You are on page 1of 22

634 multi final

Study online at quizlet.com/_50xf3


1.

_______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25 ________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive. a. Contention b. Polling c. Pooling d. Carrier sense e. CRC _________ are smaller versions of NAPs that link a set of regional ISPs. a. mini Network Access Points b. cable modem termination system endpoints c. distribution hubs d. metropolitan area exchanges e. points-of-presence _________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request _________ is the basic physical layout of the circuit. a. point-to-point configuration b. configuration c. circuit configuration d. circuit design e. circuit plan __________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets __________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

Answer: D

8.

__________ is a line-of-sight type of wireless media. a. coaxial cable b. microwave c. radio d. twisted pair e. fiber optic __________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer __________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion. ___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control ___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling ___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing ___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding

Answer: B

2.

Answer: B

9.

Answer: C

3.

Answer: D

10.

Answer: C

4.

Answer: A
11.

Answer: B

5.

Answer: C

12.

Answer: E

6.

Answer: B

13.

Answer: A

7.

Answer: B

14.

Answer: C

15.

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking ____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs ____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol. a. quadrature amplitude modulation b. time division multiplexing c. synchronous digital line control d. pulse code modulation e. baseband signaling ____________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control ____________ is one of the most commonly used coding schemes used in data transmission. a. ASCII b. ISDN c. MAU d. ATM e. FDM ____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0. a. digitizing. b. sampling c. modulation d. demodulation e. shaping

Answer: B

21.

____________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs. a. Software metering b. Information sharing c. Resource sharing d. Software pirating e. Network routing ____________ refers to the transmission characteristics of the circuit. a. handshaking b. virtual circuit c. bonding d. logical circuit e. physical circuit ____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing _____________ is an effective way to prevent attenuation. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuit d. Changing multiplexing techniques e. Shorting a circuit _____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit _____________ is not a form of modulation used to transform digital data into analog signals. a. synchronous time division b. amplitude shift keying c. amplitude modulation d. frequency modulation e. phase modulation

Answer: C

16.

Answer: A

22.

Answer: D

23.

Answer: C

17.

Answer: A

24.

Answer: C

18.

Answer: C

25.

Answer: A

19.

Answer: A

26.

Answer: A

20.

Answer: C

27.

_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System _____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services _____________ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information. a. Resource sharing b. User grouping c. User profiling d. Information sharing e. Data pirating _____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net ______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message. a. Hamming code b. Huffman encoding c. Front end processing d. Wave division multiplexing e. Hub polling ______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented

Answer: A

33.

_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing __________can obliterate a group of bits, causing a burst error. a. Crosstalk b. Attenuation c. Impulse noise d. Intermodulation noise e. Jitter A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list

Answer: D

28.

Answer: B

34.

Answer: C

35.

Answer: D

29.

Answer: D

36.

30.

Answer: D

Answer: C

37.

31.

Answer: A

Answer: A

38.

Answer: C

32.

Answer: C

39.

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network A backbone network is: a. a high speed central network that connects other networks in a distance spanning up to several miles. b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 200 miles with common carrier circuits. A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer's network layer software package e. ISO

Answer: A

44.

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a. 256 b. 20 c. 200 d. 512 e. 1024 A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster A high-speed Internet has a set of access points called ____pops that provide point-ofpresence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe

Answer: E

45.

40.

Answer: B

Answer: D

46.

Answer: D

41.

Answer: C

47.

Answer: A

42.

Answer: A

48.

Answer: D

43.

Answer: A

49.

A metropolitan area network is: a. a high speed central network, built with privately owned media, which connects other networks in a distance spanning up to several miles. b. a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits. d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 543.56 miles with private media. A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster A peer-to-peer LAN: a. has more capability than a dedicated server b. supports a higher number of computers than a dedicated server c. is generally cheaper in hardware and software than a dedicated server d. is not appropriate for sharing resources in a small LAN e. is often much faster than dedicated server networks A phase hit is likely to be: a. spikes b. a short term shift out of phase c. intermodulation noise d. white noise e. Gaussian noise A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection a. ACK b. NAK c. SYN d. ARQ e. FIN

Answer: C

54.

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255 A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte A virtual circuit is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless

Answer: C

55.

Answer: B

50.

Answer: B

56.

Answer: D

51.

Answer: C
57.

Answer: A

52.

Answer: B

58.

Answer: D

53.

Answer: C

59.

Answer: B

60.

A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT proxy server c. IP spoofing bridge d. packet level firewall e. smart hub A(n) __________ circuit is another name for a multipoint configuration. a. analog b. dedicated c. point-to-point d. shared e. simplex A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub

Answer: B

66.

A(n) _____________ is required to connect a computer to WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster An N-tiered architecture: a. is generally more "scalable" than a threetiered architecture b. is generally less "scalable" than a threetiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a twotiered architecture because there tends to be less communication among the servers

Answer: C

67.

61.

Answer: B

Answer: B

68.

62.

Answer: D

Answer: C

63.

Answer: C

69.

Answer: D

64.

Answer: B

70.

Answer: A

65.

Answer: D

71.

Another term for impulse noise is: a. Gaussian noise b. spikes c. attenuation d. cross-talk e. intermodulation noise ARQ means that: a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c. a sender is using a data link protocol called Asynchronous Repeating reQuest d. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines e. a sender is using a parity scheme called Array Resource Quality As part of the five-layer network model used in this textbook, the data link layer sits directly between: a. the physical and the application layers b. the network and the application layers c. the network and transport layers d. the physical and the application layers e. the physical and the network layers Asynchronous transmission: a. is used to transmit each character simultaneously with all other characters b. has a pre-determined, fixed time between sending characters c. is typically used on multipoint half duplex circuits d. uses a continuous series of start bits as an idle signal e. is also known as start-stop transmission At the top of the Internet structure are national ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation

Answer: B

77.

72.

Answer: A

CA*Net3 was developed by a Canadian organization known as: a. IETF b. ARDNOC c. ADSL d. RFC e. UCAID Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures Cross-talk: a. occurs when one circuit picks up signals in another b. is always bothersome because it has a high signal strength c. decreases with increased proximity of two wires d. decreases during wet or damp weather e. increases with lower frequency signals CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer. Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches

Answer: B

78.

Answer: C

79.

Answer: A

73.

Answer: E

80.

74.

Answer: E

Answer: C

75.

Answer: B

81.

Answer: True

82.

Answer: A

76.

Answer: B

83.

Digital Subscriber Line: a. is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local loop b. combines analog transmission and frequency division multiplexing c. involves the use of a customer premises equipment (CPE) d. uses a combination of amplitude and phase modulation e. all of the above Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator Errors on a network can occur: a. only on dial-up type of circuits b. because of noise on the line c. only on poorly maintained networks d. only due to Gaussian noise e. only due to lightning strikes Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva

Answer: E

89.

Frequency division multiplexing: a. operates by statistically time slicing the signal b. operates by dividing the signal into different frequencies c. uses a codec that divides signals into different channels d. operates by time slicing the signal e. operates by light dividing the signal Gateways: a. process all messages, even if the messages are not explicitly addressed to them b. can translate one network protocol into another c. are less complex than bridges d. are most often used as the interface between two or more networks that have similar data link and network layer protocols e. cannot perform a routing function Having a conversation with someone using a cellular phone is an example of _________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of: a. intermodulation noise b. attenuation c. echo d. jitter e. harmonic distortion

Answer: B

90.

Answer: B

84.

Answer: E

91.

Answer: B

85.

Answer: B

92.

Answer: C

86.

Answer: C

87.

Answer: B

93.

88.

Answer: C

Answer: A

94.

IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver. a. transport b. network c. physical d. data link e. connection

Answer: E

99.

In general, controlled approaches: a. work better than contention approaches for small networks that have low usage b. work better than contention approaches for large networks that have high usage c. work better than contention approaches for all sizes of networks d. do not require a host, server, or active monitor to assign media access control e. have many collisions In general, local ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model. a. data link and network b. session, presentation and application c. application layer d. application and presentation e. network, transport and presentation

Answer: B

100.

95.

Answer: A

Answer: A

101.

Answer: B

96.

Answer: C

97.

Answer: C

102.

Answer: D

98.

Answer: A

103.

Answer: B

104.

In the three tier architecture the software on the client computer is responsible for____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage In which layer of the Internet model would the HTTP standard be used? a. physical b. application c. transport d. network e. data link In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins? a. bandwidth modulation b. amplitude modulation c. frequency modulation d. phase modulation e. codec modulation Internet 2 is also known as: a. CA*Net3 b. IETF c. Next Generation Internet d. the Abilene network e. passive optical networking Inverse multiplexing means: a. combining several low speed circuits to enable them to be transmitted across one high speed circuit b. multiplexing from the terminal to the host, rather than from the host to the terminal c. combining high speed circuits to enable them to be transmitted across one low speed circuit d. inverting the frequencies used for transmission across a low speed circuit for switching to a digital circuit e. multiplexing to a codec, rather than to a modem IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packet form or structure d. performs routing functions e. performs error control functions

Answer: A

110.

Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider Media access control: a. is not very important in point-to-point with full duplex configuration b. is not very important in local area networks c. is not very important in a point-to-point with a half duplex configuration d. is not very important in a multipoint configuration e. does not control when computers transmit Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded Microwave transmission: a. is a type of high frequency radio communication b. requires a clear line-of-sight path c. is typically used for long distance data transmission d. does not require the laying of any cable e. all of the above

Answer: B

105.

Answer: B

111.

Answer: D

106.

Answer: D
112.

Answer: A

107.

Answer: D

113.

108.

Answer: A

Answer: B

114.

Answer: E

109.

Answer: D

115.

National ISPs connect together and exchange data at ___________. a. Network Access Points b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia Networks that are designed to connect similar computers that share data and software with each other are called: a. client/server networks b. peer-to-peer networks c. host networks d. client networks e. local area networks Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

Answer: A

120.

On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. a. amplifiers b. repeaters c. multiplexers d. digitizers e. modems One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information "wastes" network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing. One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture Pervasive networking means that: a. the five-layer network model will be used to design all networks b. all networks of the future will be developed by a monopolistic organization c. the cost of computers will be higher in the future d. virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates e. cable companies will offer more than 150 network selections for viewers

Answer: B

121.

116.

Answer: C

Answer: D

122.

Answer: C

117.

Answer: B

118.

Answer: C

123.

Answer: B

119.

Answer: A

124.

Answer: D

125.

Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service Some of the new applications being developed for a high-speed Internet include a.) Tele-immersion b.) Tele-conferencing c.) QoS d.) Broadband e.) Tele-phoning Switched Ethernet: a. always has a lower capacity than shared Ethernet. b. operates at 50% of capacity before performance becomes a problem. c. operates at about 95% of capacity before performance becomes a problem. d. is affected by the increased collisions caused by using a switched LAN design. e. decreases network performance because each computer is connected via a common multipoint circuit. Switched Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously Synchronous transmission: a. cannot be used on multipoint circuits b. is used to send one character at a time c. uses start bits before each character to be sent d. uses stop bits after each character to be sent e. is used to transmit a "frame" or "packet" of data at a time

Answer: D

131.

126.

Answer: E

TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3 The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link The ____________ layer of the OSI model is responsible for data format translation. a. session b. presentation c. physical d. application e. transport

Answer: B

132.

Answer: B

127.

Answer: A

133.

128.

Answer: C

Answer: D

134.

Answer: d

129.

Answer: E
135.

Answer: B

130.

Answer: E

136.

Answer: B

137.

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society The direction in which the sound wave begins is known as: a. amplitude, which our ears detect as loudness b. frequency, which our ears detect as pitch c. phase d. bandwidth e. furlong The earliest type of fiber optic systems were: a. Graded index multimode b. Attenuated c. Multimode d. Single mode e. Step mode The familiar background static on radios and telephones is called: a. echoes b. intermodulation noise c. line outages d. cross-talk e. white noise The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation The height of a sound wave is called its: a. frequency b. phase c. amplitude d. bandwidth e. furlong The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks.

Answer: C

145.

138.

Answer: E

The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher The integration of voice, video, and data communications is also known as __________. a. convergence b. peer-to-peer networks c. metropolitan wide networks d. regional bell operating company e. intranet The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is: a. jitter b. spiking c. attenuation d. intermodulation noise e. echo The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request The network layer of the Internet model uses the _____________ protocol to route messages though the network. a. TCP b. HTTP c. FTP d. SMTP e. IP

Answer: B

146.

139.

Answer: C

Answer: A

147.

140.

Answer: C

Answer: C

141.

Answer: E

148.

Answer: D

142.

Answer: B

149.

Answer: E

143.

Answer: C

144.

Answer: True

150.

The newer form of IP, version 6 (Ipv6) is: a. running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit The primary reason for networking standards is to: a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor The primary source of error in data communications is: a. echoes b. intermodulation noise c. spikes d. jitter e. cross-talk The probability of detecting an error, given that one has occurred, using parity checking is about: a. 100% b. 0% c. 50% d. 75% e. 98% The representation of the character A by the group of 8 bits, 01000001, is an example of: a. digital coding b. phase modulation c. binary modulation d. analog transmission e. pitch variation

Answer: C

156.

151.

Answer: B

The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer. The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. dial-up access through a modem b. intranet c. extranet d. WAN e. none of the above The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connectionoriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing The three stages of the formal standardization process are ______________________. a. specification, identification of choices and acceptance. b. planning, implementing and acceptance. c. brainstorming, identification and implementing. d. specification, formalization, and acceptance. e. none of the above.

Answer: A

157.

Answer: C

152.

Answer: B

158.

Answer: A

153.

Answer: C

159.

Answer: E

154.

Answer: C

160.

155.

Answer: A

Answer: A

161.

The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings The two basic types of media are: a. statistical and frequency b. guided and wireless (radiated) c. local and wide area d. attenuator and Gaussian e. duplexed and non-duplexed The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library

Answer: D

168.

162.

Answer: B

To get more "bandwidth" in a digital transmission, you must: a. increase the range of frequencies available for a transmission b. increase the loudness per transmission c. decrease the bits per second transmission speed d. increase the phase shifts per transmission e. increase the baud rate per transmission To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox Transmission speeds: a. are the same among all media b. are not a factor in selecting a media because all media have more than enough speed to serve current communication demands c. are a constant, 56Kbps, for all media types d. differ widely among media e. always have a direct correlation with security Using parity, the probability for detecting an error, given that one has occurred, is: a. about 50% for either even or odd parity b. about 70% for even parity and 30% for odd parity c. about 30% for even parity and 70% for odd parity d. about 0% for either even or odd parity e. about 100% for either even or odd parity

Answer: A

169.

Answer: A

163.

Answer: B
170.

Answer: A

164.

Answer: C
171.

Answer: A

165.

Answer: A
172.

Answer: D

166.

Answer: D

173.

Answer: A

167.

Answer: D

174.

what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a: a. dedicated circuit b. dialed circuit c. ISDN circuit d. VPN circuit e. T-1 carrier circuit When a signal is reflected back to the transmitting equipment, it is called a(n) _________. a. jitter b. echo c. crosstalk d. attenuation e. impulse noise When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet

Answer: D

180.

When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________. a. intermodulation noise b. attenuation c. echo d. jitter e. harmonic distortion Which is not a function of the physical layer: a. transmission of bits. b. defining the rules by which one and zeroes are transmitted. c. providing error-free transmission of data. d. providing the physical connection between sender and receiver. e. specifying the type of connection and type of signals, waves or pulses that pass though it. Which is not true about point-to-point circuits? a. point-to-point circuits are dedicated to the use of the two computers. b. point-to-point circuits are more expensive than multipoint circuits. c. point-to-point circuits are called dedicated circuits. d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits. e. point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit. Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation Layer b. transport Layer c. physical Layer d. session Layer e. application Layer Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation Layer b. transport Layer c. physical Layer d. session Layer e. application Layer

Answer: E

175.

Answer: B

181.

Answer: C

176.

Answer: B

182.

Answer: D

177.

Answer: A

183.

178.

Answer: D

Answer: B

184.

179.

Answer: B

Answer: B

185.

Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type? a.) Switch b.) Router c.) Gateway d.) Hub e.) NIC Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE Which of the following devices is the most complex? a. Gateway b. Router c. Layer 3 switches d. Switch e. Multiprotocol router Which of the following groups developed Internet 2? a. MCI WorldCom b. ARDNOC c. UCAID d. Yipes e. ISOC Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals? a. phase b. attenuation c. bipolar d. bandwidth e. codec Which of the following is a function of the transport layer? a. linking the physical layer to the network layer b. formatting messages by indicating where they start and end c. deciding which route the message should take d. breaking long messages into several smaller messages e. specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it

Answer: C

191.

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user Which of the following is a term used to group together the physical and data link layers? a. Internetwork layers b. Hardware layers c. Software layers d. Middleware layers e. Application layers Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service. Which of the following is not a controlled access method of media access control? a. Token passing b. CSMA/CD c. polling d. roll call polling e. hub polling

Answer: A

192.

Answer: B

186.

Answer: A

193.

Answer: C

187.

Answer: A

194.

Answer: B

188.

Answer: C

195.

Answer: A

189.

Answer: A

190.

Answer: d

196.

Answer: B

197.

Which of the following is not a critical software component in a dedicated server LAN? a. application software on server computers b. network operating system in the dedicated server c. network communication software on the client d. LAN metering software e. application software on client computers Which of the following is not a function of the data link layer? a. deciding when to transmit messages over the media b. formatting the message by indicating where messages start and end, and which part is the address c. detecting and correcting any errors that have occurred in the transmission of the message d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it e. controlling the physical layer by determining when to transmit Which of the following is not a key advantage of digital transmission? a. It permits only low transmission rates. b. It is more efficient. c. It is simpler to integrate voice, video, and data on the same circuit. d. It is more secure. e. It produces fewer errors. Which of the following is not a problem with dialed circuits? a. Data transmission rates on dialed circuits are relatively low. b. Dialed circuits may vary in quality. c. Transmission rates for dialed circuits can vary with each call. d. It is hard to predict if a given connection will be clear or noisy. e. Use of these circuits is very simple. Which of the following is not a property of a WAN: a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses lease lines from IXCs like ATT, MCI, Sprint.

Answer: D

202.

Which of the following is not a type of hardware device that can be used to interconnect networks? a. switches b. routers c. multiprotocol routers d. 'dumb' terminals e. gateways Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times Which of the following is not an advantage of a WLAN? a. The ability to use the network in places where it is impractical to install a wired network. b. WLANs enable mobile users to work at different locations within an office building and stay connected to the network. c. WLANs enable business travelers to connect the Internet from within waiting areas. d. WLANs allow users to work more securely than a wired LAN. e. WLANs cost less to install and operate in most cases (except new buildings) than wired networks.

Answer: D

203.

Answer: D

198.

Answer: d

204.

Answer: A

199.

Answer: A
205.

Answer: D

200.

Answer: E

206.

Answer: D

201.

Answer: D

207.

Which of the following is not an application layer standard? a. HTTP b. POP c. T1 d. IMAP e. HTML Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

Answer: C

212.

208.

Answer: D

Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting Which of the following is not true about de facto standards? a. They never evolve into formal standards. b. They are those standards that emerge in the marketplace. c. They tend not to be developed by an official industry or government body. d. They are generally supported by more than one vendor but de facto standards have no official standing. e. They tend to emerge based upon the needs/response of the marketplace. Which of the following is not true about formal standards? a. They are always developed before de facto standards. b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body. Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable

Answer: B

213.

Answer: A

209.

Answer: A

214.

210.

Answer: A

Answer: A

215.

211.

Answer: C

Answer: C

216.

Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time. Which of the following is true about roll call polling? a. It can not be modified to increase priority of clients or terminals. b. It does not require a server or host or special device that performs the polling. c. It is also called token passing. d. It is a type of contention approach to media access control. e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal. Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)? a. it is not very popular b. it is a bit-oriented protocol c. it uses block check characters for error detection d. newer version permits jumbo frames e. it uses parity bits for error detection Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based Which of the following is true with respect to the data link layer? a. It accepts streams of bits from the application layer. b. It is responsible for getting a message from one computer to another (one node to another) without errors. c. It does not perform error detection. d. It performs routing functions. e. It organizes data from the physical layer and passes these coherent messages to the application layer.

Answer: A

221.

Which of the following is way to reduce or eliminate crosstalk on a circuit, a. changing multiplexing techniques b. adding repeaters or amplifiers to a circuit c. reducing the length of the cable d. adding fluorescent lights e. shorting a circuit Which of the following media can best withstand harsh environmental conditions? a. shielded twisted pair b. unshielded twisted pair c. Cat 5 twisted pair d. coaxial cable e. fiber optic cable Which of the following media has the lowest error rates and the highest transmission speeds? a. coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared Which of the following media is least susceptible to noise? a. fiber optic cable b. coaxial cable c. twisted pair d. unshielded twisted pair e. shielded twisted pair Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. UCAID Which of the following statements is correct? a. Parallel transmission is most often used for sending data on a circuit that is made up of one wire. b. Parallel transmission is distinguished from serial transmission by the fact that the transmitting device sends a single bit, then a second bit, and so on, until all the bits are transmitted. c. Parallel transmission is only used for analog data. d. Serial transmission is slower than parallel transmission. e. Parallel transmission is the same as serial transmission.

Answer: A

222.

Answer: E

217.

Answer: E

223.

Answer: D

218.

Answer: D

224.

Answer: A

219.

Answer: A

225.

Answer: E

226.

Answer: D

220.

Answer: B

227.

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network Which of the following would be a standard used at the Data Link layer of the Internet or OSI model? a. IP b. TCP c. Ethernet d. HTTP e. FTP Which of the following would be considered a type of wireless media? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. microwave e. fiber optics Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR)

Answer: A

234.

228.

Answer: A

With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. a. open window b. halt and be recognized (HBR) c. sliding window d. stop and wait e. continuous With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds With contention: a. computers wait until the circuit is free before they send data b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media c. the front end processor must wait for a response from the polled client or terminal d. one computer starts the poll and passes it to the next computer on the multipoint circuit e. there is never a chance for "collision," or two computers trying to send data at the same time

Answer: D

235.

Answer: D

229.

Answer: D

236.

Answer: E

230.

Answer: C

237.

Answer: C

231.

Answer: D

238.

Answer: A

232.

Answer: C

233.

Answer: A

239.

With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect? a. 0110101 1 b. 0001101 1 c. 0010010 1 d. 1011011 0 e. 1111111 0 With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses With respect to converting digital data into analog signals, AM stands for: a. Asynchronous Manchester b. Analog Multimode c. Amplitude Modulation d. Anomaly Multiplexing e. Analytical Mosaic With respect to costs for a client-server network, which of the following is true? a. Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power. b. More network capacity, which costs more money, is required for client-server networks than for client-based networks. c. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper. d. Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client. e. None of the above With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software

Answer: B

244.

With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic. a. Application; presentation b. Presentation; data access c. Data access; presentation d. Application; data access e. Presentation; application storage With which type of digital signaling does the signal always return to zero volts after each bit? a. Non-return-to-zero signaling b. Unipolar signaling c. Return-to-zero signaling d. Data rate signaling e. Huffman encoding signal

Answer: B

240.

Answer: A

245.

Answer: C

241.

Answer: C

242.

Answer: C

243.

Answer: B

You might also like