Mid-Term | Data Communications and Networks
____________________ is an unwanted coupling between two different signal paths.
Crosstalk
____________________ is a relative measure of signal loss or gain and is used to measure the logarithmic loss or gain of a signal.
Decibel
A(n) ____________________ is essentially a filter that allows the signal to pass in one direction only.
Echo Suppressor
Industrial environments with heavy machinery produce ____________________ that can interfere with improperly shielded cables.
Electronic Noise
____________________ shift keying uses two different frequency ranges to represent data values of 0 and 1.
Frequency
A(n) ____________________ license, operating system user license, and controlled number of concurrent users license all refer to essentially the same situation.
Interactive User(?)
When a digital signal is being transmitted, the rises and falls of the signal can start to shift, or become blurry, and thus produce ____________________.
Jitter
The 802.11g standard is frequently called ____. a) Wi-Fi 3 b) Wi-Fi 4 c) Wi-Fi 5 d) Wi-Fi 6
NOT 4 (6?)
____ are then typically stored in a hierarchical file system a) Logs b) Applications c) Websites d) Office and Media Files
NOT A
____ are then typically stored in a hierarchical file system. a) Logs b) Application c) Websites d) Office and Media Files
NOT A
____ shift keying incorporates four different phase angles, each of which represents 2 bits. a) Quadrature Amplitude b) Quadrature Frequency c) Quadrature Noise d) Quadrature Phase
NOT A
Considering that the many kinds of servers' workloads rely on data, a(n) ____________________ application draws on data stored in a database.
NOT DBMS
USB is a ____________________ cable because a peripheral connected using a USB cable can simply be plugged in and turned on, and the computer dynamically recognizes the device and establishes the interface.
NOT Hot pluggable full duplex?
____________________ are personal computers or smartphones where users connect to computer networks.
PAN(?)
____ allows some underlying configuration, but developers can mostly focus on their development work without having to devote time to managing a network infrastructure. a) XaaS b) PaaS c) SaaS d) IaaS
PaaS
The ____________________ of a signal is the position of the waveform relative to a given moment of time, or relative to time zero.
Phase
The ____________________ connection is the only direct connection between sender and receiver and is at the physical layer, where actual 1s and 0s are transmitted over wires or airwaves.
Physical
Converting analog data to digital signals is generally called ____________________.
Pulse Code Modulation (PCM)
A(n) ____________________ converts the local area network data into wide area network data.
Router
____________________ can listen to traffic on a network and determine if invalid messages are being transmitted, report network problems such as malfunctioning NICs, and detect traffic congestion problems.
Sniffers
The ______________ layer of the TCP/IP protocol suite is responsible for making sure that what leaves one end of the network arrives at the other end of the network exactly the same.
Transport
____________________ dedicates two or four bytes for each encoded symbol.
UTF-16
____________________ dedicates one to four bytes for each encoded symbol.
UTF-8
____________________ is a relatively continuous type of noise and is much like the static you hear when a radio is being tuned between two stations.
White Noise
A reliable backup strategy called ____ includes at least three complete copies of data stored on at least two different types of media with at least one copy stored offsite and, for greater protection, at least one copy kept offline from the remainder of the network. a) 3-2-1-1- Rule b) Happy Paranoid Rule c) 4-steps Rule d) 4-Fold Protection Rule
a) 3-2-1-1 Rule
The ____ topology consists of a simple cable to which all devices attach. a) Bus b) Token Ring c) Ring Star d) Star
a) Bus
To minimize the effect of echo, a device called a(n) ____ can be attached to a line. a) Echo Suppressor b) Repeater c) Amplifier d) Hub
a) Echo Suppresor
The addition of control information to a packet as it moves through the layers is called ____. a) Encapsulation b) Overloading c) Payload d) Filtering
a) Encapsulation
____ cable is the medium least prone to generating errors. a) Fiber-Optic b) Coaxial c) Twisted Pair d) Copper-Based
a) Fiber-Optic
A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository or ____ server. a) File b) Printer c) Database d) Application
a) File
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. a) Hub b) Switch c) Router d) Repeater
a) Hub
____ technology is the fastest option for fiber-optic cable. a) Laser b) LED c) Glass-Based d) Plastic-Based
a) Laser
____ modulation, which is commonly employed in contemporary modems, uses each signal change to represent 4 bits. a) Quadrature Amplitude b) Quadrature Frequency c) Quadrature Noise d) Quadrature Phase
a) Quadrature Amplitude
In a fiber-optic cable, when a signal reaches the other end of the cable, some of the light is reflected back into the cable to its source, and this phenomenon is called ____. a) Reflectance b) Attenuation c) Mirroring d) Refraction
a) Reflectance
In the context of cloud computing, ____ refers to the ability of resources to be adjusted over time in response to changing needs a) Scalability b) Pay-as-you-go c) Self-Service d) Elasticity
a) Scalability
A LAN can interface with other LANs and with WANs such as the Internet. a) True b) False
a) True
A byte consists of 8 bits. a) True b) False
a) True
A cold storage scheme has a lower cost per stored byte and a higher cost per data access. a) True b) False
a) True
A hub is a simple device that requires virtually no overhead to operate. a) True b) False
a) True
A subscription license relies on a monthly or annual payment schedule to continue using the application. a) True b) False
a) True
ASCII is now a subset of Unicode. a) True b) False
a) True
AWS and GCP are examples of CSP. a) True b) False
a) True
All ports included in the broadcast message are collectively called a broadcast domain. a) True b) False
a) True
An inherent problem with the NRZ-L and NRZI digital encoding schemes is that long sequences of 0s in the data produce a signal that never changes. a) True b) False
a) True
Category 5 twisted pair has a higher number of twists per inch than the Category 1 to 4 wires. a) True b) False
a) True
Data transmission speed is the number of bits per second that can be transmitted. a) True b) False
a) True
In a sliding-window error control system, a receiver may acknowledge multiple packets with a single ACK. a) True b) False
a) True
Modern coaxial technology can typically support data transfer speeds up to 1 Gbps. a) True b) False
a) True
The TCP/IP protocol suite does not have rigidly defined layers as the OSI model does a) True b) False
a) True
The data link layer of the OSI model can incorporate some form of error detection software. a) True b) False
a) True
The logical link control sublayer defines the layout or format of the data frame, simply called the frame. a) True b) False
a) True
The physical layer has no awareness of the meaning of the data bits being transmitted. a) True b) False
a) True
The transport layer header contains as receiver address a port number. a) True b) False
a) True
White noise is dependent on the temperature of the medium. a) True b) False
a) True
Wi-Fi 802.11n standard was the first one to introduce the multiple input multiple output technology. a) True b) False
a) True
The ____ scheme tries to satisfy the synchronization problem and avoid the "baud equals two times the bps" problem. a) Manchester b) 4B/5B c) Differential Manchester d) NRZ-L
b) 4B/5B
____ twisted pair was designed to transmit 10 Gbps of data over a local area network for distances up to 100 meters (328 feet). a) Category 5 b) Category 6a c) Category 5e d) Category 6
b) Category 6a
The LLC and MAC sublayers are divisions of the ____ OSI model layer. a) Transport b) Data Link c) Network d) Physical
b) Data Link
In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub. a) Shared b) Dedicated c) Distributed d) Remote
b) Dedicated
A hub is designed to perform much faster than a switch. a) True b) False
b) False
Amplitude shift keying is restricted to only two possible amplitude levels: low and high. a) True b) False
b) False
Creating a data frame does not increase the number of bits to be transmitted. a) True b) False
b) False
Most switches are transparent, which means they learn by themselves. a) True b) False
b) False
One of the major problems with Unicode is that it cannot represent symbols other than those found in the English language. a) True b) False
b) False
The 802.11n standard has a greater maximum theoretical throughput than the 802.11ac standard. a) True b) False
b) False
The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. a) True b) False
b) False
The application development process that breaks an application into smaller components is called deduplication. a) True b) False
b) False
The application layer of the OSI model is responsible for token management. a) True b) False
b) False
The spanning tree algorithm allows you to run cable spans between two or more networks. a) True b) False
b) False
The trailer part of a data link frame never holds error detection information. a) True b) False
b) False
When a parity bit is assigned to ASCII, the Hamming distance becomes 4. a) True b) False
b) False
____ is the result of small timing irregularities that become magnified during the transmission of digital signals as the signals are passed from one device to another. a) White Noise b) Jitter c) Attenuation d) Echo
b) Jitter
The ____ layer of the TCP/IP protocol suite is not a logical connection. a) Application b) Physical c) Transport d) Network
b) Physical
The ____ layer of the OSI model performs a series of miscellaneous functions necessary for presenting the data package properly to the sender or receiver. a) Transport b) Presentation c) Applications d) Session
b) Presentation
When a light signal inside the cable bounces off the cable wall and back into the cable, this is called ____. a) Refraction b) Reflection c) Blinking d) Friction
b) Reflection
____ is similar in concept to software-defined networking since it abstracts the control of storage management away from the physical or virtual disks storing the data. a) SDN b) SDS c) SD-Branch d) SD-WAN
b) SDS
____ twisted pair is the least quality twisted pair wire that should be used in a data/voice application. a) Category 1 b) Category 3 c) Category 5e d) Category 7a
c) Category 5e
A current or signal in one wire can produce an unwanted current or signal, called ____, in a second wire. a) Current-Talk b) Signal-Talk c) Crosstalk d) Crossover
c) Crosstalk
High humidity and wet weather can cause an increase in electrical ____ over a telephone system. a) Compression b) Attenuation c) Jitter d) Crosstalk
c) Crosstalk
The ____ layer of the OSI model is responsible for taking data from the network layer and transforming it into a frame. a) Transport b) Physical c) Data Link d) Session
c) Data Link
LC, ST, SC, and MTRJ are connector types for ____ cables a) RJ45 b) Twisted Pair c) Fiber-Optic d) Coaxial
c) Fiber-Optic
White noise is also called thermal noise or ____ noise. a) Crosstalk b) Jitter c) Gaussian d) Spike
c) Gaussian
It is called ____ the kind of storage where there is a high cost per stored byte and low cost per data access. a) Cold Storage b) Coarse Storage c) Hot Storage d) Fine-Grain Storage
c) Hot Storage
One encoding technique that converts analog data to a digital signal is ____. a) NRZ-L b) Manchester c) Pulse Code Modulation (PCM) d) NRZ-I
c) Pulse Code Modulation (PCM)
____ are the computers that store network software and shared or private user files. a) Switches b) Routers c) Servers d) Hubs
c) Servers
The Internet "talks" only ____, so users must use software that supports this protocol. a) IPX/SPX b) DSL c) TCP/IP d) FTP
c) TCP/IP
As ____ on a CSMA/CD network increased, the rate of collisions increased, which further degraded the service of the network. a) Errors b) Noise Amplitude c) Traffic d) Transmission Speed
c) Traffic
The ____ layer of the OSI model makes sure the data received at the very end of a transmission is exactly the same as the data originally transmitted. a) Application b) Session c) Transport d) Network Access
c) Transport
One of the greatest advantages of ____ is the efficient use of resources, as many servers can run on a single physical machine. a) OSs b) NOSs c) Virtualization d) RAIDs
c) Virtualization
Causes of jitter can include electromagnetic interference, ____, passing the signal through too many repeaters, and the use of lower-quality equipment. a) Coding b) Sampling c) Compression d) Crosstalk
d) Crosstalk
In the directory service AD, the ____ can be objects, like users, groups of users, computers, applications, and network devices. a) Forest b) Tree c) Domain d) Leaves
d) Leaves
A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites or another desktop machine at home. a) Single-User-Single-Station b) Interactive User c) Site d) Single-User-Multiple-Station
d) Single-User-Multiple-Station
A ____ protocol's function is simply to inform the transmitter what piece of data is expected next. a) CRC-16 b) CRC-32 c) Stop-and-wait d) Sliding Window
d) Sliding Window
The 802.11ax standard is frequently called ____.
d) Wi-Fi 6
____ systems are good at sending low-speed signals over short to medium distances. a) Thunderbolt b) Wi-Fi 2 c) Wi-Fi 1 d) ZigBee
d) ZigBee
The ____________________ that accompanies a software product is a legal contract and describes a number of conditions that must be upheld for proper use of the software package.
licensing agreement
____________________ is the opposite of attenuation.
not jitter
An interesting aspect of Zigbee is how devices are able to keep ____________________ low.
power consumption
____ is a disadvantage of virtualization (choose two). a) Cost and energy savings b) Licensing Costs c) Single point of failure d) Fault and threat isolation
wouldnt let me choose two, just saying C was wrong
____________________ was designed to support 100-Mbps baseband signals using fiber optic.
100BaseTX
