Data Communications, Unit 3 Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive.​

Antispyware

A(n) ____________________ network is a sub-network in which a dedicated circuit is established between sender and receiver, and all data passes over this circuit.

Circuit-Switched

​The interval during which the signals propagate down the bus and back is the ____.

Collision Window

​The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____.

Sub-network

A(n) ____________________ is a device that interconnects two local area networks and can use processing power to direct a frame out a particular port, thus reducing the amount of traffic on the network.​

Switch

A(n) ____________________ is the physical (hardware) layout used to interconnect the workstations within a local area network.​

Topology

More complex bus topologies consisting of multple interconnected cable segments are termed ____.

Trees

A cut-through switch does not store a data frame and then forward it

True

A cut-through switch does not store a data frame and then forward it.​

True

A network operating system needs a host machine from which to operate.​

True

A wide area network would not exist without a sub-network.

True

NetWare 6 was the last version of Novell's network operating system.​

True

____ cabling has become the preferred medium for star-wired bus topologies.​

Twisted Pair

Popular operating systems for microcomputers include Mac OS X, ____, Linux, and the various forms of Windows XP/Vista/7.​

Unix

____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers.​

Unix

The two types of packet-switched networks are the datagram and the ____.

Virtual Circuit

If the network is experiencing a high amount of traffic, the chances for collision are small.​

False

In a(n) ____________________ network, all data messages are transmitted using fixed-sized packages, called packets, and no unique, dedicated physical path is established to transmit the data packets across the subnetwork.

Packet-switched

____ technique is also known as disk mirroring.​

RAID-5

____________________ allows all future print requests to be automatically forwarded to the network printer in an operation that is transparent to both you and the application.​

Redirection

The ____ is used to connect local area networks to wide area networks.​

Router

​Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet.

SONET

The IEEE 802.3z standards are also known as ____ Ethernet.​

Gigabit

To promote acceptance, the ____________________ suite of protocols was created to support the many different types of wireless local area networks in existence.​

IEEE 802

One of the fastest growing segments of the software market is ____________________ software, the tool set to support Internet-related services.​

Internet

________________ allows you to combine two ore more data paths, or links, into one higher-speed link.​

Link Aggreation

A ____ area network is typically confined to a single building or a couple floors within one building.

Local

The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information.

Logical Link Control (LLC)

​____ are advertised as networks with very low error rates and extremely high throughput.

MANs

A network that is connected in a ____ is one in which neighbors are connected only to neighbors.

Mesh

A(n) ______________________________ is a large, complex program that can manage the common resources on most local area networks.​

NOS

On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser.​

Netware 6

A(n) ____________________ is the computer that stores software resources such as the network operating system, computer applications, programs, data sets, and databases, and either allows or denies workstations connected to the network access to these resources.​

Network Server

With a system-based or ____ license, there is rarely a software counter controlling the current number of users.​

Network Server

____ software incorporates a fairly large number of network support tools.​

Network-monitoring

A(n) ____________________ protocol is one in which you cannot calculate the time at which a workstation will transmit.​

Nondeterministic

​The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).

Packet

A modern operating system must provide various levels of operating system ____, including directory and file security, memory security, and resource security.​

Security

Windows ____, released in the year 2000, was the next generation of the Windows NT operating system and represented a significant improvement over the earlier versions of NT.​

Server 2000

Depending on user requirements, a switch can interconnect two different types of CSMA/CD network segments: ____ segments and dedicated segments.​

Shared

When two or more hubs are interconnected and a workstation transmits data, all the workstations connected to all the hubs receive the data. This is an example of a(n) ____.

Shared Network

____________________ is software that a user unknowingly downloads from the Internet; and when this software is executed on the user's machine, it begins spying on the user.

Spyware

A(n) ____________________ is a device that a user interacts with to access a network, and it contains the software application that allows someone to use the network for a particular purpose.

Station

The tap is a(n) ____________________, as it does not alter the signal and does not require electricity to operate.​

passive device

One of the more interesting applications for a dedicated segment network and a switch is creating a _____.

virtual LAN

____ was the standard created for fiber-optic systems

100BaseFX

____ was a system designed for twisted pair wiring, but with only a 1-Mbps data transfer rate for 500 meters.​

1Base5

​SONET rings typically have a failover time of ____ milliseconds.

50

If a switch has eight 100-Mbps ports, the backplane has to support a total of ____ Mbps.

800

A relatively new standard, IEEE ____, was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN.​

802.1Q

Even after an application starts and is being executed, the application makes use of the operating system by making service requests through a defined ___________________________________.​

API

The ____ is essentially the interface device between the wireless user device and the wired local area network.​

Access Point

Microsoft's ____________________ stores information about all the objects and resources in a network and makes this information available to users, network administrators, and application programs.​

Active Directory

____ software is designed to detect and remove viruses that have infected your memory, disks, or operating system.​

Antivirus

____ was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today.​

Ethernet

When the network signals the transmitting station to slow down, this is called _________________________.

Explicit Congestion Control

The wireless LAN term for a collection of multiple Basic Service Sets is ____.​

Extended Service Set (ESS)

Broadcast networks are as common as circuit-switched and packet-switched networks.

False

The local area network appeared in the 1950s

False

The most popular example of a contention-based protocol is the token-passing protocol

False

Three of the most popular local area network systems are Ethernet, IBM Token Ring, and Wireless Ethernet.​

False

Unlike NetWare's NDS, Active Directory creates a hierarchical structure of resources.​

False

Users cannot interact directly with the operating system through a shell.​

False

Wireless local area networks are typically found in seven basic configurations.​

False

Wireless sniffes cannot detect how far wireless signals reach.​

False

A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository, or ____ server.​

File

The NT ____________________ was a container object that contained users, servers, printers, and other network resources.​

Domain

____________________ software allows network administrators to back up data files currently stored on the network server's hard disk drive.​

Backup

A company that has a connection with Metro Ethernet can create a(n) ____________________ for that connection.

Bandwidth Profile

____________________ means that when the signal is transmitted from a given workstation, the signal propagates away from the source in both directions on the cable.

Bidirectional

​The ____ of NetWare version 3 holds information about other services provided by the server to the client, such as printer, modem, and switch/router access information.

Bindery

​A(n) ____________________ is a large surge of data that's transmitted for a short period of time.

Burst

​A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another.

Bus-based

​____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur.

Circuit-Switched

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data.

Connection Admission Control

A(n) ____________________ network application provides some guarantee that information traveling through the network will not be lost.

Connection-oriented

​____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged.

Connectionless

A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites.​

Corporate

One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.

Distributed

A wide area network's underlying sub-network consists of multiple nodes, each with multiple possible connections to other nodes within the sub-network.

True

All bus networks share a major disadvantage: In general, it is difficult to add a new workstation if no tap currently exists.​

True

Every software company may create its own brand of user licenses and may name them something unique.​

True

Link aggregation allows you to combine two or more data paths, or links, into one higher-speed link.​

True

Mac OS X Server is based on the Unix concept.​

True

Most modern local area networks provide the capabilities of transferring video images and video streams.​

True

One of the biggest advantages of local area networks is their ability to share resources in an economical and efficient manner.​

True

The bus/tree topology was the first physical design used when local area networks became commercially available in the late 1970s.​

True

Using coaxial cable to transmit analog signals, 10Broad36 can transmit data at 10 Mbps for a maximum segment distance of 3600 meters

True

Wide area networks share a few characteristics with local area networks.

True

​A virtual circuit breaks a large amount of data into n packets.

True

​The major disadvantage of flooding is the large number of copied packets distributed throughout the network.

True

The first version of NetWare to gain widespread popularity was ____.​

Version 3

NetWare ____ introduced NetWare Directory Services (NDS).​

Version 4

One of the more interesting applications for a dedicated segment network and a switch is creating a ___.

Virtual LAN

​A(n) _________________________ is a collection of computers and computer-related equipment interconnected to perform a given function or functions and typically using local and long-distance telecommunications systems.

WAN

____ area networks can cover large geographic distances, including the entire Earth.

Wide

A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____.​

Wireless LAN


Conjuntos de estudio relacionados

Astronomy Chapter 15, 16, 17, 18 and 19 Homework Questions

View Set

Lec 3 - Genetics of Addiction, Psychosocial Explanations for Addiction

View Set

Literary Terms AP English Language

View Set

APUSH Unit 6 AMSCO (Chapters 26-29)

View Set