MIS 4123: Telecommunications Networked Systems (Exam 1/Ch1-3)

¡Supera tus tareas y exámenes ahora con Quizwiz!

The "local loop" refers to the wires that run from the customer premises to the telephone switch of the telephone company. a.) True b.) False

a

Which of the following is NOT one of the 3 stages of de jure standardization? a.) specification b.) context c.) identification of choices d.) acceptance

b

Which of the following is a term used to group together the physical and data link layers? a.) Internetwork layers b.) Hardware layers c.) Software layers d.) Middleware layers e.) Application layers

b

Which of the following is an example of half-duplex transmission? a.) phone call b.) walkie-talkie c.) direct messaging d.) webcasting

b

Wireless media is the most secure, while fiber optics are the least secure because their signals are easily intercepted. a.) True b.) False

b

_______ is commonly used to transmit phone conversation over digital networks. a.) WDM b.) VOIP c.) Multiplexer d.) DSL Modem

b

________ is the number of cycles per second and is expressed in Hertz. a.) phase b.) frequency c.) amplitude d.) wave length

b

_________ is a special type of one directional videoconferencing in which content is sent from the server to the user. a.) PuTTY b.) Webcasting c.) Telnet d.) HTML

b

_________ refers to the time it takes for a signal to travel from sender to recipient. a.) Raindrop Attenuation b.) Manchester Encoding c.) Propagation Delay d.) Signal Bandwidth

c

__________ is the weakening of a signal over distance. a.) Dispersion b.) Digital Transmitting c.) Attenuation d.) Analogizing

c

___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. a.) WDM b.) Codec c.) Multiplexer d.) VOIP

c

______________ makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server. a.) Internet Message Access Protocol b.) Mail Transfer Protocol c.) Hypertext Transfer Protocol d.) Uniform Resource Locator

c

According to John Chambers, former CEO of Cisco (a leading networking technology company), the Information Age is the second Industrial Revolution. a.) True b.) False

a

Mail Transfer Agent is a software that runs on the mail server. a.) True b.) False

a

Data compression can increase the throughput of a communication link. a.) True b.) False

a

Fiber optics are usually installed on homes and businesses by the telephone company. a.) True b.) False

a

Frequency is the number of cycles per second and is expressed in Hertz. a.) True b.) False

a

Microwave transmissions require a line of sight between any two points. a.) True b.) False

a

Serial transmission is slower than parallel transmission. a.) True b.) False

a

In a three-tier architecture, the software on the client computer is responsible for the: a.) presentation logic b.) data access logic c.) application logic d.) data storage e.) Both a & c

a

Compression is the technique used by most videoconferencing applications to reduce the amount of data being transmitted. a.) True b.) False

a

A Backbone Network is a high-speed central network that connects other networks in a distance spanning up to _______________. a.) several miles b.) hundreds of miles c.) a few yards d.) a couple feet

a

A backbone network is: a.) a high speed central network that connects other networks in a distance spanning up to several miles. b.) a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c.) a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d.) a network spanning a large geographical area (up to 1000s of miles). e.) a network spanning exactly 200 miles with common carrier circuits.

a

A car manufacturer may give access to certain portions of its network to some of its suppliers via the Internet. This is an example of an extranet. a.) True b.) False

a

A network administrator has received several reports from users of the network that the intranet website on one of the company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. This is an example of what type of scenario? a.) application layer troubleshooting b.) physical layer troubleshooting c.) presentation layer troubleshooting d.) session layer troubleshooting

a

ANSI is a voting participant in the ISO. a.) True b.) False

a

Among guided media, twisted pair wire is generally the cheapest and fiber-optic cable is the most expensive. a.) True b.) False

a

Among the guided media, which of the following provides the lowest error rates? a.) fiber optics b.) coaxial cable c.) twisted pair cable d.) wireless media

a

Client-servers can use middleware to provide a standard way of communicating between software from more than one vendor. a.) True b.) False

a

The ability to transmit in both directions, but only one direction at a time is an example of half-duplex transmission. a.) True b.) False

a

The direction which the sound wave begins is known as _________. a.) phase b.) frequency c.) amplitude d.) wave length

a

The underlying problem with a host-based network, is the server can get overloaded since it must process all messages. a.) True b.) False

a

The underlying problem with client-based network is that all data on the server must travel to the client for processing. a.) True b.) False

a

When an application changes in a "thin client" architecture approach, only the server with the application logic needs to be updated. a.) True b.) False

a

When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the submarine cables that connect America and Europe. a.) True b.) False

a

Which of the following is not a form of modulation used to transform digital data into analog signals? a.) Frequency shift keying b.) Frequency modulation (FM) c.) Amplitude Modulation (AM) d.) Phase modulation

a

With ______, cloud-hosted desktops allow users to access the same client computer from any computer and any location. a.) DaaS b.) PaaS c.) IaaS d.) SaaS

a

When all bits of character are transferred one after another this is referred to as: a.) Parallel Mode b.) Serial Mode c.) Modulation d.) Digital signaling

b

________ is the most commonly used coding schemes used in data transmission. a.) ASCII b.) C# c.) Serial mode d.) Modulation

a

_________ is equipment to transform analog voice signals to digital signals and digital signals to analog signals. a.) Codec b.) VOIP c.) Telnet d.) PuTTY

a

__________ is a program that conforms to the Telnet standard and is most frequently used with Telnet applications. a.) PuTTY b.) IaaS c.) DaaS d.) IMAP e.) EEEI

a

__________ permits an email message to remain stored on the mail server even after they have been read by a client computer. a.) Internet Message Access Protocol (IMAP) b.) Mail User Agent c.) Mail Transfer Agent d.) Hypertext Transfer Protocol

a

___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination. a.) Dispersion b.) Medium c.) Attenuation d.) Shared circuit

a

A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. This is an example of what type of scenario? a.) application layer troubleshooting b.) physical layer troubleshooting c.) presentation layer troubleshooting d.) session layer troubleshooting

b

Amplitude modulation (AM): a.) converts analog data into digital data b.) converts digital data into analog data c.) converts 0's and 1's to plain text d.) converts plain text to 0's and 1's

b

Fiber optic provides the lowest transmission speeds and is the least secure wired media. a.) True b.) False

b

In ___________ computers are both client and server, thus sharing the work. a.) client-server b.) peer-to-peer architecture c.) three-tier architecture d.) two-tier architecture

b

In a client-server network, middleware gets software from the same vendors to work together. a.) True b.) False

b

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________ to send e-mail. a.) mail transfer agent b.) mail user agent c.) user d.) web server

b

In digital coding, the representation of a character A is grouped with _____ bits. a.) 4 b.) 8 c.) 10 d.) 16

b

Serial transmission is faster than parallel transmission. a.) True b.) False

b

Time (non-statistical) division multiplexing differs from frequency division multiplexing because it splits the communication circuit horizontally instead of vertically. a.) True b.) False

b

Twisted pair wire coaxial and radio can transmit data ________ before the signal must be generated. a.) few miles b.) short distance c.) hundreds of miles d.) hundreds of yards

b

What does URL stand for? a.) United Resource Lab b.) Uniform Resource Locator c.) Under Requested Limit d.) Uniformly Rejected List

b

________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0. a.) Amplitude b.) Parallel mode c.) Modulation d.) Circuit configuration

c

A ___________ places all or almost all of the application logic on the client. a.) three-tier architecture approach b.) N-tiered architecture approach c.) "thick client" architecture approach d.) "thin client" architecture approach

c

If the highest frequency of a circuit is 10 KHz and the lowest frequency is 900 Hz, the bandwidth available for this circuit is: a.) 19,200 Hz b.) 10,900 Hz c.) 9100 Hz d.) 900 Hz

c

Modem stands for: a.) Modulation b.) MOD Errors c.) Modulator/ demodulator d.) Motoring System for computers

c

Response status code of 404 means? a.) The requested information was not required b.) The response status on the page was not found c.) The requested page was not found d.) None of the above

c

The most commonly used e-mail standard is _____________. a.) Internet Message Access Protocol (IMAP) b.) Hypertext Transfer Protocol c.) Simple Mail Transfer Protocol d.) Instant messaging

c

The range of human hearing is between 20 Hz and 14,000 Hz, therefore its bandwidth is ___________. a.) 34,000 b.) 14,020 c.) 13,880 d.) 700

c

Which of the following is not a characteristic of microwave media? a.) high frequency radio communication b.) requires a clear line-of-sight path c.) is typically used for short distance data transmission d.) does not require the laying of any cable e.) requires a line of sight between any 2 points

c

Which of the following is not one of the four general functions of any application program? a.) data storage b.) data access logic c.) data processing d.) application layer e.) presentation layer

c

With ______, the cloud provider manages the hardware and the organization is responsible for all the software. a.) DaaS b.) PaaS c.) IaaS d.) SaaS

c

A _________ places all or almost all of the application logic on the server. a.) three-tier architecture approach b.) N-tiered architecture approach c.) "thick client" architecture approach d.) "thin client" architecture approach

d

The DSL modem is an FDM device that splits the physical circuit into three logical circuits. Which of the following is not one of those three logical circuits? a.) phone b.) upstream data c.) downstream data d.) middleware

d

The _______ is the height of a sound wave. a.) frequency b.) phase c.) wave length d.) amplitude

d

The ________ layer groups together the network and transport layers. a.) application b.) software c.) hardware d.) internetwork

d

The required and optional parts of an HTTP request are: a.) request line b.) request header c.) request body d.) all the above

d

What does HTML stand for? a.) High Transfer Multipurpose Limit b.) Hypertext Mail Locator c.) Half Text to Minimize Language d.) Hypertext Markup Language

d

What does MIME stand for? a.) Multipurpose Intranet, and Multipurpose Extranet b.) Maximizing Information for Maximizing Effort c.) Massive Internet Mail Extension d.) Multipurpose Internet Mail Extension

d

Which of the following is not true in terms of Signal Bandwidth? a.) the bandwidth of a circuit determines a circuit's capacity b.) to get more "bandwidth" in a digital transmission, you must increase the range of frequencies available for a transmission c.) bandwidth is constant across any wire, therefore distance is not relevant to its capacity d.) All the above are true

d

Which of the following is the basic type of media? a.) guided b.) wireless (radiated) c.) mass d.) Both A and B

d

___________ is a type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels. a.) Ethernet b.) Pulse Code Modulation c.) Amplitude Division Multiplexer d.) Wavelength Division Multiplexer

d

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a.) 256 b.) 20 c.) 200 d.) 512 e.) 1024

e

Another term for the weakening of a signal over distance is: a.) turnaround time b.) propagation delay c.) dispersion d.) insulation e.) attenuation

e

In three-tier architecture, a separate database server is responsible for the: a.) presentation logic b.) data access logic c.) application logic d.) data storage e.) Both b & d

e

The network layer of the Internet model uses the _____________ protocol to route messages though the network. a.) TCP b.) HTTP c.) FTP d.) SMTP e.) IP

e

Which of the following is not true about Telnet? a.) it requires an application layer program on the clients computer b.) it requires an application layer program on the server or host computer c.) it was designed in the early days of the Internet d.) keystrokes are sent over the network in clear text e.) All above are true

e

Which of the following should you consider when selecting media to be used in a network? a.) Type of Network b.) Cost c.) Transmission distance d.) Security e.) All the Above

e

An N-tiered architecture: a.) is generally more "scalable" than a three-tiered architecture b.) is generally less "scalable" than a three-tiered architecture c.) uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d.) uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e.) puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers

a

Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits. a.) True b.) False

a

The American National Standards Institute: a.) is the coordinating organization for the United States' national system of standards b.) is a professional society in the U.S. whose standards committees focus on local area network standards c.) sets the standards that govern how much of the Internet will operate d.) is an agency that develops federal information processing standards for the federal government e.) makes technical recommendations about global telephone rates

a

The Institute of Electrical Engineers (IEEE) standards body is responsible for the development of __________ standards. a.) Local Area Network (LAN) b.) Wide Area Network (WAN) c.) Metropolitan Area Network (MAN) d.) Any of the Above

a

The ________ is responsible for data format translation. a.) presentation layer (layer 6) b.) application layer (layer 7) c.) transport layer (layer 4) d.) physical layer (layer 1) e.) network layer (layer 3)

a

The ___________ is concerned primarily with the transmission of bits over a communication circuit. It defines the rules by which ones and zeros are transmitted. a.) physical layer (layer 1) b.) network layer (layer 3) c.) transport layer (layer 4) d.) application layer (layer 7) e.) presentation layer (layer 6)

a

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. a.) True b.) False

a

The function of the file server is to : a.) store data and software programs that can be used by client computers on the network. b.) manage all printing requests from clients on the network. c.) transfer e-mail messages to other servers on the network. d.) store HTML documents for an Internet or intranet web site. e.) coordinate the communication of client and servers on the network.

a

The most commonly used e-mail standard is: a.) Simple Mail Transfer Protocol b.) X.400 c.) CMC d.) Post Office Protocol e.) Telnet

a

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a.) Hypertext Transfer Protocol b.) File Transfer Protocol c.) Simple Mail Transfer Protocol d.) Internet Message Access Protocol e.) Hyperlink Transfer Protocol.

a

The specification stage of the de jure standardization process consists of developing nomenclature and identifying the problems to be addressed. a.) True b.) False

a

The three stages of the de jure standardization process are ______________________. a.) specification, identification of choices and acceptance. b.) planning, implementing and acceptance. c.) brainstorming, identification and implementing. d.) specification, formalization, and acceptance. e.) none of the above.

a

Time division multiplexing is more efficient that frequency division multiplexing because the guardbands used in the frequency division multiplexing or not needed. a.) True b.) False

a

To get more "bandwidth" in a digital transmission, you must: a.) increase the range of frequencies available for a transmission b.) increase the loudness per transmission c.) decrease the bits per second transmission speed d.) increase the phase shifts per transmission e.) decrease the baud rate per transmission

a

To interact with the World Wide Web, a client computer needs an application layer software package called a: a.) Web browser b.) Web server c.) Telnet package d.) Uniform Resource Locator package e.) Router package

a

Using the _______________, users access an application via a web browser on their mobile device. a.) browser-based approach b.) application layer c.) server farm d.) Intranet

a

Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. a.) True b.) False

a

When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe. a.) submarine cables b.) satellites c.) telephone lines d.) boats e.) modems

a

Which of the following is not an important future trend in communication and networking? a.) Development of online batch systems b.) Massively online systems c.) The Internet of Things d.) Wireless LAN e.) BYOD

a

With a "thin client" architecture approach, when an application changes, only the server with the application logic needs to be updated. a.) True b.) False

a

_________ is an application program function that deals with storing and retrieving data. a.) data storage b.) data access logic c.) application logic d.) presentation logic e.) application access storage

a

__________ is the orderly close to a dialogue between end users. a.) Session termination b.) Protocol c.) OSI layers d.) The Extranet

a

___________ is an application program that deals with storing and retrieving data. a.) Data storage b.) Application logic c.) Client-server application d.) Data access logic

a

Ethernet is an example of a network layer protocol. a.) True b.) False

b

Guided media refers to the type of media in which the message is broadcast through the air. a.) True b.) False

b

In a multipoint circuit configuration, each computer can use the circuit at the same time. a.) True b.) False

b

In three-tier architecture, an application server is responsible for the: a.) presentation logic b.) application logic c.) data access logic d.) data storage e.) Both c & d

b

It is uncommon for companies to spend more money on network management and security tasks than they do on actual computer equipment itself. a.) True b.) False

b

Multiplexing increases the cost of provisioning network circuits. a.) True b.) False

b

Nonreturn to zero is a type of unipolar signaling. a.) True b.) False

b

One of the most frequently used Telnet applications is a.) WS-FTP b.) PuTTY c.) Outlook d.) Word e.) FTP

b

One underlying problem with a host-based network is that: a.) there are economies of scale because all computer resources are centralized b.) the server can get overloaded since it must process all messages c.) the architecture is relatively simple and works well d.) the server is the one point of control which simplifies security e.) clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

b

The Simple Mail Transfer Protocol is the least commonly used e-mail standard. a.) True b.) False

b

The _______ is a connection of computers and networks built into common, everyday devices. a. BYOD b. Internet of Things c. Web of lies d. Wide Area Network

b

The ________ manages the physical transmission circuit in layer 1 and transforms it into a circuit that is free of transmission errors as far as layers above are concerned. a.) transport layer (layer 4) b.) data link layer (layer 2) c.) presentation layer (layer 6) d.) application layer (layer 7) e.) session layer (layer 5)

b

The ___________ provides a set of utilities for applications and is the end user's access to the network. a.) presentation layer (layer 6) b.) application layer (layer 7) c.) transport layer (layer 4) d.) data link layer (layer 2) e.) network layer (layer 3)

b

The standard protocol for communication between a Web browser and a Web server is the web protocol. a.) True b.) False

b

The two-tier e-mail architecture does not require any application software on the client computer. a.) True b.) False

b

To use the Web, each client computer requires a data link layer software package called a Web browser. a.) True b.) False

b

When a developer creates an application for each type of device that might be used, this is referred to as a.) A browser-based approach b.) A native app c.) Internet Explorer d.) BYOD

b

When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______. a.) 24 b.) 16 c.) 2 d.) 8 e.) 4

b

With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage. a.) True b.) False

b

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a.) client b.) server c.) middleware d.) hardware e.) software

b

With the two-tier client-server architecture, the client is responsible for the ________ logic. a.) session b.) presentation c.) data access d.) data storage e.) networking

b

_________ is the set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand. a.) Clients b.) Protocol c.) Session termination d.) IEEE

b

__________ is an application program function that deals with processing required access data. a.) Data storage b.) Data access logic c.) Client-server application d.) Presentation logic

b

___________ are networks designed to connect similar computers that share data and software with each other. a.) Client-server b.) Peer-to-Peer c.) B2B d.) Backbone

b

_______________ is a group of PCs or terminals located in the same general area and connected by a common cable so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. a.) Backbone network b.) Local Area Network (LANs) c.) IEEE d.) Wide Area Network (WANs)

b

A ________ is a group of computers linked together so that they appear to act as one computer. a.) workstation b.) transaction terminal c.) server farm d.) network computer e.) transaction terminal

c

If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is : a. 890 Hz b. 8900 HZ c. 9100 Hz d. 9Khz e. 890 KHz

c

In ______________, the server stores data or software that can be accessed by the clients from any Web browser. a.) Cloud computing b.) HTTP c.) Client-server computing d.) the Intranet

c

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a.) message transfer agent b.) router agent c.) mail user agent d.) webcast package e.) gateway agent

c

One disadvantage of N-tiered architecture is: a.) it is generally more scalable than a three-tiered architecture b.) cannot provide access to e-mail messages c.) it places a greater load on the network d.) All the Above

c

The __________ is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them. a.) presentation layer (layer 6) b.) session layer (layer 5) c.) transport layer (layer 4) d.) physical layer (layer 1) e.) network layer (layer 3)

c

The acronym, HTML, refers to: a.) Header Markup Language b.) Hypertext Markup Locator c.) Hypertext Markup Language d.) Hypertext Markup Library e.) Hypertext Modulating Language

c

What is the function of a file server? a.) connects other networks in a distance spanning up to several miles b.) routes messages from the source computer to the destination computer c.) stores data and software programs that can be used client computers on the network d.) None of the Above

c

Which is not a function of the physical layer: a.) transmission of bits. b.) defining the rules by which one and zeroes are transmitted. c.) providing error-free transmission of data. d.) providing the physical connection between sender and receiver. e.) specifying the type of connection and type of signals, waves or pulses that pass through it.

c

Which of the following does the application layer NOT correspond to in the OSI model? a.) session layer b.) presentation layer c.) transport layer d.) application layer

c

Which of the following is not true about ITU-T: a.) It is the technical standards-setting organization of the United Nations International Telecommunications Union b.) It is the International Telecommunications Union - Telecommunications Group c.) Its membership is limited to U.S. telephone companies d.) It is based in Geneva, Switzerland e.) Its membership is comprised of representatives from over 200 member countries

c

Which of the following is the primary reason for networking standards? a.) to enable communication between the OSI layers b.) to identify which data can be shared with connected computers c.) to ensure that hardware and software produced by different vendors can work together d.) to store data e.) None of the Above

c

____________ is open to only those inside the organization and ___________ is developed for users outside the organization. a.) WANs; LANs b.) LANs; WANs c.) intranet; extranet d.) extranet; intranet

c

____________ is the algorithms or business logic programmed into the application can be simple or complex depending on the application. a.) Presentation logic b.) Data access logic c.) Application logic d.) Architecture logic

c

_____________ is the way in which the functions of the application layer software are spread among the clients and servers in the networks. a.) Mainframe b.) Server farms c.) Application architecture d.) Data storage

c

A __________ is the input-output hardware device at the end user's end of a communication circuit in a client-server network. a.) network b.) harddrive c.) server d.) client

d

A network administrator has received several reports from users of the network that the intranet website on one of company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. What layer of the Internet model does this problem appear to reside at? a.) physical b.) transport c.) network d.) application e.) data link

d

A(n) ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users outside the organization. a.) intranet b.) Usenet c.) Wide Area Network d.) extranet

d

Data communication standards: a.) ensure that hardware and software produced by different vendors can work together b.) connect computers and networks built into everyday devices c.) emerge several vendors without any interference d.) enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer

d

Data communications and networking can be considered as a global area of study because: a.) new technologies and applications emerge from a variety of countries and spread around the world b.) the technologies enable global communication c.) the political and regulatory issues are exactly the same in every country d.) Both a and b e.) none of the above

d

How is the application logic partitioned between the client and the server in a two-tier client-server architecture? a.) with the two-tier client-server architecture, the server is responsible for the data access logic while the client is responsible for the application and presentation b.) a two-tiered architecture uses only 2 sets of computers c.) the clients have a set of computer and the servers have another set d.) All the Above

d

The ________ groups together the physical and data link layers. a.) application layer b.) presentation layer c.) internetwork layer d.) hardware layer

d

The __________ is responsible for managing and structuring all sessions. a.) application layer (layer 7) b.) physical layer (layer 1) c.) presentation layer (layer 6) d.) session layer (layer 5) e.) data link layer (layer 2)

d

The acronym, Modem, stands for _________________. a.) Multiplexing/demultiplexing b.) More/demote c.) Mode-M technique d.) Modulator/demodulator e.) Mod emulation technique

d

Which of the following is NOT a characteristic of Wide Area Networks (WANs)? a.) connect backbone networks and MANS b.) span hundreds or thousands of miles c.) provide data transmission speeds from 56Kbps to 10 Gbps d.) IEEE is the standards body responsible for the development of WAN standards

d

Which of the following is an example of de jure standard? a.) network layer software b.) data link layer software c.) physical hardware d.) All the Above

d

Which of the following is not a property of a WAN: a.) connects backbone networks and MANS. b.) spans hundreds or thousands of miles. c.) provides data transmission speeds from 56Kbps to 10Gbps. d.) connects a group of computers in a small geographic area such as room, floor, building or campus. e.) uses leased lines from IXCs like ATT, MCI, and Sprint.

d

Which of the following is the transport layer NOT responsible for ensuring? a.) flow control so that the destination station does not receive more packets that I can process at any given time b.) breaking large files received from the application layer c.) that all packets are sent are received by the destination station by dealing with end-to-end issues d.) The transport layer is responsible for all of the following

d

Which of the following statements is correct? a.) Parallel transmission is most often used for sending data on a circuit that is made up of one wire. b.) Parallel transmission is distinguished from serial transmission by the fact that the transmitting device sends a single bit, then a second bit, and so on, until all the bits are transmitted. c.) Parallel transmission is only used for analog data. d.) Serial transmission is slower than parallel transmission. e.) Parallel transmission is the same as serial transmission.

d

Which standards body is responsible for the development of local area network (LAN) standards? a. ANSI b. ISO c. IETF d. IEEE e. ITU-T

d

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a.) private clouds b.) hardware clouds c.) storage services d.) IaaS

d

_____________ is the presentation of information to the user and the acceptance of the user's commands. a.) Application logic b.) Data storage c.) Data access logic d.) Presentation logic

d

______________ is a group of computers that are linked together so they act as one computer. a.) The Intranet b.) The Extranet c.) OSI layers d.) Server farm

d

The __________ is responsible for routing messages from the source computer to the destination computer. It uses the IP protocol to route messages through the network. a.) session layer (layer 5) b.) data link layer (layer 2) c.) physical layer (layer 1) d.) application layer (layer 7) e.) network layer (layer 3)

e

There are optional and required parts of an HTTP request. They are: a.) request address, request body b.) request address, request header, request body c.) request line, request header d.) request line, request body e.) request line, request header, request body

e

______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission). a.) Line-of-sight effect b.) Multimode index c.) Saturation effect d.) Raindrop attenuation e.) Propagation delay

e


Conjuntos de estudio relacionados

FSU PAD 3003 Final Exam Proffesor Bruce Grant

View Set

Chap. 4: Evidence-Based Practice & Ethics

View Set

1=a 2=b 3=c 4=d 5=e 6=f 7=g 8=h 9=i 10=j 11=k 12=l 13=m 14=n 15=o 16=p 17=q 18=r 19=s 20=t 21=u 22=v 23=w 24=x 25=y 26=z

View Set

6. Vitamin D requirements of older adults

View Set

end products of cellular respiration

View Set

PE172 Ch 12 Achieving a Health Weight

View Set

NU245- Chapter 18: Personality Disorders

View Set

psychology of aging midterm questions

View Set

Med-Surg Chapter 30-heme-Good with EXP 160ish Q

View Set

Chapter 4 The Monetary System: What it Is and How it Works

View Set