CDA FINAL EXAM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

____ was the standard created for fiber-optic systems.​

100BASEFX

When routing tables adapt to network changes, the routing system is called ____.

ADAPTIVE

Simple parity can detect only an even number of erroneous bits per character.​

FALSE

Subscriber loops usually transmit digital signals, which require amplifiers every few kilometers.

FALSE

The logical link control sublayer defines the layout or format of the data frame, simply called the frame.​

FALSE

White noise is also called thermal noise or ____ noise.​

GAUSSIAN

Cycles per second, or frequency, is represented by ____.​

HERTZ

A(n) ____ connection is a nonphysical connection between sender and receiver that allows an exchange of commands and responses.​

LOGICAL

​The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information.​

LOGICAL LINK CONTROL (LLC)

A technique that can be used to compress data when a ____ compression is necessary is the Lempel-Ziv technique.​

LOSSLESS

____, which is an abbreviation for MPEG (Moving Picture Experts Group) Audio Layer-3, is a common form of audio compression.​

MP3

When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ____ occurs.

NETWORK CONGESTION

____ was founded in 1983 and was one of the first developers of network operating systems.​

NOVELL

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.​

PACKET FILTER

Because DSL is an always-on connection, it uses a ____ circuit instead of a switched circuit.

PERMANENT

The ____ layer of the OSI model performs a series of miscellaneous functions necessary for presenting the data package properly to the sender or receiver.​

PRESENTATION (LAYER 6)

A company can use IP for transmission of data within its own network, but use traditional telephone lines outside the company network. Many people are now beginning to call such systems ____.

PRIVATE VoIP

One encoding technique that converts analog data to a digital signal is ____.​

PULSE CODE MODULATION (PCM)

____ shift keying incorporates four different phase angles, each of which represents 2 bits.

QUADRATURE PHASE

____ technique is also known as disk mirroring.​

RAID-1

The SONET network topology is a ____.

RING

____ twisted pair wire is used in environments that have a noticeable amount of electromagnetic interference.​

SHEILDED

____ transmission requires the use of a very thin fiber-optic cable and a very focused light source, such as a laser.​

SINGLE-MODE

Under the terms of the ____ license, the software package may be installed on a single machine, and then only a single user at one time may be using that machine.​

SINGLE-USER-SINGLE-STATION

____ is a flow control scheme that allows a station to transmit a number of data packets at one time before receiving some form of acknowledgment.​

SLIDING WINDOW

Three types of synchronous time division multiplexing that are popular today are T-1 multiplexing,____ multiplexing, and SDH.​

SONET

The most popular configuration for a local area network is the ____ topology.​

STAR-WIRED BUS

____ division multiplexing is a good choice for connecting a number of lower-speed devices that do not transmit data on a continuous basis to a remote computer system.​

STATISTICAL TIME

____ error control is a technique usually associated with the Stop-and-wait flow control protocol.

STOP-AND-WAIT

The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt.​

SYMMETRIC

​A(n) ____ connection is one in which the transfer speeds in both directions are equal.

SYMMETRIC

SONET defines a hierarchy of signaling levels, or data transmission rates, called ____.​

SYNCHRONOUS TRANSPORT SIGNALS (STS)

The ______ protocol is a high-speed protocol commonly found on Apple laptops and incorporates two currently existing standards.​

THUNDERBOLT

​The TCP/IP ____ layer commonly uses the Transmission Control Protocol (TCP) to maintain an error-free end-to-end connection.

TRANSPORT

The ____ layer of the OSI model performs end-to-end connection control.​

TRANSPORT (LAYER 4)

A worm is a form of computer virus.​

TRUE

Switches can be used in combination with routers to further isolate traffic segments in a local area network.​

TRUE

Switches can significantly decrease interconnection traffic and increase the throughput of the interconnected networks or segments.​

TRUE

TCP performs error detection at the end points of the connection.​

TRUE

Telephone systems were originally designed to transmit the human voice

TRUE

The NRZ-L encoding scheme is simple to generate and inexpensive to implement in hardware.​

TRUE

The data link layer of the OSI model can incorporate some form of error detection software.​

TRUE

The lowest layer of the TCP/IP protocol suite is the network access or physical layer.​

TRUE

The major disadvantage of flooding is the large number of copied packets distributed throughout the network.

TRUE

Code division multiplexing can produce system capacities that are ____ times those of frequency division multiplexing systems.​

8-10

The amplitude of a signal can be expressed as volts, ____, or watts.​

AMPS

Unfortunately, noise itself occurs as a(n) ____ waveform, and this makes it challenging, if not extremely difficult, to separate noise from an analog waveform that represents data.​

ANALOG

The data rate is measured in ____.​

BITS PER SECOND (BPS)

The most popular contention-based protocol is ____.​

CARRIER SENSE MULTIPLE ACCESS WITH COLLISON DETECTION (CSMA/CD)

A ____ application does not guarantee the delivery of any information or data.

CONECTIONLESS

When a signal is amplified by an amplifier, the signal gains in ____.​

DECIBELS

The ____ digital encoding scheme is similar to the Manchester scheme in that there is always a transition in the middle of the interval.​

DIFFERENTIAL MANCHESTER

____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.​

DIRECT SEQUENCE

____ technology is a unique form of multiplexing in that all the subchannels multiplexed together are intended for one user.​

DISCRETE MULTITONE

____ is a technology that allows a high-speed data signal to traverse a standard copper-based telephone line.​

DSL

The local loop commonly consists of either four or ____ wires.

EIGHT

ATM transfer rates are as fast as 311 Mbps.

FALSE

According to a famous communications theorem created by Nyquist, the sampling rate using pulse code modulation must be at least three times the highest frequency of the original analog waveform.​

FALSE

An asynchronous connection is the most complex example of a data link protocol.​

FALSE

Because USB provides a digital interface, it is necessary to convert the digital signals of the microcomputer to analog signals for transfer over a connection.​

FALSE

CSMA/CD is the only network technology that successfully supports connection admission control and quality of service.

FALSE

IP is a connection-oriented protocol.

FALSE

IP is the protocol used by most networks and network applications to create an error-free, end-to-end network connection.

FALSE

If impulse noise interferes with a digital signal, often the original digital signal cannot be recognized and recovered.​

FALSE

It is not possible to connect two local area networks so that they can share peripherals as well as software.​

FALSE

NAK represents a positive acknowledgment.​

FALSE

Neither USB nor FireWire support isochronous connections.​

FALSE

When a user stores data in "the cloud", the data is stored on the user's premise in what is called a "cloud server".

FALSE

The network layer of the OSI model is an end-to-end layer.​

FALSE (LAYER 4-TRANSPORT IS END TO END)

___ cable is a thin glass cable, a little thicker than a human hair, surrounded by a plastic coating.​

FIBER-OPTIC

For a receiver to be able to fix an error—in a process called ____—redundant information must be present so that the receiver knows which bit or bits are in error and what their original values were.​

FORWARD ERROR DETECTION

____ is a packet-switched network that was designed for transmitting data over fixed lines.

FRAME RELAY

​____ is a packet-switched network that was designed for transmitting data over fixed lines.

FRAME RELAY

Each time a packet is copied, a counter associated with the packet increases by one. This counter is called the ____.

HOP COUNT

The Web server software accepts ____ requests from Web browsers connected to the Internet.

HTTP

____ is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another.​

JITTER

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.​

KERBEROS

The ____ layer of the OSI model performs end-to-end error control and end-to-end flow control.​

TRANSPORT (LAYER 4)

A wide area network's sub-network, or cloud, may be categorized by the way it transfers information from one end of the sub-network to the other.

TRUE

Circuit-switched networks were designed primarily for voice signals.

TRUE

Convergence has had a particularly noticeable impact on the telecommunications market.

TRUE

Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation.​

TRUE

Examples of real-time applications usually include streaming voice, video, and music.​

TRUE

Fiber-optic cable cannot generate nor be disrupted by electromagnetic interference.​

TRUE

HTML pages are simple, static text documents that browsers read, interpret, and display on the screen.

TRUE

If control simplicity is your primary goal, point-to-point connection of terminals is clearly superior to multipoint connections.

TRUE

In a network architecture, as the packet moves up through the layers, the data packet shrinks in size.​

TRUE

MPLS on Internet routers and VPNs (virtual private networks) are gaining in popularity in the data network market.

TRUE

Most switches are transparent, which means they learn by themselves.​

TRUE

Network architectures are cohesive layers of protocols defining a set of communication services

TRUE

Network operating systems are essential if the network is going to allow multiple users to share resources.​

TRUE

Only two wires are required to complete a telephone circuit.

TRUE

Typically, frame relay is a replacement for the leased lines that connect a business to other businesses or connect multiple offices of the same business.

TRUE

Unix runs on the widest variety of hardware of any network operating system.​

TRUE

Wireless transmissions generally do not have to deal with right-of-way issues.​

TRUE

With the CSMA/CD protocol, only one workstation at a time can transmit.​

TRUE

____ software works with the user to locate and remove applications that are no longer desired.​

UNINSTALL

____ is capable of sending traffic that may experience bursts of data, but there are no promises as to when the data may be sent.

UNSPECIFIED BIT RATE (UBR)

____ division multiplexing is a good technique for transmitting multiple concurrent signals over a fiber-optic line.​

WAVELENGTH

Digital subscriber line comes in a variety of formats. Often collectively referred to as ____.

xDSL


Set pelajaran terkait

Health Insurance Providers Chapter 13

View Set

Psychiatric-Mental Health Practice Exam

View Set

Professional Responsibility Midterm Question Bank

View Set

ECON 2020-Final Practice Questions

View Set