DataCom Ch9-11 Multiple Choice

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A ____ application does not guarantee the delivery of any information or data. a. connectionless c. virtual circuit b. connection-oriented d. packet-switched

A

In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____. a. MILNET c. CampusNET b. NSFnet d. DoDNET

A

MANs are almost exclusively ____ networks, and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second. a. fiber-optic c. twisted-paired b. copper-wired d. coaxial-cabled

A

The IP datagram ____ field enables the network to discard a datagram that has been traveling the Internet for too long. a. Time to Live c. Total Length b. Service Type d. IP Options

A

The telephone network consists of two basic types of telephone lines: a subscriber loop, or standard telephone line, and a ____. a. trunk c. LATA b. CIR d. SONET

A

The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____. a. sub-network c. server b. station d. client

A

____ are permanent direct connections between two specified points. a. Tie lines c. Centrex b. PBXs d. IPX

A

____ are used to select unique documents from anywhere in the world. a. Uniform Resource Locators (URLs) c. Dynamic Host Configuration Protocol b. Domain Name Systems (DNSs) d. XMLs

A

____ involves the continuous download of a compressed audio or video file, which can then be heard or viewed on the user's workstation. a. Streaming audio and video c. File Transfer Protocol (FTP) b. Voice over IP d. XML

A

____ is a collection of newer markup tags and techniques that can be used to create more flexible and more powerful Web pages. a. Dynamic HTML (DHTML) c. Hypertext Transfer Protocol (HTTP) b. Address Resolution Protocol (ARP) d. Uniform Resource Locator (URL)

A

____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer. a. Remote login c. DNS b. ARP d. FTP

A

____ is advantageous when a copy of a packet needs to get to all nodes. a. Flooding c. Dijkstra's shortest-path b. Dijkstra's least-cost d. Dijkstra's maximum-cost

A

____ is the capability of a network server to transmit a data stream to more than one host at a time. a. IP multicasting c. TCP broadcasting b. TCP unicasting d. ICMP multicasting

A

____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies. a. Micro-marketing c. VoIP b. E-retailing d. EDI

A

____ area networks can cover large geographic distances, including the entire Earth. a. Personal c. Wide b. Local d. Universal

C

A network that expands beyond a metropolitan area is a ____ area network. a. personal c. metropolitan b. local d. wide

D

As long as a telephone call remains within a LATA (a(n) ____ call), the telephone call is local and is handled by a local telephone company. a. intraLATA c. outerLATA b. extraLATA d. outLATA

A

A ____ is data created by a Web server that is stored on the hard drive of a user's workstation. a. javascript c. script b. cookie d. certificate

B

A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand. a. PANs c. MANs b. LANs d. WANs

C

The Telecommunications Act of 1996 mandated that the existing local telephone companies, now called ____, must give CLECs access to their telephone lines. a. private Branch Exchange (PBX) b. Centrex (central office exchange service) c. incumbent local exchange carriers (ILECs) d. interexchange carriers (IECs)

C

A ____ network is the only network that offers a dedicated path. a. packet-switched c. virtual circuit b. broadcast d. circuit-switched

D

If the telephone call passes out of one LATA and into another (a(n) ____ call), the telephone call is long distance and must be handled by a long-distance telephone company. a. intraLATA c. inLATA b. innerLATA d. interLATA

D

One of the biggest changes to affect the Internet will be the adoption of a new version of the Internet Protocol, version ____. a. IPv3 c. IPv5 b. IPv4 d. IPv6

D

The two types of packet-switched networks are the datagram and the ____. a. static circuit c. standard circuit b. fixed circuit d. virtual circuit

D

A ____ profile describes various characteristics about the connection, such as basic data transfer rates, basic burst rates, excess data transfer rates, and excess burst rates. a. bandwidth c. client b. server d. router

A

A company can use IP for transmission of data within its own network, but use traditional telephone lines outside the company network. Many people are now beginning to call such systems ____. a. private VoIP c. remote VoIP b. public VoIP d. distributed VoIP

A

A network limit, called the ____, can be placed on how many times any packet is copied. a. hop limit c. time to live b. hop count d. time to hop

A

A(n) ____ connection is one in which the transfer speeds in both directions are equal. a. symmetric c. static b. asymmetric d. dynamic

A

Almost all MANs are based on one of two basic forms of supporting technology: ____ or Ethernet. a. SONET c. GALNET b. SOHO d. SWNET

A

An e-mail program creates a(n) ____ document and attaches it to the e-mail message. a. Multipurpose Internet Mail Extensions (MIME) b. Address Resolution Message (ARM) c. Transport Control Protocol (TCP) d. Internet Protocol (IP)

A

When a node on a wide area network ____ network transmits its data, the data is received by all the other nodes. a. broadcast c. circuit-switched b. packet-switched d. datagram packet-switched

A

With ____ routing, routing tables are created once, typically when the network is installed, and then never updated again. a. fixed c. changing b. adaptive d. modifying

A

With ____, when a frame relay router experiences congestion, it sends a congestion signal forward to the destination station, which in turn tells the originating station to slow down the transfer of data. a. forward explicit congestion notification (FECN) b. backward explicit congestion notification (BECN) c. implicit congestion control d. remote congestion control

A

____ is a popular format that transmits the downstream data at a faster rate than the upstream rate. a. Asymmetric digital subscriber line (ADSL) b. Consumer DSL (CDSL) c. DSL Lite d. High bit-rate DSL (HDSL)

A

____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer. a. IPsec c. PPP b. PPTP d. SLIP

A

A ____ area network is typically confined to a single building or a couple floors within one building. a. personal c. metropolitan b. local d. wide

B

A ____ is a legally binding, written document, that can include service parameters offered in the service, various types of service/support options, incentives if the service levels are exceeded, and penalties if service levels are not met. a. connection admission control c. software license agreement b. service level agreement d. congestion control

B

A ____ network application provides some guarantee that information traveling through the network will be delivered to the intended receiver in the same order in which it was transmitted. a. connectionless c. virtual circuit b. connection-oriented d. packet-switched

B

A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another. a. star-based c. ring-based b. bus-based d. star-ring-based

B

A network that is connected in a ____ is one in which neighbors are connected only to neighbors. a. star c. bus b. mesh d. star-bus

B

A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company's central (local) office are offered to business users, so that they don't need to purchase their own facilities. a. local exchange carriers (LECs) c. interexchange carriers (IECs or IXCs) b. central office exchange service d. private branch exchange (PBXs)

B

The National Science Foundation funded the creation of a new high-speed, cross-country network backbone called the ____. a. MILNET c. CampusNET b. NSFnet d. DoDNET

B

The SONET network topology is a ____. a. star c. bus b. ring d. star-bus

B

The ____ is a large, distributed database of Internet addresses and domain names. a. Uniform Resource Locator (URL) c. Hypertext Transfer Protocol (HTTP) b. Domain Name System (DNS) d. Hypertext Markup Language (HTML)

B

The ____ is an Internet protocol for sending and receiving e-mail and is used to perform the transfer. a. Address Resolution Protocol (ARP) c. File Transfer Protocol (FTP) b. Simple Mail Transfer Protocol (SMTP) d. Transport Control Protocol (TCP)

B

The ____ standard is a 56,000-bps dial-up modem standard approved by a standards-making organization rather than a single company. a. R.56 c. 802.11Q b. V.90 d. 803.1

B

The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet). a. circuit c. protocol b. packet d. port

B

The local loop commonly consists of either four or ____ wires. a. six c. nine b. eight d. ten

B

To transfer Web pages, the Internet uses the ____. a. Telnet c. e-commerce b. Hypertext Transfer Protocol (HTTP) d. Network Address Translation (NAT)

B

When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control. a. explicit c. forward explicit b. implicit d. backward explicit

B

When no splitter is used to separate the DSL signal from the POTS signal, then the service is called ____. a. asymmetric DSL c. symmetric DSL b. splitterless DSL d. POTSless DSL

B

____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged. a. FTP c. Connection-oriented b. Connectionless d. Reliable service

B

____ is a no-frills transport protocol that does not establish connections, does not attempt to keep data packets in sequence, and does not watch for datagrams that have existed for too long. a. Transport Control Protocol (TCP) b. User Datagram Protocol (UDP) c. Internet Control Message Protocol (ICMP) d. Network Address Translation (NAT)

B

____ is a set of codes inserted into a document that is intended for display on a Web browser. a. Domain Name Service (DNS) c. Uniform Resource Locator (URL) b. Hypertext Markup Language (HTML) d. Hypertext Transfer Protocol (HTTP)

B

____ is the earliest form of DSL. a. DSL Lite c. Very high data rate DSL (VDSL) b. High bit-rate DSL (HDSL) d. Rate-adaptive DSL (RADSL)

B

____ is the electronic selling and buying of merchandise using the Web. a. VoIP c. E-mail b. E-retailing d. IM

B

____ lets a router represent an entire local area network to the Internet as a single IP address. a. ICMP c. ARP b. NAT d. UDP

B

____ routing involves storing all the routing information at one central location. a. Distributed c. Remote b. Centralized d. Fixed

B

A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network. a. bus c. mesh b. star d. ring

C

A(n) ____ connection has a faster downstream transmission speed than its upstream speed. a. symmetric c. asymmetric b. static d. dynamic

C

A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet. a. File Transfer Protocol (FTP) c. Uniform Resource Locator (URL) b. Internet Protocol (IP) d. Domain Name Service (DNS)

C

After the 1984's Modified Final Judgment, the long-distance telephone companies became known as ____. a. local exchange carriers (LECs) c. interexchange carriers (IECs or IXCs) b. central office exchange service d. private branch exchange (PBXs)

C

During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks. a. Department of Defense b. IEEE c. Advanced Research Projects Agency (ARPA) d. IETF

C

On the other end of the local loop is the local telephone company's ____. a. trunk c. central office b. interLATA d. intraLATA

C

One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information. a. centralized c. distributed b. focalized d. local

C

The Point-to-Point Tunneling Protocol (PPTP) is an extension of the Internet's ____. a. Internet Protocol (IP) c. Point-to-Point Protocol (PPP) b. Transport Control Protocol (TCP) d. Address Resolution Protocol (ARP)

C

The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection. a. Source Port c. Sequence Number b. Padding d. Window

C

The practice of making telephone calls over the Internet has had a number of different names, including packet voice, voice over packet, voice over the Internet, Internet telephony, and ____. a. HTML c. Voice over IP (VoIP) b. SMTP d. XHTML

C

The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site. a. Hypertext Transfer Protocol (HTTP) b. Domain Name Service (DNS) c. File Transfer Protocol (FTP) d. Internet Message Access Protocol (IMAP)

C

The protocol that resides at the ____ layer in the TCP/IP protocol suite is called Internet Protocol (IP). a. application c. network b. transport d. network access

C

There is a plan to implement a newer, very high-speed network that will cover the United States, interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new high-speed network is called ____. a. IPv6 c. Internet2 b. FastEthernet d. Internet6

C

To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer. a. load c. frame b. product d. payload

C

When routing tables adapt to network changes, the routing system is called ____. a. fixed c. adaptive b. local d. static

C

____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur. a. Broadcast c. Circuit-switched b. Wireless d. Datagram

C

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data. a. Explicit congestion control c. Connection admission control b. Implicit congestion control d. Buffer preallocation

C

____ is a common application layer protocols that servers and the Internet use to deliver streaming audio and video data to a user's browser. a. Secure Shell (SSH) c. Real-Time Protocol (RTP) b. Transport Control Protocol (TCP) d. Voice over IP (VoIP)

C

____ is a trademarked version of DSL with speeds that are a little slower than typical ADSL speeds. a. Asymmetric digital subscriber line (ADSL) b. DSL Lite c. Consumer DSL (CDSL) d. High bit-rate DSL (HDSL)

C

A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. a. NAT network c. DHCP b. TCP network d. virtual private network (VPN)

D

A classic algorithm that calculates a least-cost path through a network is ____ algorithm. a. Dijkstra's maximum-cost c. Turing's longest-path b. Dijkstra's longest-path d. Dijkstra's least-cost

D

A(n) ____ handles all in-house calls and places calls onto outside telephone lines. a. local exchange carriers (LECs) c. interexchange carriers (IECs or IXCs) b. local access transport area (LATA) d. private branch exchange (PBXs)

D

All wide area networks are collections of at least two basic types of equipment: a station and a ____. a. link c. workstation b. server d. node

D

Because DSL is an always-on connection, it uses a ____ circuit instead of a switched circuit. a. changing c. virtual b. dynamic d. permanent

D

Digital subscriber line comes in a variety of formats. Often collectively referred to as ____. a. ADSL c. SDSL b. CDSL d. xDSL

D

Each time a packet is copied, a counter associated with the packet increases by one. This counter is called the ____. a. hop limit c. TTL count b. time to live d. hop count

D

In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets. a. explicit congestion control c. connection admission control b. implicit congestion control d. buffer preallocation

D

Real-Time Streaming Protocol (RTSP) is a(n) ____ layer protocol. a. physical c. transport b. network d. application

D

SONET rings typically have a failover time of ____ milliseconds. a. 20 c. 40 b. 30 d. 50

D

The Web server software accepts ____ requests from Web browsers connected to the Internet. a. ARP c. NAT b. DHCP d. HTTP

D

The ____ field of an IP datagram contains the version number of IP being used, just in case a new version becomes available. a. Service Type c. Protocol b. Time to Live d. Version

D

The ____ is the main telecommunications line through the network, connecting the major router sites across the country. a. star topology c. mid-level network b. ARPANET d. backbone

D

When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ____ occurs. a. network flowing c. frame control b. packet control d. network congestion

D

____ and distributed routing are methods for sending routing information. a. Distributed c. Fixed b. Adaptive d. Centralized

D

____ are advertised as networks with very low error rates and extremely high throughput. a. PANs c. GANs b. UANs d. MANs

D

____ is a client/server protocol in which e-mail is received and held for you at your Internet server. a. Hypertext Transfer Protocol (HTTP) b. File Transfer Protocol (FTP) c. Domain Name Service (DNS) d. Internet Message Access Protocol (IMAP)

D

____ is a format in which the transfer rate can vary, depending on noise levels within the telephone line's local loop. a. DSL Lite c. Very high data rate DSL (VDSL) b. High bit-rate DSL (HDSL) d. Rate-adaptive DSL (RADSL)

D

____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video). a. H.121 c. H.256 b. H.232 d. H.323

D

____ is the computerized version of writing a letter and mailing it at the local post office. a. FTP c. e-commerce b. e-business d. Electronic mail

D

____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network. a. Transport Control Protocol (TCP) c. Network Address Translation (NAT) b. User Datagram Protocol (UDP) d. Address Resolution Protocol (ARP)

D

The three basic types of subnetworks are ____, packet-switched, and broadcast. a. multicast c. circuit-switched b. protocol-switched d. unicast

C

____ is a protocol that converts telephone numbers to fully qualified domain name addresses. a. H.323 c. SIP b. ENUM d. UDP

B


Ensembles d'études connexes

Lesson 2/Chapter 25: Water, Fluid, Electrolytes, and Acid-Base Balance

View Set

Commercial Ground - Basic Aerodynamics

View Set

Number of Solutions to an Equation

View Set

power point lesson 4, 5, 6 and 7

View Set