits.
Done in multiples of 4.
Guardband - describe
used in frequency division multiplexing (FDM) for seperating frequencies
What are the criteria for selecting which media
1. type of network
2. cost
3. transmission distance
4. security
5. error rates
6. transmission speeds
Difference between serial and parallel transmission
serial sends one after the other, parallel sends at the same time over channels
Which of the following is not an error detection method used in the data link layer?
Choose one answer.
a. odd parity
b. pulse code checking
c. cyclic redundancy checking
d. parity checking
e. CRC-32
b. pulse code checking
When a signal is reflected back to the transmitting equipment, it is called ano _________.
Choose one answer.
a. echo
b. crosstalk
c. attenuation
d. impulse noise
e. jitter
a. echo
TRIB, an acronym that relates to throughput, stands for:
Choose one answer.
a. Transmission Rate of Information Bits
b. Transmission Regulation for Inverse-multiplexing Bands
c. Throughput Rate of Iso-synchronous Bytes
d. Trellis-coded Regulation of Information Bits
e. Throughput Reduction of Information Barriers
a. Transmission Rate of Information Bits
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
Choose one answer.
a. it uses parity bits for error detection
b. it is not very popular
c. newer version permits jumbo frames
d. it is a bit-oriented protocol
e. it uses block check characters for error detection
c. newer version permits jumbo frames
____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
Choose one answer.
a. Shielding wires
b. Adding repeaters to a circuit
c. Adding amplifiers to a circuit
d. Adding fluorescent lights
e. Shorting a circuit
a. Shielding wires
The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:
Choose one answer.
a. 50%
b. 0%
c. exactly 100%
d. > 99%
e. 75%
d. > 99%
Which of the following is not a type of synchronous protocol?
Choose one answer.
a. VT100
b. Ethernet
c. SDLC
d. PPP
e. HDLC
a. VT100
In communication protocols, _________ are used to convey the user's meaning.
Choose one answer.
a. overhead bits
b. flag bits
c. information bits
d. stop bits
e. start bits
c. information bits
Which of the following is true about roll call polling?
Choose one answer.
a. It is also called token passing.
b. It does not require a server or host or special device that performs the polling.
c. It can not be modified to increase priority of clients or terminals.
d. It is a type of contention approach to media access control.
e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
Media access control:
Choose one answer.
a. is not very important in local area networks
b. is not very important in a point-to-point with a half duplex configuration
c. is not very important in a multipoint configuration
d. does not control when computers transmit
e. is not very important in point-to-point with full duplex configuration
e. is not very important in point-to-point with full duplex configuration
____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.
Choose one answer.
a. Flipped bits
b. Contracted bits
c. Bit delineation
d. Inverse multiplexed bits
e. Polled bits
a. Flipped bits
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
Choose one answer.
a. amplifiers
b. multiplexers
c. digitizers
d. repeaters
e. modems
d. repeaters
Stop-and-wait ARQ uses ___________ type of data flow.
Choose one answer.
a. full complex
b. half complex
c. full duplex
d. half duplex
e. full simplex
d. half duplex
____________ is not a function of a data link protocol.
Choose one answer.
a. Message delineation
b. Indicating when a message starts and stops
c. Error control
d. Media access control
e. Amplitude shift keying
e. Amplitude shift keying
____________ is an effective way to prevent attenuation.
Choose one answer.
a. Shielding wires
b. Changing multiplexing techniques
c. Adding repeaters or amplifiers to a circuit
d. Adding fluorescent lights
e. Shorting a circuit
c. Adding repeaters or amplifiers to a circuit
Which of the following media is least susceptible to noise?
Choose one answer.
a. shielded twisted pair
b. unshielded twisted pair
c. fiber optic cable
d. coaxial cable
e. twisted pair
c. fiber optic cable
ARQ means that:
Choose one answer.
a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error
b. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines
c. a sender is using a parity scheme called Array Resource Quality
d. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries
e. a sender is using a data link protocol called Asynchronous Repeating reQuest
a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error
When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________.
Choose one answer.
a. attenuation
b. jitter
c. intermodulation noise
d. harmonic distortion
e. echo
d. harmonic distortion
________________ is defined as the total number of information bits divided by the total number of bits in the transmission.
Choose one answer.
a. Protocol percentage
b. Transmission efficiency
c. Transmission Rate of Information Bits
d. Throughput
e. Asynchronous rate
b. Transmission efficiency
The probability of detecting an error, given that one has occurred, using parity checking is about:
Choose one answer.
a. 75%
b. 50%
c. 100%
d. 0%
e. 98%
b. 50%
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
a. the physical and the application layers
b. the network and the application layers
c. the network and transport layers
d. the physical and the application layers
e. the physical and the network layers
e. the physical and the network layers
Which of the following is not a controlled access method of media access control?
a. Token access
b. CSMA/CD
c. polling
d. roll call polling
e. hub polling
b. CSMA/CD
________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive.
a. Contention
b. Polling
c. Pooling
d. Carrier sense
e. CRC
b. Polling
With contention:
a. computers wait until the circuit is free before they send data
b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media
c. the front end processor must wait for a response from the polled client or terminal
d. one computer starts the poll and passes it to the next computer on the multipoint circuit
e. there is never a chance for “collision,” or two computers trying to send data at the same time
a. computers wait until the circuit is free before they send data
In general, controlled approaches:
a. work better than contention approaches for small networks that have low usage
b. work better than contention approaches for large networks that have high usage
c. work better than contention approaches for all sizes of networks
d. do not require a host, server, or active monitor to assign media access control
e. have many collisions
a. work better than contention approaches for small networks that have low usage
In a _________ , more than one data bit is changed by the error-causing condition.
a. burst error
b. data rate shift
c. Trellis-coded modulation
d. uniform distribution
e. amplitude key shift
a. burst error
Errors on a network can occur:
a. only on dial-up type of circuits
b. because of noise on the line
c. only on poorly maintained networks
d. only due to Gaussian noise
e. only due to lightning strikes
b. because of noise on the line
Optical media is:
a. more likely to suffer from noise than electrical media
b. has about the same likelihood of suffering from noise as electrical media
c. has about the same likelihood of suffering from noise as coaxial cable
d. less likely to suffer from noise than electrical media
e. more prone to noise than twisted pair media
d. less likely to suffer from noise than electrical media
Another term for impulse noise is:
a. Gaussian noise
b. spikes
c. attenuation
d. cross-talk
e. intermodulation noise
b. spikes
The familiar background static on radios and telephones is called:
a. echoes
b. intermodulation noise
c. line outages
d. cross-talk
e. white noise
e. white noise
__________can obliterate a group of bits, causing a burst error.
a. Crosstalk
b. Attenuation
c. Impulse noise
d. Intermodulation noise
e. Jitter
c. Impulse noise
Cross-talk:
a. occurs when one circuit picks up signals in another
b. is always bothersome because it has a high signal strength
c. decreases with increased proximity of two wires
d. decreases during wet or damp weather
e. increases with lower frequency signals
a. occurs when one circuit picks up signals in another
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
a. jitter
b. spiking
c. attenuation
d. intermodulation noise
e. echo
c. attenuation
Which of the following is way to reduce or eliminate crosstalk on a circuit,
a. changing multiplexing techniques
b. adding repeaters or amplifiers to a circuit
c. reducing the length of the cable
d. adding fluorescent lights
e. shorting a circuit
a. changing multiplexing techniques
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?

a. 01101011
b. 00011011
c. 00100101
d. 10110110
e. 11111110
c. 00100101
In ARQ, a NAK:
a. is sent by the recipient if the message was received without error
b. is sent by the sender at the same time as it sends a data packet
c. is sent by the recipient if the message contains an error
d. refers to non-asynchronous Kermit technique
e. means that the sender should continue with sending the next message
c. is sent by the recipient if the message contains an error
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.
a. open window
b. halt and be recognized (HBR)
c. sliding window
d. stop and wait
e. continuous
d. stop and wait
With __________ ARQ, the sender immediately sends the next message or packet of data.
a. continuous
b. immediate
c. open window
d. stop-and-wait
e. halt and be recognized (HBR)
a. continuous
Asynchronous transmission:
a. is used to transmit each character simultaneously with all other characters
b. has a pre-determined, fixed time between sending characters
c. is typically used on multipoint half duplex circuits
d. uses a continuous series of start bits as an idle signal
e. is also known as start-stop transmission
e. is also known as start-stop transmission
Synchronous transmission:
a. cannot be used on multipoint circuits
b. is used to send one character at a time
c. uses start bits before each character to be sent
d. uses stop bits after each character to be sent
e. is used to transmit a “frame” or “packet” of data at a time
e. is used to transmit a “frame” or “packet” of data at a time
Which of the following is true about the data link protocol, SDLC:
a. It is a client-server protocol developed by Compaq in 1996
b. It is a byte-count-oriented protocol
c. It uses a special bit pattern called a flag at the beginning and end of every frame (or packet)
d. It uses a contention media access control protocol
e. It does not have a problem with transparency
c. It uses a special bit pattern called a flag at the beginning and end of every frame (or packet)
Which of the following is true about the data link protocol, PPP?
a. it is a byte-oriented protocol
b. it is a bit-oriented protocol
c. it uses block check characters for error detection
d. it is a byte-count oriented protocol
e. it uses parity bits for error detection
a. it is a byte-oriented protocol
In communication protocols, _________ are used to convey the user’s meaning.
a. information bits
b. overhead bits
c. stop bits
d. start bits
e. flag bits
a. information bits
Baud
number times the signal on the comms circuit changes
define modem
modulator/demodulator
Formula for TRIB
K(M - C) (1 - P) divided by
(M/R) + T
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:
Choose one answer.
a. port address
b. network address
c. data link layer address
d. IP address
e. application layer address
a. port address
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
Choose one answer.
a. Xerox
b. University of Minnesota
c. ARPANET
d. Hewlett-Packard
e. IBM
c. ARPANET
__________ is not an important function of the transport layer.
Choose one answer.
a. breaking long messages into smaller packets
b. interfacing with the network layer
c. end-to-end delivery of the message
d. routing
e. taking messages from the application layer
d. routing
A special type of message that is used when sending the same message to a specific group of computers is called a:
Choose one answer.
a. radiated message
b. unicast message
c. broadcast message
d. multicast message
e. guided message
d. multicast message
________ is a specially formatted request used to perform IP address to data link address resolution.
Choose one answer.
a. HTTP request
b. Address Resolution Protocol
c. Link state request
d. Domain Service Request
e. Autonomous System Request
b. Address Resolution Protocol
With QoS routing different __________ are defined, each with different priorities.
Choose one answer.
a. classes of service
b. application layer addresses
c. domain names
d. data link layer addresses
e. classes of Internet addresses
a. classes of service
With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.
Choose one answer.
a. indirect
b. distance vector
c. decentralized
d. link state
e. circuitous
b. distance vector
Marks: 1
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
Choose one answer.
a. reassembly value
b. IP addresses
c. sequence numbers
d. packet numbers
e. port numbers
c. sequence numbers
Which of the following is not a protocol used at the application layer.
Choose one answer.
a. UDP
b. Telnet
c. FTP
d. HTTP
e. SMTP
a. UDP
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing ano ___________ between the sender and receiver.
Choose one answer.
a. network layer address resolution
b. DNS server request
c. one way handshake
d. SNA message
e. TCP connection
e. TCP connection
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
Choose one answer.
a. configuration listing
b. routing table
c. linking loader
d. file allocation table
e. bus header assignment list
b. routing table
An advantage of centralized routing is:
Choose one answer.
a. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function
b. the routing tables are stored at all computers in the network
c. it requires more processing by each computer or router in the network than dynamic routing
d. routing decisions are simple
e. routing does reflect changing network conditions, such as computers that are overloaded by many messages
d. routing decisions are simple
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
Choose one answer.
a. X.25 message
b. application layer packet
c. physical layer packet
d. broadcast message
e. multicast message
d. broadcast message
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
Choose one answer.
a. 255.0.0.0
b. 255.255.0.0
c. 11111111.0.0.0
d. 255.255.255.255
e. 255.255.255.0
b. 255.255.0.0
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
Choose one answer.
a. Dynamic routing
b. Link state routing
c. Adaptive routing
d. Static routing
e. Distance vector routing
d. Static routing
Server name resolution is done using the:
Choose one answer.
a. Routing Information Protocol
b. Address Resolution Protocol
c. Domain Name Service
d. Internet Control Message Protocol
e. Border Gateway Protocol
c. Domain Name Service
IGMP refers to:
Choose one answer.
a. Interchange Group Management Parameters
b. Internet Guided Meta Protocol
c. Internet Group Management Protocol
d. Internet Giga Memory Parameters
e. Interchange Guided Meta Protocol
c. Internet Group Management Protocol
______ is the dominant network protocol today.
Choose one answer.
a. SDLC
b. SNA
c. TCP/IP
d. X.25
e. IPX/SPX
c. TCP/IP
_____________ routing is most commonly used when the application data or message can fit into one single packet.
Choose one answer.
a. Connection-oriented
b. Connectionless
c. Physical-oriented
d. Frame-oriented
e. Byte-oriented
b. Connectionless
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
Choose one answer.
a. transport
b. data link
c. presentation
d. session
e. physical
a. transport
Network _______ are important to ensure that hardware and software from different vendors operated by different companies can communicate.
a. protocols
b. directories
c. frequencies
d. topologies
e. directions
a. protocols
TCP/IP:
a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet
b. performs packetizing, as well as routing and addressing functions
c. is not very efficient and is prone to errors
d. is compatible with only one type of data link protocol, SDLC
e. refers to Telephone Control Procedures/Inter-exchange Procedures
b. performs packetizing, as well as routing and addressing functions
The source destination port identifier tells the destination station _____________.
a. which computer sent the TCP packet.
b. which application layer program that the packet should be sent
c. which application layer process the packet is from.
d. the IP address of the source computer.
e. the IP address of the destination computer.
b. which application layer program that the packet should be sent
IP:
a. performs packetizing functions
b. does not have a header
c. is currently in use with only one packet form or structure
d. performs routing functions
e. performs error control functions
d. performs routing functions
The newer form of IP, version 6 (Ipv6) is:
a. running out of address space to support the growth of the Internet
b. has a 20 byte header
c. has an increased address size from 32 bits to 128 bits
d. does not include version number in its header
e. does not include hop limit in its header
c. has an increased address size from 32 bits to 128 bits
In the IPX/SPX network model, ______is the network layer protocol and performs the same routing and addressing functions as its counterpart IP in the TCP/IP model.
a. IPX
b. SPX
c. SAP
d. NCP
e. UDP
a. IPX
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
a. bits
b. bytes
c. frames
d. packets
e. strings
c. frames
A virtual circuit is established in the ___________ routing method.
a. asynchronous
b. connection-oriented
c. frequency division
d. application net
e. connectionless
b. connection-oriented
A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection
a. ACK
b. NAK
c. SYN
d. ARQ
e. FIN
c. SYN
_____________ routing is a method of routing in which each packet makes its own way through the network.
a. Frequency division
b. Connection-oriented
c. PCMCIA
d. Connectionless
e. Application net
d. Connectionless
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
a. transport
b. network
c. physical
d. data link
e. connection
a. transport
UDP is not commonly used for:
a. network management control messages
b. RIP messages
c. DHCP addressing messages
d. HTTP requests
e. routing control messages
d. HTTP requests
An application layer address using TCP/Ipv4 looks like:
a. 128.192.78.5
b. www.cba.uga.edu
c. user@cba.uga.edu
d. 00-0F-00-81-14-00
e. Building 4, Room 2, User 3
b. www.cba.uga.edu
A client computer is assigned a data link layer address is by:
a. hardware manufacturers
b. software manufacturers
c. middleware manufacturers
d. network managers who configure a file in a computer’s network layer software package
e. ISO
a. hardware manufacturers
IPv6 will be based upon _________ -byte addresses.
a. 32
b. 24
c. 4
d. 16
e. 8
d. 16
IPv4 uses ________ bytes per Internet address.
a. 4
b. 32
c. 8
d. 24
e. 16
a. 4
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
a. IPv6 group
b. subnet
c. data link group
d. TCP group
e. application net
b. subnet
Dynamic addressing:
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks
e. can solve many updating headaches for network managers who have large, growing, changing networks
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
a. broadcast message
b. DNS request packet
c. SNA packet
d. IPX message
e. X.25 packet
b. DNS request packet
___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
a. Routing
b. Addressing
c. Interfacing
d. Broadcasting
e. Packetizing
a. Routing
The _____________ is used by a computer to determine how messages will travel through the network.
a. routing table
b. configuration listing
c. linking loader
d. bus header assignment list
e. file allocation table
a. routing table
The three fundamental approaches to routing are:
a. circuitous, flat, and direct routing
b. connectionless, static, and connection-oriented
c. subordinate, master, and insubordinate routing
d. host, client, and client-server routing
e. centralized, static routing, and dynamic routing
e. centralized, static routing, and dynamic routing
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
a. Adaptive routing
b. Dynamic routing
c. Static routing
d. Distance vector routing
e. Link state routing
c. Static routing
_______________ is a type of dynamic routing.
a. Static routing
b. Circuitous routing
c. Centralized routing
d. Link state
e. X.25 routing
d. Link state
One drawback to dynamic routing is:
a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages
b. It cannot be used with non-government networks
c. The transmission of status information “wastes” network capacity that could be used to send user messages
d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table.
e. It requires less processing by each computer than static routing.
c. The transmission of status information “wastes” network capacity that could be used to send user messages
The ping command uses the most basic interior routing protocol on the Internet, which is the:
a. Border Gateway Protocol
b. Internet Control Message Protocol
c. Routing Information Protocol
d. Enhanced Interior Gateway Routing Protocol
e. Open Shortest Path First
b. Internet Control Message Protocol
A type of message that is used when sending a message from one computer to another computer is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message
a. unicast message
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message
c. broadcast message
Which of the following is not given to a client computer that is installed on a TCP/IP network so that it has the appropriate routing/addressing information?
a. application layer address
b. subnet mask
c. its own IP address
d. IP address of its DNS server
e. IP address of a gateway, router, or a switch outside of its subnet
e. IP address of a gateway, router, or a switch outside of its subnet
Media access control refers to:
Choose one answer.
a. the price of fiber optic cable
b. security over floppy disks in a user environment
c. the ability for a user to use multimedia equipment in a LAN
d. controlling access to a media by more than one computer in a LAN
e. the control over coax cable installed by a cable service provider "
d. controlling access to a media by more than one computer in a LAN
__________ is how the network works conceptually.
Choose one answer.
a. Network topology
b. Logical topology
c. Ethernet
d. Physical topology
e. Media access control "
b. Logical topology
Which of the following is not true about layer-2 switched Ethernet?
Choose one answer.
a. A switch replaces the hub.
b. The logical topology is a star.
c. The physical topology is the same as the physical topology of shared Ethernet: a ring.
d. The switch uses a forwarding table to route the packet to the correct circuit/computer.
e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily. "
c. The physical topology is the same as the physical topology of shared Ethernet: a ring.
A switch uses a _____________ that is very similar to a routing table used in a router.
Choose one answer.
a. forwarding table
b. cable plan
c. switching mullion
d. network server
e. reversing table "
a. forwarding table
Ano ____________ allows many users to share the same set of files on a common, shared disk drive.
Choose one answer.
a. file server
b. database server
c. remote access server
d. piconet server
e. print server "
a. file server
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
Choose one answer.
a. network operating system
b. network profile
c. server allocation list
d. user profile
e. user access log "
b. network profile
1000 Base-T:
Choose one answer.
a. can run at either full- or half-duplex
b. can only be used over coaxial cables
c. is one of the oldest forms of Ethernet
d. has only one version, 1000Base-SLCX
e. is one of the slowest forms of Ethernet "
a. can run at either full- or half-duplex
____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
Choose one answer.
a. Network Services
b. Remote Access Services
c. Directory Services
d. Client Services
e. Computing Services "
c. Directory Services
Switched Ethernet:
Choose one answer.
a. has a logical topology of a ring
b. uses a hub to connect computers
c. has a logical topology of a bus
d. has a physical topology of a ring
e. usually enables all attached circuits to send or receive packets simultaneously "
e. usually enables all attached circuits to send or receive packets simultaneously "
Which of the following can provide fault tolerance for the storage space on a server?
Choose one answer.
a. SCSI
b. USB
c. IDE
d. EIDE
e. RAID
e. RAID
Switched Ethernet:
Choose one answer.
a. operates at 50% of capacity before performance becomes a problem.
b. always has a lower capacity than shared Ethernet.
c. operates at about 95% of capacity before performance becomes a problem.
d. decreases network performance because each computer is connected via a common multipoint circuit.
e. is affected by the increased collisions caused by using a switched LAN design.
"
c. operates at about 95% of capacity before performance becomes a problem.
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
Choose one answer.
a. unshielded twisted pair
b. coax cable
c. shielded twisted pair
d. fiber
e. infrared frequencies "
d. fiber
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
Choose one answer.
a. multipoint
b. ring
c. star
d. shared
e. point-to-point "
e. point-to-point
_________ is not a type of Ethernet specification.
Choose one answer.
a. 10Base-T
b. Securenet
c. 10GbE
d. 1000Base-T (1GbE)
e. 100Base-T "
b. Securenet
____________ is the software that controls the network.
Choose one answer.
a. Client Operating System
b. Network Operating System
c. Embedded Operating System
d. Network Software System
e. Network Control System
"
b. Network Operating System
Hubs:
Choose one answer.
a. limit the distance of a network to a few meters in length
b. have connection points called handles
c. usually incorporate repeaters or amplifiers
d. operate at the application layer
e. are a difficult method to connect network cables "
c. usually incorporate repeaters or amplifiers
The server version of the Network Operating System does not:
Choose one answer.
a. provide the software that performs the functions associated with the physical layer
b. provide the software that performs the functions associated with the network layer
c. provide the software that performs the functions associated with the data link layer
d. usually provide the software that performs the functions associated with the computer's own operating system
e. provide the software that performs the functions associated with the application layer "
a. provide the software that performs the functions associated with the physical layer
A _________ is a group of related resources.
Choose one answer.
a. client
b. domain
c. sharepoint
d. server
e. workgroup "
b. domain
The type of logical topology that Ethernet uses is a:
Choose one answer.
a. interconnected
b. mesh
c. star
d. ring
e. bus "
e. bus
____________ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.
Choose one answer.
a. Data pirating
b. Information sharing
c. Resource sharing
d. User grouping
e. User profiling "
b. Information sharing
Which of the following is not a potential bottleneck for LAN performance?
Choose one answer.
a. number and speed of hard disks in the server
b. amount of memory in the server
c. speed of server's CPU
d. network interface card
e. all of the above are potential bottlenecks for LAN performance "
d. network interface card
_______ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.
Choose one answer.
a. Base-T Ethernet
b. 10/100 Ethernet
c. Mullion Ethernet
d. Token ring Ethernet
e. FDDI Ethernet "
b. 10/100 Ethernet
Which of the following is not true about CSMA/CD?
Choose one answer.
a. It is a contention-based media access control technique
b. It is used in token ring protocol LANs
c. The acronym refers to Carrier Sense Multiple Access with Collision Detection
d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit
e. Computers on the circuit 'listen' before transmitting "
c. The acronym refers to Carrier Sense Multiple Access with Collision Detection
Which of the following is not a basic LAN component?
Choose one answer.
a. network interface card
b. server
c. network operating system
d. client
e. PAD "
e. PAD
A peer-to-peer LAN:
Choose one answer.
a. is not appropriate for sharing resources in a small LAN
b. is often much faster than dedicated server networks
c. has more capability than a dedicated server
d. is generally cheaper in hardware and software than a dedicated server
e. supports a higher number of computers than a dedicated server
"
d. is generally cheaper in hardware and software than a dedicated server
The cheapest time to install network cabling is:
Choose one answer.
a. any time that a network needs to be installed
b. as soon as the building is completed
c. during the construction of the building
d. as soon as the building is occupied
e. about five years after the building is occupied so that the exact office locations for each network computer is known "
c. during the construction of the building
Which of the following is not an effective way to reduce LAN network demand:
Choose one answer.
a. use disk caching on the client machines
b. add hidden nodes
c. shift the users' routines
d. move files to client computers
e. find an application that places a large demand on the network and run it a time when the network is lightly loaded
"
b. add hidden nodes
10Base-T:
Choose one answer.
a. is more dominant than token ring
b. runs on twisted pair
c. is inexpensive
d. all of the above
e. supports 10 Mbps data rate "
d. all of the above
Breaking a network into smaller parts is called network:
Choose one answer.
a. segmentation
b. localization
c. allocation
d. fragmentation
e. mitigation "
a. segmentation
Of the following, which is not true about fiber optic cable?
Choose one answer.
a. it is lighter than unshielded twisted pair cable
b. it is thinner than unshielded twisted pair cable
c. it is more expensive than CAT5 unshielded twisted pair cable
d. it is a type of guided media
e. it has a very low capacity "
e. it has a very low capacity
A dedicated server LAN:
Choose one answer.
a. has one or more permanently assigned servers that can enable users to share files, for example
b. is limited to handling small databases
c. is limited to handling small files
d. can only use simple LAN software
e. can not connect with other networks "
a. has one or more permanently assigned servers that can enable users to share files, for example
_________ is not true with respect to network hubs.
Choose one answer.
a. Many hubs act as repeaters or amplifiers
b. Hubs provide a complicated way to connect network cables
c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes
d. Each port in a hub has a unique number.
e. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand "
b. Hubs provide a complicated way to connect network cables
Which of the following is not true about 10/100 Ethernet?
Choose one answer.
a. It is not a hybrid type of Ethernet.
b. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term.
c. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time.
d. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client's NIC and use 10 Mbps or 100 Mbps, depending on what the client uses.
e. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. "
a. It is not a hybrid type of Ethernet.
The _____________ is an operating system based on a version of UNIX that is more secure than the Windows Server operating system.
Choose one answer.
a. Apple Mac Operating System
b. RX-7
c. Novell NetWare
d. WD-40
e. Windows NT "
a. Apple Mac Operating System
Which of the following is not a critical software component in a dedicated server LAN?
Choose one answer.
a. network communication software on the client
b. application software on server computers
c. LAN metering software
d. application software on client computers
e. network operating system in the dedicated server
"
c. LAN metering software
10/100 Ethernet:
Choose one answer.
a. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use
b. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
c. uses 10 Gbps throughout 100% of the entire network
d. uses 100 Mbps throughout the entire network
e. uses 10 Mbps throughout 100% of the entire network "
b. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
Ano _____________ is not a common type of dedicated server.
Choose one answer.
a. database server
b. collision server
c. file server
d. print server
e. remote access server "
b. collision server
LAN bottlenecks are usually found at the:
Choose one answer.
a. data entry keyboard and client video monitors
b. hub repeaters and transducer circuit modules
c. client hard drive and processor
d. LAN server and network circuit
e. client operating system and diskette drive "
d. LAN server and network circuit
When an access point configured to use EAP discovers a new client, the access point:
Choose one answer.
a. none of the above
b. grants the client access to the network
c. asks the client to provide a WEP key
d. requires the user authenticate against a login server
e. issues a WEP key to the client
d. requires the user authenticate against a login server
The newest, most secure type of WLAN security is ____________.
Choose one answer.
a. 802.11g
b. 802.11i
c. 802.11a
d. 802.11n
e. EAP
b. 802.11i
Ano ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
Choose one answer.
a. access point
b. hub
c. antennae
d. wireless NIC
e. Ethernet NIC
a. access point
CSMA/CA is an acronym for:
Choose one answer.
a. Carrier Sense Multiple Access with Collision Acknowledgment
b. Carrier Sense Multiple Access with Collision Avoidance
c. Carrier Sense Mode Access with Carrier Avoidance
d. Carrier Sense Multiple Acknowledgment with Collision Avoidance
e. Carrier Sensory Multiple Access without Collision Acknowledgment
b. Carrier Sense Multiple Access with Collision Avoidance
Bluetooth operate in the ________ band.
Choose one answer.
a. 5 MHz
b. 5 GHz
c. 11 GHz
d. 2.4 GHz
e. 2.4 MHz
d. 2.4 GHz
The maximum data rate of Bluetooth is
Choose one answer.
a. 4 Mbps
b. 11 Mbps
c. 2 Mbps
d. 5 Mbps
e. 1 Mbps
e. 1 Mbps
How can a set of 802.11b access points be configured to operate without interference?
Choose one answer.
a. none of the above
b. separate each access point by more than 10 meters
c. assigning each access point a different channel to communicate with clients
d. assign the same channel to no more than two access points
e. use omnidirectional antennas on some access points and directional on others.
c. assigning each access point a different channel to communicate with clients
Another name for distributed coordination function (DCF) is __________.
Choose one answer.
a. distributed carrier sense method
b. distributed coordination mode
c. distributed carrier sense mode
d. physical carrier sense mode
e. physical carrier sense method
e. physical carrier sense method
With _____________, the AP permits the owner to provide a list of valid addresses that can connect.
Choose one answer.
a. EAP.
b. MAC address filtering
c. SWEP
d. SSID
e. WEP
b. MAC address filtering
Which of the following standards is backward compatible with IEEE802.11a, b, and g?
Choose one answer.
a. 802.15
b. 802.11a
c. 802.11b
d. 802.11n
e. 802.11g
d. 802.11n
______ is the commercial name for a set of standards by the IEEE 802.16 standards group.
Choose one answer.
a. WiMAX
b. Bluetooth
c. WEP
d. Infrared
e. Hi-Fi
a. WiMAX
What percentage of overlap in coverage by access points (AP) is needed to provide smooth and transparent roaming from AP to AP.
Choose one answer.
a. 15 %
b. 40 %
c. 50 %
d. 25 %
e. 60 %
a. 15 %
__________ are usually provided in hallways and lunchrooms where wired network connectivity is not available and allows employees to work in these areas.
Choose one answer.
a. Bluetooth
b. overlay networks
c. mobile networks
d. Ethernet networks
e. cellular networks
b. overlay networks
The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________.
Choose one answer.
a. 802.11b
b. 802.11g
c. 802.11a
d. 802.3
e. 802.11n
e. 802.11n
802.11g is backward compatible with which type of LAN?
Choose one answer.
a. 802.11b
b. 802.15
c. 802.3
d. 802.5
e. 802.11a
a. 802.11b
Which is true about bandwidth?
Choose one answer.
a. The larger the range of frequencies, the smaller the amount of bandwidth available.
b. Bandwidth and transmission speed are not related.
c. The greater the bandwidth, the faster we can transmit data.
d. The sum of the lowest and highest frequencies is the bandwidth.
e. Bandwidth is usually measured in bytes/second
c. The greater the bandwidth, the faster we can transmit data.
How many channels does the 802.11b standard provide for communication between the access point and clients?
Choose one answer.
a. 3
b. 2
c. 6
d. 11
e. 4
a. 3
The maximum data rate of a an 802.11a WLAN is
Choose one answer.
a. 11 Mbps
b. 54 Mbps
c. 36 Mbps
d. 9 Mbps
e. 24 Mbps
b. 54 Mbps
In the U.S. 802.11g WLANs operate in the ________ band.
Choose one answer.
a. 2.4 MHz
b. 11 GHz
c. 2.4 GHz
d. 5 GHz
e. 5 MHz
c. 2.4 GHz
The effective data range is up to 6 miles with a line of sight to the access point or 2.5 miles without line of sight. This describes ____________.
Choose one answer.
a. IEEE 802.11a
b. IEEE 802.16e
c. IEEE 802.16d
d. IEEE 802.15
e. IEEE 802.3
b. IEEE 802.16e
A Bluetooth network is called ____________.
Choose one answer.
a. WAN
b. area
c. LAN
d. Piconet
e. WLAN
d. Piconet
Which of the following is not determined by a site survey?
Choose one answer.
a. the security of the WLAN
b. feasibility of the desired coverage
c. current locations of the wired network into which the WLAN will connect.
d. estimated number of access points needed to provide coverage
e. potential sources of interference
a. the security of the WLAN
A major difference between Wi-Fi Protected Access (WPA) and WEP or EAP is
Choose one answer.
a. WPA keys are longer than WEP keys.
b. WPA keys easier to manage
c. WEP keys are changed for every packet that is transmitted to the client.
d. WPA keys cannot be broken by a brute force attack
e. WPA keys are encrypted
a. WPA keys are longer than WEP keys.
___________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN.
Choose one answer.
a. identifying
b. marking
c. warchalking
d. chalking
e. wardriving
c. warchalking
________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.
Choose one answer.
a. vertical
b. radio
c. omnidirectional
d. directional
e. microware
d. directional
Which of the following is true regarding WiMAX?
Choose one answer.
a. The logical and physical topologies are both bus.
b. WiMAX does not use many of the IEEE802.3 components
c. There is one type of WiMAX.
d. WiMAX was designed to compete with Bluetooth
e. WiMAX is controlled access
e. WiMAX is controlled access
___________ is used in Bluetooth in which the 2.4 GHz frequency range is divided into 79 separate channels.
Choose one answer.
a. Physical layer convergence protocol
b. Distributed coordination function
c. Direct-sequence spread-spectrum
d. Frequency-hopping spread spectrum
e. Point coordination function
d. Frequency-hopping spread spectrum
Which wireless standard will become the dominant standard of all the current standards?
Choose one answer.
a. 802.11n
b. 802.15
c. 802.11a
d. none of the above
e. 802.11b
a. 802.11n
____ is standardized as IEEE 802.15
Choose one answer.
a. Wireless Ethernet
b. VLAN
c. Token Ring
d. Bluetooth
e. FDDI
d. Bluetooth
The ___________ standard covers fixed point wireless access, using antennas that are 12-18 inches in size
Choose one answer.
a. IEEE 802.16d
b. IEEE 802.15
c. IEEE 802.11a
d. IEEE 802.16e
e. IEEE 802.3
a. IEEE 802.16d
Associated with a switched backbone, MDF is an acronym for:
Choose one answer.
a. multiplexer downstream flow
b. multi-station device foundation
c. main distribution facility
d. maximum data facility
e. manual data frequency
c. main distribution facility
The _______ is the part of the backbone that connects the LANs together.
Choose one answer.
a. Switched layer
b. Access layer
c. Core layer
d. Distribution layer
e. Privacy layer
d. Distribution layer
Routed backbones:
Choose one answer.
a. require a lot of management
b. require only a few set of TCP/IP addresses
c. don't need much time to establish separate subnet addresses for each LAN
d. use data link layer addresses to move packets that leave the subnet
e. are not susceptible to time delays
a. require a lot of management
Devices in a rack are connected together using ___________.
Choose one answer.
a. chassis switches
b. patch cables
c. servers
d. string
e. modules
b. patch cables
Switches:
Choose one answer.
a. learn addresses by reading the source and destination addresses
b. have become more popular than layer 2 switches
c. connect two or more network segments that use different network protocols
d. operate at the physical layer only
e. connect two ore more network segments that use different data link protocols
a. learn addresses by reading the source and destination addresses
A _____ connects all networks within a company, regardless of whether it crosses state, national, or international boundaries.
Choose one answer.
a. MAN
b. campus network
c. LAN
d. enterprise network
e. core network
d. enterprise network
A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone.
Choose one answer.
a. bridged backbone
b. hubbed backbone
c. collapsed backbone
d. virtual LAN
e. routed backbone
e. routed backbone
Computers are assigned to a VLAN based on the ________.
Choose one answer.
a. IEEE 802.1q standard
b. physical port on the switch
c. IEEE 802.3 standard
d. NIC interface
e. physical location of the computer
b. physical port on the switch
The backbone architecture layer that is closest to the users is the
Choose one answer.
a. Switched layer
b. Distribution layer
c. Core layer
d. Access layer
e. Privacy layer
d. Access layer
Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages.
Choose one answer.
a. QoS
b. access
c. routed
d. switched
e. backbone
a. QoS
Which of the following would not be part of an “ideal” backbone design for the future?
Choose one answer.
a. coax cabling throughout LANs and BN
b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T
c. access layer composed of 10/100 layer 2 Ethernet switches
d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber
e. redundant switches
a. coax cabling throughout LANs and BN
Which of the following is a fundamental backbone network architecture?
Choose one answer.
a. Hubbed backbone
b. Virtual backbone
c. Virtual LAN
d. Gatewayed backbone
e. Bridged backbone
c. Virtual LAN
Which IEEE standard inserts a 16-byte VLAN tag into a normal Ethernet packet?
Choose one answer.
a. 802.5
b. 802.11g
c. 802.11
d. 803.3
e. 802.1q
e. 802.1q
Gateways:
Choose one answer.
a. process all messages, even if the messages are not explicitly addressed to them
b. cannot perform a routing function
c. can translate one network protocol into another
d. are most often used as the interface between two or more networks that have similar data link and network layer protocols
e. are less complex than bridges
c. can translate one network protocol into another
Switched backbone networks:
Choose one answer.
a. are the least common type of BN used in one building
b. have a great deal of cable in their backbones
c. always use a ring topology
d. use a star topology with one device, usually a switch
e. tend to have less cable, but more network devices
d. use a star topology with one device, usually a switch
________ have no backbone cable.
Choose one answer.
a. Multistation access unit backbones
b. Hubbed backbones
c. Bridged backbones
d. Switched backbones
e. Cloud routed backbones
d. Switched backbones
Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type?
Choose one answer.
a. Switch
b. NIC
c. Hub
d. Gateway
e. Router
d. Gateway
___________ routers can understand different network layer protocols.
Choose one answer.
a. Multiprotocol
b. 3270 emulation
c. ASCII/EBCDIC
d. Bridge-
e. Asynchronous
a. Multiprotocol
A __________ type of BN has a star topology with one device, such as a switch, at its center.
Choose one answer.
a. Routed backbone
b. Switched backbone
c. Hubbed backbone
d. Virtual LAN
e. Bridged backbone
b. Switched backbone
With a switched backbone network, the equipment is usually placed in a ______.
Choose one answer.
a. NIC
b. cabinet
c. server
d. rack
e. basement
d. rack
Which of the following devices is the most complex?
Choose one answer.
a. Gateway
b. Multiprotocol router
c. Layer 3 switches
d. Router
e. Switch
a. Gateway
Which of the following is not true about Layer-3 switches?
Choose one answer.
a. They can be used in place of routers.
b. They have more simultaneously active ports than routers.
c. They function faster than routers.
d. They switch messages based on their IP address.
e. They can only switch messages based on their data link layer addresses.
e. They can only switch messages based on their data link layer addresses.
Which of the following is not a technology layer that is considered when designing backbone networks?
Choose one answer.
a. access layer
b. none of the options
c. core layer
d. decentralized layer
e. distribution layer
d. decentralized layer
______ move packets along the backbone based on their network layer address.
Choose one answer.
a. Hubbed backbones
b. NIC backbones
c. Routed backbones
d. Bridged backbones
e. Multistation access unit backbones
c. Routed backbones
The _________ is the part of the backbone that connects the different backbones together.
Choose one answer.
a. Distribution layer
b. Privacy layer
c. Access layer
d. Switched layer
e. Core layer
e. Core layer
Which of the following would be least effective in improving backbone performance?
Choose one answer.
a. improving the computers in the network
b. upgrading the circuits between computers
c. adding new keyboards to the client computers
d. improving devices in the network
e. changing the demand placed on the network
c. adding new keyboards to the client computers
Which of the following is not a type of hardware device that can be used to interconnect networks?
Choose one answer.
a. switches
b. routers
c. gateways
d. multiprotocol routers
e. 'dumb' terminals
e. 'dumb' terminals
It appears that the use of _____ is decreasing in backbones while the use of ____ is increasing.
Choose one answer.
a. Ethernet, ATM
b. WLAN, ATM
c. ATM, Ethernet
d. IEEE 802.1q, ATM
e. 10GbE, Ethernet
c. ATM, Ethernet
Which of the following is not a way that a router differs from a switch?
Choose one answer.
a. routers only process messages that are specifically addressed to it
b. routers operate at the network layer
c. routers can choose the “best” route between networks for forwarding a packet
d. routers perform more processing on each message than switch
e. routers can connect two or more networks that use the same data link protocol
e. routers can connect two or more networks that use the same data link protocol
Which of the following is not true about backbone networks?
Choose one answer.
a. They may also be called campus networks if they connect many BNs spanning several buildings as a single location.
b. They tend to use lower speed circuits than LANs.
c. They may also be called enterprise networks if they connect all networks within an organization.
d. They typically connect many networks, including LANs.
e. They typically provide connections to other BNs, WANs, MANs, and the Internet.
b. They tend to use lower speed circuits than LANs.
A subnetted or hierarchical backbone can also be called:
Choose one answer.
a. Bridged backbone
b. Collapsed backbone
c. Hubbed backbone
d. Routed backbone
e. Virtual LAN
d. Routed backbone
__________ refers to the way in which backbone interconnects the network attached to it and how it manages the way in which packets from one network move though the backbone to other networks.
Choose one answer.
a. Network design
b. Backbone architecture
c. Core layer
d. Traffic architecture
e. Distribution layer
b. Backbone architecture
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.
Choose one answer.
a. full mesh design
b. star design
c. ring design
d. partial mesh design
e. bus design
c. ring design
____________ is a newer type of packet switching technology.
Choose one answer.
a. X.25
b. SONET
c. ADSL
d. ISDN
e. ATM
e. ATM
With a virtual private network, users create permanent virtual circuits through the Internet called:
Choose one answer.
a. rings
b. bursts
c. cells
d. tunnels
e. clouds
d. tunnels
A _____________ is a user's connection into a packet switched service.
Choose one answer.
a. packet asymmetric/data transmission device
b. packet analog/digital device
c. packet assembly/disassembly device
d. packet asynchronous/discrete device
e. packet analyzer/decoder device
c. packet assembly/disassembly device
Which of the following type of networks permit packets from separate messages to be interleaved?
Choose one answer.
a. packet switched network
b. circuit switched network
c. dedicated circuit network
d. Fractional T-1 network
e. dial up circuit network
a. packet switched network
________ is a type of WAN connection that uses the normal voice telephone network.
Choose one answer.
a. T-Carrier services
b. X.25
c. ATM
d. Dial-up service
e. Digital Subscriber Line
d. Dial-up service
_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today.
Choose one answer.
a. ATM
b. ISDN
c. T-carrier services
d. Wideband analog services
e. SMDS
c. T-carrier services
Which of the following is not a problem with dialed circuits?
Choose one answer.
a. Use of these circuits is very simple.
b. Data transmission rates on dialed circuits are relatively low.
c. Dialed circuits may vary in quality.
d. Transmission rates for dialed circuits can vary with each call.
e. It is hard to predict if a given connection will be clear or noisy.
a. Use of these circuits is very simple.
Dynamic routing:
Choose one answer.
a. decreases performance in networks with “bursty” traffic
b. is another term for static routing in WANs
c. should be used in 80 to 90 percent of total networks' capacity
d. imposes an overhead cost by increasing network traffic
e. decreases performance in networks which have many possible routes
d. imposes an overhead cost by increasing network traffic
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.
Choose one answer.
a. common carrier ring design
b. common carrier bus design
c. cloak-based mesh design
d. cloud-based ring design
e. cloud-based mesh design
d. cloud-based ring design
In a ring design WAN,
Choose one answer.
a. failure in one circuit always means that the network will cease to function
b. failure in one circuit means that the network can most likely continue to function
c. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic
d. failure in one computer always means that the network will cease to function
e. failure in one circuit means that there will not be any increased traffic delays in the network
b. failure in one circuit means that the network can most likely continue to function
One type of Broadband ISDN service is intended to be used for digital broadcast television:
Choose one answer.
a. analog service
b. one full duplex channel operating at 622.08 Mbps
c. packet-switched service
d. asymmetrical service with two simplex channels
e. one simplex upstream channel operating at 155.52 Mbps, one downstream at 622.08 Mbps
d. asymmetrical service with two simplex channels
Which of the following is not a key issue to be considered when selecting a WAN service?
Choose one answer.
a. control
b. flexibility
c. reliability
d. prestige value of using a particular common carrier
e. capacity
d. prestige value of using a particular common carrier
Which of the following is not true about X.25?
Choose one answer.
a. It offers datagram, switched virtual circuit, and permanent virtual circuit services.
b. It uses the LAPB data link layer protocol.
c. It is not used widely in North America, except by multinational companies.
d. It is a type of circuit switched service.
e. It is the oldest type of packet switched service.
d. It is a type of circuit switched service.
Which of the following is a primary advantage of a VPN?
Choose one answer.
a. inflexibility
b. low cost
c. complexity to the user
d. security
e. unpredictable traffic congestion
b. low cost
____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today.
Choose one answer.
a. SMDS
b. T-carrier services
c. ATM
d. ISDN
e. Wideband analog services
b. T-carrier services
A _________ is a connection-oriented approach to sending packets on a packet switched service.
Choose one answer.
a. bursty packet
b. permanent virtual circuit
c. histogram
d. fractional T-1 network
e. datagram
b. permanent virtual circuit
In a ring design WAN,
Choose one answer.
a. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver
b. messages always take one second to travel between sender and receiver
c. messages always arrive faster than in other types of layouts
d. a message arrives at all computers on the network simultaneously
e. messages can take a long time to travel from the sender to the receiver
e. messages can take a long time to travel from the sender to the receiver
_________ is a term that refers to the speed in converting input packets to output packets.
Choose one answer.
a. Latency
b. Transfer mode
c. Cell relay
d. Frame relay
e. Burstiness
a. Latency
A star architecture:
Choose one answer.
a. connects all computers off a backbone circuit
b. all of the options
c. connects all computers in a closed loop
d. connects all computers to one central computer that routes messages to the appropriate computer
e. none of the options
d. connects all computers to one central computer that routes messages to the appropriate computer
In North America, a T1 circuit has ______ 64Kbps channels.
Choose one answer.
a. 30
b. 24
c. 2
d. 36
e. 12
b. 24
Primary rate interface:
Choose one answer.
a. is defined exactly the same way in Europe
b. is typically offered only to commercial customers
c. provides a communications circuit with two 64 Kbps B channels, plus one D channel
d. has an upper capacity of 128Kbps
e. is comprised of analog circuits only
b. is typically offered only to commercial customers
Special rate services that allow dialed circuit calls for both voice communications and data transmission to be purchased in large quantities are known as __________.
Choose one answer.
a. RBOC
b. DSL
c. ATM
d. X.25
e. WATS
e. WATS
Which of the following is not a type of VPN?
Choose one answer.
a. extranet VPN
b. access VPN
c. T-1 VPN
d. intranet VPN
e. a VPN that enables employees to access an organization's network from a remote location
c. T-1 VPN
Which of the following is not a way to reduce network demand?
Choose one answer.
a. shifting network usage from high cost times to lower cost times
b. using data compression techniques for all data in the network
c. requiring a network impact statement for all application software developed by the organization
d. moving data further from the applications and people who use them
e. shifting network usage from peak to lower demand times
c. requiring a network impact statement for all application software developed by the organization
The performance of MANs and WANs can be improved by:
Choose one answer.
a. increasing the demand placed on the network
b. downgrading the circuits between the computers
c. downgrading the devices that provide access to the circuits
d. upgrading the circuits between the computers
e. increasing network traffic
e. increasing network traffic
Mesh networks:
Choose one answer.
a. do not use decentralized routing
b. do not have many possible routes through the network to prevent one circuit from becoming overloaded
c. require more processing by each computer in the network than in star or ring networks
d. usually provide relatively long routes through the network (compared to ring networks)
e. do not have much capacity wasted by network status information
c. require more processing by each computer in the network than in star or ring networks
Which of the following is not a difference between ATM and X.25?
Choose one answer.
a. ATM has cells that are 53 bytes long.
b. ATM provides quality of service information used for setting different priorities for packet transmission
c. ATM networks do not perform error control at each node, or computer, in the network.
d. ATM is scalable.
e. ATM provides packet switched service.
c. ATM networks do not perform error control at each node, or computer, in the network.
Adoption of narrowband ISDN in North America has been:
Choose one answer.
a. rapid
b. fast
c. non existent, since it is not offered in North America
d. slow
e. none of the options
d. slow
___________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.
Choose one answer.
a. CSUs
b. Standards organizations
c. PUCs
d. Common carriers
e. Router manufacturers
d. Common carriers
SONET:
Choose one answer.
a. refers to Sprint Overall Network
b. uses inverse multiplexing above the OC-1 level
c. is very similar to the ITU-T standard, synchronous digital hierarchy
d. is a standard for optical transmission that currently operates at Terabit per second speeds
e. is not currently available, even in large cities
b. uses inverse multiplexing above the OC-1 level
Basic rate interface:
Choose one answer.
a. is typically offered only to commercial customers
b. has an upper capacity of 1.544 Mbps
c. is defined exactly the same way in Europe
d. provides a communications circuit with two 64 Kbps B channels, plus one D channel
e. is comprised of analog circuits only
d. provides a communications circuit with two 64 Kbps B channels, plus one D channel
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
Choose one answer.
a. star design
b. full mesh design
c. partial mesh design
d. ring design
e. bus design
b. full mesh design
A star topology is:
Choose one answer.
a. less susceptible to traffic problems than other architectures
b. always slower than a ring network
c. dependent upon the capacity of the central computer for its performance
d. difficult to manage because the central computer receives and routes all messages in the network
e. not affected if the central computer fails
c. dependent upon the capacity of the central computer for its performance
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.
Choose one answer.
a. bus design
b. star design
c. full mesh design
d. ring design
e. partial mesh design
d. ring design
When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
Choose one answer.
a. ISDN circuit
b. dedicated circuit
c. VPN circuit
d. dialed circuit
e. T-1 carrier circuit
d. dialed circuit
Which of the following is not a step used in newer types of network design processes?
Choose one answer.
a. cost assessment
b. technology design
c. none of the above is a correct answer
d. needs analysis
e. implementation
c. none of the above is a correct answer
Which of the following is a type of protocol that needs to be considered in technology design?
Choose one answer.
a. Ethernet
b. 100 Mbps
c. WAN
d. 10 Mbps
e. SNA
a. Ethernet
In needs analysis:
Choose one answer.
a. the rate of growth of network traffic is not an issue
b. a baseline of current operations is not important
c. the geographic scope is not an important consideration
d. a great deal of the work has probably never been done
e. the goal is to understand what users and applications the network will support
e. the goal is to understand what users and applications the network will support
Nowadays, most organizations use a simpler approach to network design called the ___________ approach.
Choose one answer.
a. frame definition
b. guided network
c. building-block
d. systems development life cycle
e. prototype
c. building-block
__________ refers to the amount of data transmitted on a circuit.
Choose one answer.
a. Leading edge deployment
b. Capacity planning
c. Requirements documentation
d. Calculating message volumes
e. Circuit loading
d. Calculating message volumes
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.
Choose one answer.
a. RFP
b. turnpike document
c. backplane
d. wish list
e. baseline
e. baseline
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?
Choose one answer.
a. an application will run on an IBM mainframe and so the network will require SNA traffic
b. an application will use HTTP over TCP/IP
c. an application will use SPX/IPX with a Novell file server
d. an application will need a gateway to translate SNA traffic into TCP/IP protocols
e. an application will have drop down menu choices
e. an application will have drop down menu choices
Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized?
Choose one answer.
a. wish list requirements
b. none of the above is an appropriate answer
c. non-necessary requirements
d. desirable requirements
e. mandatory requirements
c. non-necessary requirements
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.
Choose one answer.
a. building block
b. core layer
c. cost assessment
d. logical network design
e. access layer
d. logical network design
In the technology design stage of network design,
Choose one answer.
a. the decision for circuit capacity can be made without considering fundamental technology/protocols
b. the decision for fundamental technology/protocols can be made without considering circuit capacity
c. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity
d. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage
e. the decisions for fundamental technology/protocols and circuit capacity are interrelated
e. the decisions for fundamental technology/protocols and circuit capacity are interrelated