IT 2600 midterm 1 study guide

Ace your homework & exams now with Quizwiz!

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing.

True

The most common protocol for dynamic addressing in TCP/IP networks is the Dynamic Host Configuration Protocol.

True

The specification stage of the de jure standardization process consists of developing nomenclature and identifying the problems to be addressed.

True

The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer

True

Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit.

True

Undesirable stray electrical voltage can cause data communication errors.

True

WDM is a version of FDM used in fiber-optic cables.

True

When we amplify the signal on an analog circuit, we also amplify any noise that is present on the circuit.

True

With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.

True

With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage.

True

Which of the following is not a protocol used at the application layer.

UDP

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

A backbone network is:

a high speed central network that connects other networks in a distance spanning up to several miles.

Which of the following is not a general function by any application program?

application access storage

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?

application layer address

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.

application logic

The _____________ of a circuit determines a circuits capacity.

bandwidth

Errors on a network can occur:

because of noise on the line

Which of the following is a function of the transport layer?

breaking long messages into several smaller messages

A MOOC(Massive Open Online Course) is an example of a(n)

massively online technology

Which of the following would be considered a type of wireless media?

microwave

IP addresses from 224 to 239 belong to Class D and are reserved for

multicasting

The _________ layer is responsible for routing of messages from the sender to the final destination.

network layer

Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?

newer version permits jumbo frames

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements.

onnectionless

Networks that are designed to connect similar computers that share data and software with each other are called:

peer-to-peer networks

The direction in which the sound wave begins is known as:

phase

Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?

phase

Dynamic addressing:

can solve many updating headaches for network managers who have large, growing, changing networks

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

With QoS routing different __________ are defined, each with different priorities.

classes of service

A _____________ is the input-output hardware device at the end user’s end of a communication circuit in a client-server network.

client

Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.

codec

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements.

connectionless

Which of the following is not a property of a WAN:

connects a group of computers in a small geographic area such as room, floor, building or campus.

Which of the following is NOT a property of a WAN:

connects a group of computers in a small geographic area such as room, floor, building or campus. spans hundreds or thousands of miles

With __________ ARQ, the sender immediately sends the next message or packet of data.

continuous Automatic Repeat Query

A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at?

physical

The ____________ layer of the OSI model is responsible for data format translation.

presentation

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.

protocol

Which of the following is not an error detection method used in the data link layer?

pulse code checking

____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.

quadrature amplitude modulation

_____________ refers to the difference between the original analog data and the approximation of that data using the techniques for translating from analog data to digital signals.

quantizing error

The _____________ is used by a computer to determine how messages will travel through the network.

routing table

The transport layer must break messages from the application layer into several _____ that can be sent to the network layer.

segments

TCP uses _____________ so that the destination station can reassemble the packets into the correct order.

sequence numbers

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.

server

______ is a group of computers linked together so that they appear to act as one computer.

server farm

In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model.

session, presentation and application

A(n) __________ circuit is another name for a multipoint configuration.

shared

The three stages of the de jure standardization process are ______________________.

specification, identification of choices and acceptance.

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:

> 99%

What is the broadcast address for the network the 170.10.5.5 subnet 255.255.0.0 host is on?

170.10.255.255

What is the broadcast address for the network the 170.10.5.5 subnet 255.255.0.0 host is on? (Work this out on paper)

170.10.255.255

What is the broadcast address of the network 172.23.255.0 255.255.255.0?

172.23.255.255

A typical TCP segment has a _______ header of control information.

192-bit

What is the first valid host on the subnetwork that the node 192.168.37.73/29 belongs to?

192.168.37.73

Given the subnet mask 255.255.255.252. How many host addresses are on this network?

2

Given the subnet mask 255.255.255.252. How many host addresses are on this network? (Work this out on paper)

2

The probability of detecting an error, given that one has occurred, using parity checking is about:

50%

Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:

splits the communication circuit vertically (with time slots) instead of horizontally

Which of the following is not a controlled access method of media access control?

CSMA/CD

______________ communication is most commonly used when the application data or message can fit into one single packet.

Connectionless

What is the broadcast address of the network 172.23.255.0 255.255.255.0? (Work this out on paper)

Correct Answers 172.23.255.255

An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization.

False

Based on the TIA/EIA 568-B structured cabling standard, the cabling that runs from the telecommunications closet to each work area is called backbone cabling.

False

Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.

False

Ethernet is an example of a network layer protocol.

False

Fiber optic cable can only be used on LANs.

False

Fiber optic cable carries signals in traditional electrical form.

False

Guided media refers to the type of media in which the message is broadcast through the air.

False

In simplex transmission, the data flows in both directions at the same time

False

Multimode fiber is capable of longer transmission distances than single mode fiber.

False

Nonreturn to zero is a type of unipolar signaling

False

Only the sender of a data transmission needs to be concerned about the rules or protocols that govern how it communicates with the receiver.

False

Parity checking can only detect an error when an even number of bits are switched.

False

TCP is the network layer protocol used on the Internet today.

False

TCP/IP is a data link protocol that is used on the Internet.

False

TCP/IP operates only as connection-oriented.

False

The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including the Internet itself.

False

The distance between repeaters or amplifiers on a telephone circuit is determined by the amount of power gained per unit length of the transmission.

False

The network layer address for IP is ten bytes long when using IPv4.

False

The network layer provides guaranteed end-to-end delivery of the message.

False

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.

False

The standard port number for Telnet is 53.

False

The transport layer routes messages through the network selecting the best path from the source to the destination station.

False

The two-tier e-mail architecture does not require any application software on the client computer.

False

Transmission efficiency refers to the percentage of bits transmitted without errors.

False

he transport layer routes messages through the network selecting the best path from the source to the destination station.

False

A car manufacturer may give access to certain portions of its network to some of its suppliers via the Internet. This is an example of an extranet.

True

At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them.

True

Cloud-hosted virtual desktops are now available through a service called DaaS allowing users to access the same client computer (virtual desktop) from any computer and any location.

True

Coding schemes are groups of bits that translate into the alphabet of any given system.

True

Computers produce digital data whose values are binary: 0 or 1.

True

Cyclical redundancy check is one of the most popular polynomial error-checking schemes.

True

Due to advances in high speed communication networks, the information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened.

True

For effective error detection and correction, extra error detection "data" must be included with each message

True

Frequency is the number of cycles per second and is expressed in Hertz.

True

Frequency modulation refers to the changing of the height of the sound wave.

True

HDLC is very similar to the SDLC synchronous data link protocol.

True

If a computer transmits a message containing "ABC" and the destination computer receives"abc" as the message, the message is corrupted.

True

The Enhanced Interior Gateway Routing Protocol is an interior routing protocol originally developed by Cisco.

True

If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is?

12800 bps - 16*8000

Enter the subnet the host 10.82.84.139/18 belongs to:

10.82.64.0

The typical range of human hearing is:

20 to 14,000 Hz

What is the class full subnet mask for the IP address 99.187.60.50?

255.0.0.0

Your ISP sent you the following information. Default Gateway 130.75.69.32/21 What is the proper subnet mask for this IP address(in dotted decimal format)?

255.255.248.0

_________created a service that allows organizations to transfer IPv4 addresses they dont need to another organization.

ARIN (American Registry for Internet Numbers)

_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.

Adding repeaters to a circuit

A(n) _________ is a specially formatted request used to perform IP address to data link address resolution.

Address Resolution Protocol request

With respect to converting digital data into analog signals, AM stands for:

Amplitude Modulation

____________ is not an important middleware standard.

Asynchronous Transfer Mode (ATM)

Which of the following would be a standard or protocol used at the Data Link layer of the Internet or OSI model?

Ethernet

A local area network (LAN) connects other LANs and backbone networks (BNs) located in different areas to each other and to wide area networks in a span from 3 to 30 miles.

False

A routing protocol used inside an autonomous system is called an exterior routing protocol.

False

Radio, microwave and satellite are all examples of guided media.

False - Guided Media Guided Transmission Media uses a cabling system that guides the data signals along a specific path . The data signals are bound by the cabling system . Guided Media is also known as Bound Media or Wired media

Baud rate is the number of bits transmitted per second.

False - The baud rate is the rate at which information is transferred in a communication channel. In the serial port context, "9600 baud" means that the serial port is capable of transferring a maximum of 9600 bits per second.

____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.

Flipped bits

Which of the following is not a data link layer standard?

HTTP

UDP is not commonly used for:

HTTP requests

______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message.

Hamming code

The acronym, HTML, refers to:

Hypertext Markup Language

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

IP

Which of the following is true with respect to the data link layer?

It performs error detection.

Which of the following is not a key advantage of digital transmission?

It permits only low transmission rates.

Which of the following is not true about ITU-T:

Its membership is limited to U.S. telephone companies

_______________ is a type of dynamic routing.

Link state

The software that runs on the mail server is referred to as the ____________

Mail transfer agent

Which of the following is not an example of a mail user agent software package?

Microsoft Word

The earliest type of fiber optic systems were:

Multimode

The acronym, MIME, refers to:

Multipurpose Internet Mail Extension

Which of the following statements is correct?

Serial transmission is slower than parallel transmission.

___________ is an orderly close to a dialogue between end users.

Session termination

Which of the following is not an application layer standard?

T1

One drawback to dynamic routing is:

The transmission of status information "wastes" network capacity that could be used to send user messages

Which of the following is not true about de jure standards?

They are always developed before de facto standards.

Which of the following is not true about de facto standards?

They never evolve into de jure standards.

_________________ is defined as the total number of information bits divided by the total number of bits in the transmission.

Transmission efficiency

It is not uncommon for companies to end up spending more money on network management and security tasks than they do on the actual computer equipment itself.

True

Microwave transmissions require a line of sight between any two points.

True

Middleware is the software that sits between the application software on the client and the application software on the server.

True

One form of interference with satellite transmission is called raindrop attenuation in which the transmissions are absorbed by heavy rain.

True

One type of forward error correction is the Hamming code.

True

Overhead bits are used for error checking and marking the start and end of characters and packets.

True

Quality of Service routing is a special type of routing in which different connections are assigned different priorities.

True

Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.

True

Source port address is the logical address used to identify the application that is sending the data.

True

Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.

True

Which of the following is not a type of synchronous protocol?

VT100

A local area network is:

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.

With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.

distance vector

When a signal is reflected back to the transmitting equipment, it is called a(n) _________.

echo

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

A(n) ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users outside the organization.

extranet

Having a conversation with someone using a cellular phone is an example of _________ transmission.

full-duplex

The two basic types of media are:

guided and wireless (radiated)

Stop-and-wait ARQ uses ___________ type of data flow.

half duplex

Asynchronous transmission:

has a pre-determined, fixed time between sending characters

The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer.

hybrid

To get more "bandwidth" in a digital transmission, you must:

increase the range of frequencies available for a transmission

In communication protocols, _________ are used to convey the users meaning.

information bits

If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of:

intermodulation noise

In ARQ, a NAK (negative acknowledgement):

is sent by the recipient if the message contains an error

In ARQ, a NAK:

is sent by the recipient if the message contains an error

The American National Standards Institute:

is the coordinating organization for the United States national system of standards

A(n) ________ refers to a group of computers that are logically grouped together by IP number.

subnet

As part of the five-layer network model used in this textbook, the data link layer sits directly between:

the physical and the network layers

A response status code of 404 means:

the requested page was not found

One underlying problem with a host-based network is that:

the server can get overloaded since it must process all messages

The fourth layer of the OSI model is called the __________ layer.

transport

A type of message that is used when sending a message from one computer to another computer is called a:

unicast message

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.

web server

In general, controlled approaches:

work better than contention approaches for large networks that have high usage


Related study sets

Diabetes + Corticosteroids (AEQ) RN

View Set

Burn Types and Classification NPTE: Other Systems

View Set

Chapter Three Questions: STUDY GUIDE

View Set

Chapter 55: Caring for Clients with Disorders of the Male Reproductive System

View Set

201 PrepU - Chapter 3: Inflammation, the Inflammatory Response, and Fever

View Set

Book 4 (Fixed income, derivatives, real estate)

View Set

Organizational Structure in Action

View Set