CIS 350 Test 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the mask in decimal for the following IP address 130.100.50.10?

255.255.0.0

The bandwidth for a data transmission line that can transmit within a frequency range of 100Hz to 3,500 Hz is _____________.

3,400 Hz

The method of connecting loosely coupled computers together with a dedicated communication channel or link that passes messages between machines is called

Clustering

A _____________ occurs when multiple nodes access and send data simultaneously in such a way that their messages become mixed together and garbled.

Collision

In most computer systems, the CPU, memory, and other major components are mounted to wiring on a printed circuit board known as a(n)

Motherboard

It is possible to share a channel among multiple sender-receiver pairs, using one of several ____________ techniques.

Multiplexing

Which type of network has ranges of only thirty feet or less, but is sufficient for an individual to interconnect his personal computing devices?

PAN

It is possible to measure the position of a sine wave with respect to a reference sine wave. The difference, measured in degrees, is known as the ___________ of the sine wave.

Phase

The method of transferring data one word at a time from the CPU to a device is called

Programmed I/O

Fragmentation of a disk occurs when a. files are deleted b. files are moved c. files grow too large for their anticipated storage and must be moved d. all of the above

d

Protecting the content of data communication against changes is known as

integrity

_____________ is the most common medium used for standard telephone and most local area network wiring.

twisted-pair cable

To identify the network application requesting service, the transport protocol identifies the application that created the message and the application that is to receive the message with

port numbers.

There must be a means to synchronize the data so that the receiver knows the boundaries of each byte. Ethernet frames use a(n) ________ for this purpose.

preamble

A technique called ____________ is where an individual computer system is used to simulate multiple computers, all sharing the same CPU and I/O facilities.

Virtualization

In a __________ topology each computer node gets every message, but processes only those addressed to that node. There is no central hub in this topology.

bus

Since data communication is predominantly serial, we usually describe the data as a

byte stream.

A Bluetooth network consists of one master node and to seven slave nodes. When connecting, the master node transmits an initial packet, called a____________, that provides time synchronization for each slave. a) block b) frame c) sequence d) large data packet

c

Keeping the content of data traversing the network and information about the communication taking place private is known as

confidentiality

Files that are accessed _____________ represent the great majority of all files. a) randomly b) as records c) in parallel d) sequentially

d

What is the physical distance over which the wave's shape repeats for a sine wave that is traveling in space at the speed of light?

(speed of light) / (frequency).

The network mask is /16 in the prefix notation. To design subnetworks you borrowed 7 bits from the host part. What would be subnetwork mask in the prefix notation?

/23

The data rate (speed of transmission in bps) of the analog signal of 500 KHz bandwidth, 200 watts of power, and 2 watts of noise is about (you need to perform calculations)

1,002,161 bps

Fiber optic cable is capable of transmitting data at the rate over ___________.

100 Gbps

The IP address subnet mask in the prefix form is /14. What is this mask in the binary form?

11111111.11111100.00000000.000000000

Which of the following is not a function of how interrupts are used?

A way of buffering large amounts of data

What protocol is used to discover the relation between an IP address and a corresponding MAC address?

ARP

Which of the following can be used to characterize a communications channel?

All

Sound is an example of a(n) ____________ signal.

Analog

A signal may take on a continuous range of values, in which case it is known as a(n)

Analog Signal

For modems that transmit data one byte at a time the technique to synchronize the two systems is to provide clear start and stop signals for the data. This technique is known as ______________ transmission.

Asynchronous

Signal loss is the reduction of a signal that occurs in a medium as a function of the physical length of the channel. This is known as

Attenuation

The ______________ of a channel is the range of frequencies that are passed by the channel with only a small amount of attenuation.

Bandwidth

Switched Ethernet does not actually implement the _______________ protocol, because connections are point-to-point and messages can't become mixed together and garbled.

CSMA/CD

The input-output architecture based on separate I/O processors and used on IBM mainframes is known as a(n)

Channel subsystem

Your company has been assigned the following IP address by ICANN: 21.190.50.0. What address class is it?

Class A

An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to the network. What is this approach called?

DHCP

Modern routers, sometimes called ____________, can prioritize and route packets based on the packet class.

DiffServ capable nodes

Modern routers, sometimes called ____________, can prioritize and route packets based on the packet class.

Diffserv capable nodes

___________________ transmission has the advantage that it can incorporate error correction directly into the signal, which means a higher likelihood that the original data can be reproduced exactly, error-free, at the receiving end of the channel.

Digital

A binary discrete signal is usually called a(n)

Digital Signal

A data packet in an Ethernet network is called a(n)

Frame

Hertz, abbreviated Hz, is the unit used to measure

Frequency

Power failures, internal time-sensitive events, or external events that are time sensitive will trigger interrupts that are

High priority events

The primary purpose of channel programs is to transfer data using DMA between

I/O device and memory

Such network tools as ping and traceroute use the query services of ________ to provide the information that they report.

ICMP

The mnemonic for the x86 architecture instruction that simulates an interrupt is

INT

Which of the following is not a reason to create clusters of computers?

Increased security

After interrupting a program in execution, and saving the program's context, the computer then branches to a special program known as the

Interrupt handler program

From the perspective of a computer, the network

Is just another I/o device

The variation in delay from packet to packet is known as _________. It is a particularly important parameter in the transmission of video and audio.

Jitter

Which of the following is a contender for a cellular technology global standard?

LTE (Long Term Evolution)

What makes virtual circuits more efficient in the use of transmission resources than traditional circuit switching?

Links and intermediate nodes are shared with other connections.

Which of the following is a contender for a cellular technology global standard?

Long Term Evolution (LTE)

The ___________ is responsible for the addressing and routing of packets from the source end node through intermediate nodes, step by step, to their proper final destination.

Network Layer

Your company has been assigned the following IP address by ICANN: 130.190.50.10. You need to create a network that consists of 600 subnetworks with each subnetwork having up to 300 hosts. Can the network be designed? (You may have to perform some calculations similar to those presented in the classroom and Homework 6.)

No

Which of the following is NOT a characteristic of a sine wave?

Noise

Interrupts that can never be temporarily disabled by program instructions are called

Nonmaskable

Reading data in all the packets as they pass through the network is known as

Packet Sniffing

Which of the following is not a requirement for a computer system to handle I/O in a sufficient and effective manner?

Peripheral devices must operate only in block mode.

In part, ___________________ focuses on methods to reserve and prioritize channel capacity to favor packets that require special treatment.

QoS

What specific device is used to retransmit digital signals over long distances maintaining the integrity of the data?

Repeaters

What specific device is used to retransmit digital signals over long distances maintaining the integrity of the data?

Repeators

How do routers and gateways differ?

Routers connect similar networks together; gateways interconnect dissimilar networks.

Which of the following is not part of the TCP/IP protocol suite?

SMS

A signal travels from point A to B in a communication channel. The signal power at point A and B are 25 watts and 0.25 watts, respectively. Calculate the signal gain/loss in [decibels - dB] at point B.

The signal loss is 20 dB

Internal interrupts caused by events related to problems or special conditions within the computer itself are sometimes called

Traps or exceptions

Since DNS request packets are simple and small, ______________ are used for packet transport.

UDP datagrams

Which is not an example of an unguided medium?

USB connection from computer to smartphone

A connectionless protocol used instead of TCP for some applications is

User Datagram Protocol (UDP)

What is a common name for one Wireless Ethernet standard?

Wi-Fi

Which Ethernet technology uses radio-based signals to communicate to devices connected on the local area network?

Wi-Fi

An International standard maintained by a non-profit consortium to render 2-D and 3-D objects is known as a.OpenGL. b.DirectX. c.ActiveX. d.OpenSource

a

Displays that use 256 (Red) × 256 (Green) × 256 (Blue) different colors on the screen is sometimes described as a a.true color system b.virtual color system. c.ultra high density system. d.high density color system

a

If the allocation unit size is too small, a) file access is slower. b) there is less overhead to track each allocation unit. c) there is more unused space at the end of most allocation units. d) All of the above

a

One common method for retrieving records randomly from a file uses one field, known as the __________ field, as an index to identify the proper record. a) key b) main c) target d) critical

a

Some systems allow a data file to specify the program it is to be used with. This property is called a(n) a) association. b) attachment. c) relationship. d) membership.

a

To identify the network application requesting service, the transport protocol identifies the application that created the message and the application that is to receive the message with a) port numbers. b) application numbers. c) network node numbers. d) application address numbers

a

To increase security, the critical parts of the operating system will execute in a protected modewhile other programs will execute in ________ mode a) user b) global c) shared d) isolated

a

What type of data file consists of a mixture of alphanumeric ASCII characters and special binary formatting codes that are used in a word processor or spreadsheet? a) Text b) Video c) Database d) Numerical input

a

Which is NOT true about Access Control Lists (ACL)? a) ACLs are not very granular b) Storage space is needed for the ACLP606 c) ACLs are an ideal file protection serviceP605 d) Mechanisms are needed to check the ACL whenever a file is accessed

a

Which of the following is not a common function of an I/O disk controller? a.The I/O disk controller manages main memory during the transfer. b.The I/O disk controller recognizes messages addressed to it and accepts commands from the CPU. c.The I/O disk controller has interrupt capability, which it uses to notify the CPU when the transfer is complete. d.The I/O disk controller provides a buffer where the data from memory can be held until it can be transferred to the disk

a

Which of the following is not true about datagram switching? a) TCP/IP rarely uses datagram switching. b) Each packet is routed from node to node independently. c) A routing decision can be based on shortest path to next node. d) A routing decision can be based on traffic conditions at the time of packet arrival

a

Which of the following topologies is used primarily for local area networks; all nodes are connected point-to-point to a central device that uses switching technology to connect pairs of nodes together? a) star b) bus c) ring d) mesh

a

Each wireless unit is connected by radio to a base station _____________ that is somewhat equivalent to a hub.

access point

Sound is an example of a(n) ____________ signal.

analog

A signal may take on a continuous range of values, in which case it is known as a(n)

analog signal

For modems that transmit data one byte at a time the technique to synchronize the two systems is to provide clear start and stop signals for the data. This technique is known as ______________ transmission.

asynchronous

Using encryption can be helpful in mitigating network security issues except

availability

Using encryption can be helpful in mitigating network security issues except

availability.

Data file whose records are always retrieved in sequence from the beginning of the file are known as a. serial files b. sequential files c. logical files d. random access files

b

In a disk drive where the drive motor turns at constant angular velocity, which is true of the linear velocity? a.inner tracks move the fastest b.outer racks move the fastest c.middle tracks move the fastest d.all tracks move at the same speed

b

In a mirrored array with 4 disks, each of the disks stores exactly the same data. The access time for a multiblock read is reduced by a factor of about ______. a.two b.four c.eight d.sixteen

b

Most user commands to the operating system are actually requests to the ________ manager. a) I/O b) file c) memory d) processor

b

The UNIX system does not attempt to avoid cycles. Instead, it restricts access to the linking capability of the system. Normal users may only create hard links to files, but not to ___________. This prevents normal users from inadvertently creating cycles. a) files in use b) directories c) root folders d) working folders

b

The critical components of the operating system that remain in memory as long as the computer is running are commonly know as the a. hub b. kernel c. core d. root

b

The file system must maintain a directory structure for each device. In most cases, the directory for each device is stored on the device itself. In many computer systems, each file system is called a a. disk. b. volume. c. directory. d. partition.

b

The time it takes for the hard-disk read/write head to move from one track to another is called a) latency. b) seek time. c) flight time d) arrival time

b

The use of noncontiguous space requires that the file system maintain a detailed, ordered list of assigned blocks for each file in the system. One method of maintaining the lists of blocks allocated to each file is to use the block numbers stored as a linked list, using pointers from one block to the next. This method is known as a(n) a) joined blocking. b) linked allocation. c) connected blocking. d) associated allocation.

b

What memory management technique creates the illusion of a memory space that is potentially much larger than the actual amount of physical storage installed in the computer system? a) Virtual ROM b) virtual storage c) artificial RAM d) artificial storage

b

What processor technique provides the means for starting the computer? a) Concurrency b)Initial program loader c)User provided programs d)Programs already stored in RAM

b

When new I/O devices are added, or the device is changed, it is necessary only to replace the a) configuration file. b) I/O driver for that device. c) File Management System. d) shell program responsible for that device.

b

Which of the following is FALSE regarding fiber-optic cabling? a) Attenuation is very low. b) It is vulnerable to most forms of noise. c) A laser or light-emitting diode is used as the light source. d) Each strand is thinner than a human hair and may be tens or hundreds of miles long.

b

Which of the following organizations is responsible for allocating IP addresses to individuals or corporations? a. IETF b. ICANN c. IEEE d. IANA

b

Which operating system function is responsible for providing a consistent view of files across different I/O devices? a) Memory management b) The file management system c) The input/output control system d) Network management, communication support, and communication interfaces

b

The ______________ of a channel is the range of frequencies that are passed by the channel with only a small amount of attenuation.

bandwidth

A____ consists of binary data, where the bytes of data in the file represent the sequence of instructions that make up a program. The file is loaded sequentially into succeeding locations in memory for execution. a)Data file b)ASCII file c)Program file d)Directory file

c

All components comprising a computer system except for the ________ , are considered peripherals. a.CPU b.CPU and Memory c.CPU, Memory, and Power Source d.CPU, Memory, Disk Drives, and Power Source

c

Application program interface services allow a program to access network services. Some network operating systems also provide access to services on remote machines that might not be available locally. These services are called a. server-client calls (SCCs). b. object procedure calls (OPCs). c. remote procedure calls (RPCs). d. network method calls (NMCs).

c

In a(n) _____ hub, all of the connections at the hub are simply tied together inside thehub and the hub performsno operationor modification of the signals as they arrive at the hub. a) active b) layer 3 c) passive d) intelligent

c

In a(n) ___________ hub, all of the connections at the hub are simply tied together inside the hub and the hub performs no operation or modification of the signals as they arrive at the hub. a) active b) layer 3 c) passive d) intelligent

c

Many systems provide a means for dividing physical devices, particularly disks, into independent sections called a) disks b) RAIDs. c) partitions d) Storage Pools.

c

Modern computer systems enable users to work with more than one program at the same time as a way of improving their efficiency. This technique is known as a. multi-procedures b. multi-methods c. Multitasking d. multiprocessing

c

On a modern hard disk, what is the typical size of a block of data? a) 64 bytes b) 128 bytes c) 512 bytes d) 1024 bytes

c

Operation of a metropolitan area network (MAN) generally requires a) access servers. b) peering agreements c) right of way access. d) fiber optic transmission

c

The _______________ is the smallest unit that the file management system can store or retrieve in a single read or write operation. a) sector b) chunk c) cluster d) byte

c

What type of data file consists of information about other files? a) Video b) Database c) Directory d) Source code

c

Which of the following topologies consists of point-to-point connections from each node on the network to the next node; the last node on the network is connected back to the first and there is no central hub? a) star b) bus c) ring d) mesh

c

Which operating system function manages system configuration and setting group configuration policies? a) Scheduling and dispatching b) Secondary storage management c) Support for system administration d) System protection management and security

c

_________ access is fast, since no seek time is required to find each succeeding record assuming that the file is stored contiguously. a) Random b) Parallel c) Sequential d) Record-based

c

An AM radio station that broadcasts at 1100 KHz means the ___________ frequency is 1100 KHz.

carrier

A ____________ occurs when two different records calculate to the same hash number (logical record number). a) crash b) impact c) conflict d) collision

d

An operating system can be organized in a layered, hierarchical structure, where the inner most layers a. host the kernel b. hold the microkernel c. are visible to the user d. interact with the hardware

d

Each wireless unit is connected by radio to a base station _____________ that is somewhat equivalent to a hub. a) media site b) access site c) media point d) access point

d

In contrast to ACLs, a file system can define three groups: an owner, a group associated with the file, and a universe that consists of everyone else. These groups are then assigned read, write, and __________ privileges. a) open b) share c) print d) execute

d

Some applications require that records be retrievable from anywhere in the file in an arbitrary sequence. These files are known as ___________. a) serial files b) logical files c) sequential files d) random access files

d

Storage not immediately available to the CPU is referred to as a.cloud storage. b.off-line storage. c.network storage. d.secondary storage

d

The __________________ is part of the filename and is used to identify the file type. a) file prefix b) file location c) file argument d) file extension

d

The _______view of the file is the way in which the data is actually stored on a disk. a) real view b) image view c) logical view d) physical view

d

The first line of defense against file system failure is a well-defined set of proper system ________________________ procedures. a) backup b) network storage c) file maintenance d) backup and file maintenance

d

The technique used for storage and retrieval in an LTO formatted data cartridge is called a) data torrent. b) LTO tasking. c) data continuity. d) data streaming

d

Typing command DIR PROG?.TXT in a Windows directory will return which files? a) PROG.DAT b) PROG1.TXT c) PROG3.TXT d) All of the above

d

What type of data file consists of alphanumeric text that will serve as the input to a compiler? a) Video b) Database c) Directory d) Source code

d

Which display technology consists of a thin display panel that contains red, green, and blue LEDs for each pixel with transistors for each LED that generate electrical current to light the LED? a.CRT b.LCD c.FED d.OLED

d

Which of the following are functions that are performed by a program rather than by a user? a) Open a file and create a file pointer b) Read a number of bytes from a file c) Move the file pointer a number of bytes a distance forward or backward d) All of the above

d

Which of the following is a basic service that the operating system provides? a) Manages, loads, and executes programs b) Accepts and processes commands from user c) Manages the hardware resources of the computer d) All of the above

d

Which of the following is an example of a file operation that manipulates the file directory, rather than the file itself? a) Delete a file b) Rename a file c) Append one file to another d) All of the above

d

Which of the following is the responsibility of the system administrator? a) Recovering lost data b) Adding and deleting users c) Managing, maintaining, and upgrading networks d) All the above

d

Which of the following is true about black-box testing? a. The testing is performed by dedicated testers b. The test cases are based on the code c. The test cases are based on the output d.The test cases are based on the input

d

Which of the following use computer-based operating systems? a)Mobile phone b)Business system c)E-reader and notebooks d)All of the above

d

Which operating system function is responsible for providing the communication software necessary to implement the features and facilities of Wi-Fi, wired Ethernet, and TCP/IP? a. Memory management b. The file management system c. The input/output control system d. Network management, communication support, and communication interfaces

d

Which type of network is used to interconnect local area networks? The primary motivation for this type of network is to improve overall performance of a larger network by creating separate local area networks for groups of users who communicate primary with each other. a. link networks b. extended networks c. connected networks d. backbone networks

d

Which type of topology describes the actual layout of the wiring for the network? a) virtual b) logical c) tangible d) physical

d

Both wired and wireless analog signals are particularly susceptible to noise and attenuation and other forms of distortion in a channel because the distortion created cannot be

detected and reversed.

An access router that is located between the public Internet and the internal LAN is called (a)n

edge router.

Remember that the IP datagram may pass through different types of links. For certain types of physical layer connections, it is necessary to further divide the IP datagrams into smaller packets before they are delivered as frames to the data link layer. What are these smaller packets called?

fragments

Analog cable TV carries dozens of channels over a single cable using

frequency division multiplexing

Channels that carry signals simultaneously in both directions are called

full-duplex channels.

The most familiar, and often most practical and useful, way to categorize networks is by their

geographical range of service.

Transmission media that confine the signal physically to a cable of some kind are called

guided media.

In cellular technology, the movement of the users from cell to cell is called a

handoff

TCP establishes a connection at the request of a network application. To initiate a connection, TCP sends a control packet to TCP at the Web site, requesting a connection; this results in a brief back-and-forth series of requests and acknowledgments known as

handshaking

The USB protocol allows packets to be scheduled for delivery at regular time intervals. This technique is known as

isochronous data transfer

The PCI-Express is made up of a bundle of thirty-two serial, bidirectional point-to-point buses. Each bidirectional bus is called a(n)

lane

The typical communication channel is actually divided into segments; connections along the segments are called

links

Which type of topology defines the operational relationship between the various network components?

logical

SATA stands for Serial Advanced Technology Attachment; it replaces an older standard, IDE (Integrated Drive Electronics), and is used primarily as an interface for

magnetic and optical disk storage devices

In a wireless network where the access points are connected by radio, the mesh points operate at the ___________ and are essentially invisible to the upper layers of the network.

media access control layer

The data link layer is divided into _____________ and ____________ sublayers.

medium access control; logical link control

The amount of time that it takes for a packet to get from one end of the network to the other is called the

network propagation delay.

The most recent versions of Wi-Fi use a modulation technique called

orthogonal frequency division multiplexing (OFDM).

A _________is equivalent to an envelope containing pages of data.

packet

The TCP/IP and OSI models are conceived and implemented as a hierarchical __________, in which each layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node.

protocol stack

Which of the following topologies consists of point-to-point connections from each node on the network to the next node; the last node on the network is connected back to the first and there is no central hub?

ring

The dialogue between two cooperating applications or processes at the ends of the communication link on the OSI model is known as a

session

Channels that carry messages in only one direction are known as

simplex channels.

The circuitry that connects the CPU to memory and to all the various modules that control I/O devices is called the

system bus

Symmetric key cryptography requires

the same key be used for both encryption and decryption.

When the device generating the interrupt request identifies its address as part of the interrupt, it is called

vectored interrupt

Optical multiplexing is known as

wavelength division multiplexing (WDM).


Kaugnay na mga set ng pag-aaral

VATI Maternal Newborn Health Promotion and Maintenance Quiz

View Set

AP Gov Unit 2 Progress Check: MCQ Part A

View Set

Sadlier-Oxford Vocabulary Level G Units 4-6 synonyms

View Set

FP515 Retirement Savings and Income Planning

View Set

TEST #1- Ch. 12,13,14 (Business Communication/ UCA Carson Fall 2019)

View Set

APUSH Unit 5 College Board Review Questions

View Set

RPRACTICES16: Taxes, Tax Year, Prop 13, Capitol Gains, Determining a Profit or Loss, Depreciation

View Set