Business Data Communications Quizzes
The simplest method for error correction is retransmission.
True
____________ is one of the most commonly used coding schemes used in data transmission.
ASCII
Which of the following is not a controlled access method of media access control?
CSMA/CD
IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.
False
The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it.
False
To use the Web, each client computer requires a data link layer software package called a Web browser.
False
With contention, a computer does not have to wait before it can transmit. A computer can transmit at anytime.
False
With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.
False
____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission
Flipped bits
___________ is an orderly close to a dialogue between end users.
Session termination
The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.
True
The network layer performs the same functions in both the OSI and Internet models and is responsible for routing messages from the source computer to the destination computer.
True
When we amplify the signal on an analog circuit, we also amplify any noise that is present on the circuit.
True
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.
Two
Which is not a protocol used at the application layer.
UDP
The three fundamental approaches to routing are:
centralized, static routing, and dynamic routing
With the two-tier client-server architecture, the server is responsible for the ________ logic.
data access
The newer form of IP, version 6 (Ipv6):
has an increased address size from 32 bits to 128 bits
Controlled access MAC approaches work better in a large network with high usage.
True
With respect to converting digital data into analog signals, AM stands for:
Amplitude Modulation
Server name resolution is done using the:
Domain Name Service
A local area network (LAN) connects other LANs and backbone networks (BNs) located in different areas to each other and to wide area networks in a span from 3 to 30 miles.
False
An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.
False
Ethernet is an example of a network layer protocol.
False
Fiber optic cable can only be used on LANs.
False
The earliest type of fiber optic systems were:
Multimode
In a ___________ architecture, computers are both client and server, thus sharing the work.
Peer-to-peer
A walkie-talkie is an example of half-duplex transmission.
True
An address resolution protocol (ARP) message broadcasts to all devices in a subnet when the IP address is known but the MAC address is not known.
True
Computers produce digital data whose values are binary: 0 or 1.
True
Contention is commonly used with Ethernet local area networks.
True
A local area network is:
a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.
Another term for the weakening of a signal over distance is:
attenuation
Errors on a network can occur:
because of noise on the line
Dynamic addressing:
can solve many updating headaches for network managers who have large, growing, changing networks
The primary reason for networking standards is to:
ensure that hardware and software produced by different vendors can work together
A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.
intranet
The two sublayers of the data link layer consist of the media access control sublayer and the________ .
logical link control sublayer
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:
mail user agent
Which of the following would be considered a type of wireless media?
microwave
The _________ layer is responsible for routing of messages from the sender to the final destination.
network layer
IP:
performs routing functions
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:
port address
In the three tier architecture, the software on the client computer is responsible for the ____________.
presentation logic
________ is the presentation of information to the user and the acceptance of the user's commands.
presentation logic
There are optional and required parts of an HTTP request. They are:
request line, request header, request body
The _____________ is used by a computer to determine how messages will travel through the network.
routing table
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
the physical and the network layers
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
transport