Chapter 1 - Introduction to Computer Networks

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which statement is true? 1. Protocols define the rules and formats a computer must use when sending information to itself. 2. Wide Area Networks (WANs) interconnect LANs in a specific geographic region, such as a county of city. 3. A frame is a packet with the source and destination MAC addresses added to it. 4. The Internet can be described as a worldwide private network.

A frame is a packet with the source and destination MAC addresses added to it.

The following statements are correct about multicore CPUs except: A multicore CPU is like a person with a brain Multicore CPUs enable computers to carry out multiple instructions simultaneously Results in better overall performance Multicore CPUs enable computers to carry out multiple instructions

A multicore CPU is like a person with a brain

A ________________ is the computer or network software that requests network data and a ____________ is the computer or network software that makes the network data available to requesting clients

Client; server

In network communication, the ______________ address is used to deliver a frame to the correct computer on the network while a ______________ message is used to determine whether a computer is listening on the network.

MAC, ping

Which definition is incorrect about Protocol Data Unit (PDU) names at different layers in the TCP/IP suite: Segment - Transport Layer PDU Packet - Application Layer PDU Frame - Network Access Layer PDU Bits - A PDU used when physically transmitting data over the medium

Packet - Application Layer PDU

00-1E-37-D0-E9-36

Physical/ MAC address

In this screen shot of the command prompt, the red rectangle is covering the word/phrase: (The parenthesis on IPv4 address)

Preferred

Step 1 of Network communication Step 2 of Network communication Step 3 of Network communication Step 4 of Network communication

1. An application requests to access a network. 2. Network client software recognizes the request and forwards it to the appropriate network protocol. 3. The network protocol packages the message into a format appropriate for navigating the network and then forwards it to the NIC driver 4. The NIC driver sends the packaged message to the NIC card which physically sends the data to the network

18000 bytes is equivalent to:

144000 bits

Choose the correct order for the process of a user attempting to access network resources: 1. Network protocol 2. Application 3. Network client 4. NIC driver

2,3,1,4

When you run the ipconfig /all command in the command prompt, a physical address is one of the lines of information included - similar to which of the following: TTL=53 192.168.107.169 90-B1-1C-9E-8D-55 FE80:CD00:0:CDE:1257:0:211E:729C

90-B1-1C-9E-8D-55

Interconnecting Device

Allows two or more computers to communicate on the network without having to be connected directly to one another.

- Perform a POST - Begin the boot procedure. These tasks are usually performed by the:

BIOS

Which statement is false? 1. A device driver may be installed to allow the OS to communicate with the new NIC 2. Basic computer functions include Processing, Internet access, Input, Output and E-mail 3. The Network client requests information stored on another computer 4. The CPU executes instructions provided by computer programs

Basic computer functions include Processing, Internet access, Input, Output and E-mail

One of the following is not a layer of the network communication process: user application network software device driver network protocol

Device Driver

A __________________ is a collection of users and computers whose accounts are managed by Windows servers.

Domain

All the following are required to turn a standalone computer into a networked computer except: IP Address Network interface card Interconnecting device Network medium

IP address

A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?

LAN

The four terms used to describe networks of different scope are:

LAN, Internetwork, WAN, and MAN

When you run the ipconfig /all command in the command prompt, a section/category is named Ethernet adapter Ethernet. One of the following is not included in this section/category:

Lease Enabled

The _____________________ is the lowest layer of the TCP/IP protocol hierarchy. The protocols in this layer provide the means for the system to deliver data to the other devices on a directly attached network.

Network Access Layer

What is the second and third layer?

Network software; Network protocol

When data has to be transmitted, it is broken down into similar structures of data before transmission, called ______________________, which are reassembled to the original data chunk once they reach their destination.

Packets

TCP is a reliable, connection-oriented, byte-stream protocol. Let's look at each of these characteristics in more detail. TCP provides reliability with a mechanism called _______________________

Positive Acknowledgment with Re-transmission (PAR)

A complete communication process includes these steps

Segmentation and encapsulation of data as it passes down the protocol stack in the source end device Transportation of the data through the internetwork, which consists of media and any intermediary devices Generation of the data onto the media at the network access layer of the stack

A computer becomes a ______________ when software is installed on it that provides a network service to ______________ computers

Server; client

Two main categories of storage:

Short-term storage and Long-term storage

Which of the following were associated limitations of early networks that used a daisy-chain method of connecting computers?

Total number of computers that could be connected; Cable length

___________ use the services of third-party communication providers to carry network traffic from one location to another

WANS

TCP is ___________________. It establishes a logical end-to-end connection between the two communicating hosts. Control information, called a ________________, is exchanged between the two endpoints to establish a dialogue before data is transmitted.

connection-oriented; handshake

As a packet travels through the TCP/IP protocol stack, the protocols at each layer either add or remove fields from the basic header. When a protocol on the sending system adds data to the packet header, the process is called ___________________

data encapsulation

When one user requires data from another user or a server over a network, the user most probably first ____________________________________________

goes through an application that creates a message which attempts to access the user's network

The information in this screen shot was generated using which command:

ipconfig

The information in this screen shot was generated using which command:

ping


संबंधित स्टडी सेट्स

Chapter 29: Growth and Development of the Adolescent

View Set

UVU NUTR-1020 2020 fall semester

View Set

Slack Plans, Upgrade Paths from Free to Pro/Bus +, Features by plan

View Set

Où, quand, qui, comment, pourquoi, combien (exercice)

View Set

Chapter 32 Environmental Emergencies

View Set

Unit 4: Above-the-line Deductions and Losses

View Set