IT 340 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

d. network congestion

When a network or part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, ______ occurs a. network flowing b. packet control c. frame control d. network congestion

a. broadcast

When a node on a wide area network _____ network transmits data, the data is receive by all the other nodes. a. broadcast b. packet-switched c. circuit switched d. datagram packet-switched

a. Uniform Resource Locators (URLs)

____ are used to select unique documents from anywhere in the world a. Uniform Resource Locators (URLs) b. Domain Name Systems (DNSs) c. Dynamic Host Configuration Protocol d. XMls

d. 100BaseFX

____ was the standard created for fiber-optic systems. a. 1Base5 b. 10BaseTX c. 100BaseTX d. 100BaseFX

a. flooding

_____ is advantageous when a copy of a packet needs to get all nodes. a. flooding b. Dijkstra's least-cost c. Dijkstra's shortest-path d. Dijkstra's maximum-cost

d. circuit-switched

A ____ network is the only network that offers a dedicated path a. packet-switched b. broadcast c. virtual circuit d. circuit-switched

b. local

A ______ area network is typically confined to a single building or couple floors within one building. a. personal b. local c. metropolotan d. wide

a. hub

A ______ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. a. hub b. switch c. router d. repeater

b. service level agreement

A _______ is a legally binding, written document, that can include service parameters offered in the service, various types of service/ support options, incentives if the service levels are exceeded, and penalties if service levels are not met a. connection admission control b. service level agreement c. software license agreement d. congestion control

False

A local area network is only as strong as its strongest link

b. wireless LAN

A local area network that is not based primarily on physical wiring but uses wireless transmissions between workstations is a(n) ____. a. FDDI c. token ring b. wireless LAN d. MAU

False

Currently, almost all networks involved in the internet use IPv6

True

Some MAN topologies are based on a ring

a. time to live

The IP datagram ______ field enables the network to discard a datagram that has been traveling the Internet for too long a. time to live b. service type c. total length d. IP options

False

A trunk has a unique telephone number associated with it

False

IP is the protocol used by most networks and network applications to create an error-free, end-to-end network connection

False

Local area network ethernet allows users to set their own data transfer rates

True

The Internet can transfer conventional data and voice data

a. Antivitus

______ software is designed to detect and memove viruses that have infected your memory, disks, or operating system. a. Antivitus b. remote access c. uninstall d. backup

a. ethernet

was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today. a. ethernet b. IBM Token Ring c. FDDI d. Wireless ethernet

d. Active Directory

windows server 2000 incorporated microsoft answer to the highly popular NetWare NDS directory system: _____ a. inode b. X.509 c. iPrint d. Active Directory

b. site

A _____ license allows a software package to be installed on any and all workstations and servers at a given site. a. network server b. site c. corporate d. single-user-multiple-station

a. T-1

A _____ service is an all-digital connetion that can transfer either voice or data at speeds up to 1.544 Mbps a. T-1 b. T-2 c. T-3 d. T-4

a. hop limit

A network limit, called the _____, can be placed on how many times any packet is copied. a. hop limit b. hop count c. time to live d. time to hop

c. medium access control

A(n) ____ protocol is the software that allows a workstation to place data onto a local area network. a. error control c. medium access control b. noise control d. flow control

d. private branch exchange (PBXs)

A(n) _____ handles in-house calls and places calls onto outside telephone lines a. local exchange carriers (LECs) b. local access transport area (LATA) c. interexchanging carriers (IECs or IXCs) d. private branch exchange (PBXs)

d. uninterruptible power supply (UPS)

A(n) _____ is a valuable device in the event of a power failure a. media converter b. blu-ray DVD c. thin client d. uninterruptible power supply (UPS)

d. node

All wide area networks are collections of at least two basic types of equipment: a station and a _____ a. link b. server c. workstation d. node

True

Circuit-switched networks were designed primarily for voice signals

True

Every device that has a connection to the internet is assigned an IP address

c. cut-through

In a ________ architecture, the data frame begins to exit the switch almost as soon as it begins to enter the switch. a. forward b. backward c. cut-through d. random-propagation

a. peer-to-peer

In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell. a. peer-to-peer c. single-cell b. multiple-cell d. random-cell

c. frame relay and ATM

MPLS and VPNs continue to replace which long-distance data services? a. Google and Yahoo b. Telnet and FTP c. frame relay and ATM d. frame relay and FTP

c. central office

On the other end of the local loop is the local telephones company's ______. a. trunk b. interLATA c. central office d. intraLATA

a. virtual LAN

One of the more interesting applications for a dedicated segment network and a switch is creating a ________. a. virtual LAN b. dedicated LAN c. Shared LAN d. local LAN

True

Perhaps the strongest advantage of a local area netowrk is its capability of allowing users to share hardware and software resources

d. HTTP

The Web server software accepts ______ requests from Web browsers connected to the Internet. a. ARP b. DHCP c. NAT d. HTTP

D. Logical

The ____ design of a network determines how the data moves around the network from workstation to workstation. a. electrical c. physical b. data d. logical

a. network

The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals. a. network c. print b. file d. operating system

b. Simple Mail Transfer Protocol (SMTP)

The _____ is an Internet protocol for sending and receiving an e-mail and is used to perform the transfer a. Address Resolution Protocol (ARP) b. Simple Mail Transfer Protocol (SMTP) c. File Transfer Protocol (FTP) d. Transport Control Protocol (TCP)

b. service level agreement

The _____ is the main telecommunications line through the network, connecting the major router sites across the country a. star topology b. ARPANET c. mid-level network d. backbone

b. operating system

The _____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer a. print server b. operating system c. file server d. user system

A. bus/tree

The _____ topology consists of a simple cable, or a bus, to which all devices attach. A. bus/tree B. token ring C. ring star D. star

b. Domain Name System (DNS)

The ______ is a large, distributed database of Internet addresses and domain names. a. Uniform Resource Locator (URL) b. Domain Name System (DNS) c. Hypertext Transfer Protocol (HTTP) d. Hypertext Markup Language (HTML)

d. carrier sense multiple access with collision detection (CSMA/CD)

The most popular contention-based protocol is ____. a. token ring b. round-robin c. carrier sense multiple access with collision avoidance (CSMA/CA) d. carrier sense multiple access with collision detection (CSMA/CD)

c. Voice over IP (VoIP)

The practice of making telephone calls over the internet has had a number of difenent names, including packet voice, voice over packet, voice over the internet, internet telephony, and ______. a. HTML b. SMTP c. Voice over IP (VoIP) d. XHTML

c. File Transfer Protocol (FTP)

The primary functions of _______ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site a. Hypertext Transfer Protocol (HTTP) b. Domain Name Service (DNS) c. File Transfer Protocol (FTP) d. Internet Message Access Protocol (IMAP)

d. crash protection

The primary goal of _____ software is to perform crash stalling, or to try to keep the OS running long enough to perform a graceful exit. a. Antivitus b. network monitoring c. sniffer d. crash protection

b. switch

Whether shared or dedicated segments are involved, the primary goal of a(n) ______ is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network. a. hub b. switch c. repeater d. amplifier

a. fixed

With _____ routing, routing tables are created once, typically when network is installed, and then never updated again. a. fixed b. adaptive c. changing d. modifying

c. wide

____ area networks can cover large geographic distances, including the entire earth. a. personal b. local c. wide d. universal

b. Transport Control Protocol (TCP)

_____ is a common application layer protocols that servers and the internet use to deliver streaming audio and video data to a user's browser a. Secure Shell (SSH) b. Transport Control Protocol (TCP) c. Real-Time Protocol (RTP) d. Voice over IP (VoIP)

d. Constant bit rate (CBR)

_____ is the most expensive ATM class of service. a. Variable bit rate (VBR) b. Available bit rate (ABR) c. Unspecified bit rate (UBR) d. Constant bit rate (CBR)

b. NAT

_____ lets a router represent an entire local area network to the Internet as a single IP address. a. ICMP b. NAT c. ARP d. UDP

b. centralized

_____ routing involves storing all the routing information at one central location a. distributed b. centralized c. remote d. fixed

b. connectionless

______ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged. a. FTP b. connectionless c. Connection-oriented d. Reliable service

c. Frame relay

______ is a packet-switching network that was designed for transmitting data over fixed lines a. T-1 b. IntraLATA c. Frame relay d. InterLATA

a. Unix

______ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computer and network servers. a. Unix b. linux c. windows ME d. windows 95

b. Unified messaging

______ means that users utilize a single desktop application to send and receive e-mail, voice mail, and fax a. Interactive voice response b. Unified messaging c. Fax processing d. Third-party call control

c. remote access

______ software allows a user to access all of the possible functions of a personal computer workstation from a mobile network or remote location a. network monitoring b. sniffer c. remote access d. antispyware

b. RAID-1

______ technique is also known as disk mirroring. a. RAID-0 b. RAID-1 c. RAID-3 d. RAID-5

d. Address Resolution Protocol (ARP)

_______ takes an IP address and translates it into the appropriate medium access control layer address for delivery on a local area network a. Transport Control Protocol (TCP) b. User Datagram Protocol (UDP) c. Network Address Translation (NAT) d. Address Resolution Protocol (ARP)

b. PBX graphic user interface

_____means that different icons on a computer screen represent common PBX functions such as call hold, call transfer, and call conferencing, making the system easier for operators to use a. Third-party call control b. PBX graphic user interface c. Fax-back d. Call filtering

c. router

the ____ is used to connect local area networks to wide area networks a. hub b. repeater c. router d. bridge

b. Hypertext Transfer Protocol (HTTP)

to transfer Web pages, the Internet uses the _____. a Telnet b. Hypertext Transfer Protocol (HTTP) c. e-commerce d. Network Address Translation (NAT)


Set pelajaran terkait

Chapter 44: Digestive and Gastrointestinal Treatment Modalities

View Set

4.7 - Lower Bounds and Θ Notation

View Set

Periodic Table of Elements (1-12)

View Set

Business, Ethics & Society: Exam 3 Review

View Set

AP Computer Science Project Stem Chp. 1

View Set

SLS Strategies For Success Final (Chapter 5-7)

View Set

Assemblies and the Global Assembly Cache

View Set