Data Comm 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ was a system designed for twisted pair wiring, but with only a 1-Mbps data transfer rate for 500 meters.​

1base5

​SONET rings typically have a failover time of ____ milliseconds.

50

The wireless LAN term for a collection of multiple Basic Service Sets is ____.​

Extended Service Set (ESS)

CSMA/CD is the only network technology that successfully supports connection admission control and quality of service.

False

Active Directory is built around the ____.​

Lightweight Directory Access Protocol (LDAP)

The ____ network operating systems were the first to perform redirection on a local area network.​

Novell

All bus networks share a major disadvantage: In general, it is difficult to add a new workstation if no tap currently exists.​

True

Most modern local area networks provide the capabilities of transferring video images and video streams.​

True

____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers.​

Unix

____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive.​

antispyware

Even after an application starts and is being executed, the application makes use of the operating system by making service requests through a defined ___________________________________.​

application program interface (API)

____________________ software allows network administrators to back up data files currently stored on the network server's hard disk drive.​

backup

A transparent bridge creates the internal port table by using a form of ____.​

backward learning

A company that has a connection with Metro Ethernet can create a(n) ____________________ for that connection.

bandwidth profile

____________________ means that when the signal is transmitted from a given workstation, the signal propagates away from the source in both directions on the cable.

bidirectional

​A(n) ____________________ is a large surge of data that's transmitted for a short period of time.

burst

The ____ topology consists of a simple cable, or bus, to which all devices attach.​

bus/tree

The most popular contention-based protocol is ____.​

carrier sense multiple access with collision detection (CSMA/CD)

​____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.

circuit-switched

​The interval during which the signals propagate down the bus and back is the ____.

collision window

A modern operating system must provide various levels of operating system ____, including directory and file security, memory security, and resource security.​

security

Under the terms of the ____ license, the software package may be installed on a single machine, and then only a single user at one time may be using that machine.​

single-user-single-station

____________________ is a synchronous time division multiplexing technique that is capable of sending data at hundreds of millions of bits per second.

sonet

​Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet.

sonet

The most popular configuration for a local area network is the ____ topology.​

star-wired bus

A(n) ____________________ is a collection of nodes and interconnecting telecommunications links.

sub-network

A(n) ____________________ is a device that interconnects two local area networks and can use processing power to direct a frame out a particular port, thus reducing the amount of traffic on the network.​

switch

A(n) ____________________ is the physical (hardware) layout used to interconnect the workstations within a local area network.​

topolgy

More complex bus topologies consisting of multiple interconnected cable segments are termed ____.​

trees

One of the more interesting applications for a dedicated segment network and a switch is creating a ____.​

virtual LAN

The two types of packet-switched networks are the datagram and the ____.

virtual circuit

To promote acceptance, the ____________________ suite of protocols was created to support the many different types of wireless local area networks in existence.​

IEEE 802

​A network that expands into a metropolitan area and exhibits high data rates, high reliability, and low data loss is called a(n) ___________________________________.

MAN

____ is an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network.​

NetWare Directory Services (NDS)

____ was founded in 1983 and was one of the first developers of network operating systems.​

Novell

Windows ____, released in the year 2000, was the next generation of the Windows NT operating system and represented a significant improvement over the earlier versions of NT.​

Server 2000

____________________ is software that a user unknowingly downloads from the Internet; and when this software is executed on the user's machine, it begins spying on the user.

Spyware

​A(n) _________________________ is a collection of computers and computer-related equipment interconnected to perform a given function or functions and typically using local and long-distance telecommunications systems.

WAN

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data.

connection admission control

A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted.

connection-oriented

A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites.​

corporate

One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.

distributed

The NT ____________________ was a container object that contained users, servers, printers, and other network resources.​

domain

​The ability to reroute in the event of a failure is called ____________________.

failover

Any network is as strong as its strongest link.

false

Broadcast networks are as common as circuit-switched and packet-switched networks.

false

Hubs (and switches) support only twisted pair cable for interhub connection.​

false

The logical link control sublayer defines the layout or format of the data frame, simply called the frame.​

false

Wireless local area networks are typically found in seven basic configurations.​

false

Wireless sniffers cannot detect how far wireless signals reach.​

false

​A common example of a connection-oriented network application is DNS.

false

​NetWare 5 dropped the NDS distributed database of network resources

false

A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository, or ____ server.​

file

____ is advantageous when a copy of a packet needs to get to all nodes.

flooding

​A network limit, called the ____, can be placed on how many times any packet is copied.

hop limit

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected.​

hub

The switch operates in place of a ____.​

hub

A(n) ____________________ is the computer that stores software resources such as the network operating system, computer applications, programs, data sets, and databases, and either allows or denies workstations connected to the network access to these resources.​

network server

A(n) ____________________ is a device that allows one or more stations to access the physical network and is a transfer point for passing information through the network.

node

A(n) _________________________ is the program initially loaded into computer memory when the computer is turned on.​

operating system

The ____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer.

operating system

​The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).

packet

The tap is a(n) ____________________, as it does not alter the signal and does not require electricity to operate.​

passive device

The ____________________ design refers to the pattern formed by the locations of the elements of the network, as it would appear if drawn on a sheet of paper.​

physical

____________________ allows all future print requests to be automatically forwarded to the network printer in an operation that is transparent to both you and the application.​

redirection

A connection-oriented network application provides what is called a(n) ___________ service.

reliable

A cut-through switch does not store a data frame and then forward it.​

true

A wide area network would not exist without a sub-network.

true

Mac OS X Server is based on the Unix concept.​

true

Most switches are transparent, which means they learn by themselves.​

true

Network operating systems are essential if the network is going to allow multiple users to share resources.​

true

The bus/tree topology was the first physical design used when local area networks became commercially available in the late 1970s.​

true

Unix is often found with a text-based interface, although graphical user interfaces are available.​

true

Wide area networks share a few characteristics with local area networks.

true

​Many of the same technologies and communications protocols found in local area networks are used to create metropolitan area networks.

true

____ software works with the user to locate and remove applications that are no longer desired.​

uninstall

Early local area networks transmitted data at only ____ million bits per second.​

10

____ was the standard created for fiber-optic systems.​

100baseFX

The spanning tree algorithm allows you to run cable spans between two or more networks.​

False

In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____.​

interframe space (IFS)

One of the fastest growing segments of the software market is ____________________ software, the tool set to support Internet-related services.​

internet

The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information.​

logical link control (LLC)

A network that is connected in a ____ is one in which neighbors are connected only to neighbors.

mesh

​When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ____ occurs.

network congestion

With a system-based or ____ license, there is rarely a software counter controlling the current number of users.​

network server

____ area networks can cover large geographic distances, including the entire Earth.

wide


Conjuntos de estudio relacionados

F469 Final Exam Review - HW + Practice Problems

View Set

Macbeth quotes (character saying it -matching; interpretation- multiple choice)

View Set

Chapter 11: Developmental Theories 3

View Set

1945 - present Mexico, Cuba and Central America

View Set

Principles of real estate 1 chapter 10 quiz

View Set

Honors English 1 Vocabulary Lesson 7

View Set

HEA 110 Chapter 6: Homework Quiz

View Set

MS2 Mod 3 HESI - Elsevier Adaptive Quizzing

View Set