Network and Internet Technology midterm
Protocol implementations follow the layering model by passing the input from a protocol in one layer to the output of a protocol in the next layer. T/F
False
Changing IPv4 to IPv6 is easy as it only requires a change to one part of the Internet. T/F
False
As data passes down through the protocol layers on the sending computer, postage is added. T/F
False
As opposed to LANs, WANs (wide area networks) cover a smaller geographic area. T/F
False
Business managers are concerned with whether a network has the required availability to handle traffic with acceptable reliability at an affordable cost. T/F
False
A private branch exchange (PBX) is an on-premise telephone switch that interconnects telephones at that location that provides outside access to the public telephone system. T/F
True
In an IPv6 address, the interface address/suffix is always constant and of length 64bits. T/F
True
A pair of protocols in adjacent layers pass a pointer to the packet rather than create a new copy. T/F
True
In terms of the client-server model, a browser is a client that extracts a server name from a URL and contacts the server. T/F
True
Industry experts estimate that approximately 15 petabytes (15,000 gigabytes) of new electronic data are created every day, much of this the result of huge growth in video, image, audio, and social media data. T/F
True
Lack of consistency in the networking field has produced a challenge - instead of uniform terminology, multiple groups each attempt to create their own terminology, resulting in jargon that contains terms that are abbreviated, misused, or associated with products. T/F
True
An application-layer protocol that is intended to be used across the Internet and implemented by many programmers and companies is known as a public service. T/F
False
What is the minimum number of routers that can be used to connect 4 networks? 2 1 4 3
1
What approximate data rate would be required, without compression, to send a resolution of 360x250 pixels with an 8-bit grayscale color palette? 10 Mbs 25 Kbs 125 Mbs 25 Mbs
10Mbs
In an standard Class C IPv4 address, a prefix of 24 bits (of 32) is used to create a subnet of 256 possible addresses. Since the first and the last are reserved for the network and broadcast addresses, respectively, there are two less possible hosts on the network or 254. If 26 bits are used for the prefix, there are 62 possible hosts. How many hosts are possible if 28 bits are used in a prefix? 14 20 22
14
Your computer has been configured in the following way: 172.16.128.67 mask 255.255.255.192 How would you represent the network you are on in CIDR notation? 172.16.128.0/24 172.16.128.64/26 172.16.128.67/26 172.16.128.0/67
172.16.128.64/26
How many primary classes did the original classful IP addressing scheme divide IPv4 into? 5 4 3 6
3
The TCP/IP protocol suite that is widely used today corresponds to a model that contains how many layers? 4 7 5 6
5
How many different IP addresses (although usable is quite less) can IPv4 theoretically accommodate? 6382910884 2857431098 4294967296
4294967296
Desktop systems in the workplace are typically interconnected to: data communication equipment storage technologies server rooms communication closets data center servers
AOTA
Examples of image-based applications used by businesses include: Web publishing Digital photographs Medical publishing Electronic publishing
AOTA
HTML can be defined as: a representation standard declarative a markup language
AOTA
In the 1970s, the Internet was: a set of standards proposed by Vinton Cerf and Robert Kahn a revolution in computer networking a concept
AOTA
Recent trends in computer networks and the Internet include: social networking applications sensor networks traditional communications systems adopting Internet technology cloud computing
AOTA
Which of the following is an IPv6 address in proper notation? FE80:0:0:0:02AA:00FF:FE9A:4CA2 ABCD::4 2607:f8b0:4004:806::1013 FE80::2AA:FF:FE9A:4CA2
AOTA
The Advanced Research Projects Agency (ARPA), an agency of the US. Department of Defense, gathered researchers and contractors together to produce a working data network, utilizing packet switching, and was known as: DODNET DHSNET ARPANET OSI
ARPANET
What character set in use today is the most common format for English-language text files? ASCII International Reference Alphabet (IRA) UTF-8 (Universal Character Set Transformation Format 8) Unicode
ASCII
Audio services may be provided to a business by: Competitive local exchange services (CLECs) Local telephone companies Long-distance carriers Cellular networks
All of the above
Traditional business applications of audio services are: voicemail telemarketing audio conferencing interactive voice response systems
All of the above
Typical components of UC architecture include: audio conferencing unified messaging videoconferencing instant messaging web conferencing presence
All of the above
The number of computers, terminals, and mobile devices used around the world is in the: Billions Millions Thousands Hundreds
Billions
Business information can be transmitted in: Both Digital Form Analog Form
Both
A browser can significantly reduce download time by saving images in a: cache harddrive file
Cache
An organization usually buys an expensive router that connects all networks and can then upgrade it when the capacity is exceeded. T/F
False
There are several key distinctions between LANs and WANs: data rates geographic scope packet switching ownership of communications equipment
Data Rates Geographic Scope Ownership of communications equipment
Match the following special IPv4 addresses: 192.168.0.255 255.255.255.255 127.0.0.1 192.168.0.0 0.0.0.0 --------------------- Limited Broadcast Loopback Address Directed Broadcast Network Address This Computer
Directed B Limited B Loopback A Network A This COmputer
Network technologies are created to meet various requirements for: distance economic cost internetworking speed
Distance Economic Cost Speed
Which of the following could be a host? (look up the product if you are unsure of the features) Dell Optiplex 9020 MiniTower Jawbone Era Bluetooth Headset Apple iPhone 6 Plus Titan Supercomputer in Oak Ridge National Laboratory Sonos PLAY:5 Speakers GE Profile™ Series 30" Built-In Double Convection Wall Oven with Brillion Technology (look this one up!!) Samsung UHD 4K HU8550 Series Smart TV Acer B276HUL Hi-resolution 2560x1440 IPS monitor CM Storm Mizer (8200 DPI WIRED Laser Mouse)
Every one except Monitor and Mouse
Convergence refers to the merger of previously unified telephony and information technologies and markets. T/F
False
Data transfer refers to interaction between two servers. T/F
False
Growth in capacity and a drop in cost has led to data transmission consuming a smaller chunk of the communications budget for most businesses. T/F
False
In terms of the networking implications of video information, real-time video traffic without compression requires minimal bandwidth to ensure an adequate user experience. T/F
False
Internet protocol software shows the detailed information of the physical network connection such as the IP address, MAC address, DNS server, default router, and the route a packet takes. T/F
False
No computer can run a web server unless the computer's domain name starts with www. T/F
False
On a single network, two computers can have the same IP address. T/F
False
One of the primary reasons for the success of TCP/IP standards lies in tolerance of homogeneity. T/F
False
The dominant LAN architecture is ring. T/F
False
The network services and facilities that users interact with are provided by each individual user. T/F
False
The three-layer model of enterprise communications is comprised of applications, enterprise services, and supply chain. T/F
False
As the Internet experienced exponential growth over the past 25 years, it changed in the following ways: focus on new applications increase in communication speeds increased demand for shared resources
Focus on new applications Increase in communication speeds
Which of the following incompatibilities prevent two networks from simply being directly connected (bridged)? Operating Systems/Applications (Layer 5) Frames (Layer 2) Network Hardware (Layer 1) Addresses (Layer 3)
Frames Network Hardware Addresses
Examples of representation standards include: HTML HTTP URL
HTML URL
What entity created the Open Systems Interconnection (OSI) seven-layer model? ITU (International Telecommunications Union) TCP/IP (Transport Control Protocol / Internet Protocol) ISO (International Organization for Standardization)
ISO
Internet Corporation for assigned Names and Numbers (ICANN) is the ultimate authority for all prefixes ensuring their individuality assignment and to adjudicate disputes. however it is the registrars that assigns prefixes directly through large blocks assigned to major: Governments ISPs Corporations
ISPs
Business rationale for adoption of cloud computing includes: Increased agility and flexibility Improved business process execution Reduced travel expenses Pay-as-you-grow computing Reduced on-premises network expenses
Increased agility and flexibility Pay as you grow computing reduced on premises network expenses
As companies increasingly rely on networks, the need for security: Increases Decreses
Increases
What are the three parts of an IPv6 address? Interface Subnet Mask Global Prefix
Interface Subnet Global PRefix
In 1980, the Internet was a research project that involved: More than 1000 sites Less than 100 sites 100 to 1000 sites
Less than 100
In the original architecture of Internet email service, what component acted as both a client and server? email interface application mail transfer application simple mail transfer protocol
Mail Transfer Application
Data communications is the study of using physical phenomena to transfer information across a physical communication ________. portal medium broadcast
Medium
The World Wide Web is: One of many services in use on the Internet The same as the Internet A transfer protocol that specifies how browsers interact with servers The protocol standard for the Internet
One of many services...
Match the Layer with its description in the TCP/IP Model 1 2 3 4 5 Network Interface Internet IP Application Transport Physical
Physical Network Interface Internet Transport Application
Before sending a request to the server, an FTP client allocates a protocol: port layer thread
Port
An application-layer protocol created by a company for proprietary software is known as a: hybrid service public service private service
Private
The name resolution process involves a resolver that forms a DNS request and waits for a: port message reply message layer message
Reply Message
These forces have consistently driven the architecture and evolution of data communications and networking: technological advancements new services traffic growth voice database access
Technological Advancements New Services Traffic Growth
DNS servers use the following mechanisms for caching: temporal locality server locality conditional locality spatial locality
Temporal Locality Spatial Locality
Within a LAN, business managers make choices about: the combination of wired and wireless transmission rates proprietary architectures
The combination of wired and wireless Transmission rates
A key benefit of IP network convergence is: (select all that apply) transformation reduce cycle time cost savings effectiveness
Transofrmation Costsavings effectiveness
Multiple protocols designed to work together in a complete, cooperative set are called a suite. T/F
Tru
The MIME standard encodes non-text attachments as printable characters. T/F
True
A common type of network is the LAN (local area network). T/F
True
A communications system that supplies universal service allows arbitrary pairs of computers to communicate. T/F
True
A digital system uses a sequence of discrete values to represent information. T/F
True
A programmer defines an application layer protocol when two applications need to communicate over a network. T/F
True
A router does not use conventional application software but does need TCP/IP protocol software. T/F
True
A router must have multiple IP addresses. T/F
True
An IP address is a unique binary number assigned to a host and used for all communication with the host. T/F
True
An email program using SMTP requests an mail exchange record from the DNS database. An IP address is returned in response. T/F
True
As a result of the adoption of standards, equipment from multiple vendors can be used in a single network. T/F
True
Audio, data, image and video are basic information sources that are useful categories for the analysis and design of enterprise networks. T/F
True
Because the Internet tolerates heterogeneity, engineers can experiment with new networking technologies without disrupting existing networks. T/F
True
Client server architecture provides specialized services such as database functions, file storage, printing, and other shared services. T/F
True
Compared to the early years of data communications when the key focus was functionality and performance, today the key focus for businesses is management. T/F
True
Data representation deals with the syntax of data exchanged between computers. T/F
True
Data that contains a combination of text, graphics, audio, and video is referred to as multimedia. True/False
True
Early communications networks such as the telegraph and telephone systems use circuits to send information. T/F
True
FTP handles both uploading and downloading of any type of data. T/F
True
Fiber-optic and wireless transmission are driving the evolution of data communications. T/F
True
IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. T/F
True
Networking technology facilitates the flow of information that is needed to coordinate business activities. True/False
True
No single networking technology is best for all needs. T/F
True
One of the main features of the Domain Name System is autonomy which allows each organization to run its own DNS servers. T/F
True
Packet switching is the basis for the modern Internet. T/F
True
Part of a browser's architecture is a controller that utilizes clients to retrieve information from various services. T/F
True
Protocols in a suite are furthermore collected into a unified whole known as a layering model. T/F
True
Since the 1970s, computer communication has changed from an esoteric research topic to an essential part of everyone's lives. T/F
True
The basic building block of any network is the transmission line (or facility). T/F
True
The design and infrastructure of future enterprise networks will be shaped by cloud computing. T/F
True
The primary motivation for early computer networks was resource sharing due to computers being large and expensive. T/F
True
The term for information that can be represented by a finite alphabet of symbols, such as the numbers 0 through 9 or the symbols represented on a computer keyboard, is data. T/F
True
The term protocol refers to a specification for network communications. T/F
True
The volume of communications traffic being transported over business networks is increasing. T/F
True
Today, the Internet has grown into a production communication system that reaches all populated countries in the world. T/F
True
Using multiple routers improves reliability and avoids a single point of failure by sending traffic along an alternate path if a link fails. T/F
True
Web browsers have replaced email interface applications as the primary means of accessing email. T/F
True
A page of text contains about 10,000 bits of 8-bit character data. The bit image of a 640x480 pixel screen in 256 color mode requires over: Two million bytes One million bits Two million bits One million bytes
Two Million Bits
What is one difference between the POP3 and IMAP standards? message format authentication mailbox access mail extension
authentication
What is/are the basic component(s) used for interconnecting heterogeneous networks? router Wi-Fi switch hub bridge
router
Which of the following accurately describe the Simple Mail Transfer Protocol? uses textual control messages transfers text messages and images uses stream paradigm sends one copy of a message
uses textual control messages uses stream paradigm sends one copy of a message
The four major types of information carried over business networks are: news voice data video image
voice data video image
Match each part of the domain name below: xxx.yyy.zzz Individual Computer Group or Organization Top-Level Domain
x = Individual y = group or organization z = top level domain