CIS 308 - Mobile and Wireless Technology
173. What output is expected when the function that is shown below is entered in a Python program interpreter? >>> print Cisco 1
"SyntaxError: Missing parentheses in call to 'print'"
65. What are wireless systems expected to provide?
"anytime anywhere" service
568. In a hypothetical wireless system, five adjacent frequency bands (f1, f2, f3, f4,f5)
* not 140
548. What process allows the advantage of multipath by transmitting multiple radio signals simultaneously?
* >>> spatial diversity is correct - not DSSS - not none of the above not MiMo
407. In AM, how much of the overall signal is contained in the sideband? Where is the rest of the signal contained?
- 1/3 is in the sideband - 2/3 is in the carrier, which doesn't contribute to the transfer data
518. Which three passwords are the least secure? (Choose three.)
- 135792468 - randolf - asdfghjkl
402. Discuss current applications of CDMA
- 2.5G - 3G
574. What is the range of worldwide interoperability for microwave access (WiMAX)?
- 48.2 kilometers not none of the above
95. What is slow fading?
- AKA shadowing - long term fading - caused by the long term spatial and temporal variations over distances large enough to produce gross variation in the overall path between the transmitter and the receiver
56. What is CDMA?
- Code Division Multiple Access - Increases number of potential users on a given frequency - Instead of having users split time, they make unique frequencies (codes) within the frequencies. They all use the frequency at the same time, but are unique in the code in which they are transmitting, preventing overlap across each other - similar to encrypting and decrypting
356. What is considered the most feasible generic method when code is selected and assigned dynamically to each MS in CDMA? Why?
- DS - FH is difficult to use on a practical basis unless a super-fast synthesizer is employed
360. What is DSSS method in regards to CDMA? 4
- Direct Sequence Spread Spectrum - An incarnation of DS - the radio signal is multiplied by a pseudorandom sequence whose bandwidth is much greater than that of the signal itself, thereby spreading its bandwidth - this is a modulation technique where a pseudorandom sequence directly phase modulates (data-modulated) carrier, thereby increasing the bandwidth of the transmission and lowering the spectral power density (i.e. the power level at any given frequency - the received signal is despread by correlating it with a local pseudorandom sequence identical to and in synchronization with the sequence used to spread the carrier at the radio transmitting end
342. What are the two modes of TDMA?
- FDD - TDD
371. What is OFDM based on?
- FDM frequency division multiplexing - to transmit multiple data streams over a common transmission medium
66. What are the four multiplexing techniques used for cellular
- FDMA - TDMA - CDMA - OFDM
410. Which provides a better SNR, AM or FM?
- FM - it has less noise content
317. Which provides a better SNR, AM or FM?
- FM - this implies that FM has less noise content
104. True or false Fast fading is long-term fading.
- False - Fast fading is short-term fading
240. True or false In a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme, a random delay or backoff period guarantees that a collision will not occur.
- False - There are no guarantees
97. True or false: The sky wave propagates in space but can return to earth by reflection either in the mesosphere or stratosphere.
- False - should be troposphere or ionosphere
109. True or false The key characteristic of a cellular network is the ability to use a single channel.
- False - the key concept is the reuse of frequencies - meaning the same frequency is assigned to different cells
330. What are the two types of duplex systems?
- Frequency Division Duplexing (FDD) - Time Division Duplexing (TDD)
54. What is FDMA 4
- Frequency Division Multiple Access - Each user connected to a base station is given their own frequency - this only allows a specific number of users due to finite number of frequencies - can think of this like IP addresses with static or dynamic NAT
362. Discuss FHSS
- Frequency Hopping Spread Spectrum - an incarnation of FH - a pseudorandom sequence is used to change the radio signal frequency across a broad frequency band in a random fashion - the sequence hops from channel to channel in a predetermined and pseudorandom manner - the RF signal is dehopped at the receiver end using a frequency synthesizer controlled by a pseudorandom sequence generator synchronized with the transmitters pseudorandom sequence generator
401. Discuss current applications of TDMA
- GSM - PDC
12. What is the term for the technology that uses machine learning and advanced automation to control networks?
- Intent-based Networking - IBN
9. What is the term for the connection of millions of smart devices and sensors connected to the internet?
- IoT - Internet of Things
504. What are two characteristics of artificial intelligence? (Choose two.)
- It uses systems that mimic human cognitive functions such as learning and problem solving. - It uses intelligent agents that interact with the environment and make decisions to reach a specific goal.
3. What is the term used to describe networks in small or local geographical area, such as home, small business, or a department within a large corperation?
- LAN - Local Area Network
57. What is OFDM?
- Orthogonal Frequency Division Multiplexing
323. What are the two newer ways to have many channels within an allocated bandwidth
- Orthogonal Frequency Division Multiplexing (OFDM) - Space Division Multiple Access (SDMA)
2. What is the term used to describe the small networks where connected wireless devices are within personal reach?
- PAN - Personal Area Network
37. What are sensor networks?
- The newest members of one special class of wireless ad hoc networks - large number of tiny immobile sensors are planted on an ad hoc basis to sense and transmit some physical characteristics of the environment
55. What is TDMA?
- Time Division Multiple Access - Splits up users across frequencies, across time - increases the number of users allowed - users share the frequency that is in use across time - each takes turn using the frequency - similar to how wireless access points work, devices take turns - this is why free wifi is slow and have a limit on the number of users they can support
4. What is the term to describe a collection of LANs that provides inter-LAN and internet connectivity for networks over long distance?
- WAN - Wide Area Network
123. Describe the mechanics of an if - then statement 3
- When an if-then structure is encountered, the computer checks if the expression is true or false. - if the expression is false, the computer moves on to the next structure ignoring the contents of the if - then block - if the expression is true, the computer executes whatever is in the if - then block before moving on to the next instruction in the program
35. Can a network be wireless, but not mobile? Explain
- Yes - Most home internet networks are wireless but not mobile. You don't need to use wires to connect to the internet, but you can't pick up your router, take it camping, and expect it to provide connectivity
52. What happens with cell towers as you drive across the country?
- You go from one cell coverage zone to another - you don't stay connected to a single station
372. Discuss OFDM
- a data signal is split into multiple data streams that are modulated by different frequencies that are orthogonal to each other and simultaneously transmitted to the receiver - the OFDM transmitter converts the high-speed bit streams into parallel low-speed bit streams that are modulated and mixed using Inverse Discrete Fourier Transform - to reduce intersymbol interference (ISI), guard time is inserted - on the receiver side, reverse actions are taken to retrieve the original signal
269. What is HDFS (Hadoop Distributed File System)? 2
- a distributed, fault tolerant, file system - used by hadoop
329. What is necessary to provide simultaneous two way communication (duplex communication)?
- a forward channel (downlink) from the BS to the MS - a reverse channel (uplink) from the MS to the BS
116. What is a compiled program language? examples
- a language that takes the human-readable code and compiles (translates) it into machine readable code in order to run - examples: java, c+
159. What is a dictionary in python 9
- a list of elements - is ordered, this order will not change - is changeable, can add/remove items - no duplicates - presented in key:value pairs - duplicate keys will overwrite previous values - can be referred to by using the key name - takes String, int, boolean, and list data types - lots of built in dictionary functions, such as: comparing elements with different dictionaries or providing a count of the number of items in the dictionary
122. What is an if - then statement? 2
- a logic structure in programming - allows the computer to make a decision based on the result of an expression
123. What is a for loop? 2
- a logic structure in programming - used to execute a specific set of instructions a specific number of times based on an expression - the loop part of the name is because the block it contains is executed repeatedly
409. What is frequency modulation (FM)?
- a method if integrating the information signal with an alternating current (AC) wave by varying the instantaneous frequency of the wave - the carrier is stretched or squeezed by the information signal, and the frequency of the carrier is changed according to the value of the modulating voltage
314. What is frequency modulation (fm)?
- a method of integrating the information signal with an alternating current (ac) wave by varying the instantaneous frequency of the wave - the carrier is stretched or squeezed by the information signal, and the frequency of the carrier is changed according the value of the modulating voltage
417. What is PSK? example
- a method of transmitting and receiving digital signals in which the phase of a transmitted signal is varied to convey information
146. What is a function in python? 2
- a named block of code that can be called and reused as needed - similar to a method in Java
147. What is Range()
- a predefined function in python - generates a list of numbers - usually used to iterate with FOR loops
29. What does the term GPS mean?
- a radio navigation system that helps to determine 3D position, velocity, and time - can be used any place on earth
500. What are two characteristics of artificial intelligence? (Choose two.)
- a robot cleans up an industrial chemical spill - a building automatically adjusts the heating and lights based the routine of the occupants
153. What are lists in python? 3
- a sequence of changeable python objects - allows duplicates - can be created by putting different comma-separated values between square brackets
151. What is a tuple? 3 example with output
- a sequence of unchangeable python objects - tuples are sequences separated by parenthesis - allows duplicates tup1 = ('dancing', 'singing', 400, 1842); tup2 = (1, 2, 3, 4, 5, 6, 7); print ('tup1[0]: ', tup1[0]) print ('tup2[1:5]: ', tup2[1:5]) output tup1[0]: dancing tup2[1:5]: (2, 3, 4, 5,)
161. What are else and elif in python? 3
- a sub-structures of if - then - elif is short for else if - allows the programmer to provide instructions for if the statement being tested is false
345. What is a guard time in TDMA?
- a time buffer between the slots so that interference due to propagation delays along different paths can be minimized
357. Describe the spread spectrum technique in regards to CDMA? What else is it called?
- a transmission technique wherein data occupy a larger bandwidth than necessary - bandwidth spreading
67. Explain CDMA another way
- a unique code is assigned to each user by the BS - distinct codes are used for different users - the code is mixed with bit of information before it is transmitted - the same code is used to decode the information - any information received that hasn't been mixed with this code is perceived as noise
125. Describe the mechanics of a for loop 3
- a variable acts as a counter inside a range of values identified by a minimum and a maximum - ever time the loop is executed, the counter variable is incremented - when the counter is equal to the defined maximum value, the loop is abandoned and the execution moves on to the next instruction
137. What is blockly?
- a visual programming tool created to help beginners understand the concepts of programming - by using a number of block types, blockly allows a user to create a program without entering any lines of code
192. What is a disadvantage of interleaving? What does this mean?
- additional delay as the sequence needs to be processed block by block - small memory sized interleaving is preferred in delay-sensitive applications
185. Discuss convolutional codes 4
- amongst the most widely used channel codes in practical communication systems - developed with a separate strong mathematical structure and are primarily used for real-time error correction -the encoded bits depend not only on the current input data bits, but also on past input bits - the main decoding strategy for convolutional codes is based on the viterbi algorithm
51. What is MANET
- an autonomous system of mobile nodes, mobile hosts (aka MHs or MSs, also serving as routers) connected by wireless links, the union of which forms a network modeled in the form of an arbitrary communication graph
184. Discuss cyclic redundancy check (crc) 2
- an error checking code that is widely used in data communications systems and other data transmission systems - uses frame check sequence (fcs), which holds redundant information about the frame that helps the receivers detect errors in the frame
183. Discuss cyclic codes 3
- are a subclass of linear block codes - have a cyclic structure that leads to more practical implementation - an advantage of cyclic codes over most other types is that they are relatively easy to encode/decode
508. What three technologies control network functions to accomplish a desired intent in an intent based network? (Choose three.)
- artificial intelligence - machine learn - automation
273. Discuss fault tolerance in regards to hadoop 2
- automatically replicates data across clusters to ensure data will not be lost - if a disk, node, or whole rack fails, the data is safe
369. What are the disadvantages of power control?
- battery power at MS is a limited resource that needs to be conserved, so it may not be possible or desirable to set transmission powers to higher values - increasing the transmitted power on one channel, irrespective of the power levels used on other channels, can cause inequality of transmission over the other channels - as a result, there is also the possibility that a set of connections using a pure power control scheme can suffer from unstable behavior, requiring increasingly higher transmission powers
351. How is fading resistance achieved in CDMA?
- because of its broadband characteristics, RAKE multipath synthesis provides fading resistance
358. How is spread spectrum/bandwidth spreading accomplished 2
- before transmission through the use of a code that is independent of the transmitted data - this same code is used to demodulate the data at the receiving end
318. List two advantages of FM?
- better SNR, therefore less noise content - needs less radiated power
262. Discuss analytics as a major storage problem in big data 4
- big data contains both structured and unstructured data - unstructured data, such as emails or photos, are difficult to analyze and consume a lot of storage space - structured data, such as a spreadsheet, is easier to analyze and store - data storage systems need to be able to manage both types
263. Discuss access as a major storage problem in big data 3
- big data must be accessible from anywhere at any time - storage solutions need to support the quantity of input and output requests - companies should also be aware of the strain placed on WAN links
190. What are the different kinds of interleavers? 6
- block interleavers - random interleavers - circular interleavers - semirandom interleaver - odd-even interleavers - optimal (near-optimal) interleavers
281. What is transactional data?
- captured and processed as events happen - used to analyze daily sales reports and production schedules to determine how much inventory to carry
73. What are the two types of wireless network?
- centralized or infrastructure based network - decentralized or infrastructure free based network
61. Discuss APs in a commercial environment
- channel bandwidth requirements and coordination of channels between APs govern the complexity
354. How is CDMA usually quantified?
- chip rate - the number of bits changed per second
398. Discuss disadvantages of CDMA
- complex receiver - requires power control to avoid near-far problem
287. When should you use a scatter plot? 2
- correlation visualizations - to show the distribution of a large number of data points
283. What is structured data?
- created by applications that use "fixed" format input such as spreadsheets or medical forms - may need to be manipulated into a common format such as CSV
112. What is application software? example?
- created to accomplish a certain task or collection of tasks - ex: packet tracer
268. What is hadoop? 3
- created to deal with big data volumes - uses HDFS (Hadoop Distributed File System) - uses MapReduce - is open-source
155. Give an example of updating that list in python with output
- creating the list list = ['car', 'train', 47, 2016]; print ('available at index 2: ') print (list[2]) output available at index 2: 47 - updating the list list[2] = 2017; print ('new value available at index 2 :') print (list[2]) output new value available at index 2: 2017
154. Give an example of a list in python with output
- creating the list: list1 = ['car', 'train', 47, 2016]; list2 = [1, 2, 3, 4, 5, 6, 7]; print ('list1[0]: ', list1[0]) print ('list2[1:5]: ', list2[1:5]) output list1[0]: car list2[1:5]: [2, 3, 4, 5]
259. Discuss management as a major storage problem in big data 3
- data can be from multiple different sources - a management system must be to organize and collate all the sources - there are few data-sharing standards and thousands of data management tools available
349. In broad terms, how does CDMA work?
- different spread-spectrum codes are selected and assigned to each user - multiple users share the same frequency
341. Where is TDMA widely used?
- digital portable and automobile telephones - mobile satellite communication systems
355. What are the two basic types of CDMA implementation methodologies
- direct sequence (DS) - frequency hopping (FH)
332. What does TDD (Time Division Duplexing) do?
- divides the frequency by time
331. What does FDD (Frequency Division Duplexing) do?
- divides the frequency used - typically used by FDMA
118. What are programming variables?
- dynamic buckets to hold phrases, numbers, or other important information that can be used in coding
366. Discuss walsh codes in CDMA
- each user is assigned one or many orthogonal waveforms derived from one orthogonal code - since the waveforms are orthogonal, users with different codes don't interfere with each other - CDMA requires synchronization among the users, since the waveforms are orthogonal only if they are aligned in time - an important set of orthogonal codes is the walsh set
310. What are three features of Hadoop? (Choose three.)
- easily scalable cluster sizes - automatic replication of data across clusters - uses HDFS as a fault tolerant file system
523. Match the security best practice to the description.
- educating users = train users on security procedures - regularly testing incident responses = perform and test emergency response scenarios - employing access controls = assign user roles and privilege levels - Implementing human resource security measures = research and perform background checks on employees
266. What are the benefits of cloud computing to companies 5
- enables access to organizational data from anywhere at any time - it streamlines the IT operations of an organization by subscribing only to needed services - it eliminates or reduces the need for onsite IT equipment, maintenance, and management - it reduces the cost of equipment, energy, physical plant requirements, and personnel training needs - it enables rapid responses to increasing data volume requirements
346. Discuss wideband TDMA
- enables high-speed digital transmissions where selective frequency fading due to the use of multiple paths can become a problem - requires the bandwidth be limited to an extent where selective fading can be overcome or appropriate measures such as adaptive equalization techniques can be adopted for improvement
248. True or false An advantage of Carrier Sense Multiple Access with collision detection (CSMA/CD) over Carrier Sense Multiple Access with collision avoidance (CSMA/CA) is that it can be used for both wired and wireless networks.
- false - CSMA/CS can be used on both wired and wireless networks
102. True or false Diffraction and scattering result in a large-scale fading effect.
- false - Diffraction and scattering result in small scale fading effects
436. Quadrature Phase Shift Keying (QPSK) employs two efficient frequencies for 0 and 1 bits.
- false - FSK uses 0 & 1
106. True or false Fading rate is defined as the number of times that the signal envelope crosses the middle valuer m in a negative-going direction per unit time.
- false - Fading rate is defined as the number of times that the signal envelope crosses the middle value r m in a positive-going direction per unit time.
229. True or false Adjacent channel interference is caused by the ongoing transmissions in different cells which are using the same channel.
- false - I couldn't find anything that discussed this, so it must be false?
228. True or false A handoff region is the time duration required for completing a handoff.
- false - I think it has less to do with time, and more to do with signal strength (see the book section 5.3)
435. Frequency Shift Keying (FSK) has a perfect signal-to-noise (SNR) ratio.
- false - PSK has a perfect SNR ratio
218. True or false The GBN ARQ scheme is better suited when single packet errors are most possible during transmission.
- false - better suited for an environment where burst errors are most probable during packet transmission
206. True or false The main coding strategy for turbo codes is based on the widely used Viterbi algorithm.
- false - convolutional codes use the viterbi algorithm
312. True or False? Distributed data processing involves large databases being centrally processed by powerful mainframe computers and stored in giant disk arrays.
- false - distributed data processing involves breaking large data volumes into smaller pieces that are distributed to many computers for processing
223. True or false If a cell area is increased, the number of channels per unit must be increased for the same number of channels and therefore satisfies less populated areas.
- false - if the cell area is increased, the number of channels per unit area is reduced for the same number of channels and is good for less populated areas with fewer cell phone subscribers. - On the other hand, if the number of the cell phone users is increased (such as in a dense urban area), a simple-minded solution is to increase the number of the channels. - A more practical option is to reduce the cell size so that the number of channels per unit area can be kept comparable to the number of subscribers.
428. Frequency hopping (FH) is a spread spectrum technique whereby the original data signal is multiplied with a pseudo random noise spreading code.
- false - it is DSSS, not FH
217. True or false In the Stop-And-Wait ARQ scheme, if the data packet received in not corrupted, the receiver sends a NAK packet.
- false - it sends an ACK packet
210. True or false A hard-decision decoding uses multi-bit quantization on the received channel values.
- false - it uses single-bit quantization
216. True or false In relation to Turbo Codes, the decoder must use a hard-decision input to produce some type of hard output since estimation of the information bits is used in decoding.
- false - it uses soft-decision
429. In fast hopping, there are multiple data bits per hop.
- false - slow hopping has multiple data bits per hop - fast hopping has multiple hops per data bit
430. In CDMA systems, a major area of concern is the near-far problem which is caused by non-orthogonal code sequences.
- false - the near-far problem stems from a wide range of signal levels received in a wireless and mobile communications systems
300. True or False? Data is defined as big data if it is more than 1 petabyte.
- false - there is no minimum amount of data required
221. True or false In cellular broadcasting, the cell boundary or model is based on rhomboid cells.
- false - typically it is a hexagon, though it could also be a circle, square, or equilateral triangle
299. True or False? Web scraping tools are used to extract and manipulate structured data.
- false - web scraping tools can collect both structured and unstructured data
364. What types of hops can a frequency hopper use? Describe each
- fast hopped: multiple hops per data bit - slow hopped: where there are multiple data bits per hop
53. What is an example of a sensor network
- fire detection system - ICS
519. Which two online activities pose high security risks? (Choose two.)
- following email links that have already been scanned by the email server - sharing information on social media
260. Discuss security as a major storage problem in big data
- for data to be of value to enterprises it must be kept secure and only accessible by authorized users
68. What are the channels from BS to MS called?
- forward channels - called downlink outside the US
322. What are the three basic ways to have many channels within an allocated bandwidth?
- frequency (FDMA) - time (TDMA) - code (CDMA)
285. What is unstructured data? 2
- generated in a freeform style such as audio, video, web pages, and tweets. - requires different tools to prepare data for processing or analysis
186. What are the two typical decoding methods for convolutional coding?
- hard-decision decoding - soft-decision decoding
361. What does the resulting RF signal from DSSS CDMA look like?
- has a noiselike spectrum - can be made to look like noise to all but the intended radio receiver
189. What is interleavering?
- heavily used in wireless communication - the base objective is to protect the transmitted data from burst errors - there are many different interleavers
222. What shapes are used to represent cells in a cellular telephone system? 4
- hexagons - square - equilateral triangle - circle
416. Does FSK have a high or low signal to noise ratio (SNR)? How about spectral efficiency? What was it used for?
- high SNR - low spectral efficiency - all early low bit-rate modems
200. Discuss selective-repeat ARQ (SR ARQ) 7
- improves on the unnecessary repeat transmissions that can occur during GBN ARQ - the receiver ACKs all correctly received packets, and when the sender does not receive an ACK packet from the receiver (some specific packet is suspected to be lost or corrupted) it retransmits only that packet - avoids unnecessary transmissions - the sender continuously sends packets and only retransmits the corrupted ones - since the receiver may receive out of order packets, it needs a large memory to buffer and reorder these packets before passing them to the upper layer - offers the best efficiency - great for when the probability of packet corruption or loss is high for communication channels
64. Discuss security as the book first describes it
- in terms of authentication and encryption, it is critical - it is fairly expensive in terms of hardware and resources - it affects channel capacity and information contents - many levels of security are useful and desirable
202. What are two ways to reduce carrier-to-interference ratio?
- increase transmitting power - have appropriate use of the frequency spectrum
396. Discuss disadvantages of FDMA
- inflexible - available frequencies are fixed - requires guard bands
399. Discuss disadvantages of SDMA
- inflexible - requires network monitoring to avoid intracellular handoffs
182. Discuss linear block code 4
- information sequence is always a multiple of a preselected length - has parity to ensure no data is lost or changed - since the coded sequence includes the entire information sequence, it is linear, hence the first part of the name - the encoding is processed block by block, which is where it gets the second part of its name
164. What are the characteristics of a prototype?
- is fully functional, but not fault-proof - is an actual working version of the product - is used for performance evaluation and further improvement of the product - has a complete interior and exterior - may be relatively expensive to produce - in the IoT, is often used as a technology demonstrator
197. Discuss the stop-and-wait ARQ (SAW ARQ) scheme 6
- is the simplest ARQ scheme - sender sends one data packet at a time - the receiver receives that packet and checks if the data packet has been received correctly - if the packet isn't corrupted, the receiver sends an ACK packet - otherwise, the receiver responds with a NAK packet - exhibits poor utilization of the wireless communication channel since the sender does not send the next packet until it receives an ACK from the receiver
141. What happens when python is called with no arguments? 3
- it reads and executes commands interactively - it is in interactive mode and waits for commands - can act as a calculator
320. What is one of the most important messages sent by the MS? 4
- its readiness to send information - then it receives information about which traffic or information channel is to be used exclusively by that ms from the bs - this channel is used for the duration of the call - this assignment is done dynamically and as needed so that the wireless resources can be used effectively and efficiently
170. What are two resources that could help someone learn to program? (choose two)
- khan academy - code academy
291. What should you know before you begin to analyse data?
- know what problem the business is trying to solve or what information the business is looking for
272. Discuss scalability in regards to Hadoop 2
- larger cluster sizes improve performance and provide higher data processing capabilities - with hadoop, cluster size can easily scale from a five node cluster to a one thousand node cluster without excessively increasing the administrative burden
31. What are ad hoc networks?
- local networks with wireless or temporary plug-in connections - mobile or portable devices are part of the network only while they are in close proximity
119. What are the two types of variables?
- local variables - global variables
126. What are while loops? 2
- logic structure in programming - used to execute a specific set of instructions while an expression is true
231. What is the function of a control channel?
- maintains order and informs mobiles which channels can be utilized
265. What are the benefits of fog computing and pre-processing 2
- makes communication quicker - decreases bandwidth requirements
258. What are the 5 major data storage problems with big data?
- management - security - redundancy - analytics - access
115. When you really boil it down, what isn't an algorithm? 2
- math - a specific coding language or syntax
157. What are common uses of sets in python? 3
- membership testing - removing duplicates from a sequence - computing standard math operations on sets such as intersection, union, difference, and symmetric difference
359. What was spread spectrum originally designed for?
- military use to avoid jamming (interference created intentionally to make a communication channel useable - now used in personal communication because of its superior performance in an interference dominated environment
427. Which multiple access scheme is under review as a core technology for the next generation multiple communication system?
- none of the above - CDMA is the correct answer
212. Which is the most commonly used interleaver used in wireless communication systems?
- none of the above - the block interleaver is the most commonly used interleaver
374. Discuss SDMA
- omni-directional communication space is divided into spatially separable sectors - the BS uses smart antennas allowing multiple MSs to use the same channel simultaneously - the communication characterised by time slot, carrier frequency, or spreading code - use of a smart antenna maximizes the antenna gain in the desired direction, and directing antenna gain in a particular direction leads to range extension, which reduces the number of cells required to cover a given area - such a focused transmission reduces the interference from undesired directions by placing minimum radiation patterns in the direction of interferers
195. What are ARQ (automatic repeat request) techniques
- one of the error handling mechanisms used in data communication - when the receiver detects errors in a packet (that cannot be corrected by underlying error-detecting code, if used) it simply drops the packet and the sender needs to transmit again - ACK (acknowledgement) and NAK (negative acknowledgement) are explicit feedback sent by the receiver
418. What kind of SNR does PSK have? What does this mean?
- perfect, but must be demodulated synchronously - a reference carrier signal is required to be received at the receiver to compare with the phase of the received signal, which makes the demodulation circuit complex
511. Which three elements should be combined when creating a strong password? (Choose three.)
- phrases - special characters - combinations of letters and numbers
493. In which layers of the open systems interconnection (OSI) model does cellular digital packet data (CDPD) operate?
- physical layer and data link layer
49. What are the characteristics of wireless and mobile systems?
- public sphere: traffic information system, personal security, disaster information system - business sphere: mobile videophone, video conferencing, database email - private sphere: information services, music on demand, portable tv, interactive tv, interactive games, video on demand, e newspapers and books, shopping, home-schooling, weather forecasts, financial information
400. Discuss current applications of FDMA
- radio - TV - analog cellular
267. What is distributed data processing? 4
- rather than large databases being processed by big and powerful mainframe computers, and stored in giant disk arrays (vertical scaling) - distributed data processing takes the large volume of data and breaks it into smaller pieces - the smaller data volumes are distributed in many locations to be processed by many computers with smaller processors - each computer in the distributed architecture analyses part of the big data picture (horizontal scaling)
319. What is a disadvantage of FM?
- requires a larger bandwidth than AM
397. Discuss disadvantages of TDMA
- requires guard space - synchronization problem
69. What are the channels used from MS to BS called?
- reverse channels - uplinks outside the US
261. Discuss redundancy as a major storage problem in big data 2
- safeguards should be in place to maintain the integrity of the stored data - processes for backups, redundancy, and disaster recovery are required
403. Discuss current applications of SDMA
- satellite systems - other options being explored
271. What are the two main features that make Hadoop the industry standard for handling big data?
- scalability - fault tolerance
96. What is fast fading?
- short term fading - caused by the scattering of the signal by objects near the transmitter
421. What is quadrature amplitude modulation (QAM)?
- simply a combination of AM and PSK - two carriers out of phase by 90 degrees are amplitude modulated - modulated using two measures of amplitude and four phase shifts - combining the two gives 8 possible waves - mathematically, there is no limit to the data rate that may be supported by a given baud rate in a perfectly stable, noiseless transmission environment - the governing factors are the amplitude (and consequently, phase) stability, and the amount of noise present, in both the terminal equipment and the transmission medium (carrier frequency, or communication channel) involved
73. Give an example for military application of ad hoc network
- soldiers in close proximity sharing information on their notebook computers using RF signals
45. Why are different sized cells needed?
- some areas, such as downtown, have a large number of wireless phone users who are served by a smaller sized cell - this allows a larger number of channels allocated to each cell, which is assumed to be the same or independent of the cell size - the goal is to have the same number of channels per customer and try to have similar quality of service in all areas
506. Which two applications commonly use ML technology? (Choose two.)
- speech recognition - credit card fraud detection
340. What does TDMA do?
- splits a single carrier wave into several time slots and distributes the slots among multiple users - consist of many units (time slots) over a time cycle, making it possible for one frequency to be efficiently used by multiple users, since each uses a different time slot
233. Which channel sharing technique predetermines and assigns the channel and does not change it with time?
- static channelization
367. What is the near-far problem?
- stems from a wide range of signal levels received in a wireless and mobile communications systems - if two MSs are communicating with a BS and we assume the transmission power of each MS to be the same, received signal levels at teh BS from MS1 and MS2 are quite different due to the difference in path lengths - assume that the MSs are using adjacent channels - out-of-band radiation of the signal from the MS1 interferes with the signal from the MS2 in the adjacent channel - this effect, called adjacent channel interference, becomes serious when the difference in the received signal strength is high - because of this, the out-of-band radiation must be kept small - the tolerable relative adjacent channel interference level can be different depending on the system characteristics - if the power control technique is used, the system can tolerate higher relative adjacent channel interference levels - the near-far problem becomes more important for CDMA systems where spread spectrum signals are multiplexed on the same frequency using low cross correlation
196. What are the three kinds of ARQ schemes?
- stop-and-wait ARQ (SAW ARQ) - go-back-n ARQ (GBN ARQ) - selective-repeat ARQ (SR ARQ)
282. What is analytical data?
- supports managerial analysis tasks like determining whether the organization should build a new manufacturing plant or hire additional sales personnel
405. What does single sideband modulation (SSB) do?
- suppresses one sideband before transmission - doubles the number of transmissions that can fit into a given transmission band
111. What are the two most common types of computer software?
- system software - application software
419. What is quadrature phase shift keying (QPSK)
- takes the concept of PSK a step further - it assumes that the number of phase shifts is not limited to only two states - the transmitted carrier can undergo any number of phase changes
477. Which statement below is true in relation to the difference between open systems interconnection (OSI) and transmission control protocol/internet protocol (TCP/IP) protocol models?
- the OSI suite was put forward before the protocols were invented
406. What happens at the receiver end for AM?
- the carrier signal is filtered out, rebuilding the information signal (speach, data, etc)
420. What happens in QPSK?
- the carrier undergoes four changes in phase and can thus represent four binary bit patterns of data, effectively doubling the bandwidth of the carrier - typically is implemented using I/Q modulation with
50. What are forward channels?
- the channels from BS to MS - called downlinks outside the US)
350. What makes CDMA less susceptible to noise and interference?
- the fact that it is based on spread-spectrum tech - this means it is spread over the bandwidth range of the modulated signal
194. How do turbo codes work?
- the first RSC encoder uses the bit stream as it comes, whereas an interleaver precedes the second one - the two encoders introduce redundancy for the same block of bits but are different as there exists low correlation among the input bits streams due to interleaving
404. What is amplitude modulation (AM)?
- the first method ever used to transfer voice information from one place to another - its bandwidth is twice that of modulating signal which halves the number of independent signals that can be sent using a given range of transmission frequencies
344. Discuss TDD in TDMA
- the forward/reverse or uplink/downlink communication frequencies are the same
343. Discuss FDD in TDMA
- the forward/reverse or uplink/downlink communication frequencies differ
60. What is an access point (AP)?
- the hardware that acts as a hub for many digital devices - connects them wirelessly to a wired LAN for data exchange - expected to communicate with various appliances to control them using localized wireless mode and facilitate remote control
117. What are interpreted programming languages? example
- the human readable code doesn't need to be compiled, but rather, is interpreted directly by the machine - example: python
114. When you really boil it down, what is an algorithm? 2
- the logic that makes a program function - think of flowcharts
193. What are turbo codes?
- the most recently developed codes (as of 2014 when the book was written) - extremely powerful - built using two identical recursive systematic convolutional (rsc) codes with parallel concatenation
290. When should you use a bar chart? What makes them unique?
- the names for each data point is long - similar to column charts, except they can be placed horizontally or vertically
375. Discuss SDMA
- the omni-directional communication space is divided into spatially separable sectors by having a BS use smart antennas, allowing multiple MSs to use the same channel simultaneously - the communication characterized by time slot, carrier frequency, or spreading code - use of a smart antenna maximizes the antenna gain in the desired direction, and directing antenna gain in a particular direction leads to range extension, which reduces the number of cells required to cover a given area - such focused transmission reduces the interference from undesired directions by placing minimum radiation patterns in the direction of interferers - as the BS forms different beams for each spatially separable MS on the forward and reverse channels, noise and interference for each MS and BS is minimized - this enhances the quality of the communication link significantly and increases overall system capacity - by creating separate spatial channels in each cell intra-cell, reuse of conventional channels can be easily exploited - as of 2015 (when the book was written) this tech was being explored and looked promising - SDMA is typically used with more than one multiple-access schemes, there can be more than one MS in one beam - using TDMA and CDMA, different areas can be covered by the antenna beam, providing frequency reuse - when used with TDMA and FDMA, the higher CIR ratio due to smart antennas can be exploited for better frequency channel reuse - with CDMA, the user can transmit less power for each link, thereby reducing MAC interference and hence supporting more users in the cell - the tradeoff is that there will be more intra-cell handoffs in SDMA compared to TDMA and CDMA systems, requiring a closer look at network resource management
163. What is prototyping
- the process of creating a rudimentary working model of a product or system
62. What should be considered regarding APs in a commercial environment?
- the range of the system - the number of APs as distribution infrastructures that are installed - number of users for each AP - example: a department store may have one AP per floor, while a factory may have several uniformly placed APs per floor to ensure continuous connection
199. Discuss the go-back-n ARQ (GBN ARQ) scheme 5
- the sender is allowed to transmit N packets without waiting for acknowledgement of prior packets - when a packet is corrupted during the transmission and it receives a NAK from the receiver, the sender has to retransmit all the packets that have been sent after that corrupted packet - the packets that have been sent but not acknowledged are buffered by the sender - since the receiver only accepts the correct and in-order packets, only a buffer of one packet size is needed at the receiver - better suited for an environment where burst errors are most probable during packet transmission
127. Describe the mechanics of a while loop
- the system checks if the while expression is true. - if it is, the contents of the while block are executed, then the system checks the while statement again and will either execute the contents again, or move on - if it isn't the contents of the while loop is skipped - typically the block inside the while loop has instructions that cause the while loop to eventually become false
368. What is power control in CDMA? example
- the technique of controlling the transmit power in the traffic channel so as to affect the received power and hence the CIR - ex: in free space, the propagation path loss depends on the frequency of transmission and the distance between the transmitter and receiver
46. What do the network characteristics of cellular systems depend on? example
- the type of applications being explored - home based environment or industrial environment vs commercial and private environment
348. What does the orthogonality condition of CDMA imply 2
- there is no overlapping of signals in code axis for signals - the signals don't have any common codes in the code space
201. What should all ARQ schemes have? Why?
- timers - if the sender didn't receive a response from the receiver in a specified timeframe, those packets must be retransmitted
289. When should you use a column chart? What is unique about them?
- to display the value of a specific data point and compare that value across similar categories - can only be placed vertically
288. When should you use pie charts?
- to show a composition of a static number
280. What are the two types of valuable data that has been processed?
- transactional - analytical
243. True or false Hidden nodes increase the probability of collision at a receiver, whereas exposed nodes may be denied channel access unnecessarily, which means underutilization of the bandwidth resources.
- true
139. What is a python interpreter?
- understands and executes python code
156. What are sets in python? 6
- unordered - unindexed - unchangeable, though you can add new items and remove items - duplicate values are ignored - can add/remove items - since they are unordered, you don't know what order they will appear in - collections of elements - can make a set from a list
524. What are two recommended steps to protect and secure a wireless network? (Choose two.)
- update firmware - use wpa2-AES encryption
338. What is a guard band?
- used between two adjacent channels to minimize interference
41. What are reverse channels
- used for communication from MS to BS - also known as uplinks
334. What is a frequency synthesizer?
- used to adjust and maintain the transmission and reception frequencies
414. What is frequency shift keying (FSK)
- used to modulate a digital signal over two carriers by using a different frequency for a 1 or a 0 - the difference between the carriers is known as the frequency shift
188. What is soft-decision decoding?
- uses multi-bit quantization on the received channel values.
187. What is hard-decision decoding?
- uses single-bit quantization on the received channel values
121. What are global variables? 2
- variables that are in the scope for the time of the program's execution - they can be retrieved by any part of the program
120. What is a local variable?
- variables that are in the scope of a program / function / procedure
515. What are three examples of personally identifiable information? (Choose three.)
- vehicle identification number - birth date - bank account number
138. What is python?
- very popular coding language designed to be easy to read and write
47. What are the services and features provided by cellular tech?
- voice and data through handheld phones
58. What is frequency hopping?
- was a way to stop people from eavesdropping on your signal - they won't know which frequency you are jumping to next or when
270. What is MapReduce
- which is a distributed way to process data - used by hadoop
324. What must an MS distinguish?
- which signal is meant for itself among many signals sent by a particular user - which signal is from its connected BS rather than a nearby BS
113. What is system software? 2 example?
- works between the computer hardware and the application program - controls the computer hardware and allows application programs to function - ex: Linux, OSX, Windows
145. Can strings be used with interactive python? What do you use to indicate a string? how do you escape characters? example
- yes - "" or '' - you use \ to escape characters >>> "I really \"need\" this"
365. Are multiple simultaneous transmissions from several users possible using FH? If so, how?
- yes - as long as each uses different frequency hopping sequences and none of them collide (no more than one unit using the same band) at any given instance of time
321. Can users receive signals transmitted by other uses in the system? 2
- yes - but they are discarded by the MS as not for them
336. Are different frequency bandwidths assigned to different users? What does this imply?
- yes - there is no frequency overlapping between the forward and reverse channels
286. When should you use line charts? 3
- you have a continuous set of data - the number of data points is high - you would like to show a trend in the data over time
72. What are the steps for a call setup from BS to MS?
1. BS sends call for MS #pending 2. MS sends ready to establish path 3. BS sends use frequency/time slot/code (FDMA/TDMA/CDMA) 4. MS responds with ready to communicate 5. BS starts communication on the assigned traffic channel
71. What are the steps for a call setup from MS to BS?
1. MS requests need to establish path 2. BS responds assigning frequency/time slot/code (FDMA/TDMA/CDMA) 3. MS responds with control information acknowledgement 4. BS responds by starting communication on the assigned traffic channel
198. List the steps of the stop-and-wait ARQ (SAQ ARQ) 8
1. The sender transmits packet 1 and then waits for an ACK packet from the receiver. 2. The receiver receives packet 1 without error and transmits an ACK packet. 3. The sender receives the ACK packet and then proceeds to transmit packet 2. 4. Packet 2 also arrives at the receiver without error and the sender successfully gets an ACK packet from the receiver. 5. Packet 3 is sent by the sender but undergoes errors in transmission. 6. The receiver receives packet 3, but it finds the packet is corrupted. Then it sends back a NAK packet to the sender. 7. Upon receiving the NAK, the sender retransmits packet 3. 8. A similar sequence is followed for the rest of the packets.
561. A typical Bluetooth device has a range of approximately:
10 meters
537. How many users can be connected to one access point (AP) simultaneously ?
10 to 30 users
539. The IEEE 802.11 Wi-Fi / WLAN standards set the attributes for the different channels that may be used. How many channels are allowed for use by the federal communications commission (FCC) in the United States?
11
569. The IEEE 802.15.4 2.4GHz ISM band PHY layer supports ______ channels between 2.4 GHz and 2.4835 GHz.
16
525. How many countries have Cisco Networking Academies helping individuals prepare for industry-recognized certifications and mastering IT skills?
180
570. Bluetooth 3.0 high speed (HS) operates on which frequency band?
2.4-2.4835 GHz band
543. What is the recommended minimum distance between a Bluetooth device and an AP?
20 feet
567. In terms of the IEEE 802.15.4 PHY layer, the 2.4 GHz ISM band offers a transmission rate of:
250 kbps
473. The radio range of a macrocell is:
300 - 2000 meters
173. What is displayed after the following code is entered into a python interpreter? addition = 22 + 10 print(addition)
32
166. A student has a digitized version of an idea for a project. What machine can the student use to turn the idea into a solid object?
3d printer
532. How many students have been trained through Cisco Networking academies to date?
5 million
845. The IEEE 802.11a standard has a bandwidth of:
54 Mbps
552. What is the main operational difference between 802.11b and 802.11n?
802.11n adds technology called multiple-input multiple-output (MIMO)
586. Which of the following is NOT a functional component of an intrusion detection system (IDS)?
>> misuse detection is correct not global response not local detection engine not none of the above
142. What does the primary prompt for python in interactive mode look like?
>>>
592. Given a bivariate polynomial function f(x, y)=x2+y2+ x3+y3 +12x+12y+5, what will the shared key if x=3 and y=7?
>>> 553 is correct not 548
581. A temporary ID called ______ is used to identify the user equipment globally without revealing identity .
>>> GUTI is correct not International mobile subscriber identity (IMSI) not none of the above
144. How do you set variable values for python in interactive mode? What happens after you press enter?
>>> birth_year = 1941 >>> curr_year = 2016 >>> curr_year - birth_year 75 - no result will be displayed before the next active prompt
544. The IEEE protocol version 802.11d was designed for this purpose:
>>> none of the above is correct - not Quality of service *
149. Give an example of the syntax of a two parameter Range() function. Give an example of the use of a two parameter Range() function and the output
>>> range(start, stop) the starting number of the sequence and stop is the last number in the sequence >>> for i in range(3, 6): print (i) output 3 4 5
150. Give an example of the syntax of a three parameter Range() function. Give an example of the use of a three parameter Range() function and the output
>>> range(start, stop, step) the starting number of the sequence, the end number of the sequence, and the difference between each number in the sequence >>> for i in range(4, 10, 2): print (i) output 4 6 8
148. Give an example of the syntax of a single parameter Range() function. Give an example of the use of a single parameter Range() function and the output
>>> range(stop) the stop indicates the number of integers (whole numbers) to generate, starting from 0 >>> for i in range(3): print (i) output: 0 1 2
447. Hybrid channel allocation (HCA) schemes are defined as:
A blend of the fixed channel allocation (FCA) and the dynamic channel allocation (DCA) schemes.
20. What is a sensor?
A device that detects or measures an event or physical property
444. What characteristic regarding the fixed channel allocation (FCA) scheme makes it exhibit superior performance compared to the dynamic channel allocation (DCA) scheme under heavy load conditions?
A specific channel can be assigned to cells that are the minimum distance apart so that no interference occurs.
488. Which protocol utilizes a blend of forward error correction (FEC) and automatic request (ARQ) techniques for loss recovery?
AIRMAIL protocol
471. The three distinct applications of time-modulated ultra wide band (TM-UWB) are communications, precision location and tracking, and ___________.
Advanced radar sensing
453. In a cellular system, with 7-cell clusters, has the following average number of calls at a given time: Cell number Average number of calls/unit time 1 900 2 2000 3 2500 4 1100 5 1200 6 1800 7 1000 If the system is assigned 49 traffic channels, how would you distribute the channel if a FCA Simple borrowing scheme is used (no traffic load considered)?
Allocate seven channels to each cell and borrow channels from adjacent cells with low traffic.
598. DHCP operates at this layer of the OSI model.
Application
597. _______________provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call.
Authentication Center Unit (AUC)
482. Open shortest path first (OSPF) supports hierarchical routing in which hosts are partitioned into ___________ that present a common, clearly defined routing policy to the Internet.
Autonomous systems (AS)
535. An access point (AP) that provides wireless connectivity to numerous mobile stations (MSs) within a fixed range radius of approximately 150 meters is defined as a:
Basic Service Area (BSA)
439. In the cell sector method, ordered channel assignment scheme with rearrangement and borrowing of channels is accomplished by:
Borrowed traffic channels can be returned to the donor cells if the channels become available in the borrowing cell.
88. Which multiplexing technique uses spread spectrum?
CDMA
328. What is a system that uses different code to transmit the signal for each user?
CDMA system
209. Which CRC polynomial do some Department of Defense (DoD) applications use?
CRC-32
459. In the United States, beacon signals are transmitted by which system?
Cellular Digital Packet Data (CDPD)
443. In relation to the cell-based distributed dynamic channel allocation (DCA) scheme, the signal strength measurement-based distributed scheme is characterized by:
Channels are allocated to a new call if the anticipated CCIR (Cochannel Interference Ratio) is above a threshold.
455. A cellular system with omni-directional antennas employs a cluster of size 7. The cell at the center of the cluster has much more traffic than the others and needs to borrow some channels from adjacent cells. Which strategy you would employ to determine a donor cell outside the cluster?
Choose a free channel, which could minimize the possible interference with the cells of the other clusters that are within reuse distance of the center cell.
530. Which IT community is a collection of resources designed for people who wish to develop skills and pursue a Cisco certification?
Cisco Learning Network
422. If a system uses different code to transmit the signal for each user, it is a:
Code Division Multiple Access (CDMA) system
424. In relation to the Frequency Division Multiple Access (FDMA) technique, the definition of the carrier frequencies of the forward channel is:
Communication between cell site and mobile subscribers.
533. What is a Cisco developer program community that allows the user to learn, connect, inspire, and code and consists of coordinated developer tools, and sandboxes?
DevNet
470. A disadvantage of UWB is:
Devices are power limited
438. What is the definition of complex borrowing in regards to fixed channel allocation (FCA)?
Divide the traffic channels into two groups, one group assigned to each cell permanently and the second group kept reserved as donors to be borrowed by neighboring cells.
485. In the transmission control protocol / internet protocol (TCP/IP) application layer, this application runs special purpose networking software, features a public IP address, and contains a database of network names and addresses for other Internet hosts.
Domain name server
481. This protocol is designed to handle dynamic assignments of internet protocol (IP) addresses in a domain:
Dynamic Host Configuration Protocol DHCP
89. Which system divides the total bandwidth into nonoverlapping frequency subbands, thereby eliminating the interference between adjacent channels?
FDMA
326. What is a system that uses different carrier frequencies to transmit the signal for each user?
FDMA system
411. Which needs less radiated power, AM or FM?
FM
412. Which requires more bandwidth, AM or FM?
FM
415. What type of modulation is similar to FM?
FSK, except that it is binary
234. True or false The Open Systems Interconnection (OSI) reference model for modified for cellular networks includes a Medium Access Control (MAC) sublayer in the physical layer.
False
437. True or false: In dynamic allocation, a fixed number of channels is allocated to each cell.
False
441. True or false: The centralized DCA scheme involves a number of controllers scattered across the network (mobile switching centers [MSCs]).
False
487. True or false: The fast retransmission approach utilizes local retransmission from the base station (BS) to shield the wireless link from errors and enhances the operation of the transmission control protocol (TCP) over the wireless link.
False
584. True or false: In a mobile ad hoc network (MANET) underlying routing protocols like the transmission control protocol (TCP) have numerous security related vulnerabilities.
False
458. Some of the information carried by beacon signals includes:
Gateway address
509. Which technology uses AI and other technologies to reconfigure a network to comply with service levels?
IBM
547. Which IEEE 802.11 standard is functionally comparable to an Ethernet?
IEEE 802.11b
451. In overlapped cell-based allocation, a directed retry is characterized by:
If a call finds its first-attempt cell without any free channels, it can try for a free channel in any other cell with ample signal quality.
94. What does IEEE stand for?
Institute of Electronics and Electrical Engineering
527. Which series of Cisco Networking Academy courses is designed to develop skills for securely collecting data, connecting sensors to the cloud, and analyzing big data?
IoT Fundamentals
526. What is the primary focus of the CCNA Routing and Switching curriculum that is available through the Cisco Networking Academy?
It provides learners to have a comprehensive overview of networking concepts and skills.
178. Which output would be displayed if the code that is shown below is entered in a python interpreter? y = ['yellow', 'red', 'green', 'purple', 'white'] print y
It shows "SyntaxError"
293. Fill in the blank comma-separated value (CSV), _____________________, and XML create plaintext file types
JSON
99. A sky wave is used for:
Long-range, high-frequency daylight communication
521. What is a wireless router security best practice that limits access to only specific internal hosts?
MAC address filtering
238. What describes the transmission behavior of an MS in pure ALOHA?
MS can start transmission right away
540. A wireless mobile station (MS) follows three phases; in the first phase of authentication, the MS ascertains whether the MS has the legal right to access the AP via which layer?
Medium Access Control (MAC)
557. The Ricochet service was introduced by which internet service provider (ISP)?
Metricom
425. What is the purpose of a guard band?
Minimizes the channel interference between two adjacent channels.
457. The ___________ maintains access information such as type of allowed service and billing data.
Mobile Switching Center (MSC)
467. Which protocol attempts to address the issue of tunnel convergence?
Mobile multicast (MoM) protocol
250. An independent t-shirt vendor advertises through Facebook and other social media sites. The vendor receives statistics on the customer demographics. Does this vendor have big data?
No
484. The border gateway protocol (BGP) is based on this protocol:
None of the above
433. What is a current application of Space Division Multiple Access (SDMA)?
None of the above.
556. HiperLAN2 uses which modulation method?
OFDM
87. Which of the following is NOT an example of a shape used to model a cell:
Octagon
475. A closed access mode for a femto cell base station (F-BS) is defined as:
Only a small portion of cellular users are served in the femto cell network.
464. The ___________ is the area covered by one or several or several mobile switching centers (MSC) in order to obtain the current position of the mobile station (MS).
Paging area
491. In the internet protocol version 6 (IPv6) header, the ___________ specifies the size of the data in the packet.
Payload length
439. In fixed channel allocation (FCA), a simple borrowing scheme called borrow-first-available scheme can be defined as:
Perform a predefined sequence search and select the first free channel available.
448. In the _________ , the traffic intensity or the blocking probability is constantly monitored at every cell site so that the reallocation of these channels can be done at any time.
Predictive strategy
426. How can fading be addressed on a Code Division Multiple Access (CDMA) system?
RAKE multipath synthesis
296. fill in the blank ___________________ is an example of a big data analytics tool
RapidMiner
172. Which platform is a low cost, credit-card sized computer?
Raspberry Pi
101. The following statement best describes the behavior of reflection:
Reflection occurs when a wave bounces from the surface of an obstacle.
462. A hard handoff is characterized by:
Releasing current radio resources from the prior base station (BS) before acquiring resources from the next BS.
466. In the multicast over mobile internet protocol approach called ___________, whenever a mobile station (MS) moves into a foreign network, the foreign agent (FA) sends a tree join request.
Remote subscription approach
434. What is a disadvantage of using Time Division Multiple Access (TDMA)?
Requires guard space.
92. What was the name of the first artificial satellite to orbit the earth?
SPUTNIK
522. What is used to identify a wireless network?
SSID
76. What are the challenges for wireless networking?
Secure communication
214. Which ARQ scheme retransmits only the packet that is suspected to be lost or corrupt?
Selective-Repeat ARQ scheme (SR ARQ)
564. Which protocol provides a means for applications to find out which services are available through Bluetooth?
Service Discovery Protocol
587. Local intrusion detection system (LIDS) uses which protocol's data located in management information databases (MIBs) for the basis of auditing?
Simple network management protocol SNMP
432. What is an advantage of using FDMA?
Simplicity and robustness
542. What is the small time interval between the data frame and its acknowledgment called?
Small inter-frame space (SIFS)
225. What is the definition of a "handoff"?
Switching from one base station to a geographically adjacent base station as the user moves around.
327. What is a system that uses distinct time slots to transmit the signal for different users?
TDMA system
246. The IEEE 802.11x is the popular CSMA/CA protocol employed for wireless LANs and ad hoc networks. Which describes the IEEE 802.11a standard?
The IEEE 802.11a uses 5 GHz unlicensed spectrum to achieve bandwidths of around 54 Mbps.
559. Which IEEE 802.15 task group has the responsibility of defining the physical and medium access control (MAC) layer specifications?
The IEEE 802.15 WPAN/low rate TG4
531. What is the primary focus of the IoT fundamentals courses available through Cisco Networking Academy curriculum?
The courses teach learners how to connect sensors to the cloud, analyze big data, and securely collect data.
442. In the centralized dynamic channel allocation scheme, the description of first available is:
The first available channel within the reuse distance encountered during a channel search is assigned to the call.
107. Fading rate is defined as:
The number of times that the signal envelope crosses the middle value r m in a positive going direction per unit time.
168. A specific Blockly block has a slot on the top. What is the purpose of this slot?
The slot allows a block with a bevel tab on the bottom to be connected above the block shown.
207. What is the main advantage of cyclic codes over other types of codes:
They are the most easily encoded and decoded.
516. How are USB flash drives a security risk?
They have a controller that can be infected
100. True or false Diffraction is the bending of a wave around objects.
True
105. True or false Fast fading is due to scattering of the signal by object near transmitter.
True
108. True or false Intersymbol Interference (ISI) is caused by time-delayed multipath signals.
True
110. True or false Doppler shift occurs when the transmitter of a signal is moving in relation to the receiver. The relative movement shifts the frequency of the signal, making it different at the receiver than at the transmitter.
True
236. True or false In systems that have a collision resolution protocol classification, a MS is allowed to transit a collided message only after a random delay
True
26. True or false Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or pc.
True
431. One disadvantage of using power control to address the near-far issue on a CDMA system is increasing the transmitted power to a high value will reduce battery life at a MS.Increasing the transmitted power to a high value in a CDMA system with reduce battery life at an MS
True
489. True or false: A disadvantage of internet protocol version 4 (IPv4) is that it does not have encryption or authentication.
True
494. True or false: The main disadvantage of using wireline TCP over wireless networks is that wireline TCP attributes loss of packets during packet transmission to congestion in the network.
True
588. True or false: The stationary secure database (SSD) acts as a secure trusted warehouse for the latest audit information on user activity.
True
98. True or false: Propagation in multipath channels depends on the actual environment, such as mountains, reflection from bodies of water, and the terrain.
True
463. What describes the optimal method of how a foreign agent (FA) in another area can locate the home agent (HA) in a backbone router network?
Use a distributed routing table.
21. What type of network is used to connect a company located in one area to another location in a city far away?
WAN
244. What statement below describes how collision detection works?
When a collision is sensed during transmission, the terminal aborts the transmission immediately and attempts to retransmit later after a random wait period.
18. Which type of wireless network is used to connect devices within a city to create a Metropolitan Area Network (MAN)
WiMAX
595. A firewall typically resides between the Internet and the ______.
Wireless Application Protocol (WAP) gateway
536. What allows travelling mobile stations (MSs) to access wireless networks seamlessly in public-access facilities using locations called hotspots?
Wireless Local Area Network (WLAN)
571. In regards to IEEE project 802.16a draft 3 specifications, which 2 - 11 GHz air interface specifies single carrier modulation?
Wireless metropolitan area network-single carrier 2 (WMAN-SC2)
5. What is the term used to describe computer networks that use electromagnetic waves instead of wires in order to carry signals over the various parts of the network?
Wireless network
486. In which protocol does the base station (BS) buffer data from the stationary host and uses separate flow and bottleneck control mechanisms for the connection between itself and the mobile station (MS)?
Wireless wide-area transmission control protocol (WTCP)
249. An orange grove company has sensors in the trees and on the machines that harvest the oranges. A camera mounted on the harvester takes a close-up picture of the orange every 5 minutes. Live data is sent to the distributor who gets the data from 100 companies. Does this distributor have big data?
Yes
171. What is the output when the following code is entered into a python program interpreter? [1, 2, 4, 5] + [3, 6]
[1,2,4,5,3,6]
347. What becomes necessary on the MS side for TDMA
a high precision synchronization circuit to carry out intermittent burst signal transmission
252. What is volume in big data?
a lot of data
22. What allows digital devices to interconnect and transmit data?
a network
165. What is blockly?
a programming tool for beginners
337. What is used between the forward and reverse channels?
a protecting bandwidth
307. What is cloud computing?
a system of data centers or connected servers that provide anywhere/anytime access to data and applications
227. What is the definition of an Erlang?
a unit to measure traffic
303. Which challenge of big data storage is characterized by the need to make data accessible from anywhere at anytime?
access
583. In regards to a network firewall, the ______ carries out authentication with the help of an authentication server.
access point (ap)
502. Which element of the IBN model orchestrates policies and configures systems?
activation
578. A growth in the use of wireless communication has increased availability to various kinds of attacks. Which kind of attack is serious and involves denial of service (DoS)?
active attack
32. How is an ad hoc network different from a cellular network?
ad hoc: - group of people come together for a short time to share some data - coverage area is equal to LAN but without fixed infrastructure - limited range - ex: defense applications Cellular - voice and data through handheld phones - continuous coverage limited to cell coverage (book says metropolitan areas) - available bandwidth can be low for data intensive applications - ex: cell phones, personal digital assistants
380. Discuss active terminals in regards to FDMA
all terminals active on their specified frequencies
382. Discuss active terminals in regards to CDMA
all terminals are active on the same frequency
34. What is WPAN (Bluetooth)
allows digital devices to be connected without any cable
301. Which type of data can be used by a business to support managerial analysis tasks and organizational decision making?
analyzed data
498. What is a key feature of the translation element of the intent-based networking model?
application of business intent to network configuration
152. What do tuples seem kind of like to me?
arrays where the values are fixed and unchangeable
11. What is the term for a branch of computer science with the simulation of intelligent behavior in computers which implies that smart devices can think on their own?
artificial intelligence
13. What is the core component of Intent-Based Networking?
artificial intelligence
503. What term is used to describe the intelligence demonstrated by machines?
artificial intelligence
30. What are the unconventional applications of wireless networks?
blank
39. Why do you have difficulty using your cell phone inside an elevator?
blank
40. What phenomenon do you observe when a cell phone is used while traveling along a metallic bridge?
blank
42. In an airplane flight, what happens if you use: a) a walkie-talkie b)a satellite phone c) a cell phone
blank
43. What are the similarities between frequency hopping and TDMA?
blank
205. Which statement best describes why the technique of channel coding is applied?
channel coding ensures a transmission is received with as few errors as possible
275. name the term providing storage and access to applications via a web browser
cloud services
366. Discuss signal separation in CDMA
code separation
232. Which protocol resolves a collision after it occurs?
contention-based protocol
48. What is the coverage area provided by cellular tech?
continuous coverage limited to metropolitan regions
70. In communication between BS and MS, what needs to be exchanged before information transfer can take place?
control information
75. Why do you need wireless services when adequate wired infrastructure exists?
convenience
284. What is a valuable way to combine data from different sources?
converting data to common formats such as JSON or XML
167. What is one way to pay for prototyping?
crowd funding
253. what is velocity in big data?
data coming in quickly
306. What is the process of discovering patterns and relationships in large data sets in order to convert raw data into meaningful information?
data mining
174. Refer to the exhibit. What does the exhibited flow chart symbol commonly represent? (it's a diamond shape)
decision
254. what is variety in big data?
different types of data
279. name the term large volume of data broken into smaller pieces and stored on different servers
distributed database
376. What is the concept behind FDMA?
divide the frequency band into disjoint subbands
379. What is the concept behind SDMA?
divide the space into sectors
377. What is the concept behind TDMA?
divide the time into non-overlapping time slots
169. How is a new variable created in blockly?
drag the variable block onto the work space area
333. Which type of duplexing do TDMA and CDMA use?
either FDD or TDD
534. Which IoT-related job would deal with the development and implementation of the underlying technologies within the digital world?
enablers
512. An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
encrypt traffic through a VPN
495. Which ML technology can be used to identify and track individual persons?
facial recognition
203. Channel coding can be defined digitalization of analog message signals and encoding information using fewer bits than the original representation
false
247. True or false The advantage of 1-persistent CSMA is that it will have good channel utilization when traffic is light because it will transmit immediately when the medium becomes idle.
false
257. Small companies can not analyse big data since they do not generate enough themselves
false
446. A DCA scheme is sensitive to time and spatial changes.
false
450. Flexible channel allocation schemes use decentralized control and need up-to-date information about the traffic pattern in its vicinity in order to manage flexible channels and their assignments.
false
452. True or false: Among many quality of service (QoS) factors considered critical in wireless networks, delay and jitter are the most important ones.
false
461. True or false: Radio link-type handoff is due to degradation of quality of service (QoS).
false
465. True or False: In regards to multicasting, a particular router is chosen as a core in a source-based tree approach.
false
472. True or false A mobile base station (M-BS) operates at lower power consumption rate compared to a femto base station (F-BS).
false
476. True or false: A handoff procedure is a user handset handoff from a femto cell to a macrocell.
false
483. True or false: The bellman-ford algorithm is used to calculate the shortest path through the network and is also called the "shortest path first" (SPF) algorithm.
false
492. True or false: In internet protocol version 6 (IPv6), the address space is increased from 32 bits to 64 bits.
false
538. True or False: Data transfer can take place via a downlink or uplink which allows transfer of data bi-directionally and simultaneously.
false
554. True or false IEEE 802.11ac can handle up to four spatial streams serving multiple users and utilizing high-density modulation such as up to 256 quadrature amplitude modulation (QAM).
false
565. True or False: The IEEE 802.15.3 is compatible with Bluetooth and the IEEE 802.11 family of protocols.
false
575. True or false: The most uncomplicated encryption technique encompasses transforming input blocks to some coded form.
false
582. True or false: One foolproof technique of making sure that a user is a genuine subscriber in an access point (AP) network is to use a hash function.
false
589. True or false: A wormhole attack is a suction attack where a malicious node uses a routing protocol to state that it has the shortest path to the node so it can intercept those packets and drop all of the traffic.
false
591. true or false In most wireless sensor network (WSN) applications, an asymmetric scheme is the best approach in terms of energy utilization and time necessitated for encryption/decryption.
false
594. true or false In a distributed denial of service (DoS) smurf attack, the attacker exploits by sending internet protocol (IP) fragment packets that are difficult to reassemble.
false
80. True or false A cell phone offers a large coverage area compared to a satellite phone.
false
84. True or false Sensor networks cover a large area.
false
384. Discuss signal separation in regards to FDMA
filtering in frequency
393. Discuss advantages TDMA
flexible
394. Discuss advantages of CDMA
flexible
179. What is used to illustrate how a given process will run?
flow chart
25. Which type of computing is located at the edge of a business or corporate network and that allows data from sensors to be preprocessed?
fog
274. Name the term servers located close to the company network edge for pre-processing data
fog
302. An organization is concerned with the amount of sensor data that is being generated locally, analyzed in the cloud, and returned for processing at the local site. Which solution will keep the data closer to the source for preprocessing?
fog computing
8. What is the term for servers and computer programs, which are located at the edge of a business or corporate network, that allow the local data to be preprocessed for immediate use?
fog computing
308. What characterizes data management problems associated with big data storage?
generating and collecting data from multiple sources
93. Which is NOT an application of a traditional satellite system?
global telephone connections
276. name the term tool created to distribute and process big datasets in smaller quantities
hadoop
391. Discuss handoff in SDMA
hard and soft handoffs
388. Discuss handoff in FDMA
hard handoff
389. Discuss handoff in TDMA
hard handoff
241. What is the main issue for contention-based protocols?
hidden terminal problem
36. What is ricocet?
high-speed, secure mobile access to the desktop (data) from outside the office that covers some major cities, airports, and some university areas
10. What is the term for a device that acts as a local connection center to IoT smart devices?
home gateway
15. What is needed in a smart home to connect sensors and smart devices to a network?
home gateway
490. The internet protocol version 6 (IPv6) header format differs from internet protocol version 4 (IPv4) in that it includes a ___________.
hop limit
78. How is an ad hoc system different from a cellular network?
information is forwarded in peer-to-peer mode using multi-hop routing
590. A cluster-based intrusion detection system consists of four modules. In which module is the intrusion sensed by analyzing and comparing the traffic patterns with normal behavior?
intrusion detection module
585. Which security approach will react to an intrusion by forcing rekey operation and finding the compromised nodes?
intrusion response mechanism (IRM)
413. In FM, how does the receiver rebuild the information wave?
it checks how the known carrier signal has modified the information
528. What is the primary focus of the IT Essentials course available through the Cisco Academy curriculum?
it teaches learners the fundamentals of computer hardware and software
59. What layer are the frequency communications (FDMA/TDMA/CDMA) at between cell phone and base station at?
layer 1
297. fill in the blank a _____________________ chart is used when you display a continuous set of data over time
line
593. Which component of the support vector machine (SVM)-based intrusion detection system is responsible for sending out the local detection results?
local response module (LRM)
572. Which is a key advantage of a wireless mesh network?
low cost infrastructure
505. Which technology enables features such as speech recognition, product recommendations, and credit card fraud detection?
machine learning
86. What is a potential application of a WMAN/WLAN or wireless MAN/LAN?
manufacturing
158. Give an example of syntax for sets
myset = {'apple', 'banana', 'cherry'}
82. Which of the following does NOT indicate the relative size of the area that can be covered by a transmitting or Base Station:
nanocell
478. In the open systems interconnection (OSI) model, the ___________ layer is responsible for logical addressing and routing.
network layer
315. In FM, does the total wave power change when the frequency alters?
no
408. Is AM an efficient form of communication?
no, too much is kept at the carrier and doesn't contribute to the transfer of data
235. Which is an example of a contention based protocol scheme?
none of the above
239. Which protocol is used extensively in wired Ethernet?
none of the above
460. What is the frequency band used for advanced mobile phone system (AMPS)?
none of the above
480. Which protocol provides a means for error reporting and query to a host or router?
none of the above
546. Which standard of IEEE 802.11 has less interference compared to other IEEE 802.11 standards?
none of the above
555. Which wireless technology has been recently standardized as IEEE802.15.6?
none of the above
560. Which wireless local area network (WLAN) uses low power states like sleep?
none of the above
576. Which service of security category for wireless systems states that the sender and receiver cannot deny the transmission?
none of the above
579. Which effect of a malicious attack on a wireless network is characterized by an attack on availability by blocking or interrupting system resources?
none of the above
77. What is an example of a household application that does not use wireless schemes to control functionality?
none of the above
449. In hybrid channel allocation (HCA), the ratio of fixed to dynamic channels is a function of the _________ and would fluctuate over time according to presented load distribution estimates.
not co-channel interference
383. Discuss active terminals in regards to SDMA
number of terminals per beam dependent on FDMA/TDMA/CDMA
510. Which action can help reduce online risk?
only conduct transactions on websites after verifying the URL is correct
140. What do third party tools like Py2exe and Pyinstallar do?
package the python source code (if written outside an interpreter) and packages it into an executable
24. Which tool allows a user to simulate real networks?
packet tracer
103. Wave propagation loss in a channel can be expressed as L = L P L S L F. Where L P represents:
path loss
63. In ad hoc networks, how is information transfer acheived?
peer-to-peer mode
513. How can a virtual assistant be a security risk?
personal information could be leaked
370. What are power control techniques restricted by?
physical limitations on the transmitted power levels
562. In regards to the architecture of the Bluetooth system, a device acts as a master and can have up to seven slaves in the scheme called:
piconet
296. fill in the blank a ______________ chart represents data as segment of a whole
pie
23. Which command is used to test network connectivity and provide a response to each packet received by the host?
ping
85. What is a characteristic of a private sphere?
portable or interactive tv
353. How was the near-far problem solved in CDMA?
power control enables the adjustment of the antenna emitting power
176. Which python programming function is used to display output?
177. Refer to the exhibit. What does the exhibited flow chart symbol represent? (it's a plain rectangle)
process
517. What is the goal of a white hat hacker?
protecting data
204. Which statement best describes why the technique of channel coding is applied?
reduce errors
224. What is the best way to solve the issue of increased cell phone subscribers in a dense urban area?
reduce the cell size
499. Which field has traditionally been tied to automation?
robotics
305. Making data accessible to only authorized users addresses which data storage problem associated with big data?
security
577. Which security mechanism category administers security during the operation of a system by the deterrence of security breaches?
security prevention
38. What are the pros and cons of different size cells for wireless networking?
see card 45 - otherwise, blank
27. What type of device could allow a refrigerator to place a replacement order for an item contained within it?
sensor
264. What type of data in particular can be pre-processed closer to where it was collected?
sensor data
277. name the term generating high volumes of data
sensors
392. Discuss advantages in FDMA
simple and robust
390. Discuss handoff in CDMA
soft handoff
387. Discuss signal separation in SDMA
spatial separation using smart antenna
373. What is the basic strategy in OFDM
split high-rate radio channels into multiple lower-rate subchannels that are then simultaneously transmitted over multiple orthogonal carrier frequencies
378. What is the concept behind CDMA?
spread the signal with orthogonal codes
309. What type of data is being collected when an organization is using spreadsheets and forms for data input?
structured data
292. Fill in the blank data created using spreadsheets or pre-printed forms is called ______________ data
strutured
339. What is the frequency bandwidth for each user called?
subband
385. Discuss signal separation in TDMA
synchronization in time
381. Discuss active terminals in regards to TDMA
terminals are active in their specified slot on the same frequency
242. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) with request to send/clear to send (RTS/CTS) protocol reduces collisions by the following method:
terminates transmission immediately after the detection of a collision
363. What does a spread spectrum modulation technique imply?
that the radio transmitter frequency hops from channel to channel in a predetermined but pseudorandom manner
208. What is the purpose of the Frame Check Sequence (FCS) in a Cyclic Redundancy Check?
the FCS holds extra information about the frame for error detection and control
19. What is comprised of millions of smart devices and sensors connected to the internet?
the Internet of Things
507. What is artificial intelligence?
the ability of a device to "learn" based on code and provided data
44. What does the term cell mean?
the area that can be covered by a transmitting station - usually called a base station
191. Which interleaver is the most commonly used interleaver in wireless communication systems?
the block interleaver
6. What is the term for a collection of data centers or groups of connected servers that are used to store and analyze data, provide access to online applications, and provide backup services for personal and corporate use?
the cloud
501. What is a requirement for a device to be referred to as a smart device?
the device can make a decision or take a course of action based on outside information
7. What is the term that refers to the "edge" of a corporate network?
the edge
1. What is a network of networks?
the internet
352. What problem made wider bandwidth as a single communication channel regarded as disadvantageous in terms of effective frequency utilization?
the near-far problem
180. How can channel coding be defined?
the process of coding discrete digital information in a form suitable for transmission, with an emphasis on enhanced reliability
316. In fm, how is the signal recouverd?
the receiver rebuilds the information wave by checking how the known carrier signal has modified the information
325. What must a BS recognize?
the signal sent by a particular user
14. What information is conveyed by the SSID that is configured in an IoT device?
the wireless network
143. What is unique about python in interactive mode?
there is a special variable "_" which holds the result of the last expression issued
160. Give an example of the syntax for dictionary in python with output
thisdict = { 'brand': 'Ford', 'model': 'Mustang', 'year': 1964 } print(thisdict) output {'brand': 'Ford', 'model': 'Mustang', 'year': 1964}
181. Why is channel coding applied?
to ensure adequacy of transmission quality (bit error rate (BER) or frame error rate (FER))
245. What is the purpose of the contention window?
to reduce or avoid collisions
520. Why would an IT person use Zabasearch?
to research a person
294. Fill in the blank _______________ information is captured and processed as events happen
transactional
304. A business is analyzing sales information as the sales data is being generated from the point-of-sale (POS) machines. What type of data is captured and processed as the events happen?
transactional data
16. True or False The IoT can help originations improve the efficiency and productivity of manufacturing processes and operations
true
17. True or False The IoT will connect inanimate objects to the network with intelligent sensors
true
213. True or false The disadvantage of interleaving is the additional delay as the sequence needs to be processed block by block.
true
215. True or false In relation to linear block codes, each parity bit consists of weighted modulo 2 sum of the data bits represented by the symbol:
true
219. A block interleaver accepts a set of symbols and rearranges them, without repeating or omitting any of the symbols in the set.
true
220. True or false A cell is a geographic area or zone surrounding a transmitter in a cellular telephone system.
true
226. True or false Since each MS has a different mobility pattern, it is not possible to have an exact match between the cell shape and the subscriber mobility.
true
230. True or false An advantage of cell sectoring is that it requires each antenna to cover a smaller area thereby lowering the amount of power needed to transmit radio signals.
true
255. A large European city has sensors installed in ambulances and police cars to verify that the emergency response services are adequate in all areas of the city. This example would generate big data?
true
311. True of False? Structured data is easier to analyze and store than unstructured data.
true
445. In a dynamic channel allocation (DCA) scheme, the grade of service within an interference group of cells depends on the average loading within that group, not on its spatial distribution.
true
454. True or false: An advantage of cell sectoring is that interference is minimized by reducing the possible number of co-channels that could cause interference within each cell.
true
456. If mobile stations are slow moving, then channels are assigned from one of the microcells, based on the current location.
true
468. True or false In a time-modulated ultra wide band (TM-UWB) method, the system uses a modulation technique called pulse position modulation.
true
469. True or false: One difference between ultra wide band (UWB) and spread spectrum techniques is that in UWB, carrier modulation does not take place.
true
474. True or false: A wireless LAN access point (AP) network is more cost effective than a femto cell network
true
479. True or false: The maximum transmission unit (MTU) is the largest size packet or frame that can be sent in a packet- or frame-based network such as the Internet.
true
497. True or False? An appliance that lowers power consumption during peak demand is considered a smart device.
true
529. True or False? Even though IoT is considered an enabling technology, not all jobs created are IT-related.
true
541. True or false: If a channel is busy during an uplink, the MS waits until the medium becomes idle for a specified time interval called the distributed coordination function (DCF) period.
true
549. True or false: The 802.11ac standard offers substantial performance advantages, significant improvements in the number of clients supported by an access point (AP), a better experience for each client, and more available bandwidth.
true
550. True or false: The access point (AP) at a café or an executive mansion is similar to the one used in a residential home.
true
553. True or false: Security is an issue in an access point (AP) when a connection is kept open, as the AP can be monoplized by other users.
true
558. True or false: Richochet's wireless data network operates in the free unlicensed industrial, scientific and medical (ISM) frequency band around 900 MHz.
true
563. True or false: Security is implemented for services running on Bluetooth devices via the link layer with fast frequency hopping (1600 hops per second).
true
566. True or false: An important function of the medium access control (MAC) protocol is to confirm the successful reception of frames.
true
573. True or False Existing transmission control protocol (TCP) implementation that is extensively used at the Internet transport layer does not appear to work well in multi-hop wireless networks.
true
580. True or false: Wired equivalent privacy (WEP) is somewhat similar to the Rivest Cipher-4 (RC4) symmetric key system.
true
596. True or False: Channel allocation in a cellular system is important from the performance point of view.
true
79. A network can be wireless but not mobile.
true
81. True or false The term cell represents the area that can be covered by a transmitting station, usually called a base station.
true
83. True or false When using a WPAN range is limited due to the short-range radio link used.
true
90. True or false The IEEE 802.11b and the IEEE 802.11g can work on the same network.
true
91. True or False An ad hoc or sensor network is classified as a decentralized network.
true
551. An access point (AP) covers an area of 50,000 m2. If an area of area of 10,000,000 m2 is to be covered by many APs. How many APs will be needed if deployed in a mesh topology?
trying 200 APs
295. fill in the blank Freeform data such as audio or video is called ____________________ data
unstructured
33. What is home networking?
used to connect different devices in the house and share resources such as printers
514. What is a goal of performing a risk assessment?
valuing assets to justify security expenditures
256. A corporation generates data from their web site, from sensors, and from internal documents. What characteristic of big data does this describe?
variety
278. name the term characteristics used to describe big data
velocity
313. Which attribute of big data involves an exponential data growth rate?
velocity
496. Which action takes place in the assurance element of the IBN model?
verification and corrective action
395. Discuss advantages of SDMA
very simple, increases system capacity
28. What are cellular systems?
voice and data through handheld phones are linked to a network that provides continuous coverage limited to metropolitan areas
162. Give an example of elif and else
x = int(input('please enter an integer: ')) if x < 0: x = 0 print ('negative changed to zero') elif x == 0: print ('Zero') elif x == 1: print ('single') else: print ('more')
251. Smart parking meters, real-time street traffic video, and crime statistics feed data to an app that shows users recommended and available parking spaces as well as information regarding cost and safety/security rating. Does the app use big data?
yes