Business Data Communications Quizzes

¡Supera tus tareas y exámenes ahora con Quizwiz!

The simplest method for error correction is retransmission.

True

____________ is one of the most commonly used coding schemes used in data transmission.

ASCII

Which of the following is not a controlled access method of media access control?

CSMA/CD

IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.

False

The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it.

False

To use the Web, each client computer requires a data link layer software package called a Web browser.

False

With contention, a computer does not have to wait before it can transmit. A computer can transmit at anytime.

False

With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.

False

____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission

Flipped bits

___________ is an orderly close to a dialogue between end users.

Session termination

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.

True

The network layer performs the same functions in both the OSI and Internet models and is responsible for routing messages from the source computer to the destination computer.

True

When we amplify the signal on an analog circuit, we also amplify any noise that is present on the circuit.

True

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.

Two

Which is not a protocol used at the application layer.

UDP

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

With the two-tier client-server architecture, the server is responsible for the ________ logic.

data access

The newer form of IP, version 6 (Ipv6):

has an increased address size from 32 bits to 128 bits

Controlled access MAC approaches work better in a large network with high usage.

True

With respect to converting digital data into analog signals, AM stands for:

Amplitude Modulation

Server name resolution is done using the:

Domain Name Service

A local area network (LAN) connects other LANs and backbone networks (BNs) located in different areas to each other and to wide area networks in a span from 3 to 30 miles.

False

An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.

False

Ethernet is an example of a network layer protocol.

False

Fiber optic cable can only be used on LANs.

False

The earliest type of fiber optic systems were:

Multimode

In a ___________ architecture, computers are both client and server, thus sharing the work.

Peer-to-peer

A walkie-talkie is an example of half-duplex transmission.

True

An address resolution protocol (ARP) message broadcasts to all devices in a subnet when the IP address is known but the MAC address is not known.

True

Computers produce digital data whose values are binary: 0 or 1.

True

Contention is commonly used with Ethernet local area networks.

True

A local area network is:

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.

Another term for the weakening of a signal over distance is:

attenuation

Errors on a network can occur:

because of noise on the line

Dynamic addressing:

can solve many updating headaches for network managers who have large, growing, changing networks

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.

intranet

The two sublayers of the data link layer consist of the media access control sublayer and the________ .

logical link control sublayer

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:

mail user agent

Which of the following would be considered a type of wireless media?

microwave

The _________ layer is responsible for routing of messages from the sender to the final destination.

network layer

IP:

performs routing functions

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:

port address

In the three tier architecture, the software on the client computer is responsible for the ____________.

presentation logic

________ is the presentation of information to the user and the acceptance of the user's commands.

presentation logic

There are optional and required parts of an HTTP request. They are:

request line, request header, request body

The _____________ is used by a computer to determine how messages will travel through the network.

routing table

As part of the five-layer network model used in this textbook, the data link layer sits directly between:

the physical and the network layers

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?

transport


Conjuntos de estudio relacionados

FEDERAL REGULATION OF MEDICATION

View Set

Lab 34 lab book reading quiz:Cleaning Up a Hazardous Drug Spill

View Set

Chapter 1 Anatomy and Physiology

View Set

chapter 8 managerial accounting

View Set

Chapter 3: Exploring Network Technologies and Tools

View Set