Network and Internet Technology

¡Supera tus tareas y exámenes ahora con Quizwiz!

Business managers are concerned with whether a network has the required availability to handle traffic with acceptable reliability at an affordable cost. True/False

False

Changing IPv4 to IPv6 is easy as it only requires a change to one part of the Internet. True/False

False

An organization usually buys an expensive router that connects all networks and can then upgrade it when the capacity is exceeded. True/False?

False

As opposed to LANs, WANs (wide area networks) cover a smaller geographic area. True/False

False

In an IPv6 address, the interface address/suffix is always constant and of length 64bits. True/False?

True

A pair of protocols in adjacent layers pass a pointer to the packet rather than create a new copy. True/False

True

In terms of the client-server model, a browser is a client that extracts a server name from a URL and contacts the server. True/False

True

In the client-server paradigm, the server software waits passively for contact, while the client software actively initiates contact. True/False

True

In the thin client model, the server handles more of the work relative to the thick client model. True/False

True

Industry experts estimate that approximately 15 petabytes (15,000 gigabytes) of new electronic data are created every day, much of this the result of huge growth in video, image, audio, and social media data. True/False

True

The central feature of a client/server architecture is the allocation of application-level tasks between clients and: - applications - facilities - servers

servers

Business rationale for adoption of cloud computing includes: - improved business process execution - pay-as-you-grow computing - increased agility and flexibility - reduced travel expenses - reduced on-premises network expenses

pay-as-you-grow computing, increased agility and flexibility, and reduced on-premises network expenses

Before sending a request to the server, an FTP client allocates a protocol:

port

An application-layer protocol created by a company for proprietary software is known as a:

private service

The term ____ refers to a specification for network communications.

protocol

Within a LAN, business managers make choices about: - the combination of wired and wireless - transmission rates - proprietary architectures

the combination of wired and wireless, transmission rates

An application-layer protocol that is intended to be used across the Internet and implemented by many programmers and companies is known as a public service. True/False

False

The World Wide Web is:

One of many services in use on the Internet

Standards are a very important part of the data communications landscape. Several of the most important standard-setting organizations are: (choose the appropriate answer from below) - NIST (National Institute of Standards and Technology) - IEEE (Institute of Electrical and Electronics Engineers) - ISOC (Internet Society) - FCC (Federal Communications Commission) - ISO (International Organization for Standardization) - ITU-T (International Telecommunications Union)

*NIST* (National Institute of Standards and Technology), *IEEE* (Institute of Electrical and Electronics Engineers), *ISOC* (Internet Society), *ISO* (International Organization for Standardization), *ITU-T* (International Telecommunications Union) ISO ITU-T NIST IEEE ISOC

What is the minimum number of routers that can be used to connect 4 networks? A. 2 B. 4 C. 1 D. 3

1

In an standard Class C IPv4 address, a prefix of 24 bits (of 32) is used to create a subnet of 256 possible addresses. Since the first and the last are reserved for the network and broadcast addresses, respectively, there are two less possible hosts on the network or 254. If 26 bits are used for the prefix, there are 62 possible hosts. How many hosts are possible if 28 bits are used in a prefix? A. 22 B. 20 C. 14

14

Your computer has been configured in the following way: 172.16.128.67 mask 255.255.255.192 How would you represent the network you are on in CIDR notation?

172.16.128.64/26

What approximate data rate would be required, without compression, to send a resolution of 360x250 pixels with an 8-bit grayscale color palette?

25 Mbs

Which of the following is an IPv6 address in proper notation? A. 2607:f8b0:4004:806::1013 B. ABCD::4 C. FE80:0:0:0:02AA:00FF:FE9A:4CA2 D. FE80::2AA:FF:FE9A:4CA2

2607:f8b0:4004:806::1013 ABCD::4 FE80:0:0:0:02AA:00FF:FE9A:4CA2 FE80::2AA:FF:FE9A:4CA2

How many primary classes did the original classful IP addressing scheme divide IPv4 into?A. 5 B. 3 C. 6 D. 4

3

The TCP/IP protocol suite that is widely used today corresponds to a model that contains how many layers?

5

How many different IP addresses (although usable is quite less) can IPv4 theoretically accommodate?

4294967296

A server can be defined as:

A program that waits passively for communication, A computer dedicated to running one or more server programs, a computer that has fast CPU, large memory, and powerful operating system

The Advanced Research Projects Agency (ARPA), an agency of the US. Department of Defense, gathered researchers and contractors together to produce a working data network, utilizing packet switching, and was known as:

ARPANET

What character set in use today is the most common format for English-language text files? - UTF-8 (Universal Character Set Transformation Format 8) - Unicode - International Reference Alphabet (IRA) - ASCII

ASCII

Which of the following incompatibilities prevent two networks from simply being directly connected (bridged)? A. Addresses (Layer 3) B. Frames (Layer 2) C. Operating Systems/Applications (Layer 5) D. Network Hardware (Layer 1)

Addresses (Layer 3) Frames (Layer 2) Network Hardware (Layer 1)

Business information can be transmitted in: - Analog form - Digital form - Both

Both, analog form and digital form

Desktop systems in the workplace are typically interconnected to: - server room - data center - storage technologies - servers - data communication equipment - communication closets

Data center server server rooms communication closets storage technologies data communication equipment

Which of the following could be a host? - Dell Optiplex 9020 MiniTower - Titan Supercomputer in Oak Ridge National Laboratory - Sonos PLAY:5 Speakers - Jawbone Era Bluetooth Headset - Apple iPhone 6 Plus - GE Profile™ Series 30" Built-In Double Convection Wall Oven with Brillion Technology - Acer B276HUL Hi-resolution 2560x1440 IPS monitor - CM Storm Mizer (8200 DPI WIRED Laser Mouse) - Samsung UHD 4K HU8550 Series Smart TV

Dell Optiplex 9020 MiniTower - Titan Supercomputer in Oak Ridge National Laboratory - Sonos PLAY:5 Speakers - Jawbone Era Bluetooth Headset - Apple iPhone 6 Plus - GE Profile™ Series 30" Built-In Double Convection Wall Oven with Brillion Technology - Samsung UHD 4K HU8550 Series Smart TV

192.168.0.255

Directed Broadcast Address

Convergence refers to the merger of previously unified telephony and information technologies and markets. True/False

False

Data transfer refers to interaction between two servers. True/False

False

Growth in capacity and a drop in cost has led to data transmission consuming a smaller chunk of the communications budget for most businesses. True/False

False

In terms of the networking implications of video information, real-time video traffic without compression requires minimal bandwidth to ensure an adequate user experience. True/False

False

Internet protocol software shows the detailed information of the physical network connection such as the IP address, MAC address, DNS server, default router, and the route a packet takes. True/False?

False

No computer can run a web server unless the computer's domain name starts with www. True/False

False

On a single network, two computers can have the same IP address. True/False?

False

One of the primary reasons for the success of TCP/IP standards lies in tolerance of homogeneity. True/False

False

Protocol implementations follow the layering model by passing the input from a protocol in one layer to the output of a protocol in the next layer. True/False

False

The dominant LAN architecture is ring. True/False

False

The network services and facilities that users interact with are provided by each individual user. True/False

False

The three-layer model of enterprise communications is comprised of applications, enterprise services, and supply chain. True/False

False

When a request arrives at a server, software on the server uses the IP address to determine which application on the server computer should handle the request. False/True

False

In the real world, a p2p system enables extremely large traffic to one computer because N can be extremely small. True/False

False, In a real p2p system, the traffic into one computer can be extremely small because N can be extremely large (tens of thousands).

If a peer-to-peer architecture is implemented in server code, data is distributed first come-first served among a set of N servers. True/False

False, data is distributed equally among a set of N servers,

What entity created the Open Systems Interconnection (OSI) seven-layer model? - TCP/IP (Transport Control Protocol/Internet Protocol) - ITU (International Telecommunications Union) - ISO (International Organization for Standardization)

ISO (International Organization for Standardization)

Internet Corporation for assigned Names and Numbers (ICANN) is the ultimate authority for all prefixes ensuring their individuality assignment and to adjudicate disputes. however it is the registrars that assigns prefixes directly through large blocks assigned to major: A. ISPs B. Corporations C. Governments

ISPs

Traditional business applications of audio services are:

Interactive voice response systems, telemarketing, audio conferencing, voicemail

How does a client identify a server on the Internet? *Computer*

Internet Protocol add

In 1980, the Internet was a research project that involved:

Less than 100 sites

255.255.255.255

Limited Broadcast Address

Audio services may be provided to a business by:

Long-distance carriers, cellular networks, local telephone companies, and competitive local exchange services (CLECs)

127.0.0.1

Loopback Address

192.168.0.0

Network Address

Match the Layer with its description in the TCP/IP Model Layer 1 Layer 2 Layer 3 Layer 4 Layer 5

Physical Network IP Transport Application

Typical components of UC architecture include: - audio conferencing - videoconferencing - presence - web conferencing - instant messaging - unified messaging

Presence Web Conferencing Video Conferencing Unified Messaging Instant Messaging Audio Conferencing

How does a client identify a server on the Internet? *Service*

Protocol port number

A relational database server uses ____ to split application logic between client and server.

Structured Query Language

What are the three parts of an IPv6 address?

Subnet, Interface, Global Prefix

The primary example of communications software that enables clients and servers to interoperate is:

TCP/IP

Which of the following statements describe a connection-oriented interaction? - Each message limited to 64 KBytes - The pair uses the connection to exchange data - A pair of applications requests a connection

The pair uses the connection to exchange data A pair of applications requests a connection

0.0.0.0

This computer

A client can access multiple services but typically contacts only one remote server at a time. True/False

True

A common type of network is the LAN (local area network). True/False

True

A communications system that supplies universal service allows arbitrary pairs of computers to communicate. True/False?

True

A digital system uses a sequence of discrete values to represent information. True/False

True

A private branch exchange (PBX) is an on-premise telephone switch that interconnects telephones at that location that provides outside access to the public telephone system. True/False

True

A programmer defines an application layer protocol when two applications need to communicate over a network. True/False

True

A router does not use conventional application software but does need TCP/IP protocol software. True/False

True

A router must have multiple IP addresses. True/False

True

An IP address is a unique binary number assigned to a host and used for all communication with the host. True/False

True

An email program using SMTP requests an mail exchange record from the DNS database. An IP address is returned in response. True/False

True

As a result of the adoption of standards, equipment from multiple vendors can be used in a single network. True/False

True

Audio, data, image and video are basic information sources that are useful categories for the analysis and design of enterprise networks. True/False

True

Because the Internet tolerates heterogeneity, engineers can experiment with new networking technologies without disrupting existing networks. True/False

True

Client server architecture provides specialized services such as database functions, file storage, printing, and other shared services. True/False

True

Compared to the early years of data communications when the key focus was functionality and performance, today the key focus for businesses is management. True/False

True

Concurrent server code is divided into two pieces, a thread and a handler. True/False

True

Data representation deals with the syntax of data exchanged between computers. True/False

True

Early communications networks such as the telegraph and telephone systems use circuits to send information. True/False

True

FTP handles both uploading and downloading of any type of data. True/False

True

Fiber-optic and wireless transmission are driving the evolution of data communications. True/False

True

IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. True/False?

True

The MIME standard encodes non-text attachments as printable characters. True/False

True

Lack of consistency in the networking field has produced a challenge - instead of uniform terminology, multiple groups each attempt to create their own terminology, resulting in jargon that contains terms that are abbreviated, misused, or associated with products. True/false

True

Networking technology facilitates the flow of information that is needed to coordinate business activities. True/False

True

No single networking technology is best for all needs. True/False

True

One of the main features of the Domain Name System is autonomy which allows each organization to run its own DNS servers. True/False

True

Packet switching is the basis for the modern Internet. True/False

True

Part of a browser's architecture is a controller that utilizes clients to retrieve information from various services. True/False

True

Services are provided by application programs that run on computers attached to the internet. True/False

True

Since the 1970s, computer communication has changed from an esoteric research topic to an essential part of everyone's lives. True/False

True

The Internet provides a general purpose communication mechanism on which all services are built. True/False

True

The amount of work done on a client vs. a server varies across server software. In the thick client model, application processing is offloaded from the server, reducing the likelihood of bottlenecks. True/False

True

The basic building block of any network is the transmission line (or facility). True/False

True

The design and infrastructure of future enterprise networks will be shaped by cloud computing. True/False

True

The primary motivation for early computer networks was resource sharing due to computers being large and expensive. True/False

True

The volume of communications traffic being transported over business networks is increasing. True/False

True

Today, the Internet has grown into a production communication system that reaches all populated countries in the world. True/False

True

Using multiple routers improves reliability and avoids a single point of failure by sending traffic along an alternate path if a link fails. True/False

True

Web browsers have replaced email interface applications as the primary means of accessing email. True/False

True

Examples of representation standards include:

URL and HTML

Examples of image-based applications used by businesses include:

Web publishing Electronic publishing Digital photographs Medical publishing

In the 1970s, the Internet was:

a concept, a set of standards, proposed by Vinton Cerf and Robert Kahn, a revolution in computer networking

HTML can be defined as:

a markup language, a representation standard, declarative

What handles initiating contact with and accepting contact from a remote computer?

application programs

What is one difference between the POP3 and IMAP standards?

authentication

In a three-tier client/server architecture, the following types of machines are found:

backend server, middle-tier/gateway server, client/user machine

The number of computers, terminals, and mobile devices used around the world is in the: - hundreds - millions - billions - thousands

billions

If only 1 server provides a given service, the network connection that connects the server to the Internet can become a:

bottleneck

A browser can significantly reduce download time by saving images in a:

cache

A server can act as a ____

client

Recent trends in computer networks and the Internet include:

cloud computing, traditional communication systems adopting Internet technology, social networking applications, sensor networks

Servers can handle multiple clients at the same time because they are: - concurrent - co-located - fast

concurrent

There are several key distinctions between LANs and WANs: - ownership of communication equipment - packet switching - geographic scope - data rates

data rates ownership of communication equipment geographic scope

Network technologies are created to meet various requirements for: - internetworking - economic cost - speed - distance

economic cost, speed, distance

As data passes down through the protocol layers on the sending computer, postage is added. true/false

false

As the Internet experienced exponential growth over the past 25 years, it changed in the following ways: - increased demand for shared resources - focus on new applications - increase in communication speeds

focus on new applications and increase in communication speeds

As companies increasingly rely on networks, the need for security: - increases - decreases

increases

Protocols in a suite are furthermore collected into a unified whole known as a

layering model

In the original architecture of Internet email service, what component acted as both a client and server?

mail transfer application

Data communications is the study of using physical phenomena to transfer information across a physical communication ________.

medium

Data that contains a combination of text, graphics, audio, and video is referred to as

multimedia

A computer can operate

multiple clients and multiples copies of a single application

A computer can run

multiple server programs

Consolidating multiple server programs on a single computer can

reduce cost without significantly reducing performance

The name resolution process involves a resolver that forms a DNS request and waits for a:

reply message

What is/are the basic component(s) used for interconnecting heterogeneous networks?

router

DNS servers use the following mechanisms for caching:

spatial locality temporal locality

Multiple protocols designed to work together in a complete, cooperative set are called

suite

These forces have consistently driven the architecture and evolution of data communications and networking: - technological advancements - new services - traffic growth - voice - database access

technological advancements, new services, traffic growth

What on a concurrent server interacts with a single client? - handler code - thread of control - handler - main program (thread) - main thread

thread of control

A key benefit of IP network convergence is: (select all that apply) - transformation - effectiveness - reduce cycle time - cost savings

transformation, effectiveness, and cost savings

The term for information that can be represented by a finite alphabet of symbols, such as the numbers 0 through 9 or the symbols represented on a computer keyboard, is data. true/false

true

A page of text contains about 10,000 bits of 8-bit character data. The bit image of a 640x480 pixel screen in 256 color mode requires over:

two million bits

Which of the following accurately describe the Simple Mail Transfer Protocol?

uses textual control messages sends one copy of a message uses stream paradigm

The four major types of information carried over business networks are:

voice, video, image, data

Match each part of the domain name below: xxx.yyy.zzz

xxx ind computer yyy group or org zzz top level domain

Match the term to its place in a Uniform Resource Locator. vvv://www:xxx/yyy/zzz

yyy document www computer vvv protocol xxx port zzzz parameters


Conjuntos de estudio relacionados

Analyze an Implementation Plan Instruction/Assignment

View Set

Personal Protective Equipment Career Exploration opportunities

View Set

LAS MENINAS - UNA PINTURA ENIGMÁTICA

View Set

Characteristics of financial goals

View Set