ITN 100 Exam #1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The _________ layer performs error checking which is redundant to some extent with the function of the _________ layer.

transport, data link

The familiar background static on radios and telephones is called:

white noise

_____________ can be thought of as dividing the circuit horizontally.

Frequency division multiplexing

Taken together, the physical and data link layers are called the ____________________.

Hardware layer

The acronym, HTML, refers to:

Hypertext Markup Language

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________.

Hypertext Transfer Protocol

Which of the following is not an advantage of instant messaging?

It usually takes days for an IM message to be delivered to the recipient.

Which of the following is not true about ITU-T:

Its membership is limited to U.S. telephone companies

The software that runs on the mail server is referred to as the ____________

Mail transfer agent

Ethernet uses

Manchester encoding

In a ___________ architecture, computers are both client and server, thus sharing the work.

Peer-to-peer

Which of the following statements is correct?

Serial transmission is slower than parallel transmission.

___________ is an orderly close to a dialogue between end users.

Session termination

The most commonly used e-mail standard is:

Simple Mail Transfer Protocol

Which of the following is not true about de jure standards?

They are always developed before de facto standards.

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

___________ is commonly used to transmit phone conversations over digital networks.

VOIP

microwave transmission

all of the above

The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer.

community

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted?

compression

With the two-tier client-server architecture, the server is responsible for the ________ logic.

data access

_________ is an application program function that deals with storing and retrieving data.

data storage

In general, networks designed to transmit primarily computer data are likely to be ________.

digital

The representation of the character A by the group of 8 bits, 01000001, is an example of:

digital coding

___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination.

dispersion

Another term for a mail user agent is:

e-mail client

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

Which of the following is the most secure wired media?

fiber optic cable

Which of the following media can best withstand harsh environmental conditions?

fiber optic cable

Which of the following media is least susceptible to noise?

fiber optic cable

Having a conversation with someone using a cellular phone is an example of _________ transmission.

full-duplex

In this type of cloud model, the cloud provider manages the hardware, while the organization is responsible for everything else.

infrastructure as a service

Media Access Control

is not very important in point-to-point with full duplex configuration

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:

mail user agent

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.

mainframe

A MOOC is an example of a(n)

massively online technology

Which of the following would be considered a type of wireless media?

microwave

__________ is a line-of-sight type of wireless media.

microwave

The acronym, Modem, stands for _________________.

modulator-demodulator

One disadvantage of the ____________ architecture is that places a greater load on the network.

n-tier

The direction in which the sound wave begins is known as:

phase

A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at?

physical

Which of the following correctly represents order of the seven layers of the OSI model from layer 1 to layer 7?

physical, data link, network, transport, session, presentation, application

A "thick client" architecture approach:

places all or almost all of the application logic on the client

A "thin client" architecture approach:

places all or almost all of the application logic on the server

With the two-tier client-server architecture, the client is responsible for the ________ logic.

presentation

Which of the following is not an important factor to consider when selecting media to be used in a network?

prestige value of the type of media

The ________________ cloud deployment model provides the highest levels of control, privacy and security.

private

Which is not a function of the physical layer:

providing error-free transmission of data.

____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.

quadrature amplitude modulation

There are optional and required parts of an HTTP request. They are:

request line, request header, request body

In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model.

session, presentation and application

A(n) __________ circuit is another name for a multipoint configuration.

shared

The three stages of the de jure standardization process are ______________________.

specification, identification of choices and acceptance.

When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe.

submarine cables

The room that contains the cable termination points and the distribution frames is referred to as

telecommunications closet

As part of the five-layer network model used in this textbook, the data link layer sits directly between:

the physical and the network layers

How are the application architecture functions split up in a client-server network?

the presentation logic is on the client, while the data storage and data access logic are on the server

The fourth layer of the OSI model is called the __________ layer.

transport

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?

transport

How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels?

6

When converting analog voice data to digital signals, Pulse Code Modulation typically samples the incoming voice signal _______ times per second.

8,000

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:

> 99%

When a user accesses an application via a web browser on their mobile device, this is referred to as

A browser-based approach

When a developer creates an application for each type of device that might be used, this is referred to as

A native app

____________ is one of the most commonly used coding schemes used in data transmission.

ASCII

____________ is not an important middleware standard.

Asynchronous Transfer Mode (ATM)

___________ is not a type of digital signaling technique.

Data rate signaling

Which of the following is not an important future trend in communication and networking?

Development of online batch systems

With respect to costs for a client-server network, which of the following is true?

Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.

A network administrator has received several reports from users of the network that the intranet website on one of company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. What layer of the Internet model does this problem appear to reside at?

application

The _____________ of a circuit determines a circuit's capacity.

bandwidth

Client-server architectures:

can use middleware to provide a standard way of communicating between software from more than one vendor

A _____________ is the input-output hardware device at the end user's end of a communication circuit in a client-server network.

client


Ensembles d'études connexes

Chapter 15: Psychological Disorders Questions

View Set

History Quiz 3 Unit 1 Semester 2

View Set

Data Communications & Networking

View Set

Chapter 20 "Internal and external respiration & gas transport"

View Set