2112

Ace your homework & exams now with Quizwiz!

In which layer of the Internet Model would the HTTP standard be used?

Application

A(n) _________ develops a specific system and companies purchase the service without ever installing the system on their own computers.

Application Service Provider (ASP)

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.

1024

If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is:

9100 Hz

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:

>99%

A _____________ is the input-output hardware device at the user's end of a communication circuit.

Client

_____ is one of the most commonly used coding schemes used in data transmission.

ASCII

Hardware and software used to transform analog voice signals to digital signals and digital signals to analog signals.

Codec

True and False: The application architecture called the distributed computing model uses the "thick" client approach.

False

True or False: A "thin client" approach places most of the application logic on the client.

False

True or False: A key advantage of digital transmission is it permits only low transmission rates.

False

True or False: A local area network (LAN) connects other LANs and BNs located in different areas to each other and to wide area networks in a span from 3 to 30 miles.

False

True or False: A server can only perform one function on a network.

False

True or False: An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.

False

True or False: As the demand for more and more network applications grow; host-based computing becomes the best solution.

False

True or False: Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable

False

True or False: De facto standards never evolve into de juro standards.

False

True or False: De juro standards are always developed before de facto standards.

False

True or False: Development of online batch systems is an important future trend in communication and networking.

False

True or False: Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.

False

True or False: Digital transmission produces more errors than analog transmission.

False

True or False: Error collision is a major function of Error Control.

False

True or False: Error detection techniques include bit checks.

False

True or False: Fiber optic cable carries signals in traditional electrical form.

False

True or False: Frequency division multiplexing divides the circuit into a set of different time slots.

False

True or False: HTTP is a data link layer standard.

False

True or False: Host-based and client-based networks are similar in that the client computer performs most of the work.

False

True or False: In a multipoint circuit configuration, each computer can use the circuit at the same time.

False

True or False: In simplex transmission, the data flows in both directions at the same time.

False

True or False: One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.

False

True or False: One property of a WAN is that it connects a group of computers in a small geographic area such as room, floor, building or campus.

False

True or False: Point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.

False

True or False: Polling is the process of permitting all clients to transmit or receive at any time.

False

True or False: Providing error-free transmission of data is a function of the physical layer.

False

True or False: Sparky is a component of a network.

False

True or False: Specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it is a function of the data link layer.

False

True or False: T1 is an application layer standard.

False

True or False: The data link layer accepts messages from the network layer and controls the hardware that transmits them.

False

True or False: The earliest data communications networks were client-server networks.

False

True or False: The standard protocol for communication between a Web browser and a Web server is the web protocol.

False

True or False: To use the Web, each client computer requires a data link layer software package called a Web browser.

False

True or False: When polling in a controlled access environment, communication collisions can occur

False

True or False: With contention, a computer does not have to wait before it can transmit. A computer can successfully transmit at anytime.

False

True or False: With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.

False

The internet provides:

a) General purpose platform b) All services are built on top c) Services are supplied by application programs d) New services are created without changing the platform

In a client-server network, _________ gets software from different vendors to work together. a) a front-end processor b) serverware c) middleware d) centerware e) programmer

c) middleware

_________ is an application program function that deals with storing and retrieving data.

data storage

Transmission speeds

differ widely among media

Two fundamentally different types of data are:

digital and analog

Modern (1990s and beyond) data communication networks are characterized by:

distributed systems that rely heavily on networking

Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?

Phase

From lowest level to the highest level, the correct order of layers for the Internet Model is:

Physical, Data Link, Network, Transport, Application

Data Communications combines

Physics, Electrical Engineering, and Mathematics to send information over a distance

The ____________ layer of the OSI model is responsible for data format translation.

Presentation

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.

Protocol

Which of the following is not an error detection method used in the data link layer?

Pulse code checking

The motivation for computer networks was to enable _________________________.

Resource sharing

True or False: Error Detection techniques generally perform some mathematical function on the message, and sending the result along with the message to the destination

True

True or False: Ethernet is a standard used at the Data Link layer of the Internet or OSI model.

True

True or False: Ethernet, a common LAN technology, uses Manchester encoding.

True

True or False: Frequency is the number of cycles per second and is expressed in Hertz.

True

True or False: Frequency modulation refers to the changing of the height of the sound wave.

True

True or False: In 1874, Alexander Graham Bell developed the concept for the telephone.

True

True or False: In a client-server network, the presentation logic is the responsibility of the client computer.

True

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

In 1984, a federal judge broke up a highly contested telephone service monopoly and:

divided AT&T into two parts: one part for long distance service, and a second part, comprised of seven regional operating companies, for local telephone service

____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.

flipped bits

Having a conversation with someone using a cellular phone is an example of _________ transmission.

full-duplex

________________ separate channels to reduce interference between channels in frequency division multiplexing.

guardbands

The two basic types of media are:

guided and unguided (radiated)

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.

half-duplex

The __________________ is one of the most important developments in the history of both information systems and communication systems.

internet

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.

intranet

Asynchronous transmission:

is also known as start-stop transmission

An N-tiered architecture:

is generally more "scalable" than a three-tiered architecture

Media access control:

is not very important in point-to-point with full duplex configuration

In ARQ, a NAK:

is sent by the recipient if the message contains an error

Synchronous transmission:

is used to transmit a "frame" or "packet" of data at a time

Optical media:

less likely to suffer from noise than electrical media

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.

mainframe

_____________ is a line-of-sight type of wireless media.

microwave

In a client-server network, _________ gets software from different vendors to work together.

middleware

The acronym, Modem, stands for _________________.

modulator/demodulator

A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.

multiplexer

One disadvantage of the ____________ architecture is that places a greater load on the network

n-tier

The _________ layer is responsible for routing of messages from the sender to the final destination.

network layer

Cross-talk:

occurs when one circuit picks up signals in another

Frequency division multiplexing:

operates by dividing the signal into different frequencies

In a ___________ architecture, computers are both client and server, thus sharing the work.

peer-to-peer

Networks that are designed to connect similar computers that share data and software with each other are called:

peer-to-peer networks

Data is physically transmitted from one computer or terminal to another in the ________ layer.

physcial

A "thick client" architecture approach:

places all or almost all of the application logic on the client

A "thin client" architecture approach:

places all or almost all of the application logic on the server

________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive.

polling

In the three tier architecture the software on the client computer is responsible for____________.

presentation logic

________ is the presentation of information to the user and the acceptance of the user's commands.

presentation logic

With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic, remember, choose the best answer.

presentation; data access

Which of the following is not an important factor to consider when selecting media to be used in a network?

prestige value of the type of media

____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.

quadrature amplitude modulation

When all bits of a character are transferred one after another, the bits are transferred in ___________ mode.

serial

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.

server

In the Internet Model, the application layer corresponds to the _______________, layer(s) of the OSI model.

session, presentation, application

The three stages of the de juro standardization process are ______________________.

specification, identification of choices, and acceptance

The function of the file server is to:

store data and software programs that can be used by client computers on the network.

As part of the five-layer network model used in our textbook, the data link layer sits directly between:

the physical and network layers

How are the application architecture functions split up in a client-server network?

the presentation logic is on the client, while the data storage and data access logic are on the server

An HTTP response status code of 404 means that:

the requested page was not found

One underlying problem with a host-based network is that:

the server can get overloaded since it must process all messages

Which of the following is not true a dumb terminal:

you can install your latest application software on it

True or False: Contention is commonly used with Ethernet local area networks.

True

True or False: Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.

True

True or False: Data compression can increase the throughput of a communication link.

True

The height of a wave is called its:

amplitude

____________ is not a function of a data link protocol.

amplitude shift keying.

Which of the following is not a general function by any application program?

application access storage

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network.

application architecture

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.

application logic

The typical range of human hearing is:

0 to 4,000 Hz

With respect to converting digital data into analog signals, AM stands for:

Amplitude Modulation

A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet.

Extranet

Serial mode transmission is much faster than parallel mode transmission.

False

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.

Hypertext Transfer Protocol

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

IP

Which of the following is true with respect to the data link layer?

It is responsible for getting a message from one computer to another (one node to another) without errors.

The Big Responsibilities of the Data Link Layer include all but

Linking Hypertext data from one page to the next

Marc Andreessen led a team that developed the first graphical Web browser, which was called:

Mosaic

True and False: The network layer is responsible for routing messages from the source computer to the destination computer.

True

True or False: A network computer is designed primarily to communicate using Internet based standards, but has no hard disk. It has only limited functionality.

True

True or False: A request line for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands.

True

True or False: A walkie-talkie is an example of half-duplex transmission.

True

True or False: According to John Chambers, CEO of Cisco (a leading networking technology company), the information age is the second Industrial Revolution.

True

True or False: An Application Service Provider (ASP) develops a specific system and companies purchase or rent the service without installing the system on their own computers.

True

True or False: Bandwidth is the difference between the highest and lowest frequencies in a band.

True

True or False: Coding schemes are groups of bits that translate into the "alphabet" of any given system.

True

True or False: In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.

True

True or False: Manchester encoding is a special type of bipolar signaling in which the signal is changed from high to low or from low to high in the middle of the signal using Phase Shift Keying

True

True or False: Media access controls refer to the need to control when computers transmit.

True

True or False: Middleware is the software that sits between the application software on the client and the application software on the server.

True

True or False: One way to reduce quantizing errors is to increase the sampling rate of the analog signal.

True

True or False: Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency.

True

True or False: Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.

True

True or False: Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.

True

True or False: The Internet was started by the U.S. Department of Defense in 1969 as a network of four computers called ARPANET

True

True or False: The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.

True

True or False: The fundamental problem in client-based networks is that all data on the server must travel to the client for processing.

True

True or False: The medium is the physical matter or substance that carries the voice or data transmission.

True

True or False: The specification stage of the de juro standardization process consists of developing nomenclature and identifying the problems to be addressed.

True

True or False: The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.

True

True or False: Undesirable stray electrical voltage can cause data communication errors.

True

True or False: Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.

True

True or False: When using contention access control, communication collisions can occur.

True

True or False: he predominant method of transferring information internally in a computer is via parallel mode.

True

A local area network is

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.

A backbone network is

a high speed central network that connects other networks in a distance spanning up to several miles.

A metropolitan area network is

a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.

ARQ means that:

a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error

Another term for the weakening of a signal over distance is:

attenuation

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a) Hypertext Transfer Protocol b) File Transfer Protocol c) Simple Mail Transfer Protocol d) Internet Message Access Protocol e) Hyperlink Transfer Protocol.

a) Hypertext Transfer Protocol

Techniques used to protect circuits from noise include:

a) Insulation b) Shielding c) Twisting

The software that runs on the mail server is referred to as the ____________ a) Mail transfer agent b) Mail user agent c) Microsoft Outlook d) Web server e) SMTP

a) Mail transfer agent

What is true about net neutrality?

a) Net neutrality means that for a given type of content (i.e. email, web, video, etc), all content providers are treated the same. b) Net neutrality prevents ISP's from giving priority to some content providers, while slowing down others c) Currently Under Attack

The most commonly used e-mail standard is: a) Simple Mail Transfer Protocol b) X.400 c) CMC d) Post Office Protocol e) Telnet

a) Simple Mail Transfer Protocol

To interact with the World Wide Web, a client computer needs an application layer software package called a: a) Web browser b) Web server c) Telnet package d) Uniform Resource Locator package e) Router package

a) Web browser

Digital Subscriber Line:

a) is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local loop b) combines analog transmission and frequency division multiplexing c) involves the use of a customer premises equipment (CPE) d) uses a combination of amplitude and phase modulation

Microwave Transmisson:

a) is a type of high frequency radio communication b) requires a clear line-of-sight path c) is typically used for long distance data transmission d) does not require the laying of any cable

An N-tiered architecture: a) is generally more "scalable" than a three-tiered architecture b) is generally less "scalable" than a three-tiered architecture c) uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d) uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e) puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers

a) is generally more "scalable" than a three-tiered architecture

Data communications and networking can be considered as a global area of study because:

a) new technologies and applications emerge from a variety of countries and spread around the world b) the technologies enable global communication

In the three tier architecture, the software on the client computer is responsible for the ____________. a) presentation logic b) application logic c) data access logic d) data storage e) application storage

a) presentation logic

The ________________ cloud deployment model provides the highest levels of control, privacy and security. a) private b) public c) community d) hybrid

a) private

A response status code of 404 means: a) the requested page was not found b) the server is currently unavailable c) the sever is currently busy d) your browser is incompatible with the Web server software. e) your browser needs to be updated to the latest version.

a) the requested page was not found

With a client-based network, one fundamental problem is that:

all data on the server must travel to the client for processing

Which of the following is not an example of a mail user agent software package? a) Outlook Express b) Microsoft Word c) Eudora d) Microsoft Outlook e) All of these are mail user agent packages

b) Microsoft Word

Which of the following is not true about Telnet? a) Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b) Telnet poses no security threat. c) Telnet was designed in the early days of the Internet. d) Keystrokes are sent over the network in clear text. e) One program that conforms to the Telnet standard is PuTTY.

b) Telnet poses no security threat.

The standards H.320, H.323, and MPEG-2 are commonly used with a) Telnet b) Videoconferencing c) Email d) IM e) Microsoft Office

b) Videoconferencing

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a) client b) server c) middleware d) hardware e) software

b) server

One underlying problem with a host-based network is that: a) there are economies of scale because all computer resources are centralized b) the server can get overloaded since it must process all messages c) the architecture is relatively simple and works well d) the server is the one point of control which simplifies security e) clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

b) the server can get overloaded since it must process all messages

The term ______________ refers to high speed communication circuits such as DSL.

broadband communications

____________ is not an important middleware standard. a) CORBA (Common Object Request Broker Architecture b) Distributed Computed Environment (DCE) c) Asynchronous Transfer Mode (ATM) d) Open Database Connectivity (ODBC) e) none of the above is an appropriate answer

c) Asynchronous Transfer Mode (ATM)

The acronym, HTML, refers to: a) Header Markup Language b) Hypertext Markup Locator c) Hypertext Markup Language d) Hypertext Markup Library e) Hypertext Modulating Language

c) Hypertext Markup Language

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a) data storage b) data access logic c) application logic d) presentation logic e) application access storage

c) application logic

Client-server architectures: a) cannot connect computers that use different hardware b) are one of the least used network architectures today c) can use middleware to provide a standard way of communicating between software from more than one vendor d) assign the responsibility for the presentation logic to the server e) were the earliest type of network architectures

c) can use middleware to provide a standard way of communicating between software from more than one vendor

With the two-tier client-server architecture, the server is responsible for the ________ logic. a) application b) presentation c) data access d) session e) physical

c) data access

Another term for a mail user agent is: a) message transfer agent b) router agent c) e-mail client d) webcast package e) Web client

c) e-mail client

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a) message transfer agent b) router agent c) mail user agent d) Webcast package e) gateway agent

c) mail user agent

A "thick client" architecture approach: a) always is a two-tier network architecture b) always is an n-tiered architecture c) places all or almost all of the application logic on the client d) places all or almost all of the application logic on the server e) refers to the size of the cable connecting the clients to the network

c) places all or almost all of the application logic on the client

A "thin client" architecture approach: a) always is a two-tier network architecture b) always is an n-tiered architecture c) places all or almost all of the application logic on the client d) refers to the size of the cable connecting the clients to the network

c) places all or almost all of the application logic on the server

A ________ is a group of computers linked together so that they appear to act as one computer. a) workstation b) transaction terminal c) server farm d)network computer e) transaction terminal

c) server farm

How are the application architecture functions split up in a client-server network? a) the presentation logic and data storage are on the client, while the data access logic is on the server b) the data storage, data access, and presentation logic are on the client c) the presentation logic is on the client, while the data storage and data access logic are on the server d) the data storage and data access logic are on the client, while the presentation logic are on the server e) the presentation logic and data access logic are on the client, and the data storage is on the server

c) the presentation logic is on the client, while the data storage and data access logic are on the server

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a) browser b) application web c) web server d) operating system e) none of the above

c) web server

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a) broadcasting b) instant messaging c) webcasting d) H.323 e) net Meeting

c) webcasting

Client-Server architectures:

can use middleware to provide a standard way of communicating between software from more than one vendor

A ________ is a group of computers linked together so that they act as one computer.

cluster

Inverse multiplexing means:

combining several low speed circuits to enable them to be transmitted across one high speed circuit

Calculating the actual throughput of a data communication network is:

complex because many factors affect throughput

The integration of voice, video, and data communications is also known as __________.

convergence

An application program function is __________, or the processing required to access data.

data access logic

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a) private clouds b) hardware clouds c) storage services d) IaaS

d) IaaS

To get a page from the Web, a user must type in a URL, which stands for: a) Unknown Resource Locator b) Unknown Router Location c) Uniform Router Location d) Uniform Resource Locator e) Uniform Resource Library

d) Uniform Resource Locator

With a client-based network, one fundamental problem is that: a) the clients each must store all the data b) the server does not have any data storage capability c) the host or server must perform presentation logic, application logic, and data access logic at the same time d) all data on the server must travel to the client for processing e) the clients must perform the data storage logic

d) all data on the server must travel to the client for processing

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a) anonymous FTP b) data access logic c) fat client d) application architecture e) response status architecture

d) application architecture

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a) workstation b) transaction terminal c) cluster d) mainframe e) personal computer

d) mainframe

One disadvantage of the ____________ architecture is that places a greater load on the network. a) two-tier b) three tier c) one-tier d) n-tier e) layered

d) n-tier

Which of the following is not a general function by any application program? a) data storage b) data access logic c) application logic d) presentation logic e) application access storage

e) application access storage

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a) hashing b) encryption c) authentication d) identification e) compression

e) compression

IMAP (Internet Message Access Protocol): a) is a set of standards that define how email is to be processed between mail servers b) is exactly the same as SMTP c) copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d) is exactly the same as POP e) permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

e) permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

There are optional and required parts of an HTTP request. They are: a) request address, request body b) request address, request header, request body c) request line, request header d) request line, request body e) request line, request header, request body

e) request line, request header, request body

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

A "thin client" approach places most of the application logic on the client. true false

false

As the demand for more and more network applications grow; host-based computing becomes the best solution. true false

false

Host-based and client-based networks are similar in that the client computer performs most of the work. true false

false

The Simple Mail Transfer Protocol is the least commonly used e-mail standard. true false

false

The application architecture called the distributed computing model uses the "thick" client approach. true false

false

The earliest data communications networks were client-server networks. true false

false

Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. true false

false

_________________ is defined as the total number of information bits divided by the total number of bits in the transmission.

transmission efficiency

The fourth layer of the OSI model is called the __________ layer.

transport

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?

transport layer

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?

transport layer

In a client-server network, the presentation logic is the responsibility of the client computer. true false

true

Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. true false

true

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. true false

true

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. true false

true

The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data. true false

true

Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture. true false

true

The type of media usually installed on homes and businesses by the telephone company is called ____________.

twisted pair

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.

two

Pervasive networking means that:

virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates

The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:

wavelength division multiplexer

To interact with the World Wide Web, a client computer needs an application layer software package called a:

web browser

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.

web server

In general, controlled approaches:

work better than contention approaches for large networks that have high usage


Related study sets

AMNH genetic and genomic in nursing

View Set

Vocabulary Definitions: "All Summer in a Day" by Ray Bradbury

View Set

HUN2202 Nutrition Ch 12 Water and the Major Minerals

View Set

Chapter 13: Implementing Basic Differences Tests

View Set