Network and Internet Technology
Business managers are concerned with whether a network has the required availability to handle traffic with acceptable reliability at an affordable cost. True/False
False
Changing IPv4 to IPv6 is easy as it only requires a change to one part of the Internet. True/False
False
An organization usually buys an expensive router that connects all networks and can then upgrade it when the capacity is exceeded. True/False?
False
As opposed to LANs, WANs (wide area networks) cover a smaller geographic area. True/False
False
In an IPv6 address, the interface address/suffix is always constant and of length 64bits. True/False?
True
A pair of protocols in adjacent layers pass a pointer to the packet rather than create a new copy. True/False
True
In terms of the client-server model, a browser is a client that extracts a server name from a URL and contacts the server. True/False
True
In the client-server paradigm, the server software waits passively for contact, while the client software actively initiates contact. True/False
True
In the thin client model, the server handles more of the work relative to the thick client model. True/False
True
Industry experts estimate that approximately 15 petabytes (15,000 gigabytes) of new electronic data are created every day, much of this the result of huge growth in video, image, audio, and social media data. True/False
True
The central feature of a client/server architecture is the allocation of application-level tasks between clients and: - applications - facilities - servers
servers
Business rationale for adoption of cloud computing includes: - improved business process execution - pay-as-you-grow computing - increased agility and flexibility - reduced travel expenses - reduced on-premises network expenses
pay-as-you-grow computing, increased agility and flexibility, and reduced on-premises network expenses
Before sending a request to the server, an FTP client allocates a protocol:
port
An application-layer protocol created by a company for proprietary software is known as a:
private service
The term ____ refers to a specification for network communications.
protocol
Within a LAN, business managers make choices about: - the combination of wired and wireless - transmission rates - proprietary architectures
the combination of wired and wireless, transmission rates
An application-layer protocol that is intended to be used across the Internet and implemented by many programmers and companies is known as a public service. True/False
False
The World Wide Web is:
One of many services in use on the Internet
Standards are a very important part of the data communications landscape. Several of the most important standard-setting organizations are: (choose the appropriate answer from below) - NIST (National Institute of Standards and Technology) - IEEE (Institute of Electrical and Electronics Engineers) - ISOC (Internet Society) - FCC (Federal Communications Commission) - ISO (International Organization for Standardization) - ITU-T (International Telecommunications Union)
*NIST* (National Institute of Standards and Technology), *IEEE* (Institute of Electrical and Electronics Engineers), *ISOC* (Internet Society), *ISO* (International Organization for Standardization), *ITU-T* (International Telecommunications Union) ISO ITU-T NIST IEEE ISOC
What is the minimum number of routers that can be used to connect 4 networks? A. 2 B. 4 C. 1 D. 3
1
In an standard Class C IPv4 address, a prefix of 24 bits (of 32) is used to create a subnet of 256 possible addresses. Since the first and the last are reserved for the network and broadcast addresses, respectively, there are two less possible hosts on the network or 254. If 26 bits are used for the prefix, there are 62 possible hosts. How many hosts are possible if 28 bits are used in a prefix? A. 22 B. 20 C. 14
14
Your computer has been configured in the following way: 172.16.128.67 mask 255.255.255.192 How would you represent the network you are on in CIDR notation?
172.16.128.64/26
What approximate data rate would be required, without compression, to send a resolution of 360x250 pixels with an 8-bit grayscale color palette?
25 Mbs
Which of the following is an IPv6 address in proper notation? A. 2607:f8b0:4004:806::1013 B. ABCD::4 C. FE80:0:0:0:02AA:00FF:FE9A:4CA2 D. FE80::2AA:FF:FE9A:4CA2
2607:f8b0:4004:806::1013 ABCD::4 FE80:0:0:0:02AA:00FF:FE9A:4CA2 FE80::2AA:FF:FE9A:4CA2
How many primary classes did the original classful IP addressing scheme divide IPv4 into?A. 5 B. 3 C. 6 D. 4
3
The TCP/IP protocol suite that is widely used today corresponds to a model that contains how many layers?
5
How many different IP addresses (although usable is quite less) can IPv4 theoretically accommodate?
4294967296
A server can be defined as:
A program that waits passively for communication, A computer dedicated to running one or more server programs, a computer that has fast CPU, large memory, and powerful operating system
The Advanced Research Projects Agency (ARPA), an agency of the US. Department of Defense, gathered researchers and contractors together to produce a working data network, utilizing packet switching, and was known as:
ARPANET
What character set in use today is the most common format for English-language text files? - UTF-8 (Universal Character Set Transformation Format 8) - Unicode - International Reference Alphabet (IRA) - ASCII
ASCII
Which of the following incompatibilities prevent two networks from simply being directly connected (bridged)? A. Addresses (Layer 3) B. Frames (Layer 2) C. Operating Systems/Applications (Layer 5) D. Network Hardware (Layer 1)
Addresses (Layer 3) Frames (Layer 2) Network Hardware (Layer 1)
Business information can be transmitted in: - Analog form - Digital form - Both
Both, analog form and digital form
Desktop systems in the workplace are typically interconnected to: - server room - data center - storage technologies - servers - data communication equipment - communication closets
Data center server server rooms communication closets storage technologies data communication equipment
Which of the following could be a host? - Dell Optiplex 9020 MiniTower - Titan Supercomputer in Oak Ridge National Laboratory - Sonos PLAY:5 Speakers - Jawbone Era Bluetooth Headset - Apple iPhone 6 Plus - GE Profile™ Series 30" Built-In Double Convection Wall Oven with Brillion Technology - Acer B276HUL Hi-resolution 2560x1440 IPS monitor - CM Storm Mizer (8200 DPI WIRED Laser Mouse) - Samsung UHD 4K HU8550 Series Smart TV
Dell Optiplex 9020 MiniTower - Titan Supercomputer in Oak Ridge National Laboratory - Sonos PLAY:5 Speakers - Jawbone Era Bluetooth Headset - Apple iPhone 6 Plus - GE Profile™ Series 30" Built-In Double Convection Wall Oven with Brillion Technology - Samsung UHD 4K HU8550 Series Smart TV
192.168.0.255
Directed Broadcast Address
Convergence refers to the merger of previously unified telephony and information technologies and markets. True/False
False
Data transfer refers to interaction between two servers. True/False
False
Growth in capacity and a drop in cost has led to data transmission consuming a smaller chunk of the communications budget for most businesses. True/False
False
In terms of the networking implications of video information, real-time video traffic without compression requires minimal bandwidth to ensure an adequate user experience. True/False
False
Internet protocol software shows the detailed information of the physical network connection such as the IP address, MAC address, DNS server, default router, and the route a packet takes. True/False?
False
No computer can run a web server unless the computer's domain name starts with www. True/False
False
On a single network, two computers can have the same IP address. True/False?
False
One of the primary reasons for the success of TCP/IP standards lies in tolerance of homogeneity. True/False
False
Protocol implementations follow the layering model by passing the input from a protocol in one layer to the output of a protocol in the next layer. True/False
False
The dominant LAN architecture is ring. True/False
False
The network services and facilities that users interact with are provided by each individual user. True/False
False
The three-layer model of enterprise communications is comprised of applications, enterprise services, and supply chain. True/False
False
When a request arrives at a server, software on the server uses the IP address to determine which application on the server computer should handle the request. False/True
False
In the real world, a p2p system enables extremely large traffic to one computer because N can be extremely small. True/False
False, In a real p2p system, the traffic into one computer can be extremely small because N can be extremely large (tens of thousands).
If a peer-to-peer architecture is implemented in server code, data is distributed first come-first served among a set of N servers. True/False
False, data is distributed equally among a set of N servers,
What entity created the Open Systems Interconnection (OSI) seven-layer model? - TCP/IP (Transport Control Protocol/Internet Protocol) - ITU (International Telecommunications Union) - ISO (International Organization for Standardization)
ISO (International Organization for Standardization)
Internet Corporation for assigned Names and Numbers (ICANN) is the ultimate authority for all prefixes ensuring their individuality assignment and to adjudicate disputes. however it is the registrars that assigns prefixes directly through large blocks assigned to major: A. ISPs B. Corporations C. Governments
ISPs
Traditional business applications of audio services are:
Interactive voice response systems, telemarketing, audio conferencing, voicemail
How does a client identify a server on the Internet? *Computer*
Internet Protocol add
In 1980, the Internet was a research project that involved:
Less than 100 sites
255.255.255.255
Limited Broadcast Address
Audio services may be provided to a business by:
Long-distance carriers, cellular networks, local telephone companies, and competitive local exchange services (CLECs)
127.0.0.1
Loopback Address
192.168.0.0
Network Address
Match the Layer with its description in the TCP/IP Model Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
Physical Network IP Transport Application
Typical components of UC architecture include: - audio conferencing - videoconferencing - presence - web conferencing - instant messaging - unified messaging
Presence Web Conferencing Video Conferencing Unified Messaging Instant Messaging Audio Conferencing
How does a client identify a server on the Internet? *Service*
Protocol port number
A relational database server uses ____ to split application logic between client and server.
Structured Query Language
What are the three parts of an IPv6 address?
Subnet, Interface, Global Prefix
The primary example of communications software that enables clients and servers to interoperate is:
TCP/IP
Which of the following statements describe a connection-oriented interaction? - Each message limited to 64 KBytes - The pair uses the connection to exchange data - A pair of applications requests a connection
The pair uses the connection to exchange data A pair of applications requests a connection
0.0.0.0
This computer
A client can access multiple services but typically contacts only one remote server at a time. True/False
True
A common type of network is the LAN (local area network). True/False
True
A communications system that supplies universal service allows arbitrary pairs of computers to communicate. True/False?
True
A digital system uses a sequence of discrete values to represent information. True/False
True
A private branch exchange (PBX) is an on-premise telephone switch that interconnects telephones at that location that provides outside access to the public telephone system. True/False
True
A programmer defines an application layer protocol when two applications need to communicate over a network. True/False
True
A router does not use conventional application software but does need TCP/IP protocol software. True/False
True
A router must have multiple IP addresses. True/False
True
An IP address is a unique binary number assigned to a host and used for all communication with the host. True/False
True
An email program using SMTP requests an mail exchange record from the DNS database. An IP address is returned in response. True/False
True
As a result of the adoption of standards, equipment from multiple vendors can be used in a single network. True/False
True
Audio, data, image and video are basic information sources that are useful categories for the analysis and design of enterprise networks. True/False
True
Because the Internet tolerates heterogeneity, engineers can experiment with new networking technologies without disrupting existing networks. True/False
True
Client server architecture provides specialized services such as database functions, file storage, printing, and other shared services. True/False
True
Compared to the early years of data communications when the key focus was functionality and performance, today the key focus for businesses is management. True/False
True
Concurrent server code is divided into two pieces, a thread and a handler. True/False
True
Data representation deals with the syntax of data exchanged between computers. True/False
True
Early communications networks such as the telegraph and telephone systems use circuits to send information. True/False
True
FTP handles both uploading and downloading of any type of data. True/False
True
Fiber-optic and wireless transmission are driving the evolution of data communications. True/False
True
IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. True/False?
True
The MIME standard encodes non-text attachments as printable characters. True/False
True
Lack of consistency in the networking field has produced a challenge - instead of uniform terminology, multiple groups each attempt to create their own terminology, resulting in jargon that contains terms that are abbreviated, misused, or associated with products. True/false
True
Networking technology facilitates the flow of information that is needed to coordinate business activities. True/False
True
No single networking technology is best for all needs. True/False
True
One of the main features of the Domain Name System is autonomy which allows each organization to run its own DNS servers. True/False
True
Packet switching is the basis for the modern Internet. True/False
True
Part of a browser's architecture is a controller that utilizes clients to retrieve information from various services. True/False
True
Services are provided by application programs that run on computers attached to the internet. True/False
True
Since the 1970s, computer communication has changed from an esoteric research topic to an essential part of everyone's lives. True/False
True
The Internet provides a general purpose communication mechanism on which all services are built. True/False
True
The amount of work done on a client vs. a server varies across server software. In the thick client model, application processing is offloaded from the server, reducing the likelihood of bottlenecks. True/False
True
The basic building block of any network is the transmission line (or facility). True/False
True
The design and infrastructure of future enterprise networks will be shaped by cloud computing. True/False
True
The primary motivation for early computer networks was resource sharing due to computers being large and expensive. True/False
True
The volume of communications traffic being transported over business networks is increasing. True/False
True
Today, the Internet has grown into a production communication system that reaches all populated countries in the world. True/False
True
Using multiple routers improves reliability and avoids a single point of failure by sending traffic along an alternate path if a link fails. True/False
True
Web browsers have replaced email interface applications as the primary means of accessing email. True/False
True
Examples of representation standards include:
URL and HTML
Examples of image-based applications used by businesses include:
Web publishing Electronic publishing Digital photographs Medical publishing
In the 1970s, the Internet was:
a concept, a set of standards, proposed by Vinton Cerf and Robert Kahn, a revolution in computer networking
HTML can be defined as:
a markup language, a representation standard, declarative
What handles initiating contact with and accepting contact from a remote computer?
application programs
What is one difference between the POP3 and IMAP standards?
authentication
In a three-tier client/server architecture, the following types of machines are found:
backend server, middle-tier/gateway server, client/user machine
The number of computers, terminals, and mobile devices used around the world is in the: - hundreds - millions - billions - thousands
billions
If only 1 server provides a given service, the network connection that connects the server to the Internet can become a:
bottleneck
A browser can significantly reduce download time by saving images in a:
cache
A server can act as a ____
client
Recent trends in computer networks and the Internet include:
cloud computing, traditional communication systems adopting Internet technology, social networking applications, sensor networks
Servers can handle multiple clients at the same time because they are: - concurrent - co-located - fast
concurrent
There are several key distinctions between LANs and WANs: - ownership of communication equipment - packet switching - geographic scope - data rates
data rates ownership of communication equipment geographic scope
Network technologies are created to meet various requirements for: - internetworking - economic cost - speed - distance
economic cost, speed, distance
As data passes down through the protocol layers on the sending computer, postage is added. true/false
false
As the Internet experienced exponential growth over the past 25 years, it changed in the following ways: - increased demand for shared resources - focus on new applications - increase in communication speeds
focus on new applications and increase in communication speeds
As companies increasingly rely on networks, the need for security: - increases - decreases
increases
Protocols in a suite are furthermore collected into a unified whole known as a
layering model
In the original architecture of Internet email service, what component acted as both a client and server?
mail transfer application
Data communications is the study of using physical phenomena to transfer information across a physical communication ________.
medium
Data that contains a combination of text, graphics, audio, and video is referred to as
multimedia
A computer can operate
multiple clients and multiples copies of a single application
A computer can run
multiple server programs
Consolidating multiple server programs on a single computer can
reduce cost without significantly reducing performance
The name resolution process involves a resolver that forms a DNS request and waits for a:
reply message
What is/are the basic component(s) used for interconnecting heterogeneous networks?
router
DNS servers use the following mechanisms for caching:
spatial locality temporal locality
Multiple protocols designed to work together in a complete, cooperative set are called
suite
These forces have consistently driven the architecture and evolution of data communications and networking: - technological advancements - new services - traffic growth - voice - database access
technological advancements, new services, traffic growth
What on a concurrent server interacts with a single client? - handler code - thread of control - handler - main program (thread) - main thread
thread of control
A key benefit of IP network convergence is: (select all that apply) - transformation - effectiveness - reduce cycle time - cost savings
transformation, effectiveness, and cost savings
The term for information that can be represented by a finite alphabet of symbols, such as the numbers 0 through 9 or the symbols represented on a computer keyboard, is data. true/false
true
A page of text contains about 10,000 bits of 8-bit character data. The bit image of a 640x480 pixel screen in 256 color mode requires over:
two million bits
Which of the following accurately describe the Simple Mail Transfer Protocol?
uses textual control messages sends one copy of a message uses stream paradigm
The four major types of information carried over business networks are:
voice, video, image, data
Match each part of the domain name below: xxx.yyy.zzz
xxx ind computer yyy group or org zzz top level domain
Match the term to its place in a Uniform Resource Locator. vvv://www:xxx/yyy/zzz
yyy document www computer vvv protocol xxx port zzzz parameters