IT210 Test 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A version of Ethernet called "Cheapernet" and "Thinnet" that uses a bus topology with CSMA/CD and requires thin coax cable is _____.

10Base2

_____ runs at 10 Mbps, uses CSMA/CD, and can support a total of 1,024 devices on the network.

10Base2

A single Class A network can have how many hosts?

254

Each Class C network address can have _____ hosts.

254

A designator enables the network interface card (NIC) and the client's operating system to communicate.

False

A directory service is a database stored on the client that contains information about users and network devices and their privileges to those devices.

False

A mesh topology is sometimes used in a local area network (LAN) setting in order to ensure that all the sites can continue to transmit in the event of a cable failure or similar problem.

False

A network interface card (NIC) is always found outside the computer as a separate device.

False

A process running on Ring 10 can communicate with the hardware through the kernel and HAL.

False

A repeater knows which segment goes to which network device.

False

All of the latest versions of the common operating systems used today have server-based networking capabilities built in.

False

An advantage of a 10Base-2 network is that it is difficult to find network errors.

False

Baseband signaling requires that a modem be used.

False

Because TCP/IP is a connection-oriented protocol, it establishes a session (or link) between the devices known as a two-way handshake.

False

Because a ring has no ending points, it must use terminators.

False

Circuit switching is used for data communications, while voice conversations are always sent through packet switched networks.

False

Computer programs such as word processors, spreadsheets, databases, and presentation packages are all utility software.

False

Executive services talks to the hardware abstraction layer (HAL) subsystem.

False

Extended Mapping Language outlines how data elements are structured and provides a standard way of transmitting data independent of how it is to be formatted.

False

In a point-to-point topology, each computer on the network has just one connection.

False

In a ring topology, the hub is responsible for receiving and forwarding packets to the other devices on the network.

False

Linux does not currently support graphical user interfaces (GUIs).

False

Linux has only one shell that a user can install.

False

Linux is not case sensitive.

False

Linux will function only on a computer running an Intel central processing unit.

False

Novell NetWare 6 conforms to the portable operating system interface specifications, which is standard for how operating systems are designed.

False

Performing administrative functions in Linux requires that the user be a special privileged user known as the Supercomputer.

False

Server-based networks are much less expensive to build and operate than peer-to-peer networks.

False

Ten million bits per second is the same as 1 gigabit (Gbps).

False

The NetWare iPrint service also provides synchronization.

False

The current version of the IP protocol is version 2, called IPv2.

False

The original versions of Linux used a graphical user interface (GUI).

False

The standard bus for personal computers is the Universal Supply Bus (USB).

False

Unshielded twisted pair (UTP) cables have a foil shielding on the inside of the jacket that reduces interference.

False

Windows 2000 Server is the most powerful NOS of the Windows 2000 line and is used for applications that require processing of very large amounts of data.

False

Windows 2000 provides a service known as Network Load Balancing (NLB), which automatically spreads the load across application (non-Internet) servers.

False

With a ring topology, adding more devices to the network slows it down.

False

100Base-T has many of the same basic characteristics as 10Base-T.

True

100VG-AnyLAN uses the demand priority channel access method instead of CSMA/CD.

True

10Base-T is a star-wired bus topology.

True

A bus topology is not responsible for moving data from one device to the next.

True

A carrier is an organization that has been granted special privileges from the government to build communications connections along public right-of-ways.

True

A designator is designed to keep track of which drive letter is associated with which network device.

True

A directed transmission requires that the emitter and detector be aimed directly at one another.

True

A mesh topology is also called a point-to-point topology.

True

A multipoint ring topology is the opposite of the bus.

True

A network interface card (NIC) serves as the connection between the personal computer and the network media.

True

A port number identifies what program or service on the receiving computer is being accessed.

True

A storage pool may be set up that exceeds the physical storage currently available on the network.

True

A storage-area network (SAN) uses high-speed network links between the servers and special storage devices that are used for data backups.

True

A wide area network (WAN) transmits data over a larger geographical area than a local area network (LAN).

True

An advantage of a ring topology is that it is good for networks with many devices.

True

Baseband signaling sends one data signal across the network media.

True

Before a user can print a document on a particular network printer, he or she must have been given permission to do so.

True

Broadband signaling uses analog transmission.

True

Category 5 cables are the most common type of unshielded twisted pair (UTP) used for networks.

True

Coaxial cable has a single copper wire at its center and is surrounded by insulation and shielding.

True

Component Load Balancing (CLB) distributes the load across application (non-Internet) servers.

True

Dot files, or files whose filenames are preceded by a dot, are Linux system files that provide additional features for the user.

True

Groupware refers to programs that help people work together collectively even if they are located remotely from each other.

True

Hypertext markup language (HTML) only outlines how the data should be displayed, but not the structure of the data itself.

True

IPv6 uses a fixed packet header size of 24 bytes, so information always appears in the same place.

True

In a star ring topology, the ring is actually in the hub itself.

True

In order for a NIC to communicate with the computer in which it is installed, special software known as a device driver must be installed.

True

Many word processors have a review feature that functions in a manner similar to collaborative writing groupware.

True

Microsoft's .NET framework is a set of software technologies for connecting information between people, systems, and devices.

True

NetWare automatically recognizes and supports the protocols that different operating systems use for storing files.

True

One of the functions of a network interface card (NIC) is to create packets.

True

Packet-sniffing software provides a valuable benefit by allowing network administrators to monitor network traffic and identify problems.

True

Peer-to-peer networks that function over the Internet are called P2P networks.

True

Performing administrative functions in Linux requires that the user be a special privileged user known as the Superuser.

True

Personal computers are generally not designed to be scalable.

True

Server-based networks are more expensive to build and operate than peer-to-peer networks.

True

Spread spectrum is a technique that takes a narrow signal and spreads it over a broader portion of the radio frequency band.

True

Symmetric multiprocessing (SMP) distributes the processing load among the different CPUs in a Windows 2000 Server.

True

The Linux network operating system can support over 1000 users on the network.

True

The Windows 2000 NOS (Network Operating System) has become the most widely used network operating system for LANs.

True

The combination of an IP address and a port number is known as a socket and is separated by a colon, such as 198.146.118.20:80.

True

The context can involve the physical environment as well as the cultural setting.

True

The directory service for Novell NetWare 6 is called eDirectory.

True

The executive services subsystem performs basic tasks such as managing the memory on the server for all the network users and maintaining security.

True

The first Class B network number can be from 128 to 191, but the second network number and each of the host numbers can be from 1 to 254.

True

The hardware abstraction layer (HAL) subsystem consists of virtual hardware objects that represent the actual hardware devices that are part of the server.

True

The maximum number of computers that can function together in a peer-to-peer network is about 12.

True

The original versions of Linux used a command line interface, which required the user to type commands on the keyboard.

True

The overall environment through which the communication takes place is known as the context.

True

The pathway through which the source sends the message is known as the channel.

True

The source of near end crosstalk (NEXT) interference is from another data signal being transmitted.

True

There can be over 2 million Class C network numbers, but each network can have only 254 hosts.

True

Topology refers to the physical layout of the network devices and cabling and how all of those components communicate with each other.

True

Users can be grouped into logical groups called domains.

True

When using a sliding window, the receiving host can even accept packets out of order and reorganize them as it waits for more packets to arrive.

True

Windows 2000 Professional is the desktop operating system for clients in a business environment and has limited NOS functions

True

Windows 2000 Server can support four simultaneous processors, Windows 2000 Advanced Server can support eight processors, while Windows 2000 Datacenter Server can scale up to 32 processors.

True

With a Class A address, the first octet indicates the number of the network and the remaining three octets make up the number of the host.

True

With a circuit switched network, a dedicated and direct physical connection is made between the sender and the receiver.

True

A process running on Ring _____ can communicate with the hardware through the kernel and HAL.

a. 0

NetWare 6 is available in how many different versions?

a. 1

_____ can use Category 3 or higher data cable or fiber optic cable, and the network topology is a true star with central hubs controlling the network.

a. 100VG-AnyLAN

The first Windows server operating system was released in _____.

a. 1993

All regular applications are run on Ring _____.

a. 3

With a Class _____ address, the first octet indicates the number of the network and the remaining three octets is the number of the host.

a. A

With _____ the two computers that caused the collision each wait a different amount of time before listening again to the medium and starting the process over again.

a. CSMA/CD

The protocol that "leases" an IP address to a device is _____.

a. DHCP

Each operating system has peer-to-peer capabilities built in except _____.

a. Disk Operating System (DOS)

_____ light, often used for wireless transmissions, shares the same properties as visible light.

a. Infrared (IR)

_____ encrypts IP packets so packet sniffers cannot be used

a. Internet Protocol Security (IPSec)

NetWare 6 is built around a concept that Novell calls _____.

a. One Net

The job of the _____ layer of the OSI reference model is to send the signal to the network or receive the signal from the network.

a. Physical

Each is a version of the Windows 2000 network operating system except _____.

a. Windows Client

Switching involves moving a _____ from one wire or frequency to another.

a. a signal

A loss of signal power is known as _____.

a. attenuation

If two devices send packets simultaneously a(n) _____ occurs.

a. collision

_____ format is made up of short impulses of off and on.

a. digital

The unique "flavors" of Linux that are created by different vendors adding their own sets of utilities and applications are known as _____.

a. distributions

The "flow" between layers in the OSI reference model goes _____ when data is being sent out to the network.

a. down

Software that can automatically schedule meetings when everyone is available to attend is called _____.

a. electronic calendar

The type of cable that uses a very thin cylinder of glass at its center and sends light impulses is _____.

a. fiber optic

That portion of the packet that does not include the header is called the _____.

a. frame

The _____ in a star topology is responsible for receiving and forwarding the packets to the other devices on the network.

a. hub

NetWare's expanded printing capabilities are known as

a. iPrint

The "10" in 10Base-T indicates the network's _____.

a. maximum speed of 10 Mbps

A _____ topology is also called a point-to-point topology.

a. mesh

With a subnet mask, a 1 represents a(n) _____.

a. network

A multipoint _____ topology is a circle with no ends.

a. ring

A network that is controlled by at least one special high-powered computer is called a _____ network.

a. server-based

The purpose of a computer network can best be summarized by which word?

a. sharing

10Base-T is a _____ topology

a. star-wired bus

A combination of protocols is known as a(n) _____.

a. suite

Windows 2000 servers can take advantage of a server that has multiple CPUs installed by a process called _____.

a. symmetric multiprocessing (SMP)

The communication that takes place between devices on a computer network is known as _____.

a. telecommunications

Fiber optic cables are available in _____ modes.

a. two

The media used for 10Base-T is _____.

a. unshielded twisted pair

A peer-to-peer network is also called a(n) _____.

a. workgroup

The connector found on the end of a twisted pair data cable is called _____.

b RJ-45

The minimum length for a Windows 2000 password is _____ characters.

b. 6

The first octet of a Class _____ address is from 128 to 191.

b. B

Each is a standard for unshielded twisted pair except _____.

b. Category 4e

Class E and Class _____ addresses are for special uses.

b. D

The most popular LAN architecture today is _____.

b. Ethernet

Previous versions of NetWare used a proprietary protocol known as _____.

b. IPX/SPX

_____ automatically spreads Internet traffic across multiple Windows 2000 servers.

b. Network Load Balancing (NLB)

The Active Directory is stored in the _____ database.

b. Security Accounts Manager (SAM)

The most common protocol suite used today for LANs as well as the Internet is _____.

b. TCP/IP

Each is a dominant network standard except _____.

b. Titan

Each is a popular LAN network operating system except _____.

b. UNIX

Because a data transmission signal is an electrical impulse, _____ is excellent for transmitting computer network data.

b. copper

Each of the following is a disadvantage of a ring topology except

b. easy to manage

Each is an example of application software except _____.

b. file compression

1000Base-T uses _____ pairs of wires instead of only two.

b. four

Most computer networks using twisted pair cable have only _____ pairs of wires.

b. four

Each is an advantage of a bus topology except _____.

b. it becomes slower as more devices are added

The _____ subsystem includes the software drivers for the hardware.

b. kernel

The IP address is also called the _____ address.

b. logical

Packet switching allows _____ device(s) to share one line or frequency.

b. multiple

An IP address is made up of four _____.

b. octets

The ability of Novell's directory service to constantly review the contents of the directory and take action whenever a change occurs is called _____.

b. persistent search

The range of IP addresses from 192.168.0.0 - 192.168.255.255 are used as _____ addresses.

b. private

Segments on a 10Base2 network are connected together through a device known as a _____.

b. repeater

A _____ topology works well for a computer network with many devices attached to it.

b. ring

Adding additional processors to a server is known as _____.

b. scaling up

Devices such as __________, about the size of a credit card, can be used for authentication instead of keying in a password.

b. smart cards

A(n) _____ topology is typically used to connect multiple hubs in star topologies together with a bus topology.

b. star bus

A _____ knows which segment goes to which network device.

b. switch

A trillion bytes is known as a _____.

b. terabyte (TB)

At each end of the cable on a bus is a device known as a _____ that absorbs packets.

b. terminator

Known as the 5-4-3 rule, 10Base2 can connect up to five 200-meter segments using four repeaters, but only _____ segments can have devices connected to them.

b. three

In a mesh topology network with 3 computers, each device would need _____ cables to connect to each of the other computers.

b. two

A circuit switched network is ideal for _____ communications because there are no interruptions from other devices or delays.

b. voice

NetWare 6 server storage is divided into logical _____.

b. volumes

Mesh topologies are found in _____ networks.

b. wide area

A computer on a 10Base-T network must be within _____ meters of the hub.

c. 100

100Base-T has many of the same basic characteristics as _____.

c. 10BaseT

Linux was introduced in _____.

c. 1994

The protocol that is used to determine the MAC address if the IP address is known is called _____.

c. ARP

Cellular phones, citizens band and police radios, small office or household appliances, fluorescent lights, and loose electrical connections can all cause _____.

c. EMI

The most common type of multipoint topology is a _____ topology.

c. bus

The directory service for Novell NetWare 6 is called _____.

c. eDirectory

The _____ subsystem performs the basic tasks such as managing the memory on the server for all the network users and maintaining security.

c. executive services

There are ____ different types of channel access methods used with multipoint topologies.

c. four

A special category of software that assists in communication over a computer network is called _____.

c. groupware

A personal computer (PC) is also known as a _____.

c. microcomputer

A device known as a _____ converts data from a digital signal to an analog signal and back again.

c. modem

A TCP _____ number identifies what program or service on the receiving computer is being accessed.

c. port

Each is a service that iPrint can perform except _____.

c. redirect print output to a handheld device

Although its popularity has diminished in recent years, NetWare still has a loyal following because of its _____.

c. reliability

In a bus topology, a single cable called a _____ runs the length of the computer network.

c. segment

The number of elements that are essential to any type of communication are _____.

c. seven

The number of layers in the OSI reference model is _____.

c. seven

The computer programming language code that makes up Linux and is freely distributed is called the _____.

c. source code

_____ cable, which looks similar to the cable that carries a cable TV signal, is approximately one-quarter of an inch in diameter.

c. thin coaxial

A type of software that is made up of programs that provide additional features to the user is called _____.

c. utility

The name of the first version of Ethernet, sometimes called Standard Ethernet, was more formally known as _____.

d. 10Base5

A storage pool can be made up of 1 to _____ volumes.

d. 254

Windows 2000 Server can support _____ simultaneous processors.

d. 4

A standard size of a fiber optic cable is _____.

d. 62.5/125 microns

Each of the following is required for creating a new user in Windows 2000 except

d. Birth date

One of the drawbacks to Ethernet is that many of the versions use _____.

d. CSMA/CD Correct

Each client can connect to a NetWare server without additional software except _____.

d. DOS

EEE Project 802.3 set specifications for a type of local area network known as _____.

d. Ethernet

Windows 2000 uses a special security protocol known as _____, whichsupports faster authentication and requires only one password from a user logging into a domain.

d. Kerberos

The two network operating systems for LANs that are very dissimilar in how they are purchased and how they are used are NetWare and _____.

d. Linux

Peer-to-peer networks that function over the Internet and allow users to exchange music, videos, and data are called _____ networks.

d. P2P

The Institute of Electrical and Electronic Engineers (IEEE) project to develop computer network architecture standards was called

d. Project 802

A patch cable has a(n) _____ connector on each end.

d. RJ-45

Each of the following is a protocol of TCP/IP except _____.

d. SMSS

Novell's NetWare 6 directory service can be used to manage users running each of the different network operating systems except _____.

d. Windows 3.1

A(n) _____ defines the users who can access an item and what they can do with it.

d. access control list (ACL)

_____ signaling sends one data signal across the network media.

d. baseband

The _____ is the pathway through which the source sends a message.

d. channel

Each of the following is an advantage of a star topology except

d. cheapest type of network

In a _____ switched network, dedicated and direct physical connection is made between the sender and the receiver.

d. circuit

IP addresses are broken down into groups called _____.

d. classes

_____ cable has a single copper wire at its center and is surrounded by insulation and shielding.

d. coaxial

Software that allows different users to add their own revisions, suggestions, and comments to a single common document is called _____.

d. collaborative writing software

A _____ protocol places the packets on the network and then assumes that they will arrive at the destination.

d. connectionless

The channel access method _____ requires that each device competes or "fights" for the ability to send a message.

d. contention

Each is a feature of iFolder except _____.

d. files may be synchronized between a client and a handheld device

A volume is a physical amount of storage that can be contained on each item except _____.

d. floppy disk drive

Each is a type of server that can be found on a server-based network except _____.

d. keystop server

Each is a disadvantage of a peer-to-peer network except _____.

d. low cost

Each hardware item can be shared on a computer network except a _____.

d. mouse

Instead of using a point-to-point topology, local area networks typically use a _____topology.

d. multipoint

Packet switching requires that the data transmission be broken into smaller units called _____.

d. packets

In a _____ network, there is no single high-powered computer that controls and manages the network.

d. peer-to-peer

Scaling out means to add more _____ to the network.

d. servers

Each item is a limitation of using a non-networked computer except _____.

d. sharing hardware

Copying the work done on one computer to a disk so it could be given to another computer user was known as _____.

d. sneakernet

The _____ topology describes a network in which all of the devices are connected to a central device.

d. star

Because a ring has no ending points it does not use any

d. terminators

A(n) _____ is a set of domains that are joined together.

d. tree

The _____ subsystem consists of virtual hardware objects that represent the actual hardware devices that are part of the server.

hardware abstraction layer (HAL)

A star bus topology is typically used to connect multiple hubs in star topologies with a bus topology.

true


संबंधित स्टडी सेट्स

TMR Simple and Compound Interest

View Set

MCAT Physics formulas and concepts

View Set

Chapter 45: Management of patients with oral and esophageal disorders

View Set

Unit 4 - Interest Rate, Stock Index, and Foreign Currency Futures

View Set

energetics and rates of reaction and reversible reactions

View Set

Pharm 2 unit 3 practice questions

View Set

Check Yourself with Lateral Reading: Crash Course Navigating Digital Information #3

View Set