Networking midterm
The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about: a. 75% b. 0% c. exactly 100% d. 50% e. > 99%
> 99%
Multimode fiber is capable of longer transmission distances than single mode fiber. (T/F)
False
Nonreturn to zero is a type of unipolar signaling (T/F)
False
Propagation delay is negligible with satellite transmission. (T/F)
False
The Simple Mail Transfer Protocol is the least commonly used e-mail standard. (T/F)
False
The application architecture called the distributed computing model uses the "thick" client approach. (T/F)
False
Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwork layer Application layer
Hardware layer
The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language
Hypertext Markup Language
The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it. (T/F)
False
The earliest data communications networks were client-server networks. (T/F)
False
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. (T/F)
False
With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer. (T/F)
False
The _________ layer is responsible for routing of messages from the sender to the final destination. data communication layer resident layer application layer network layer physical layer
network layer
The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire
twisted pair
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above
web server
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. broadcasting b. instant messaging c. webcasting d. H.323 e. Net Meeting.
webcasting
The most commonly used e-mail standard is: a. Simple Mail Transfer Protocol b. X.400 c. CMC d. Post Office Protocol e. Telnet
Simple Mail Transfer Protocol
__________ ensure that hardware and software produced by different vendors work together. Delimiters Standards ASPs RBOCs Intranets
Standards
Which of the following is not true about Telnet? a. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b. Telnet poses no security threat. c. Telnet was designed in the early days of the Internet. d. Keystrokes are sent over the network in clear text. e. One program that conforms to the Telnet standard is PuTTY.
Telnet poses no security threat.
The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data. (T/F)
True
Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture. (T/F)
True
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library
Uniform Resource Locator
The standards H.320, H.323, and MPEG-2 are commonly used with Telnet Videoconferencing Email IM Microsoft Office
Videoconferencing
To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package
Web browser
A walkie-talkie is an example of half-duplex transmission. (T/F)
True
Frequency is the number of cycles per second and is expressed in Hertz. (T/F)
True
In a client-server network, the presentation logic is the responsibility of the client computer. (T/F)
True
In full-duplex transmission, two stations can send and receive simultaneously. (T/F)
True
Of all the media available, fiber optic provides the highest transmission speeds. (T/F)
True
Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. (T/F)
True
The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. (T/F)
True
The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. (T/F)
True
A local area network is: a large central network that connects other networks in a distance spanning exactly 5 miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to 1000s of miles). a network spanning exactly 10 miles with common carrier circuits.
a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.
______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
application logic
Another term for the weakening of a signal over distance is: a. turnaround time b. propagation delay c. dispersion d. insulation e. attenuation
attenuation
A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. WAN BN extranet intranet MAN
intranet
An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
is generally more "scalable" than a three-tiered architecture
In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer
middleware
One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered
n-tier
A "thin client" approach places most of the application logic on the client. (T/F)
False
A codec converts an incoming digital signal to an analog signal for transmission over an analog network. (T/F)
False
An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization. (T/F)
False
As the demand for more and more network applications grow; host-based computing becomes the best solution. (T/F)
False
Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable. (T/F)
False
Digital transmission produces more errors than analog transmission. (T/F)
False
Fiber optic cable can only be used on LANs. (T/F)
False
Frequency modulation refers to the changing of the height of the sound wave. (T/F)
False
Guided media refers to the type of media in which the message is broadcast through the air. (T/F)
False
Host-based and client-based networks are similar in that the client computer performs most of the work. (T/F)
False
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a. 256 b. 20 c. 200 d. 512 e. 1024
1024
____________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control
Amplitude shift keying
____________ is not an important middleware standard. a. CORBA (Common Object Request Broker Architecture b. Distributed Computed Environment (DCE) c. Asynchronous Transfer Mode (ATM) d. Open Database Connectivity (ODBC) e. none of the above is an appropriate answer Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
BYOD stands for Bring Your Own Device Bring Your Own Database Build Your Own Device Build Your Own Database
Bring Your Own Device
Which of the following would be a standard or protocol used at the Data Link layer of the Internet or OSI model? IP TCP Ethernet HTTP FTP
Ethernet
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. Hypertext Transfer Protocol b. File Transfer Protocol c. Simple Mail Transfer Protocol d. Internet Message Access Protocol e. Hyperlink Transfer Protocol.
Hypertext Transfer Protocol
The network layer of the Internet model uses the _____________ protocol to route messages though the network. TCP HTTP FTP SMTP IP
IP
With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a. private clouds b. hardware clouds c. storage services d. IaaS
IaaS
The software that runs on the mail server is referred to as the ____________ a. Mail transfer agent b. Mail user agent c. Microsoft Outlook d. Web server e. SMTP
Mail transfer agent
Which of the following is not an example of a mail user agent software package? a. Outlook Express b. Microsoft Word c. Eudora d. Microsoft Outlook e. All of these are mail user agent packages
Microsoft Word
A backbone network is: a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to 1000s of miles). a network spanning exactly 200 miles with common carrier circuits.
a high speed central network that connects other networks in a distance spanning up to several miles.
With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic
all data on the server must travel to the client for processing
Microwave transmission: a. is a type of high frequency radio communication b. requires a clear line-of-sight path c. is typically used for long distance data transmission d. does not require the laying of any cable e. all of the above
all of the above
Which of the following is true about ISO: It makes technical recommendations about data communications interfaces Its name stands for International Organization for Standardization It is based in Geneva, Switzerland It is one of the most important standards-making bodies All of the above
all of the above
The height of a sound wave is called its: a. frequency b. phase c. amplitude d. bandwidth e. furlong
amplitude
Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
application access storage
A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture
application architecture
Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal
bipolar
Which of the following is not true about a server? stores data and software that can be accessed by the client. may be a personal computer or a mainframe on the network. in client/server computing they work together over the network with client computers to support the business application. can only perform one function on a network. stores documents and graphics that can be accessed from any Web browser.
can only perform one function on a network.
Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures
can use middleware to provide a standard way of communicating between software from more than one vendor
Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator
codec
What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a. hashing b. encryption c. authentication d. identification e. compression
compression
Which of the following is not a property of a WAN: connects backbone networks and MANS. spans hundreds or thousands of miles provides data transmission speeds from 56Kbps to 10Gbps. connects a group of computers in a small geographic area such as room, floor, building or campus. uses leased lines from IXCs like ATT, MCI, and Sprint.
connects a group of computers in a small geographic area such as room, floor, building or campus.
With the two-tier client-server architecture, the server is responsible for the ________ logic. a. application b. presentation c. data access d. session e. physical
data access
In general, networks designed to transmit primarily computer data are likely to be ________. a. international b. level 1 c. numeric d. analog e. digital
digital
Two fundamentally different types of data are: a. DSL and ADSL b. asymmetric and symmetric c. Microsoft and IBM d. digital and analog e. local area and wide area
digital and analog
Another term for a mail user agent is: a. message transfer agent b. router agent c. e-mail client d. Webcast package e. Web client
e-mail client
The primary reason for networking standards is to: simplify cost accounting for networks ensure that hardware and software produced by different vendors can work together make it more difficult to develop hardware and software that link different networks ensure that all network components of a particular network can be provided by only one vendor lock customers into buying network components from one vendor
ensure that hardware and software produced by different vendors can work together
Which of the following is the most secure wired media? a. coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared
fiber optic cable
Which of the following media has the lowest error rates and the highest transmission speeds? a. Coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared
fiber optic cable
The two basic types of media are: a. statistical and frequency b. guided and wireless (radiated) c. local and wide area d. attenuator and Gaussian e. duplexed and non-duplexed
guided and wireless (radiated)
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent
mail user agent
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a. workstation b. transaction terminal c. cluster d. mainframe e. personal computer
mainframe
Networks that are designed to connect similar computers that share data and software with each other are called: client/server networks peer-to-peer networks host networks client networks local area networks
peer-to-peer networks
IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the client
A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the server
In the three tier architecture, the software on the client computer is responsible for the ____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage
presentation logic
The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private b. public c. community d. hybrid
private
Which is not a function of the physical layer: transmission of bits. defining the rules by which one and zeroes are transmitted. providing error-free transmission of data. providing the physical connection between sender and receiver. specifying the type of connection and type of signals, waves or pulses that pass through it.
providing error-free transmission of data.
There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body
request line, request header, request body
When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex
serial
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software
server
A ________ is a group of computers linked together so that they appear to act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal
server farm
In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model. data link and network session, presentation and application application layer application and presentation network, transport and presentation
session, presentation and application
The three stages of the de jure standardization process are ______________________. specification, identification of choices and acceptance. planning, implementing and acceptance. brainstorming, identification and implementing. specification, formalization, and acceptance. none of the above.
specification, identification of choices and acceptance.
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it: a. does not share a communication circuit b. splits the communication circuit vertically (with time slots) instead of horizontally c. increases the wavelength and phase angles of the baseband frequency used for transmission d. moves the baseband of a circuit by shifting it to a higher frequency e. reduces baseband signal velocity more than frequency division multiplexing
splits the communication circuit vertically (with time slots) instead of horizontally
How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server
the presentation logic is on the client, while the data storage and data access logic are on the server
A response status code of 404 means: a. the requested page was not found b. the server is currently unavailable c. the sever is currently busy d. your browser is incompatible with the Web server software. e. your browser needs to be updated to the latest version.
the requested page was not found
One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
the server can get overloaded since it must process all messages
The fourth layer of the OSI model is called the __________ layer. network transport session data link presentation
transport