CIS 308 - Mobile and Wireless Technology

¡Supera tus tareas y exámenes ahora con Quizwiz!

173. What output is expected when the function that is shown below is entered in a Python program interpreter? >>> print Cisco 1

"SyntaxError: Missing parentheses in call to 'print'"

65. What are wireless systems expected to provide?

"anytime anywhere" service

568. In a hypothetical wireless system, five adjacent frequency bands (f1, f2, f3, f4,f5)

* not 140

548. What process allows the advantage of multipath by transmitting multiple radio signals simultaneously?

* >>> spatial diversity is correct - not DSSS - not none of the above not MiMo

407. In AM, how much of the overall signal is contained in the sideband? Where is the rest of the signal contained?

- 1/3 is in the sideband - 2/3 is in the carrier, which doesn't contribute to the transfer data

518. Which three passwords are the least secure? (Choose three.)

- 135792468 - randolf - asdfghjkl

402. Discuss current applications of CDMA

- 2.5G - 3G

574. What is the range of worldwide interoperability for microwave access (WiMAX)?

- 48.2 kilometers not none of the above

95. What is slow fading?

- AKA shadowing - long term fading - caused by the long term spatial and temporal variations over distances large enough to produce gross variation in the overall path between the transmitter and the receiver

56. What is CDMA?

- Code Division Multiple Access - Increases number of potential users on a given frequency - Instead of having users split time, they make unique frequencies (codes) within the frequencies. They all use the frequency at the same time, but are unique in the code in which they are transmitting, preventing overlap across each other - similar to encrypting and decrypting

356. What is considered the most feasible generic method when code is selected and assigned dynamically to each MS in CDMA? Why?

- DS - FH is difficult to use on a practical basis unless a super-fast synthesizer is employed

360. What is DSSS method in regards to CDMA? 4

- Direct Sequence Spread Spectrum - An incarnation of DS - the radio signal is multiplied by a pseudorandom sequence whose bandwidth is much greater than that of the signal itself, thereby spreading its bandwidth - this is a modulation technique where a pseudorandom sequence directly phase modulates (data-modulated) carrier, thereby increasing the bandwidth of the transmission and lowering the spectral power density (i.e. the power level at any given frequency - the received signal is despread by correlating it with a local pseudorandom sequence identical to and in synchronization with the sequence used to spread the carrier at the radio transmitting end

342. What are the two modes of TDMA?

- FDD - TDD

371. What is OFDM based on?

- FDM frequency division multiplexing - to transmit multiple data streams over a common transmission medium

66. What are the four multiplexing techniques used for cellular

- FDMA - TDMA - CDMA - OFDM

410. Which provides a better SNR, AM or FM?

- FM - it has less noise content

317. Which provides a better SNR, AM or FM?

- FM - this implies that FM has less noise content

104. True or false Fast fading is long-term fading.

- False - Fast fading is short-term fading

240. True or false In a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme, a random delay or backoff period guarantees that a collision will not occur.

- False - There are no guarantees

97. True or false: The sky wave propagates in space but can return to earth by reflection either in the mesosphere or stratosphere.

- False - should be troposphere or ionosphere

109. True or false The key characteristic of a cellular network is the ability to use a single channel.

- False - the key concept is the reuse of frequencies - meaning the same frequency is assigned to different cells

330. What are the two types of duplex systems?

- Frequency Division Duplexing (FDD) - Time Division Duplexing (TDD)

54. What is FDMA 4

- Frequency Division Multiple Access - Each user connected to a base station is given their own frequency - this only allows a specific number of users due to finite number of frequencies - can think of this like IP addresses with static or dynamic NAT

362. Discuss FHSS

- Frequency Hopping Spread Spectrum - an incarnation of FH - a pseudorandom sequence is used to change the radio signal frequency across a broad frequency band in a random fashion - the sequence hops from channel to channel in a predetermined and pseudorandom manner - the RF signal is dehopped at the receiver end using a frequency synthesizer controlled by a pseudorandom sequence generator synchronized with the transmitters pseudorandom sequence generator

401. Discuss current applications of TDMA

- GSM - PDC

12. What is the term for the technology that uses machine learning and advanced automation to control networks?

- Intent-based Networking - IBN

9. What is the term for the connection of millions of smart devices and sensors connected to the internet?

- IoT - Internet of Things

504. What are two characteristics of artificial intelligence? (Choose two.)

- It uses systems that mimic human cognitive functions such as learning and problem solving. - It uses intelligent agents that interact with the environment and make decisions to reach a specific goal.

3. What is the term used to describe networks in small or local geographical area, such as home, small business, or a department within a large corperation?

- LAN - Local Area Network

57. What is OFDM?

- Orthogonal Frequency Division Multiplexing

323. What are the two newer ways to have many channels within an allocated bandwidth

- Orthogonal Frequency Division Multiplexing (OFDM) - Space Division Multiple Access (SDMA)

2. What is the term used to describe the small networks where connected wireless devices are within personal reach?

- PAN - Personal Area Network

37. What are sensor networks?

- The newest members of one special class of wireless ad hoc networks - large number of tiny immobile sensors are planted on an ad hoc basis to sense and transmit some physical characteristics of the environment

55. What is TDMA?

- Time Division Multiple Access - Splits up users across frequencies, across time - increases the number of users allowed - users share the frequency that is in use across time - each takes turn using the frequency - similar to how wireless access points work, devices take turns - this is why free wifi is slow and have a limit on the number of users they can support

4. What is the term to describe a collection of LANs that provides inter-LAN and internet connectivity for networks over long distance?

- WAN - Wide Area Network

123. Describe the mechanics of an if - then statement 3

- When an if-then structure is encountered, the computer checks if the expression is true or false. - if the expression is false, the computer moves on to the next structure ignoring the contents of the if - then block - if the expression is true, the computer executes whatever is in the if - then block before moving on to the next instruction in the program

35. Can a network be wireless, but not mobile? Explain

- Yes - Most home internet networks are wireless but not mobile. You don't need to use wires to connect to the internet, but you can't pick up your router, take it camping, and expect it to provide connectivity

52. What happens with cell towers as you drive across the country?

- You go from one cell coverage zone to another - you don't stay connected to a single station

372. Discuss OFDM

- a data signal is split into multiple data streams that are modulated by different frequencies that are orthogonal to each other and simultaneously transmitted to the receiver - the OFDM transmitter converts the high-speed bit streams into parallel low-speed bit streams that are modulated and mixed using Inverse Discrete Fourier Transform - to reduce intersymbol interference (ISI), guard time is inserted - on the receiver side, reverse actions are taken to retrieve the original signal

269. What is HDFS (Hadoop Distributed File System)? 2

- a distributed, fault tolerant, file system - used by hadoop

329. What is necessary to provide simultaneous two way communication (duplex communication)?

- a forward channel (downlink) from the BS to the MS - a reverse channel (uplink) from the MS to the BS

116. What is a compiled program language? examples

- a language that takes the human-readable code and compiles (translates) it into machine readable code in order to run - examples: java, c+

159. What is a dictionary in python 9

- a list of elements - is ordered, this order will not change - is changeable, can add/remove items - no duplicates - presented in key:value pairs - duplicate keys will overwrite previous values - can be referred to by using the key name - takes String, int, boolean, and list data types - lots of built in dictionary functions, such as: comparing elements with different dictionaries or providing a count of the number of items in the dictionary

122. What is an if - then statement? 2

- a logic structure in programming - allows the computer to make a decision based on the result of an expression

123. What is a for loop? 2

- a logic structure in programming - used to execute a specific set of instructions a specific number of times based on an expression - the loop part of the name is because the block it contains is executed repeatedly

409. What is frequency modulation (FM)?

- a method if integrating the information signal with an alternating current (AC) wave by varying the instantaneous frequency of the wave - the carrier is stretched or squeezed by the information signal, and the frequency of the carrier is changed according to the value of the modulating voltage

314. What is frequency modulation (fm)?

- a method of integrating the information signal with an alternating current (ac) wave by varying the instantaneous frequency of the wave - the carrier is stretched or squeezed by the information signal, and the frequency of the carrier is changed according the value of the modulating voltage

417. What is PSK? example

- a method of transmitting and receiving digital signals in which the phase of a transmitted signal is varied to convey information

146. What is a function in python? 2

- a named block of code that can be called and reused as needed - similar to a method in Java

147. What is Range()

- a predefined function in python - generates a list of numbers - usually used to iterate with FOR loops

29. What does the term GPS mean?

- a radio navigation system that helps to determine 3D position, velocity, and time - can be used any place on earth

500. What are two characteristics of artificial intelligence? (Choose two.)

- a robot cleans up an industrial chemical spill - a building automatically adjusts the heating and lights based the routine of the occupants

153. What are lists in python? 3

- a sequence of changeable python objects - allows duplicates - can be created by putting different comma-separated values between square brackets

151. What is a tuple? 3 example with output

- a sequence of unchangeable python objects - tuples are sequences separated by parenthesis - allows duplicates tup1 = ('dancing', 'singing', 400, 1842); tup2 = (1, 2, 3, 4, 5, 6, 7); print ('tup1[0]: ', tup1[0]) print ('tup2[1:5]: ', tup2[1:5]) output tup1[0]: dancing tup2[1:5]: (2, 3, 4, 5,)

161. What are else and elif in python? 3

- a sub-structures of if - then - elif is short for else if - allows the programmer to provide instructions for if the statement being tested is false

345. What is a guard time in TDMA?

- a time buffer between the slots so that interference due to propagation delays along different paths can be minimized

357. Describe the spread spectrum technique in regards to CDMA? What else is it called?

- a transmission technique wherein data occupy a larger bandwidth than necessary - bandwidth spreading

67. Explain CDMA another way

- a unique code is assigned to each user by the BS - distinct codes are used for different users - the code is mixed with bit of information before it is transmitted - the same code is used to decode the information - any information received that hasn't been mixed with this code is perceived as noise

125. Describe the mechanics of a for loop 3

- a variable acts as a counter inside a range of values identified by a minimum and a maximum - ever time the loop is executed, the counter variable is incremented - when the counter is equal to the defined maximum value, the loop is abandoned and the execution moves on to the next instruction

137. What is blockly?

- a visual programming tool created to help beginners understand the concepts of programming - by using a number of block types, blockly allows a user to create a program without entering any lines of code

192. What is a disadvantage of interleaving? What does this mean?

- additional delay as the sequence needs to be processed block by block - small memory sized interleaving is preferred in delay-sensitive applications

185. Discuss convolutional codes 4

- amongst the most widely used channel codes in practical communication systems - developed with a separate strong mathematical structure and are primarily used for real-time error correction -the encoded bits depend not only on the current input data bits, but also on past input bits - the main decoding strategy for convolutional codes is based on the viterbi algorithm

51. What is MANET

- an autonomous system of mobile nodes, mobile hosts (aka MHs or MSs, also serving as routers) connected by wireless links, the union of which forms a network modeled in the form of an arbitrary communication graph

184. Discuss cyclic redundancy check (crc) 2

- an error checking code that is widely used in data communications systems and other data transmission systems - uses frame check sequence (fcs), which holds redundant information about the frame that helps the receivers detect errors in the frame

183. Discuss cyclic codes 3

- are a subclass of linear block codes - have a cyclic structure that leads to more practical implementation - an advantage of cyclic codes over most other types is that they are relatively easy to encode/decode

508. What three technologies control network functions to accomplish a desired intent in an intent based network? (Choose three.)

- artificial intelligence - machine learn - automation

273. Discuss fault tolerance in regards to hadoop 2

- automatically replicates data across clusters to ensure data will not be lost - if a disk, node, or whole rack fails, the data is safe

369. What are the disadvantages of power control?

- battery power at MS is a limited resource that needs to be conserved, so it may not be possible or desirable to set transmission powers to higher values - increasing the transmitted power on one channel, irrespective of the power levels used on other channels, can cause inequality of transmission over the other channels - as a result, there is also the possibility that a set of connections using a pure power control scheme can suffer from unstable behavior, requiring increasingly higher transmission powers

351. How is fading resistance achieved in CDMA?

- because of its broadband characteristics, RAKE multipath synthesis provides fading resistance

358. How is spread spectrum/bandwidth spreading accomplished 2

- before transmission through the use of a code that is independent of the transmitted data - this same code is used to demodulate the data at the receiving end

318. List two advantages of FM?

- better SNR, therefore less noise content - needs less radiated power

262. Discuss analytics as a major storage problem in big data 4

- big data contains both structured and unstructured data - unstructured data, such as emails or photos, are difficult to analyze and consume a lot of storage space - structured data, such as a spreadsheet, is easier to analyze and store - data storage systems need to be able to manage both types

263. Discuss access as a major storage problem in big data 3

- big data must be accessible from anywhere at any time - storage solutions need to support the quantity of input and output requests - companies should also be aware of the strain placed on WAN links

190. What are the different kinds of interleavers? 6

- block interleavers - random interleavers - circular interleavers - semirandom interleaver - odd-even interleavers - optimal (near-optimal) interleavers

281. What is transactional data?

- captured and processed as events happen - used to analyze daily sales reports and production schedules to determine how much inventory to carry

73. What are the two types of wireless network?

- centralized or infrastructure based network - decentralized or infrastructure free based network

61. Discuss APs in a commercial environment

- channel bandwidth requirements and coordination of channels between APs govern the complexity

354. How is CDMA usually quantified?

- chip rate - the number of bits changed per second

398. Discuss disadvantages of CDMA

- complex receiver - requires power control to avoid near-far problem

287. When should you use a scatter plot? 2

- correlation visualizations - to show the distribution of a large number of data points

283. What is structured data?

- created by applications that use "fixed" format input such as spreadsheets or medical forms - may need to be manipulated into a common format such as CSV

112. What is application software? example?

- created to accomplish a certain task or collection of tasks - ex: packet tracer

268. What is hadoop? 3

- created to deal with big data volumes - uses HDFS (Hadoop Distributed File System) - uses MapReduce - is open-source

155. Give an example of updating that list in python with output

- creating the list list = ['car', 'train', 47, 2016]; print ('available at index 2: ') print (list[2]) output available at index 2: 47 - updating the list list[2] = 2017; print ('new value available at index 2 :') print (list[2]) output new value available at index 2: 2017

154. Give an example of a list in python with output

- creating the list: list1 = ['car', 'train', 47, 2016]; list2 = [1, 2, 3, 4, 5, 6, 7]; print ('list1[0]: ', list1[0]) print ('list2[1:5]: ', list2[1:5]) output list1[0]: car list2[1:5]: [2, 3, 4, 5]

259. Discuss management as a major storage problem in big data 3

- data can be from multiple different sources - a management system must be to organize and collate all the sources - there are few data-sharing standards and thousands of data management tools available

349. In broad terms, how does CDMA work?

- different spread-spectrum codes are selected and assigned to each user - multiple users share the same frequency

341. Where is TDMA widely used?

- digital portable and automobile telephones - mobile satellite communication systems

355. What are the two basic types of CDMA implementation methodologies

- direct sequence (DS) - frequency hopping (FH)

332. What does TDD (Time Division Duplexing) do?

- divides the frequency by time

331. What does FDD (Frequency Division Duplexing) do?

- divides the frequency used - typically used by FDMA

118. What are programming variables?

- dynamic buckets to hold phrases, numbers, or other important information that can be used in coding

366. Discuss walsh codes in CDMA

- each user is assigned one or many orthogonal waveforms derived from one orthogonal code - since the waveforms are orthogonal, users with different codes don't interfere with each other - CDMA requires synchronization among the users, since the waveforms are orthogonal only if they are aligned in time - an important set of orthogonal codes is the walsh set

310. What are three features of Hadoop? (Choose three.)

- easily scalable cluster sizes - automatic replication of data across clusters - uses HDFS as a fault tolerant file system

523. Match the security best practice to the description.

- educating users = train users on security procedures - regularly testing incident responses = perform and test emergency response scenarios - employing access controls = assign user roles and privilege levels - Implementing human resource security measures = research and perform background checks on employees

266. What are the benefits of cloud computing to companies 5

- enables access to organizational data from anywhere at any time - it streamlines the IT operations of an organization by subscribing only to needed services - it eliminates or reduces the need for onsite IT equipment, maintenance, and management - it reduces the cost of equipment, energy, physical plant requirements, and personnel training needs - it enables rapid responses to increasing data volume requirements

346. Discuss wideband TDMA

- enables high-speed digital transmissions where selective frequency fading due to the use of multiple paths can become a problem - requires the bandwidth be limited to an extent where selective fading can be overcome or appropriate measures such as adaptive equalization techniques can be adopted for improvement

248. True or false An advantage of Carrier Sense Multiple Access with collision detection (CSMA/CD) over Carrier Sense Multiple Access with collision avoidance (CSMA/CA) is that it can be used for both wired and wireless networks.

- false - CSMA/CS can be used on both wired and wireless networks

102. True or false Diffraction and scattering result in a large-scale fading effect.

- false - Diffraction and scattering result in small scale fading effects

436. Quadrature Phase Shift Keying (QPSK) employs two efficient frequencies for 0 and 1 bits.

- false - FSK uses 0 & 1

106. True or false Fading rate is defined as the number of times that the signal envelope crosses the middle valuer m in a negative-going direction per unit time.

- false - Fading rate is defined as the number of times that the signal envelope crosses the middle value r m in a positive-going direction per unit time.

229. True or false Adjacent channel interference is caused by the ongoing transmissions in different cells which are using the same channel.

- false - I couldn't find anything that discussed this, so it must be false?

228. True or false A handoff region is the time duration required for completing a handoff.

- false - I think it has less to do with time, and more to do with signal strength (see the book section 5.3)

435. Frequency Shift Keying (FSK) has a perfect signal-to-noise (SNR) ratio.

- false - PSK has a perfect SNR ratio

218. True or false The GBN ARQ scheme is better suited when single packet errors are most possible during transmission.

- false - better suited for an environment where burst errors are most probable during packet transmission

206. True or false The main coding strategy for turbo codes is based on the widely used Viterbi algorithm.

- false - convolutional codes use the viterbi algorithm

312. True or False? Distributed data processing involves large databases being centrally processed by powerful mainframe computers and stored in giant disk arrays.

- false - distributed data processing involves breaking large data volumes into smaller pieces that are distributed to many computers for processing

223. True or false If a cell area is increased, the number of channels per unit must be increased for the same number of channels and therefore satisfies less populated areas.

- false - if the cell area is increased, the number of channels per unit area is reduced for the same number of channels and is good for less populated areas with fewer cell phone subscribers. - On the other hand, if the number of the cell phone users is increased (such as in a dense urban area), a simple-minded solution is to increase the number of the channels. - A more practical option is to reduce the cell size so that the number of channels per unit area can be kept comparable to the number of subscribers.

428. Frequency hopping (FH) is a spread spectrum technique whereby the original data signal is multiplied with a pseudo random noise spreading code.

- false - it is DSSS, not FH

217. True or false In the Stop-And-Wait ARQ scheme, if the data packet received in not corrupted, the receiver sends a NAK packet.

- false - it sends an ACK packet

210. True or false A hard-decision decoding uses multi-bit quantization on the received channel values.

- false - it uses single-bit quantization

216. True or false In relation to Turbo Codes, the decoder must use a hard-decision input to produce some type of hard output since estimation of the information bits is used in decoding.

- false - it uses soft-decision

429. In fast hopping, there are multiple data bits per hop.

- false - slow hopping has multiple data bits per hop - fast hopping has multiple hops per data bit

430. In CDMA systems, a major area of concern is the near-far problem which is caused by non-orthogonal code sequences.

- false - the near-far problem stems from a wide range of signal levels received in a wireless and mobile communications systems

300. True or False? Data is defined as big data if it is more than 1 petabyte.

- false - there is no minimum amount of data required

221. True or false In cellular broadcasting, the cell boundary or model is based on rhomboid cells.

- false - typically it is a hexagon, though it could also be a circle, square, or equilateral triangle

299. True or False? Web scraping tools are used to extract and manipulate structured data.

- false - web scraping tools can collect both structured and unstructured data

364. What types of hops can a frequency hopper use? Describe each

- fast hopped: multiple hops per data bit - slow hopped: where there are multiple data bits per hop

53. What is an example of a sensor network

- fire detection system - ICS

519. Which two online activities pose high security risks? (Choose two.)

- following email links that have already been scanned by the email server - sharing information on social media

260. Discuss security as a major storage problem in big data

- for data to be of value to enterprises it must be kept secure and only accessible by authorized users

68. What are the channels from BS to MS called?

- forward channels - called downlink outside the US

322. What are the three basic ways to have many channels within an allocated bandwidth?

- frequency (FDMA) - time (TDMA) - code (CDMA)

285. What is unstructured data? 2

- generated in a freeform style such as audio, video, web pages, and tweets. - requires different tools to prepare data for processing or analysis

186. What are the two typical decoding methods for convolutional coding?

- hard-decision decoding - soft-decision decoding

361. What does the resulting RF signal from DSSS CDMA look like?

- has a noiselike spectrum - can be made to look like noise to all but the intended radio receiver

189. What is interleavering?

- heavily used in wireless communication - the base objective is to protect the transmitted data from burst errors - there are many different interleavers

222. What shapes are used to represent cells in a cellular telephone system? 4

- hexagons - square - equilateral triangle - circle

416. Does FSK have a high or low signal to noise ratio (SNR)? How about spectral efficiency? What was it used for?

- high SNR - low spectral efficiency - all early low bit-rate modems

200. Discuss selective-repeat ARQ (SR ARQ) 7

- improves on the unnecessary repeat transmissions that can occur during GBN ARQ - the receiver ACKs all correctly received packets, and when the sender does not receive an ACK packet from the receiver (some specific packet is suspected to be lost or corrupted) it retransmits only that packet - avoids unnecessary transmissions - the sender continuously sends packets and only retransmits the corrupted ones - since the receiver may receive out of order packets, it needs a large memory to buffer and reorder these packets before passing them to the upper layer - offers the best efficiency - great for when the probability of packet corruption or loss is high for communication channels

64. Discuss security as the book first describes it

- in terms of authentication and encryption, it is critical - it is fairly expensive in terms of hardware and resources - it affects channel capacity and information contents - many levels of security are useful and desirable

202. What are two ways to reduce carrier-to-interference ratio?

- increase transmitting power - have appropriate use of the frequency spectrum

396. Discuss disadvantages of FDMA

- inflexible - available frequencies are fixed - requires guard bands

399. Discuss disadvantages of SDMA

- inflexible - requires network monitoring to avoid intracellular handoffs

182. Discuss linear block code 4

- information sequence is always a multiple of a preselected length - has parity to ensure no data is lost or changed - since the coded sequence includes the entire information sequence, it is linear, hence the first part of the name - the encoding is processed block by block, which is where it gets the second part of its name

164. What are the characteristics of a prototype?

- is fully functional, but not fault-proof - is an actual working version of the product - is used for performance evaluation and further improvement of the product - has a complete interior and exterior - may be relatively expensive to produce - in the IoT, is often used as a technology demonstrator

197. Discuss the stop-and-wait ARQ (SAW ARQ) scheme 6

- is the simplest ARQ scheme - sender sends one data packet at a time - the receiver receives that packet and checks if the data packet has been received correctly - if the packet isn't corrupted, the receiver sends an ACK packet - otherwise, the receiver responds with a NAK packet - exhibits poor utilization of the wireless communication channel since the sender does not send the next packet until it receives an ACK from the receiver

141. What happens when python is called with no arguments? 3

- it reads and executes commands interactively - it is in interactive mode and waits for commands - can act as a calculator

320. What is one of the most important messages sent by the MS? 4

- its readiness to send information - then it receives information about which traffic or information channel is to be used exclusively by that ms from the bs - this channel is used for the duration of the call - this assignment is done dynamically and as needed so that the wireless resources can be used effectively and efficiently

170. What are two resources that could help someone learn to program? (choose two)

- khan academy - code academy

291. What should you know before you begin to analyse data?

- know what problem the business is trying to solve or what information the business is looking for

272. Discuss scalability in regards to Hadoop 2

- larger cluster sizes improve performance and provide higher data processing capabilities - with hadoop, cluster size can easily scale from a five node cluster to a one thousand node cluster without excessively increasing the administrative burden

31. What are ad hoc networks?

- local networks with wireless or temporary plug-in connections - mobile or portable devices are part of the network only while they are in close proximity

119. What are the two types of variables?

- local variables - global variables

126. What are while loops? 2

- logic structure in programming - used to execute a specific set of instructions while an expression is true

231. What is the function of a control channel?

- maintains order and informs mobiles which channels can be utilized

265. What are the benefits of fog computing and pre-processing 2

- makes communication quicker - decreases bandwidth requirements

258. What are the 5 major data storage problems with big data?

- management - security - redundancy - analytics - access

115. When you really boil it down, what isn't an algorithm? 2

- math - a specific coding language or syntax

157. What are common uses of sets in python? 3

- membership testing - removing duplicates from a sequence - computing standard math operations on sets such as intersection, union, difference, and symmetric difference

359. What was spread spectrum originally designed for?

- military use to avoid jamming (interference created intentionally to make a communication channel useable - now used in personal communication because of its superior performance in an interference dominated environment

427. Which multiple access scheme is under review as a core technology for the next generation multiple communication system?

- none of the above - CDMA is the correct answer

212. Which is the most commonly used interleaver used in wireless communication systems?

- none of the above - the block interleaver is the most commonly used interleaver

374. Discuss SDMA

- omni-directional communication space is divided into spatially separable sectors - the BS uses smart antennas allowing multiple MSs to use the same channel simultaneously - the communication characterised by time slot, carrier frequency, or spreading code - use of a smart antenna maximizes the antenna gain in the desired direction, and directing antenna gain in a particular direction leads to range extension, which reduces the number of cells required to cover a given area - such a focused transmission reduces the interference from undesired directions by placing minimum radiation patterns in the direction of interferers

195. What are ARQ (automatic repeat request) techniques

- one of the error handling mechanisms used in data communication - when the receiver detects errors in a packet (that cannot be corrected by underlying error-detecting code, if used) it simply drops the packet and the sender needs to transmit again - ACK (acknowledgement) and NAK (negative acknowledgement) are explicit feedback sent by the receiver

418. What kind of SNR does PSK have? What does this mean?

- perfect, but must be demodulated synchronously - a reference carrier signal is required to be received at the receiver to compare with the phase of the received signal, which makes the demodulation circuit complex

511. Which three elements should be combined when creating a strong password? (Choose three.)

- phrases - special characters - combinations of letters and numbers

493. In which layers of the open systems interconnection (OSI) model does cellular digital packet data (CDPD) operate?

- physical layer and data link layer

49. What are the characteristics of wireless and mobile systems?

- public sphere: traffic information system, personal security, disaster information system - business sphere: mobile videophone, video conferencing, database email - private sphere: information services, music on demand, portable tv, interactive tv, interactive games, video on demand, e newspapers and books, shopping, home-schooling, weather forecasts, financial information

400. Discuss current applications of FDMA

- radio - TV - analog cellular

267. What is distributed data processing? 4

- rather than large databases being processed by big and powerful mainframe computers, and stored in giant disk arrays (vertical scaling) - distributed data processing takes the large volume of data and breaks it into smaller pieces - the smaller data volumes are distributed in many locations to be processed by many computers with smaller processors - each computer in the distributed architecture analyses part of the big data picture (horizontal scaling)

319. What is a disadvantage of FM?

- requires a larger bandwidth than AM

397. Discuss disadvantages of TDMA

- requires guard space - synchronization problem

69. What are the channels used from MS to BS called?

- reverse channels - uplinks outside the US

261. Discuss redundancy as a major storage problem in big data 2

- safeguards should be in place to maintain the integrity of the stored data - processes for backups, redundancy, and disaster recovery are required

403. Discuss current applications of SDMA

- satellite systems - other options being explored

271. What are the two main features that make Hadoop the industry standard for handling big data?

- scalability - fault tolerance

96. What is fast fading?

- short term fading - caused by the scattering of the signal by objects near the transmitter

421. What is quadrature amplitude modulation (QAM)?

- simply a combination of AM and PSK - two carriers out of phase by 90 degrees are amplitude modulated - modulated using two measures of amplitude and four phase shifts - combining the two gives 8 possible waves - mathematically, there is no limit to the data rate that may be supported by a given baud rate in a perfectly stable, noiseless transmission environment - the governing factors are the amplitude (and consequently, phase) stability, and the amount of noise present, in both the terminal equipment and the transmission medium (carrier frequency, or communication channel) involved

73. Give an example for military application of ad hoc network

- soldiers in close proximity sharing information on their notebook computers using RF signals

45. Why are different sized cells needed?

- some areas, such as downtown, have a large number of wireless phone users who are served by a smaller sized cell - this allows a larger number of channels allocated to each cell, which is assumed to be the same or independent of the cell size - the goal is to have the same number of channels per customer and try to have similar quality of service in all areas

506. Which two applications commonly use ML technology? (Choose two.)

- speech recognition - credit card fraud detection

340. What does TDMA do?

- splits a single carrier wave into several time slots and distributes the slots among multiple users - consist of many units (time slots) over a time cycle, making it possible for one frequency to be efficiently used by multiple users, since each uses a different time slot

233. Which channel sharing technique predetermines and assigns the channel and does not change it with time?

- static channelization

367. What is the near-far problem?

- stems from a wide range of signal levels received in a wireless and mobile communications systems - if two MSs are communicating with a BS and we assume the transmission power of each MS to be the same, received signal levels at teh BS from MS1 and MS2 are quite different due to the difference in path lengths - assume that the MSs are using adjacent channels - out-of-band radiation of the signal from the MS1 interferes with the signal from the MS2 in the adjacent channel - this effect, called adjacent channel interference, becomes serious when the difference in the received signal strength is high - because of this, the out-of-band radiation must be kept small - the tolerable relative adjacent channel interference level can be different depending on the system characteristics - if the power control technique is used, the system can tolerate higher relative adjacent channel interference levels - the near-far problem becomes more important for CDMA systems where spread spectrum signals are multiplexed on the same frequency using low cross correlation

196. What are the three kinds of ARQ schemes?

- stop-and-wait ARQ (SAW ARQ) - go-back-n ARQ (GBN ARQ) - selective-repeat ARQ (SR ARQ)

282. What is analytical data?

- supports managerial analysis tasks like determining whether the organization should build a new manufacturing plant or hire additional sales personnel

405. What does single sideband modulation (SSB) do?

- suppresses one sideband before transmission - doubles the number of transmissions that can fit into a given transmission band

111. What are the two most common types of computer software?

- system software - application software

419. What is quadrature phase shift keying (QPSK)

- takes the concept of PSK a step further - it assumes that the number of phase shifts is not limited to only two states - the transmitted carrier can undergo any number of phase changes

477. Which statement below is true in relation to the difference between open systems interconnection (OSI) and transmission control protocol/internet protocol (TCP/IP) protocol models?

- the OSI suite was put forward before the protocols were invented

406. What happens at the receiver end for AM?

- the carrier signal is filtered out, rebuilding the information signal (speach, data, etc)

420. What happens in QPSK?

- the carrier undergoes four changes in phase and can thus represent four binary bit patterns of data, effectively doubling the bandwidth of the carrier - typically is implemented using I/Q modulation with

50. What are forward channels?

- the channels from BS to MS - called downlinks outside the US)

350. What makes CDMA less susceptible to noise and interference?

- the fact that it is based on spread-spectrum tech - this means it is spread over the bandwidth range of the modulated signal

194. How do turbo codes work?

- the first RSC encoder uses the bit stream as it comes, whereas an interleaver precedes the second one - the two encoders introduce redundancy for the same block of bits but are different as there exists low correlation among the input bits streams due to interleaving

404. What is amplitude modulation (AM)?

- the first method ever used to transfer voice information from one place to another - its bandwidth is twice that of modulating signal which halves the number of independent signals that can be sent using a given range of transmission frequencies

344. Discuss TDD in TDMA

- the forward/reverse or uplink/downlink communication frequencies are the same

343. Discuss FDD in TDMA

- the forward/reverse or uplink/downlink communication frequencies differ

60. What is an access point (AP)?

- the hardware that acts as a hub for many digital devices - connects them wirelessly to a wired LAN for data exchange - expected to communicate with various appliances to control them using localized wireless mode and facilitate remote control

117. What are interpreted programming languages? example

- the human readable code doesn't need to be compiled, but rather, is interpreted directly by the machine - example: python

114. When you really boil it down, what is an algorithm? 2

- the logic that makes a program function - think of flowcharts

193. What are turbo codes?

- the most recently developed codes (as of 2014 when the book was written) - extremely powerful - built using two identical recursive systematic convolutional (rsc) codes with parallel concatenation

290. When should you use a bar chart? What makes them unique?

- the names for each data point is long - similar to column charts, except they can be placed horizontally or vertically

375. Discuss SDMA

- the omni-directional communication space is divided into spatially separable sectors by having a BS use smart antennas, allowing multiple MSs to use the same channel simultaneously - the communication characterized by time slot, carrier frequency, or spreading code - use of a smart antenna maximizes the antenna gain in the desired direction, and directing antenna gain in a particular direction leads to range extension, which reduces the number of cells required to cover a given area - such focused transmission reduces the interference from undesired directions by placing minimum radiation patterns in the direction of interferers - as the BS forms different beams for each spatially separable MS on the forward and reverse channels, noise and interference for each MS and BS is minimized - this enhances the quality of the communication link significantly and increases overall system capacity - by creating separate spatial channels in each cell intra-cell, reuse of conventional channels can be easily exploited - as of 2015 (when the book was written) this tech was being explored and looked promising - SDMA is typically used with more than one multiple-access schemes, there can be more than one MS in one beam - using TDMA and CDMA, different areas can be covered by the antenna beam, providing frequency reuse - when used with TDMA and FDMA, the higher CIR ratio due to smart antennas can be exploited for better frequency channel reuse - with CDMA, the user can transmit less power for each link, thereby reducing MAC interference and hence supporting more users in the cell - the tradeoff is that there will be more intra-cell handoffs in SDMA compared to TDMA and CDMA systems, requiring a closer look at network resource management

163. What is prototyping

- the process of creating a rudimentary working model of a product or system

62. What should be considered regarding APs in a commercial environment?

- the range of the system - the number of APs as distribution infrastructures that are installed - number of users for each AP - example: a department store may have one AP per floor, while a factory may have several uniformly placed APs per floor to ensure continuous connection

199. Discuss the go-back-n ARQ (GBN ARQ) scheme 5

- the sender is allowed to transmit N packets without waiting for acknowledgement of prior packets - when a packet is corrupted during the transmission and it receives a NAK from the receiver, the sender has to retransmit all the packets that have been sent after that corrupted packet - the packets that have been sent but not acknowledged are buffered by the sender - since the receiver only accepts the correct and in-order packets, only a buffer of one packet size is needed at the receiver - better suited for an environment where burst errors are most probable during packet transmission

127. Describe the mechanics of a while loop

- the system checks if the while expression is true. - if it is, the contents of the while block are executed, then the system checks the while statement again and will either execute the contents again, or move on - if it isn't the contents of the while loop is skipped - typically the block inside the while loop has instructions that cause the while loop to eventually become false

368. What is power control in CDMA? example

- the technique of controlling the transmit power in the traffic channel so as to affect the received power and hence the CIR - ex: in free space, the propagation path loss depends on the frequency of transmission and the distance between the transmitter and receiver

46. What do the network characteristics of cellular systems depend on? example

- the type of applications being explored - home based environment or industrial environment vs commercial and private environment

348. What does the orthogonality condition of CDMA imply 2

- there is no overlapping of signals in code axis for signals - the signals don't have any common codes in the code space

201. What should all ARQ schemes have? Why?

- timers - if the sender didn't receive a response from the receiver in a specified timeframe, those packets must be retransmitted

289. When should you use a column chart? What is unique about them?

- to display the value of a specific data point and compare that value across similar categories - can only be placed vertically

288. When should you use pie charts?

- to show a composition of a static number

280. What are the two types of valuable data that has been processed?

- transactional - analytical

243. True or false Hidden nodes increase the probability of collision at a receiver, whereas exposed nodes may be denied channel access unnecessarily, which means underutilization of the bandwidth resources.

- true

139. What is a python interpreter?

- understands and executes python code

156. What are sets in python? 6

- unordered - unindexed - unchangeable, though you can add new items and remove items - duplicate values are ignored - can add/remove items - since they are unordered, you don't know what order they will appear in - collections of elements - can make a set from a list

524. What are two recommended steps to protect and secure a wireless network? (Choose two.)

- update firmware - use wpa2-AES encryption

338. What is a guard band?

- used between two adjacent channels to minimize interference

41. What are reverse channels

- used for communication from MS to BS - also known as uplinks

334. What is a frequency synthesizer?

- used to adjust and maintain the transmission and reception frequencies

414. What is frequency shift keying (FSK)

- used to modulate a digital signal over two carriers by using a different frequency for a 1 or a 0 - the difference between the carriers is known as the frequency shift

188. What is soft-decision decoding?

- uses multi-bit quantization on the received channel values.

187. What is hard-decision decoding?

- uses single-bit quantization on the received channel values

121. What are global variables? 2

- variables that are in the scope for the time of the program's execution - they can be retrieved by any part of the program

120. What is a local variable?

- variables that are in the scope of a program / function / procedure

515. What are three examples of personally identifiable information? (Choose three.)

- vehicle identification number - birth date - bank account number

138. What is python?

- very popular coding language designed to be easy to read and write

47. What are the services and features provided by cellular tech?

- voice and data through handheld phones

58. What is frequency hopping?

- was a way to stop people from eavesdropping on your signal - they won't know which frequency you are jumping to next or when

270. What is MapReduce

- which is a distributed way to process data - used by hadoop

324. What must an MS distinguish?

- which signal is meant for itself among many signals sent by a particular user - which signal is from its connected BS rather than a nearby BS

113. What is system software? 2 example?

- works between the computer hardware and the application program - controls the computer hardware and allows application programs to function - ex: Linux, OSX, Windows

145. Can strings be used with interactive python? What do you use to indicate a string? how do you escape characters? example

- yes - "" or '' - you use \ to escape characters >>> "I really \"need\" this"

365. Are multiple simultaneous transmissions from several users possible using FH? If so, how?

- yes - as long as each uses different frequency hopping sequences and none of them collide (no more than one unit using the same band) at any given instance of time

321. Can users receive signals transmitted by other uses in the system? 2

- yes - but they are discarded by the MS as not for them

336. Are different frequency bandwidths assigned to different users? What does this imply?

- yes - there is no frequency overlapping between the forward and reverse channels

286. When should you use line charts? 3

- you have a continuous set of data - the number of data points is high - you would like to show a trend in the data over time

72. What are the steps for a call setup from BS to MS?

1. BS sends call for MS #pending 2. MS sends ready to establish path 3. BS sends use frequency/time slot/code (FDMA/TDMA/CDMA) 4. MS responds with ready to communicate 5. BS starts communication on the assigned traffic channel

71. What are the steps for a call setup from MS to BS?

1. MS requests need to establish path 2. BS responds assigning frequency/time slot/code (FDMA/TDMA/CDMA) 3. MS responds with control information acknowledgement 4. BS responds by starting communication on the assigned traffic channel

198. List the steps of the stop-and-wait ARQ (SAQ ARQ) 8

1. The sender transmits packet 1 and then waits for an ACK packet from the receiver. 2. The receiver receives packet 1 without error and transmits an ACK packet. 3. The sender receives the ACK packet and then proceeds to transmit packet 2. 4. Packet 2 also arrives at the receiver without error and the sender successfully gets an ACK packet from the receiver. 5. Packet 3 is sent by the sender but undergoes errors in transmission. 6. The receiver receives packet 3, but it finds the packet is corrupted. Then it sends back a NAK packet to the sender. 7. Upon receiving the NAK, the sender retransmits packet 3. 8. A similar sequence is followed for the rest of the packets.

561. A typical Bluetooth device has a range of approximately:

10 meters

537. How many users can be connected to one access point (AP) simultaneously ?

10 to 30 users

539. The IEEE 802.11 Wi-Fi / WLAN standards set the attributes for the different channels that may be used. How many channels are allowed for use by the federal communications commission (FCC) in the United States?

11

569. The IEEE 802.15.4 2.4GHz ISM band PHY layer supports ______ channels between 2.4 GHz and 2.4835 GHz.

16

525. How many countries have Cisco Networking Academies helping individuals prepare for industry-recognized certifications and mastering IT skills?

180

570. Bluetooth 3.0 high speed (HS) operates on which frequency band?

2.4-2.4835 GHz band

543. What is the recommended minimum distance between a Bluetooth device and an AP?

20 feet

567. In terms of the IEEE 802.15.4 PHY layer, the 2.4 GHz ISM band offers a transmission rate of:

250 kbps

473. The radio range of a macrocell is:

300 - 2000 meters

173. What is displayed after the following code is entered into a python interpreter? addition = 22 + 10 print(addition)

32

166. A student has a digitized version of an idea for a project. What machine can the student use to turn the idea into a solid object?

3d printer

532. How many students have been trained through Cisco Networking academies to date?

5 million

845. The IEEE 802.11a standard has a bandwidth of:

54 Mbps

552. What is the main operational difference between 802.11b and 802.11n?

802.11n adds technology called multiple-input multiple-output (MIMO)

586. Which of the following is NOT a functional component of an intrusion detection system (IDS)?

>> misuse detection is correct not global response not local detection engine not none of the above

142. What does the primary prompt for python in interactive mode look like?

>>>

592. Given a bivariate polynomial function f(x, y)=x2+y2+ x3+y3 +12x+12y+5, what will the shared key if x=3 and y=7?

>>> 553 is correct not 548

581. A temporary ID called ______ is used to identify the user equipment globally without revealing identity .

>>> GUTI is correct not International mobile subscriber identity (IMSI) not none of the above

144. How do you set variable values for python in interactive mode? What happens after you press enter?

>>> birth_year = 1941 >>> curr_year = 2016 >>> curr_year - birth_year 75 - no result will be displayed before the next active prompt

544. The IEEE protocol version 802.11d was designed for this purpose:

>>> none of the above is correct - not Quality of service *

149. Give an example of the syntax of a two parameter Range() function. Give an example of the use of a two parameter Range() function and the output

>>> range(start, stop) the starting number of the sequence and stop is the last number in the sequence >>> for i in range(3, 6): print (i) output 3 4 5

150. Give an example of the syntax of a three parameter Range() function. Give an example of the use of a three parameter Range() function and the output

>>> range(start, stop, step) the starting number of the sequence, the end number of the sequence, and the difference between each number in the sequence >>> for i in range(4, 10, 2): print (i) output 4 6 8

148. Give an example of the syntax of a single parameter Range() function. Give an example of the use of a single parameter Range() function and the output

>>> range(stop) the stop indicates the number of integers (whole numbers) to generate, starting from 0 >>> for i in range(3): print (i) output: 0 1 2

447. Hybrid channel allocation (HCA) schemes are defined as:

A blend of the fixed channel allocation (FCA) and the dynamic channel allocation (DCA) schemes.

20. What is a sensor?

A device that detects or measures an event or physical property

444. What characteristic regarding the fixed channel allocation (FCA) scheme makes it exhibit superior performance compared to the dynamic channel allocation (DCA) scheme under heavy load conditions?

A specific channel can be assigned to cells that are the minimum distance apart so that no interference occurs.

488. Which protocol utilizes a blend of forward error correction (FEC) and automatic request (ARQ) techniques for loss recovery?

AIRMAIL protocol

471. The three distinct applications of time-modulated ultra wide band (TM-UWB) are communications, precision location and tracking, and ___________.

Advanced radar sensing

453. In a cellular system, with 7-cell clusters, has the following average number of calls at a given time: Cell number Average number of calls/unit time 1 900 2 2000 3 2500 4 1100 5 1200 6 1800 7 1000 If the system is assigned 49 traffic channels, how would you distribute the channel if a FCA Simple borrowing scheme is used (no traffic load considered)?

Allocate seven channels to each cell and borrow channels from adjacent cells with low traffic.

598. DHCP operates at this layer of the OSI model.

Application

597. _______________provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call.

Authentication Center Unit (AUC)

482. Open shortest path first (OSPF) supports hierarchical routing in which hosts are partitioned into ___________ that present a common, clearly defined routing policy to the Internet.

Autonomous systems (AS)

535. An access point (AP) that provides wireless connectivity to numerous mobile stations (MSs) within a fixed range radius of approximately 150 meters is defined as a:

Basic Service Area (BSA)

439. In the cell sector method, ordered channel assignment scheme with rearrangement and borrowing of channels is accomplished by:

Borrowed traffic channels can be returned to the donor cells if the channels become available in the borrowing cell.

88. Which multiplexing technique uses spread spectrum?

CDMA

328. What is a system that uses different code to transmit the signal for each user?

CDMA system

209. Which CRC polynomial do some Department of Defense (DoD) applications use?

CRC-32

459. In the United States, beacon signals are transmitted by which system?

Cellular Digital Packet Data (CDPD)

443. In relation to the cell-based distributed dynamic channel allocation (DCA) scheme, the signal strength measurement-based distributed scheme is characterized by:

Channels are allocated to a new call if the anticipated CCIR (Cochannel Interference Ratio) is above a threshold.

455. A cellular system with omni-directional antennas employs a cluster of size 7. The cell at the center of the cluster has much more traffic than the others and needs to borrow some channels from adjacent cells. Which strategy you would employ to determine a donor cell outside the cluster?

Choose a free channel, which could minimize the possible interference with the cells of the other clusters that are within reuse distance of the center cell.

530. Which IT community is a collection of resources designed for people who wish to develop skills and pursue a Cisco certification?

Cisco Learning Network

422. If a system uses different code to transmit the signal for each user, it is a:

Code Division Multiple Access (CDMA) system

424. In relation to the Frequency Division Multiple Access (FDMA) technique, the definition of the carrier frequencies of the forward channel is:

Communication between cell site and mobile subscribers.

533. What is a Cisco developer program community that allows the user to learn, connect, inspire, and code and consists of coordinated developer tools, and sandboxes?

DevNet

470. A disadvantage of UWB is:

Devices are power limited

438. What is the definition of complex borrowing in regards to fixed channel allocation (FCA)?

Divide the traffic channels into two groups, one group assigned to each cell permanently and the second group kept reserved as donors to be borrowed by neighboring cells.

485. In the transmission control protocol / internet protocol (TCP/IP) application layer, this application runs special purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts.

Domain name server

481. This protocol is designed to handle dynamic assignments of internet protocol (IP) addresses in a domain:

Dynamic Host Configuration Protocol DHCP

89. Which system divides the total bandwidth into nonoverlapping frequency subbands, thereby eliminating the interference between adjacent channels?

FDMA

326. What is a system that uses different carrier frequencies to transmit the signal for each user?

FDMA system

411. Which needs less radiated power, AM or FM?

FM

412. Which requires more bandwidth, AM or FM?

FM

415. What type of modulation is similar to FM?

FSK, except that it is binary

234. True or false The Open Systems Interconnection (OSI) reference model for modified for cellular networks includes a Medium Access Control (MAC) sublayer in the physical layer.

False

437. True or false: In dynamic allocation, a fixed number of channels is allocated to each cell.

False

441. True or false: The centralized DCA scheme involves a number of controllers scattered across the network (mobile switching centers [MSCs]).

False

487. True or false: The fast retransmission approach utilizes local retransmission from the base station (BS) to shield the wireless link from errors and enhances the operation of the transmission control protocol (TCP) over the wireless link.

False

584. True or false: In a mobile ad hoc network (MANET) underlying routing protocols like the transmission control protocol (TCP) have numerous security related vulnerabilities.

False

458. Some of the information carried by beacon signals includes:

Gateway address

509. Which technology uses AI and other technologies to reconfigure a network to comply with service levels?

IBM

547. Which IEEE 802.11 standard is functionally comparable to an Ethernet?

IEEE 802.11b

451. In overlapped cell-based allocation, a directed retry is characterized by:

If a call finds its first-attempt cell without any free channels, it can try for a free channel in any other cell with ample signal quality.

94. What does IEEE stand for?

Institute of Electronics and Electrical Engineering

527. Which series of Cisco Networking Academy courses is designed to develop skills for securely collecting data, connecting sensors to the cloud, and analyzing big data?

IoT Fundamentals

526. What is the primary focus of the CCNA Routing and Switching curriculum that is available through the Cisco Networking Academy?

It provides learners to have a comprehensive overview of networking concepts and skills.

178. Which output would be displayed if the code that is shown below is entered in a python interpreter? y = ['yellow', 'red', 'green', 'purple', 'white'] print y

It shows "SyntaxError"

293. Fill in the blank comma-separated value (CSV), _____________________, and XML create plaintext file types

JSON

99. A sky wave is used for:

Long-range, high-frequency daylight communication

521. What is a wireless router security best practice that limits access to only specific internal hosts?

MAC address filtering

238. What describes the transmission behavior of an MS in pure ALOHA?

MS can start transmission right away

540. A wireless mobile station (MS) follows three phases; in the first phase of authentication, the MS ascertains whether the MS has the legal right to access the AP via which layer?

Medium Access Control (MAC)

557. The Ricochet service was introduced by which internet service provider (ISP)?

Metricom

425. What is the purpose of a guard band?

Minimizes the channel interference between two adjacent channels.

457. The ___________ maintains access information such as type of allowed service and billing data.

Mobile Switching Center (MSC)

467. Which protocol attempts to address the issue of tunnel convergence?

Mobile multicast (MoM) protocol

250. An independent t-shirt vendor advertises through Facebook and other social media sites. The vendor receives statistics on the customer demographics. Does this vendor have big data?

No

484. The border gateway protocol (BGP) is based on this protocol:

None of the above

433. What is a current application of Space Division Multiple Access (SDMA)?

None of the above.

556. HiperLAN2 uses which modulation method?

OFDM

87. Which of the following is NOT an example of a shape used to model a cell:

Octagon

475. A closed access mode for a femto cell base station (F-BS) is defined as:

Only a small portion of cellular users are served in the femto cell network.

464. The ___________ is the area covered by one or several or several mobile switching centers (MSC) in order to obtain the current position of the mobile station (MS).

Paging area

491. In the internet protocol version 6 (IPv6) header, the ___________ specifies the size of the data in the packet.

Payload length

439. In fixed channel allocation (FCA), a simple borrowing scheme called borrow-first-available scheme can be defined as:

Perform a predefined sequence search and select the first free channel available.

448. In the _________ , the traffic intensity or the blocking probability is constantly monitored at every cell site so that the reallocation of these channels can be done at any time.

Predictive strategy

426. How can fading be addressed on a Code Division Multiple Access (CDMA) system?

RAKE multipath synthesis

296. fill in the blank ___________________ is an example of a big data analytics tool

RapidMiner

172. Which platform is a low cost, credit-card sized computer?

Raspberry Pi

101. The following statement best describes the behavior of reflection:

Reflection occurs when a wave bounces from the surface of an obstacle.

462. A hard handoff is characterized by:

Releasing current radio resources from the prior base station (BS) before acquiring resources from the next BS.

466. In the multicast over mobile internet protocol approach called ___________, whenever a mobile station (MS) moves into a foreign network, the foreign agent (FA) sends a tree join request.

Remote subscription approach

434. What is a disadvantage of using Time Division Multiple Access (TDMA)?

Requires guard space.

92. What was the name of the first artificial satellite to orbit the earth?

SPUTNIK

522. What is used to identify a wireless network?

SSID

76. What are the challenges for wireless networking?

Secure communication

214. Which ARQ scheme retransmits only the packet that is suspected to be lost or corrupt?

Selective-Repeat ARQ scheme (SR ARQ)

564. Which protocol provides a means for applications to find out which services are available through Bluetooth?

Service Discovery Protocol

587. Local intrusion detection system (LIDS) uses which protocol's data located in management information databases (MIBs) for the basis of auditing?

Simple network management protocol SNMP

432. What is an advantage of using FDMA?

Simplicity and robustness

542. What is the small time interval between the data frame and its acknowledgment called?

Small inter-frame space (SIFS)

225. What is the definition of a "handoff"?

Switching from one base station to a geographically adjacent base station as the user moves around.

327. What is a system that uses distinct time slots to transmit the signal for different users?

TDMA system

246. The IEEE 802.11x is the popular CSMA/CA protocol employed for wireless LANs and ad hoc networks. Which describes the IEEE 802.11a standard?

The IEEE 802.11a uses 5 GHz unlicensed spectrum to achieve bandwidths of around 54 Mbps.

559. Which IEEE 802.15 task group has the responsibility of defining the physical and medium access control (MAC) layer specifications?

The IEEE 802.15 WPAN/low rate TG4

531. What is the primary focus of the IoT fundamentals courses available through Cisco Networking Academy curriculum?

The courses teach learners how to connect sensors to the cloud, analyze big data, and securely collect data.

442. In the centralized dynamic channel allocation scheme, the description of first available is:

The first available channel within the reuse distance encountered during a channel search is assigned to the call.

107. Fading rate is defined as:

The number of times that the signal envelope crosses the middle value r m in a positive going direction per unit time.

168. A specific Blockly block has a slot on the top. What is the purpose of this slot?

The slot allows a block with a bevel tab on the bottom to be connected above the block shown.

207. What is the main advantage of cyclic codes over other types of codes:

They are the most easily encoded and decoded.

516. How are USB flash drives a security risk?

They have a controller that can be infected

100. True or false Diffraction is the bending of a wave around objects.

True

105. True or false Fast fading is due to scattering of the signal by object near transmitter.

True

108. True or false Intersymbol Interference (ISI) is caused by time-delayed multipath signals.

True

110. True or false Doppler shift occurs when the transmitter of a signal is moving in relation to the receiver. The relative movement shifts the frequency of the signal, making it different at the receiver than at the transmitter.

True

236. True or false In systems that have a collision resolution protocol classification, a MS is allowed to transit a collided message only after a random delay

True

26. True or false Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or pc.

True

431. One disadvantage of using power control to address the near-far issue on a CDMA system is increasing the transmitted power to a high value will reduce battery life at a MS.Increasing the transmitted power to a high value in a CDMA system with reduce battery life at an MS

True

489. True or false: A disadvantage of internet protocol version 4 (IPv4) is that it does not have encryption or authentication.

True

494. True or false: The main disadvantage of using wireline TCP over wireless networks is that wireline TCP attributes loss of packets during packet transmission to congestion in the network.

True

588. True or false: The stationary secure database (SSD) acts as a secure trusted warehouse for the latest audit information on user activity.

True

98. True or false: Propagation in multipath channels depends on the actual environment, such as mountains, reflection from bodies of water, and the terrain.

True

463. What describes the optimal method of how a foreign agent (FA) in another area can locate the home agent (HA) in a backbone router network?

Use a distributed routing table.

21. What type of network is used to connect a company located in one area to another location in a city far away?

WAN

244. What statement below describes how collision detection works?

When a collision is sensed during transmission, the terminal aborts the transmission immediately and attempts to retransmit later after a random wait period.

18. Which type of wireless network is used to connect devices within a city to create a Metropolitan Area Network (MAN)

WiMAX

595. A firewall typically resides between the Internet and the ______.

Wireless Application Protocol (WAP) gateway

536. What allows travelling mobile stations (MSs) to access wireless networks seamlessly in public-access facilities using locations called hotspots?

Wireless Local Area Network (WLAN)

571. In regards to IEEE project 802.16a draft 3 specifications, which 2 - 11 GHz air interface specifies single carrier modulation?

Wireless metropolitan area network-single carrier 2 (WMAN-SC2)

5. What is the term used to describe computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network?

Wireless network

486. In which protocol does the base station (BS) buffer data from the stationary host and uses separate flow and bottleneck control mechanisms for the connection between itself and the mobile station (MS)?

Wireless wide-area transmission control protocol (WTCP)

249. An orange grove company has sensors in the trees and on the machines that harvest the oranges. A camera mounted on the harvester takes a close-up picture of the orange every 5 minutes. Live data is sent to the distributor who gets the data from 100 companies. Does this distributor have big data?

Yes

171. What is the output when the following code is entered into a python program interpreter? [1, 2, 4, 5] + [3, 6]

[1,2,4,5,3,6]

347. What becomes necessary on the MS side for TDMA

a high precision synchronization circuit to carry out intermittent burst signal transmission

252. What is volume in big data?

a lot of data

22. What allows digital devices to interconnect and transmit data?

a network

165. What is blockly?

a programming tool for beginners

337. What is used between the forward and reverse channels?

a protecting bandwidth

307. What is cloud computing?

a system of data centers or connected servers that provide anywhere/anytime access to data and applications

227. What is the definition of an Erlang?

a unit to measure traffic

303. Which challenge of big data storage is characterized by the need to make data accessible from anywhere at anytime?

access

583. In regards to a network firewall, the ______ carries out authentication with the help of an authentication server.

access point (ap)

502. Which element of the IBN model orchestrates policies and configures systems?

activation

578. A growth in the use of wireless communication has increased availability to various kinds of attacks. Which kind of attack is serious and involves denial of service (DoS)?

active attack

32. How is an ad hoc network different from a cellular network?

ad hoc: - group of people come together for a short time to share some data - coverage area is equal to LAN but without fixed infrastructure - limited range - ex: defense applications Cellular - voice and data through handheld phones - continuous coverage limited to cell coverage (book says metropolitan areas) - available bandwidth can be low for data intensive applications - ex: cell phones, personal digital assistants

380. Discuss active terminals in regards to FDMA

all terminals active on their specified frequencies

382. Discuss active terminals in regards to CDMA

all terminals are active on the same frequency

34. What is WPAN (Bluetooth)

allows digital devices to be connected without any cable

301. Which type of data can be used by a business to support managerial analysis tasks and organizational decision making?

analyzed data

498. What is a key feature of the translation element of the intent-based networking model?

application of business intent to network configuration

152. What do tuples seem kind of like to me?

arrays where the values are fixed and unchangeable

11. What is the term for a branch of computer science with the simulation of intelligent behavior in computers which implies that smart devices can think on their own?

artificial intelligence

13. What is the core component of Intent-Based Networking?

artificial intelligence

503. What term is used to describe the intelligence demonstrated by machines?

artificial intelligence

30. What are the unconventional applications of wireless networks?

blank

39. Why do you have difficulty using your cell phone inside an elevator?

blank

40. What phenomenon do you observe when a cell phone is used while traveling along a metallic bridge?

blank

42. In an airplane flight, what happens if you use: a) a walkie-talkie b)a satellite phone c) a cell phone

blank

43. What are the similarities between frequency hopping and TDMA?

blank

205. Which statement best describes why the technique of channel coding is applied?

channel coding ensures a transmission is received with as few errors as possible

275. name the term providing storage and access to applications via a web browser

cloud services

366. Discuss signal separation in CDMA

code separation

232. Which protocol resolves a collision after it occurs?

contention-based protocol

48. What is the coverage area provided by cellular tech?

continuous coverage limited to metropolitan regions

70. In communication between BS and MS, what needs to be exchanged before information transfer can take place?

control information

75. Why do you need wireless services when adequate wired infrastructure exists?

convenience

284. What is a valuable way to combine data from different sources?

converting data to common formats such as JSON or XML

167. What is one way to pay for prototyping?

crowd funding

253. what is velocity in big data?

data coming in quickly

306. What is the process of discovering patterns and relationships in large data sets in order to convert raw data into meaningful information?

data mining

174. Refer to the exhibit. What does the exhibited flow chart symbol commonly represent? (it's a diamond shape)

decision

254. what is variety in big data?

different types of data

279. name the term large volume of data broken into smaller pieces and stored on different servers

distributed database

376. What is the concept behind FDMA?

divide the frequency band into disjoint subbands

379. What is the concept behind SDMA?

divide the space into sectors

377. What is the concept behind TDMA?

divide the time into non-overlapping time slots

169. How is a new variable created in blockly?

drag the variable block onto the work space area

333. Which type of duplexing do TDMA and CDMA use?

either FDD or TDD

534. Which IoT-related job would deal with the development and implementation of the underlying technologies within the digital world?

enablers

512. An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?

encrypt traffic through a VPN

495. Which ML technology can be used to identify and track individual persons?

facial recognition

203. Channel coding can be defined digitalization of analog message signals and encoding information using fewer bits than the original representation

false

247. True or false The advantage of 1-persistent CSMA is that it will have good channel utilization when traffic is light because it will transmit immediately when the medium becomes idle.

false

257. Small companies can not analyse big data since they do not generate enough themselves

false

446. A DCA scheme is sensitive to time and spatial changes.

false

450. Flexible channel allocation schemes use decentralized control and need up-to-date information about the traffic pattern in its vicinity in order to manage flexible channels and their assignments.

false

452. True or false: Among many quality of service (QoS) factors considered critical in wireless networks, delay and jitter are the most important ones.

false

461. True or false: Radio link-type handoff is due to degradation of quality of service (QoS).

false

465. True or False: In regards to multicasting, a particular router is chosen as a core in a source-based tree approach.

false

472. True or false A mobile base station (M-BS) operates at lower power consumption rate compared to a femto base station (F-BS).

false

476. True or false: A handoff procedure is a user handset handoff from a femto cell to a macrocell.

false

483. True or false: The bellman-ford algorithm is used to calculate the shortest path through the network and is also called the "shortest path first" (SPF) algorithm.

false

492. True or false: In internet protocol version 6 (IPv6), the address space is increased from 32 bits to 64 bits.

false

538. True or False: Data transfer can take place via a downlink or uplink which allows transfer of data bi-directionally and simultaneously.

false

554. True or false IEEE 802.11ac can handle up to four spatial streams serving multiple users and utilizing high-density modulation such as up to 256 quadrature amplitude modulation (QAM).

false

565. True or False: The IEEE 802.15.3 is compatible with Bluetooth and the IEEE 802.11 family of protocols.

false

575. True or false: The most uncomplicated encryption technique encompasses transforming input blocks to some coded form.

false

582. True or false: One foolproof technique of making sure that a user is a genuine subscriber in an access point (AP) network is to use a hash function.

false

589. True or false: A wormhole attack is a suction attack where a malicious node uses a routing protocol to state that it has the shortest path to the node so it can intercept those packets and drop all of the traffic.

false

591. true or false In most wireless sensor network (WSN) applications, an asymmetric scheme is the best approach in terms of energy utilization and time necessitated for encryption/decryption.

false

594. true or false In a distributed denial of service (DoS) smurf attack, the attacker exploits by sending internet protocol (IP) fragment packets that are difficult to reassemble.

false

80. True or false A cell phone offers a large coverage area compared to a satellite phone.

false

84. True or false Sensor networks cover a large area.

false

384. Discuss signal separation in regards to FDMA

filtering in frequency

393. Discuss advantages TDMA

flexible

394. Discuss advantages of CDMA

flexible

179. What is used to illustrate how a given process will run?

flow chart

25. Which type of computing is located at the edge of a business or corporate network and that allows data from sensors to be preprocessed?

fog

274. Name the term servers located close to the company network edge for pre-processing data

fog

302. An organization is concerned with the amount of sensor data that is being generated locally, analyzed in the cloud, and returned for processing at the local site. Which solution will keep the data closer to the source for preprocessing?

fog computing

8. What is the term for servers and computer programs, which are located at the edge of a business or corporate network, that allow the local data to be preprocessed for immediate use?

fog computing

308. What characterizes data management problems associated with big data storage?

generating and collecting data from multiple sources

93. Which is NOT an application of a traditional satellite system?

global telephone connections

276. name the term tool created to distribute and process big datasets in smaller quantities

hadoop

391. Discuss handoff in SDMA

hard and soft handoffs

388. Discuss handoff in FDMA

hard handoff

389. Discuss handoff in TDMA

hard handoff

241. What is the main issue for contention-based protocols?

hidden terminal problem

36. What is ricocet?

high-speed, secure mobile access to the desktop (data) from outside the office that covers some major cities, airports, and some university areas

10. What is the term for a device that acts as a local connection center to IoT smart devices?

home gateway

15. What is needed in a smart home to connect sensors and smart devices to a network?

home gateway

490. The internet protocol version 6 (IPv6) header format differs from internet protocol version 4 (IPv4) in that it includes a ___________.

hop limit

78. How is an ad hoc system different from a cellular network?

information is forwarded in peer-to-peer mode using multi-hop routing

590. A cluster-based intrusion detection system consists of four modules. In which module is the intrusion sensed by analyzing and comparing the traffic patterns with normal behavior?

intrusion detection module

585. Which security approach will react to an intrusion by forcing rekey operation and finding the compromised nodes?

intrusion response mechanism (IRM)

413. In FM, how does the receiver rebuild the information wave?

it checks how the known carrier signal has modified the information

528. What is the primary focus of the IT Essentials course available through the Cisco Academy curriculum?

it teaches learners the fundamentals of computer hardware and software

59. What layer are the frequency communications (FDMA/TDMA/CDMA) at between cell phone and base station at?

layer 1

297. fill in the blank a _____________________ chart is used when you display a continuous set of data over time

line

593. Which component of the support vector machine (SVM)-based intrusion detection system is responsible for sending out the local detection results?

local response module (LRM)

572. Which is a key advantage of a wireless mesh network?

low cost infrastructure

505. Which technology enables features such as speech recognition, product recommendations, and credit card fraud detection?

machine learning

86. What is a potential application of a WMAN/WLAN or wireless MAN/LAN?

manufacturing

158. Give an example of syntax for sets

myset = {'apple', 'banana', 'cherry'}

82. Which of the following does NOT indicate the relative size of the area that can be covered by a transmitting or Base Station:

nanocell

478. In the open systems interconnection (OSI) model, the ___________ layer is responsible for logical addressing and routing.

network layer

315. In FM, does the total wave power change when the frequency alters?

no

408. Is AM an efficient form of communication?

no, too much is kept at the carrier and doesn't contribute to the transfer of data

235. Which is an example of a contention based protocol scheme?

none of the above

239. Which protocol is used extensively in wired Ethernet?

none of the above

460. What is the frequency band used for advanced mobile phone system (AMPS)?

none of the above

480. Which protocol provides a means for error reporting and query to a host or router?

none of the above

546. Which standard of IEEE 802.11 has less interference compared to other IEEE 802.11 standards?

none of the above

555. Which wireless technology has been recently standardized as IEEE802.15.6?

none of the above

560. Which wireless local area network (WLAN) uses low power states like sleep?

none of the above

576. Which service of security category for wireless systems states that the sender and receiver cannot deny the transmission?

none of the above

579. Which effect of a malicious attack on a wireless network is characterized by an attack on availability by blocking or interrupting system resources?

none of the above

77. What is an example of a household application that does not use wireless schemes to control functionality?

none of the above

449. In hybrid channel allocation (HCA), the ratio of fixed to dynamic channels is a function of the _________ and would fluctuate over time according to presented load distribution estimates.

not co-channel interference

383. Discuss active terminals in regards to SDMA

number of terminals per beam dependent on FDMA/TDMA/CDMA

510. Which action can help reduce online risk?

only conduct transactions on websites after verifying the URL is correct

140. What do third party tools like Py2exe and Pyinstallar do?

package the python source code (if written outside an interpreter) and packages it into an executable

24. Which tool allows a user to simulate real networks?

packet tracer

103. Wave propagation loss in a channel can be expressed as L = L P L S L F. Where L P represents:

path loss

63. In ad hoc networks, how is information transfer acheived?

peer-to-peer mode

513. How can a virtual assistant be a security risk?

personal information could be leaked

370. What are power control techniques restricted by?

physical limitations on the transmitted power levels

562. In regards to the architecture of the Bluetooth system, a device acts as a master and can have up to seven slaves in the scheme called:

piconet

296. fill in the blank a ______________ chart represents data as segment of a whole

pie

23. Which command is used to test network connectivity and provide a response to each packet received by the host?

ping

85. What is a characteristic of a private sphere?

portable or interactive tv

353. How was the near-far problem solved in CDMA?

power control enables the adjustment of the antenna emitting power

176. Which python programming function is used to display output?

print

177. Refer to the exhibit. What does the exhibited flow chart symbol represent? (it's a plain rectangle)

process

517. What is the goal of a white hat hacker?

protecting data

204. Which statement best describes why the technique of channel coding is applied?

reduce errors

224. What is the best way to solve the issue of increased cell phone subscribers in a dense urban area?

reduce the cell size

499. Which field has traditionally been tied to automation?

robotics

305. Making data accessible to only authorized users addresses which data storage problem associated with big data?

security

577. Which security mechanism category administers security during the operation of a system by the deterrence of security breaches?

security prevention

38. What are the pros and cons of different size cells for wireless networking?

see card 45 - otherwise, blank

27. What type of device could allow a refrigerator to place a replacement order for an item contained within it?

sensor

264. What type of data in particular can be pre-processed closer to where it was collected?

sensor data

277. name the term generating high volumes of data

sensors

392. Discuss advantages in FDMA

simple and robust

390. Discuss handoff in CDMA

soft handoff

387. Discuss signal separation in SDMA

spatial separation using smart antenna

373. What is the basic strategy in OFDM

split high-rate radio channels into multiple lower-rate subchannels that are then simultaneously transmitted over multiple orthogonal carrier frequencies

378. What is the concept behind CDMA?

spread the signal with orthogonal codes

309. What type of data is being collected when an organization is using spreadsheets and forms for data input?

structured data

292. Fill in the blank data created using spreadsheets or pre-printed forms is called ______________ data

strutured

339. What is the frequency bandwidth for each user called?

subband

385. Discuss signal separation in TDMA

synchronization in time

381. Discuss active terminals in regards to TDMA

terminals are active in their specified slot on the same frequency

242. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) with request to send/clear to send (RTS/CTS) protocol reduces collisions by the following method:

terminates transmission immediately after the detection of a collision

363. What does a spread spectrum modulation technique imply?

that the radio transmitter frequency hops from channel to channel in a predetermined but pseudorandom manner

208. What is the purpose of the Frame Check Sequence (FCS) in a Cyclic Redundancy Check?

the FCS holds extra information about the frame for error detection and control

19. What is comprised of millions of smart devices and sensors connected to the internet?

the Internet of Things

507. What is artificial intelligence?

the ability of a device to "learn" based on code and provided data

44. What does the term cell mean?

the area that can be covered by a transmitting station - usually called a base station

191. Which interleaver is the most commonly used interleaver in wireless communication systems?

the block interleaver

6. What is the term for a collection of data centers or groups of connected servers that are used to store and analyze data, provide access to online applications, and provide backup services for personal and corporate use?

the cloud

501. What is a requirement for a device to be referred to as a smart device?

the device can make a decision or take a course of action based on outside information

7. What is the term that refers to the "edge" of a corporate network?

the edge

1. What is a network of networks?

the internet

352. What problem made wider bandwidth as a single communication channel regarded as disadvantageous in terms of effective frequency utilization?

the near-far problem

180. How can channel coding be defined?

the process of coding discrete digital information in a form suitable for transmission, with an emphasis on enhanced reliability

316. In fm, how is the signal recouverd?

the receiver rebuilds the information wave by checking how the known carrier signal has modified the information

325. What must a BS recognize?

the signal sent by a particular user

14. What information is conveyed by the SSID that is configured in an IoT device?

the wireless network

143. What is unique about python in interactive mode?

there is a special variable "_" which holds the result of the last expression issued

160. Give an example of the syntax for dictionary in python with output

thisdict = { 'brand': 'Ford', 'model': 'Mustang', 'year': 1964 } print(thisdict) output {'brand': 'Ford', 'model': 'Mustang', 'year': 1964}

181. Why is channel coding applied?

to ensure adequacy of transmission quality (bit error rate (BER) or frame error rate (FER))

245. What is the purpose of the contention window?

to reduce or avoid collisions

520. Why would an IT person use Zabasearch?

to research a person

294. Fill in the blank _______________ information is captured and processed as events happen

transactional

304. A business is analyzing sales information as the sales data is being generated from the point-of-sale (POS) machines. What type of data is captured and processed as the events happen?

transactional data

16. True or False The IoT can help originations improve the efficiency and productivity of manufacturing processes and operations

true

17. True or False The IoT will connect inanimate objects to the network with intelligent sensors

true

213. True or false The disadvantage of interleaving is the additional delay as the sequence needs to be processed block by block.

true

215. True or false In relation to linear block codes, each parity bit consists of weighted modulo 2 sum of the data bits represented by the symbol:

true

219. A block interleaver accepts a set of symbols and rearranges them, without repeating or omitting any of the symbols in the set.

true

220. True or false A cell is a geographic area or zone surrounding a transmitter in a cellular telephone system.

true

226. True or false Since each MS has a different mobility pattern, it is not possible to have an exact match between the cell shape and the subscriber mobility.

true

230. True or false An advantage of cell sectoring is that it requires each antenna to cover a smaller area thereby lowering the amount of power needed to transmit radio signals.

true

255. A large European city has sensors installed in ambulances and police cars to verify that the emergency response services are adequate in all areas of the city. This example would generate big data?

true

311. True of False? Structured data is easier to analyze and store than unstructured data.

true

445. In a dynamic channel allocation (DCA) scheme, the grade of service within an interference group of cells depends on the average loading within that group, not on its spatial distribution.

true

454. True or false: An advantage of cell sectoring is that interference is minimized by reducing the possible number of co-channels that could cause interference within each cell.

true

456. If mobile stations are slow moving, then channels are assigned from one of the microcells, based on the current location.

true

468. True or false In a time-modulated ultra wide band (TM-UWB) method, the system uses a modulation technique called pulse position modulation.

true

469. True or false: One difference between ultra wide band (UWB) and spread spectrum techniques is that in UWB, carrier modulation does not take place.

true

474. True or false: A wireless LAN access point (AP) network is more cost effective than a femto cell network

true

479. True or false: The maximum transmission unit (MTU) is the largest size packet or frame that can be sent in a packet- or frame-based network such as the Internet.

true

497. True or False? An appliance that lowers power consumption during peak demand is considered a smart device.

true

529. True or False? Even though IoT is considered an enabling technology, not all jobs created are IT-related.

true

541. True or false: If a channel is busy during an uplink, the MS waits until the medium becomes idle for a specified time interval called the distributed coordination function (DCF) period.

true

549. True or false: The 802.11ac standard offers substantial performance advantages, significant improvements in the number of clients supported by an access point (AP), a better experience for each client, and more available bandwidth.

true

550. True or false: The access point (AP) at a café or an executive mansion is similar to the one used in a residential home.

true

553. True or false: Security is an issue in an access point (AP) when a connection is kept open, as the AP can be monoplized by other users.

true

558. True or false: Richochet's wireless data network operates in the free unlicensed industrial, scientific and medical (ISM) frequency band around 900 MHz.

true

563. True or false: Security is implemented for services running on Bluetooth devices via the link layer with fast frequency hopping (1600 hops per second).

true

566. True or false: An important function of the medium access control (MAC) protocol is to confirm the successful reception of frames.

true

573. True or False Existing transmission control protocol (TCP) implementation that is extensively used at the Internet transport layer does not appear to work well in multi-hop wireless networks.

true

580. True or false: Wired equivalent privacy (WEP) is somewhat similar to the Rivest Cipher-4 (RC4) symmetric key system.

true

596. True or False: Channel allocation in a cellular system is important from the performance point of view.

true

79. A network can be wireless but not mobile.

true

81. True or false The term cell represents the area that can be covered by a transmitting station, usually called a base station.

true

83. True or false When using a WPAN range is limited due to the short-range radio link used.

true

90. True or false The IEEE 802.11b and the IEEE 802.11g can work on the same network.

true

91. True or False An ad hoc or sensor network is classified as a decentralized network.

true

551. An access point (AP) covers an area of 50,000 m2. If an area of area of 10,000,000 m2 is to be covered by many APs. How many APs will be needed if deployed in a mesh topology?

trying 200 APs

295. fill in the blank Freeform data such as audio or video is called ____________________ data

unstructured

33. What is home networking?

used to connect different devices in the house and share resources such as printers

514. What is a goal of performing a risk assessment?

valuing assets to justify security expenditures

256. A corporation generates data from their web site, from sensors, and from internal documents. What characteristic of big data does this describe?

variety

278. name the term characteristics used to describe big data

velocity

313. Which attribute of big data involves an exponential data growth rate?

velocity

496. Which action takes place in the assurance element of the IBN model?

verification and corrective action

395. Discuss advantages of SDMA

very simple, increases system capacity

28. What are cellular systems?

voice and data through handheld phones are linked to a network that provides continuous coverage limited to metropolitan areas

162. Give an example of elif and else

x = int(input('please enter an integer: ')) if x < 0: x = 0 print ('negative changed to zero') elif x == 0: print ('Zero') elif x == 1: print ('single') else: print ('more')

251. Smart parking meters, real-time street traffic video, and crime statistics feed data to an app that shows users recommended and available parking spaces as well as information regarding cost and safety/security rating. Does the app use big data?

yes


Conjuntos de estudio relacionados

Role Transition modules 1-6 self check questions

View Set

Cyberattacks, Cybersecurity, Privacy, Freedom of Expression, Intellectual Property

View Set

CST Chapter 9 The principles and practice of aseptic technique

View Set

English File Upper Int 5B: Feeling Adjective Forms

View Set

Humanistic psychology: Key terms

View Set

Salesforce AI Associate Study Set

View Set