Hardware and Software Exam 2
Analog Signal
A signal may take on a continuous range of values, in which case it is known as a(n)
Virtualization
A technique called ____________ is where an individual computer system is used to simulate multiple computers, all sharing the same CPU and I/O facilities.
Collision
A _____________ occurs when multiple nodes access and send data simultaneously in such a way that their messages become mixed together and garbled.
Digital Signal
A binary discrete signal is usually called a(n)
User Datagram Protocol (UDP)
A connectionless protocol used instead of TCP for some applications is
Frame
A data packet in an Ethernet network is called a(n)
Asynchronous
For modems that transmit data one byte at a time the technique to synchronize the two systems is to provide clear start and stop signals for the data. This technique is known as ______________ transmission.
Is just another I/o device
From the perspective of a computer, the network
Interrupt handler program
After interrupting a program in execution, and saving the program's context, the computer then branches to a special program known as the
Which of the following can be used to characterize a communications channel?
All
Frequency
Hertz, abbreviated Hz, is the unit used to measure
Motherboard
In most computer systems, the CPU, memory, and other major components are mounted to wiring on a printed circuit board known as a(n)
QoS
In part, ___________________ focuses on methods to reserve and prioritize channel capacity to favor packets that require special treatment.
Traps or exceptions
Internal interrupts caused by events related to problems or special conditions within the computer itself are sometimes called
Nonmaskable
Interrupts that can never be temporarily disabled by program instructions are called
Phase
It is possible to measure the position of a sine wave with respect to a reference sine wave. The difference, measured in degrees, is known as the ___________ of the sine wave.
Multiplexing
It is possible to share a channel among multiple sender-receiver pairs, using one of several ____________ techniques.
High priority events
Power failures, internal time-sensitive events, or external events that are time sensitive will trigger interrupts that are
integrity
Protecting the content of data communication against changes is known as
Attenuation
Signal loss is the reduction of a signal that occurs in a medium as a function of the physical length of the channel. This is known as
Analog
Sound is an example of a(n) ____________ signal.
CSMA/CD
Switched Ethernet does not actually implement the _______________ protocol, because connections are point-to-point and messages can't become mixed together and garbled.
lane
The PCI-Express is made up of a bundle of thirty-two serial, bidirectional point-to-point buses. Each bidirectional bus is called a(n)
protocol stack
The TCP/IP and OSI models are conceived and implemented as a hierarchical __________, in which each layer at the sending node contributes information that will be used by the corresponding peer layer at the receiving node.
isochronous data transfer
The USB protocol allows packets to be scheduled for delivery at regular time intervals. This technique is known as
Network Layer
The ___________ is responsible for the addressing and routing of packets from the source end node through intermediate nodes, step by step, to their proper final destination.
Bandwidth
The ______________ of a channel is the range of frequencies that are passed by the channel with only a small amount of attenuation.
system bus
The circuitry that connects the CPU to memory and to all the various modules that control I/O devices is called the
availability
Using encryption can be helpful in mitigating network security issues except
vectored interrupt
When the device generating the interrupt request identifies its address as part of the interrupt, it is called
Noise
Which of the following is NOT a characteristic of a sine wave?
LTE (Long Term Evolution)
Which of the following is a contender for a cellular technology global standard?
A way of buffering large amounts of data
Which of the following is not a function of how interrupts are used?
Increased security
Which of the following is not a reason to create clusters of computers?
Peripheral devices must operate only in block mode.
Which of the following is not a requirement for a computer system to handle I/O in a sufficient and effective manner?
SMS
Which of the following is not part of the TCP/IP protocol suite?
Diffserv capable nodes
Modern routers, sometimes called ____________, can prioritize and route packets based on the packet class.
Packet Sniffing
Reading data in all the packets as they pass through the network is known as
magnetic and optical disk storage devices
SATA stands for Serial Advanced Technology Attachment; it replaces an older standard, IDE (Integrated Drive Electronics), and is used primarily as an interface for
ARP
What protocol is used to discover the relation between an IP address and a corresponding MAC address?
Repeators
What specific device is used to retransmit digital signals over long distances maintaining the integrity of the data?
medium access control; logical link control
The data link layer is divided into _____________ and ____________ sublayers.
Channel subsystem
The input-output architecture based on separate I/O processors and used on IBM mainframes is known as a(n)
Clustering
The method of connecting loosely coupled computers together with a dedicated communication channel or link that passes messages between machines is called
Programmed I/O
The method of transferring data one word at a time from the CPU to a device is called
INT
The mnemonic for the x86 architecture instruction that simulates an interrupt is
I/O device and memory
The primary purpose of channel programs is to transfer data using DMA between
Jitter
The variation in delay from packet to packet is known as _________. It is a particularly important parameter in the transmission of video and audio.
twisted-pair cable
_____________ is the most common medium used for standard telephone and most local area network wiring.
Digital
___________________ transmission has the advantage that it can incorporate error correction directly into the signal, which means a higher likelihood that the original data can be reproduced exactly, error-free, at the receiving end of the channel.