Mid-Term | Data Communications and Networks

¡Supera tus tareas y exámenes ahora con Quizwiz!

____________________ is an unwanted coupling between two different signal paths.

Crosstalk

____________________ is a relative measure of signal loss or gain and is used to measure the logarithmic loss or gain of a signal.

Decibel

A(n) ____________________ is essentially a filter that allows the signal to pass in one direction only.

Echo Suppressor

Industrial environments with heavy machinery produce ____________________ that can interfere with improperly shielded cables.

Electronic Noise

____________________ shift keying uses two different frequency ranges to represent data values of 0 and 1.

Frequency

A(n) ____________________ license, operating system user license, and controlled number of concurrent users license all refer to essentially the same situation.

Interactive User(?)

When a digital signal is being transmitted, the rises and falls of the signal can start to shift, or become blurry, and thus produce ____________________.

Jitter

The 802.11g standard is frequently called ____. a) Wi-Fi 3 b) Wi-Fi 4 c) Wi-Fi 5 d) Wi-Fi 6

NOT 4 (6?)

____ are then typically stored in a hierarchical file system a) Logs b) Applications c) Websites d) Office and Media Files

NOT A

____ are then typically stored in a hierarchical file system. a) Logs b) Application c) Websites d) Office and Media Files

NOT A

____ shift keying incorporates four different phase angles, each of which represents 2 bits. a) Quadrature Amplitude b) Quadrature Frequency c) Quadrature Noise d) Quadrature Phase

NOT A

Considering that the many kinds of servers' workloads rely on data, a(n) ____________________ application draws on data stored in a database.

NOT DBMS

USB is a ____________________ cable because a peripheral connected using a USB cable can simply be plugged in and turned on, and the computer dynamically recognizes the device and establishes the interface.

NOT Hot pluggable full duplex?

____________________ are personal computers or smartphones where users connect to computer networks.

PAN(?)

____ allows some underlying configuration, but developers can mostly focus on their development work without having to devote time to managing a network infrastructure. a) XaaS b) PaaS c) SaaS d) IaaS

PaaS

The ____________________ of a signal is the position of the waveform relative to a given moment of time, or relative to time zero.

Phase

The ____________________ connection is the only direct connection between sender and receiver and is at the physical layer, where actual 1s and 0s are transmitted over wires or airwaves.

Physical

Converting analog data to digital signals is generally called ____________________.

Pulse Code Modulation (PCM)

A(n) ____________________ converts the local area network data into wide area network data.

Router

____________________ can listen to traffic on a network and determine if invalid messages are being transmitted, report network problems such as malfunctioning NICs, and detect traffic congestion problems.

Sniffers

The ______________ layer of the TCP/IP protocol suite is responsible for making sure that what leaves one end of the network arrives at the other end of the network exactly the same.

Transport

____________________ dedicates two or four bytes for each encoded symbol.

UTF-16

____________________ dedicates one to four bytes for each encoded symbol.

UTF-8

____________________ is a relatively continuous type of noise and is much like the static you hear when a radio is being tuned between two stations.

White Noise

A reliable backup strategy called ____ includes at least three complete copies of data stored on at least two different types of media with at least one copy stored offsite and, for greater protection, at least one copy kept offline from the remainder of the network. a) 3-2-1-1- Rule b) Happy Paranoid Rule c) 4-steps Rule d) 4-Fold Protection Rule

a) 3-2-1-1 Rule

The ____ topology consists of a simple cable to which all devices attach. a) Bus b) Token Ring c) Ring Star d) Star

a) Bus

To minimize the effect of echo, a device called a(n) ____ can be attached to a line. a) Echo Suppressor b) Repeater c) Amplifier d) Hub

a) Echo Suppresor

The addition of control information to a packet as it moves through the layers is called ____. a) Encapsulation b) Overloading c) Payload d) Filtering

a) Encapsulation

____ cable is the medium least prone to generating errors. a) Fiber-Optic b) Coaxial c) Twisted Pair d) Copper-Based

a) Fiber-Optic

A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository or ____ server. a) File b) Printer c) Database d) Application

a) File

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. a) Hub b) Switch c) Router d) Repeater

a) Hub

____ technology is the fastest option for fiber-optic cable. a) Laser b) LED c) Glass-Based d) Plastic-Based

a) Laser

____ modulation, which is commonly employed in contemporary modems, uses each signal change to represent 4 bits. a) Quadrature Amplitude b) Quadrature Frequency c) Quadrature Noise d) Quadrature Phase

a) Quadrature Amplitude

In a fiber-optic cable, when a signal reaches the other end of the cable, some of the light is reflected back into the cable to its source, and this phenomenon is called ____. a) Reflectance b) Attenuation c) Mirroring d) Refraction

a) Reflectance

In the context of cloud computing, ____ refers to the ability of resources to be adjusted over time in response to changing needs a) Scalability b) Pay-as-you-go c) Self-Service d) Elasticity

a) Scalability

A LAN can interface with other LANs and with WANs such as the Internet. a) True b) False

a) True

A byte consists of 8 bits. a) True b) False

a) True

A cold storage scheme has a lower cost per stored byte and a higher cost per data access. a) True b) False

a) True

A hub is a simple device that requires virtually no overhead to operate. a) True b) False

a) True

A subscription license relies on a monthly or annual payment schedule to continue using the application. a) True b) False

a) True

ASCII is now a subset of Unicode. a) True b) False

a) True

AWS and GCP are examples of CSP. a) True b) False

a) True

All ports included in the broadcast message are collectively called a broadcast domain. a) True b) False

a) True

An inherent problem with the NRZ-L and NRZI digital encoding schemes is that long sequences of 0s in the data produce a signal that never changes. a) True b) False

a) True

Category 5 twisted pair has a higher number of twists per inch than the Category 1 to 4 wires. a) True b) False

a) True

Data transmission speed is the number of bits per second that can be transmitted. a) True b) False

a) True

In a sliding-window error control system, a receiver may acknowledge multiple packets with a single ACK. a) True b) False

a) True

Modern coaxial technology can typically support data transfer speeds up to 1 Gbps. a) True b) False

a) True

The TCP/IP protocol suite does not have rigidly defined layers as the OSI model does a) True b) False

a) True

The data link layer of the OSI model can incorporate some form of error detection software. a) True b) False

a) True

The logical link control sublayer defines the layout or format of the data frame, simply called the frame. a) True b) False

a) True

The physical layer has no awareness of the meaning of the data bits being transmitted. a) True b) False

a) True

The transport layer header contains as receiver address a port number. a) True b) False

a) True

White noise is dependent on the temperature of the medium. a) True b) False

a) True

Wi-Fi 802.11n standard was the first one to introduce the multiple input multiple output technology. a) True b) False

a) True

The ____ scheme tries to satisfy the synchronization problem and avoid the "baud equals two times the bps" problem. a) Manchester b) 4B/5B c) Differential Manchester d) NRZ-L

b) 4B/5B

____ twisted pair was designed to transmit 10 Gbps of data over a local area network for distances up to 100 meters (328 feet). a) Category 5 b) Category 6a c) Category 5e d) Category 6

b) Category 6a

The LLC and MAC sublayers are divisions of the ____ OSI model layer. a) Transport b) Data Link c) Network d) Physical

b) Data Link

In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub. a) Shared b) Dedicated c) Distributed d) Remote

b) Dedicated

A hub is designed to perform much faster than a switch. a) True b) False

b) False

Amplitude shift keying is restricted to only two possible amplitude levels: low and high. a) True b) False

b) False

Creating a data frame does not increase the number of bits to be transmitted. a) True b) False

b) False

Most switches are transparent, which means they learn by themselves. a) True b) False

b) False

One of the major problems with Unicode is that it cannot represent symbols other than those found in the English language. a) True b) False

b) False

The 802.11n standard has a greater maximum theoretical throughput than the 802.11ac standard. a) True b) False

b) False

The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. a) True b) False

b) False

The application development process that breaks an application into smaller components is called deduplication. a) True b) False

b) False

The application layer of the OSI model is responsible for token management. a) True b) False

b) False

The spanning tree algorithm allows you to run cable spans between two or more networks. a) True b) False

b) False

The trailer part of a data link frame never holds error detection information. a) True b) False

b) False

When a parity bit is assigned to ASCII, the Hamming distance becomes 4. a) True b) False

b) False

____ is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another. a) White Noise b) Jitter c) Attenuation d) Echo

b) Jitter

The ____ layer of the TCP/IP protocol suite is not a logical connection. a) Application b) Physical c) Transport d) Network

b) Physical

The ____ layer of the OSI model performs a series of miscellaneous functions necessary for presenting the data package properly to the sender or receiver. a) Transport b) Presentation c) Applications d) Session

b) Presentation

When a light signal inside the cable bounces off the cable wall and back into the cable, this is called ____. a) Refraction b) Reflection c) Blinking d) Friction

b) Reflection

____ is similar in concept to software-defined networking since it abstracts the control of storage management away from the physical or virtual disks storing the data. a) SDN b) SDS c) SD-Branch d) SD-WAN

b) SDS

____ twisted pair is the least quality twisted pair wire that should be used in a data/voice application. a) Category 1 b) Category 3 c) Category 5e d) Category 7a

c) Category 5e

A current or signal in one wire can produce an unwanted current or signal, called ____, in a second wire. a) Current-Talk b) Signal-Talk c) Crosstalk d) Crossover

c) Crosstalk

High humidity and wet weather can cause an increase in electrical ____ over a telephone system. a) Compression b) Attenuation c) Jitter d) Crosstalk

c) Crosstalk

The ____ layer of the OSI model is responsible for taking data from the network layer and transforming it into a frame. a) Transport b) Physical c) Data Link d) Session

c) Data Link

LC, ST, SC, and MTRJ are connector types for ____ cables a) RJ45 b) Twisted Pair c) Fiber-Optic d) Coaxial

c) Fiber-Optic

White noise is also called thermal noise or ____ noise. a) Crosstalk b) Jitter c) Gaussian d) Spike

c) Gaussian

It is called ____ the kind of storage where there is a high cost per stored byte and low cost per data access. a) Cold Storage b) Coarse Storage c) Hot Storage d) Fine-Grain Storage

c) Hot Storage

One encoding technique that converts analog data to a digital signal is ____. a) NRZ-L b) Manchester c) Pulse Code Modulation (PCM) d) NRZ-I

c) Pulse Code Modulation (PCM)

____ are the computers that store network software and shared or private user files. a) Switches b) Routers c) Servers d) Hubs

c) Servers

The Internet "talks" only ____, so users must use software that supports this protocol. a) IPX/SPX b) DSL c) TCP/IP d) FTP

c) TCP/IP

As ____ on a CSMA/CD network increased, the rate of collisions increased, which further degraded the service of the network. a) Errors b) Noise Amplitude c) Traffic d) Transmission Speed

c) Traffic

The ____ layer of the OSI model makes sure the data received at the very end of a transmission is exactly the same as the data originally transmitted. a) Application b) Session c) Transport d) Network Access

c) Transport

One of the greatest advantages of ____ is the efficient use of resources, as many servers can run on a single physical machine. a) OSs b) NOSs c) Virtualization d) RAIDs

c) Virtualization

Causes of jitter can include electromagnetic interference, ____, passing the signal through too many repeaters, and the use of lower-quality equipment. a) Coding b) Sampling c) Compression d) Crosstalk

d) Crosstalk

In the directory service AD, the ____ can be objects, like users, groups of users, computers, applications, and network devices. a) Forest b) Tree c) Domain d) Leaves

d) Leaves

A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites or another desktop machine at home. a) Single-User-Single-Station b) Interactive User c) Site d) Single-User-Multiple-Station

d) Single-User-Multiple-Station

A ____ protocol's function is simply to inform the transmitter what piece of data is expected next. a) CRC-16 b) CRC-32 c) Stop-and-wait d) Sliding Window

d) Sliding Window

The 802.11ax standard is frequently called ____.

d) Wi-Fi 6

____ systems are good at sending low-speed signals over short to medium distances. a) Thunderbolt b) Wi-Fi 2 c) Wi-Fi 1 d) ZigBee

d) ZigBee

The ____________________ that accompanies a software product is a legal contract and describes a number of conditions that must be upheld for proper use of the software package.

licensing agreement

____________________ is the opposite of attenuation.

not jitter

An interesting aspect of Zigbee is how devices are able to keep ____________________ low.

power consumption

____ is a disadvantage of virtualization (choose two). a) Cost and energy savings b) Licensing Costs c) Single point of failure d) Fault and threat isolation

wouldnt let me choose two, just saying C was wrong

____________________ was designed to support 100-Mbps baseband signals using fiber optic.

100BaseTX


Conjuntos de estudio relacionados

Chapter 4: Application Software: Programs That Let You Work and Play

View Set

Launchpad Learning Curve Chap 8 Econ

View Set

intro test 4 ch. 4 point questions

View Set