Network and Internet Technology midterm

Ace your homework & exams now with Quizwiz!

Protocol implementations follow the layering model by passing the input from a protocol in one layer to the output of a protocol in the next layer. T/F

False

Changing IPv4 to IPv6 is easy as it only requires a change to one part of the Internet. T/F

False

As data passes down through the protocol layers on the sending computer, postage is added. T/F

False

As opposed to LANs, WANs (wide area networks) cover a smaller geographic area. T/F

False

Business managers are concerned with whether a network has the required availability to handle traffic with acceptable reliability at an affordable cost. T/F

False

A private branch exchange (PBX) is an on-premise telephone switch that interconnects telephones at that location that provides outside access to the public telephone system. T/F

True

In an IPv6 address, the interface address/suffix is always constant and of length 64bits. T/F

True

A pair of protocols in adjacent layers pass a pointer to the packet rather than create a new copy. T/F

True

In terms of the client-server model, a browser is a client that extracts a server name from a URL and contacts the server. T/F

True

Industry experts estimate that approximately 15 petabytes (15,000 gigabytes) of new electronic data are created every day, much of this the result of huge growth in video, image, audio, and social media data. T/F

True

Lack of consistency in the networking field has produced a challenge - instead of uniform terminology, multiple groups each attempt to create their own terminology, resulting in jargon that contains terms that are abbreviated, misused, or associated with products. T/F

True

An application-layer protocol that is intended to be used across the Internet and implemented by many programmers and companies is known as a public service. T/F

False

What is the minimum number of routers that can be used to connect 4 networks? 2 1 4 3

1

What approximate data rate would be required, without compression, to send a resolution of 360x250 pixels with an 8-bit grayscale color palette? 10 Mbs 25 Kbs 125 Mbs 25 Mbs

10Mbs

In an standard Class C IPv4 address, a prefix of 24 bits (of 32) is used to create a subnet of 256 possible addresses. Since the first and the last are reserved for the network and broadcast addresses, respectively, there are two less possible hosts on the network or 254. If 26 bits are used for the prefix, there are 62 possible hosts. How many hosts are possible if 28 bits are used in a prefix? 14 20 22

14

Your computer has been configured in the following way: 172.16.128.67 mask 255.255.255.192 How would you represent the network you are on in CIDR notation? 172.16.128.0/24 172.16.128.64/26 172.16.128.67/26 172.16.128.0/67

172.16.128.64/26

How many primary classes did the original classful IP addressing scheme divide IPv4 into? 5 4 3 6

3

The TCP/IP protocol suite that is widely used today corresponds to a model that contains how many layers? 4 7 5 6

5

How many different IP addresses (although usable is quite less) can IPv4 theoretically accommodate? 6382910884 2857431098 4294967296

4294967296

Desktop systems in the workplace are typically interconnected to: data communication equipment storage technologies server rooms communication closets data center servers

AOTA

Examples of image-based applications used by businesses include: Web publishing Digital photographs Medical publishing Electronic publishing

AOTA

HTML can be defined as: a representation standard declarative a markup language

AOTA

In the 1970s, the Internet was: a set of standards proposed by Vinton Cerf and Robert Kahn a revolution in computer networking a concept

AOTA

Recent trends in computer networks and the Internet include: social networking applications sensor networks traditional communications systems adopting Internet technology cloud computing

AOTA

Which of the following is an IPv6 address in proper notation? FE80:0:0:0:02AA:00FF:FE9A:4CA2 ABCD::4 2607:f8b0:4004:806::1013 FE80::2AA:FF:FE9A:4CA2

AOTA

The Advanced Research Projects Agency (ARPA), an agency of the US. Department of Defense, gathered researchers and contractors together to produce a working data network, utilizing packet switching, and was known as: DODNET DHSNET ARPANET OSI

ARPANET

What character set in use today is the most common format for English-language text files? ASCII International Reference Alphabet (IRA) UTF-8 (Universal Character Set Transformation Format 8) Unicode

ASCII

Audio services may be provided to a business by: Competitive local exchange services (CLECs) Local telephone companies Long-distance carriers Cellular networks

All of the above

Traditional business applications of audio services are: voicemail telemarketing audio conferencing interactive voice response systems

All of the above

Typical components of UC architecture include: audio conferencing unified messaging videoconferencing instant messaging web conferencing presence

All of the above

The number of computers, terminals, and mobile devices used around the world is in the: Billions Millions Thousands Hundreds

Billions

Business information can be transmitted in: Both Digital Form Analog Form

Both

A browser can significantly reduce download time by saving images in a: cache harddrive file

Cache

An organization usually buys an expensive router that connects all networks and can then upgrade it when the capacity is exceeded. T/F

False

There are several key distinctions between LANs and WANs: data rates geographic scope packet switching ownership of communications equipment

Data Rates Geographic Scope Ownership of communications equipment

Match the following special IPv4 addresses: 192.168.0.255 255.255.255.255 127.0.0.1 192.168.0.0 0.0.0.0 --------------------- Limited Broadcast Loopback Address Directed Broadcast Network Address This Computer

Directed B Limited B Loopback A Network A This COmputer

Network technologies are created to meet various requirements for: distance economic cost internetworking speed

Distance Economic Cost Speed

Which of the following could be a host? (look up the product if you are unsure of the features) Dell Optiplex 9020 MiniTower Jawbone Era Bluetooth Headset Apple iPhone 6 Plus Titan Supercomputer in Oak Ridge National Laboratory Sonos PLAY:5 Speakers GE Profile™ Series 30" Built-In Double Convection Wall Oven with Brillion Technology (look this one up!!) Samsung UHD 4K HU8550 Series Smart TV Acer B276HUL Hi-resolution 2560x1440 IPS monitor CM Storm Mizer (8200 DPI WIRED Laser Mouse)

Every one except Monitor and Mouse

Convergence refers to the merger of previously unified telephony and information technologies and markets. T/F

False

Data transfer refers to interaction between two servers. T/F

False

Growth in capacity and a drop in cost has led to data transmission consuming a smaller chunk of the communications budget for most businesses. T/F

False

In terms of the networking implications of video information, real-time video traffic without compression requires minimal bandwidth to ensure an adequate user experience. T/F

False

Internet protocol software shows the detailed information of the physical network connection such as the IP address, MAC address, DNS server, default router, and the route a packet takes. T/F

False

No computer can run a web server unless the computer's domain name starts with www. T/F

False

On a single network, two computers can have the same IP address. T/F

False

One of the primary reasons for the success of TCP/IP standards lies in tolerance of homogeneity. T/F

False

The dominant LAN architecture is ring. T/F

False

The network services and facilities that users interact with are provided by each individual user. T/F

False

The three-layer model of enterprise communications is comprised of applications, enterprise services, and supply chain. T/F

False

As the Internet experienced exponential growth over the past 25 years, it changed in the following ways: focus on new applications increase in communication speeds increased demand for shared resources

Focus on new applications Increase in communication speeds

Which of the following incompatibilities prevent two networks from simply being directly connected (bridged)? Operating Systems/Applications (Layer 5) Frames (Layer 2) Network Hardware (Layer 1) Addresses (Layer 3)

Frames Network Hardware Addresses

Examples of representation standards include: HTML HTTP URL

HTML URL

What entity created the Open Systems Interconnection (OSI) seven-layer model? ITU (International Telecommunications Union) TCP/IP (Transport Control Protocol / Internet Protocol) ISO (International Organization for Standardization)

ISO

Internet Corporation for assigned Names and Numbers (ICANN) is the ultimate authority for all prefixes ensuring their individuality assignment and to adjudicate disputes. however it is the registrars that assigns prefixes directly through large blocks assigned to major: Governments ISPs Corporations

ISPs

Business rationale for adoption of cloud computing includes: Increased agility and flexibility Improved business process execution Reduced travel expenses Pay-as-you-grow computing Reduced on-premises network expenses

Increased agility and flexibility Pay as you grow computing reduced on premises network expenses

As companies increasingly rely on networks, the need for security: Increases Decreses

Increases

What are the three parts of an IPv6 address? Interface Subnet Mask Global Prefix

Interface Subnet Global PRefix

In 1980, the Internet was a research project that involved: More than 1000 sites Less than 100 sites 100 to 1000 sites

Less than 100

In the original architecture of Internet email service, what component acted as both a client and server? email interface application mail transfer application simple mail transfer protocol

Mail Transfer Application

Data communications is the study of using physical phenomena to transfer information across a physical communication ________. portal medium broadcast

Medium

The World Wide Web is: One of many services in use on the Internet The same as the Internet A transfer protocol that specifies how browsers interact with servers The protocol standard for the Internet

One of many services...

Match the Layer with its description in the TCP/IP Model 1 2 3 4 5 Network Interface Internet IP Application Transport Physical

Physical Network Interface Internet Transport Application

Before sending a request to the server, an FTP client allocates a protocol: port layer thread

Port

An application-layer protocol created by a company for proprietary software is known as a: hybrid service public service private service

Private

The name resolution process involves a resolver that forms a DNS request and waits for a: port message reply message layer message

Reply Message

These forces have consistently driven the architecture and evolution of data communications and networking: technological advancements new services traffic growth voice database access

Technological Advancements New Services Traffic Growth

DNS servers use the following mechanisms for caching: temporal locality server locality conditional locality spatial locality

Temporal Locality Spatial Locality

Within a LAN, business managers make choices about: the combination of wired and wireless transmission rates proprietary architectures

The combination of wired and wireless Transmission rates

A key benefit of IP network convergence is: (select all that apply) transformation reduce cycle time cost savings effectiveness

Transofrmation Costsavings effectiveness

Multiple protocols designed to work together in a complete, cooperative set are called a suite. T/F

Tru

The MIME standard encodes non-text attachments as printable characters. T/F

True

A common type of network is the LAN (local area network). T/F

True

A communications system that supplies universal service allows arbitrary pairs of computers to communicate. T/F

True

A digital system uses a sequence of discrete values to represent information. T/F

True

A programmer defines an application layer protocol when two applications need to communicate over a network. T/F

True

A router does not use conventional application software but does need TCP/IP protocol software. T/F

True

A router must have multiple IP addresses. T/F

True

An IP address is a unique binary number assigned to a host and used for all communication with the host. T/F

True

An email program using SMTP requests an mail exchange record from the DNS database. An IP address is returned in response. T/F

True

As a result of the adoption of standards, equipment from multiple vendors can be used in a single network. T/F

True

Audio, data, image and video are basic information sources that are useful categories for the analysis and design of enterprise networks. T/F

True

Because the Internet tolerates heterogeneity, engineers can experiment with new networking technologies without disrupting existing networks. T/F

True

Client server architecture provides specialized services such as database functions, file storage, printing, and other shared services. T/F

True

Compared to the early years of data communications when the key focus was functionality and performance, today the key focus for businesses is management. T/F

True

Data representation deals with the syntax of data exchanged between computers. T/F

True

Data that contains a combination of text, graphics, audio, and video is referred to as multimedia. True/False

True

Early communications networks such as the telegraph and telephone systems use circuits to send information. T/F

True

FTP handles both uploading and downloading of any type of data. T/F

True

Fiber-optic and wireless transmission are driving the evolution of data communications. T/F

True

IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. T/F

True

Networking technology facilitates the flow of information that is needed to coordinate business activities. True/False

True

No single networking technology is best for all needs. T/F

True

One of the main features of the Domain Name System is autonomy which allows each organization to run its own DNS servers. T/F

True

Packet switching is the basis for the modern Internet. T/F

True

Part of a browser's architecture is a controller that utilizes clients to retrieve information from various services. T/F

True

Protocols in a suite are furthermore collected into a unified whole known as a layering model. T/F

True

Since the 1970s, computer communication has changed from an esoteric research topic to an essential part of everyone's lives. T/F

True

The basic building block of any network is the transmission line (or facility). T/F

True

The design and infrastructure of future enterprise networks will be shaped by cloud computing. T/F

True

The primary motivation for early computer networks was resource sharing due to computers being large and expensive. T/F

True

The term for information that can be represented by a finite alphabet of symbols, such as the numbers 0 through 9 or the symbols represented on a computer keyboard, is data. T/F

True

The term protocol refers to a specification for network communications. T/F

True

The volume of communications traffic being transported over business networks is increasing. T/F

True

Today, the Internet has grown into a production communication system that reaches all populated countries in the world. T/F

True

Using multiple routers improves reliability and avoids a single point of failure by sending traffic along an alternate path if a link fails. T/F

True

Web browsers have replaced email interface applications as the primary means of accessing email. T/F

True

A page of text contains about 10,000 bits of 8-bit character data. The bit image of a 640x480 pixel screen in 256 color mode requires over: Two million bytes One million bits Two million bits One million bytes

Two Million Bits

What is one difference between the POP3 and IMAP standards? message format authentication mailbox access mail extension

authentication

What is/are the basic component(s) used for interconnecting heterogeneous networks? router Wi-Fi switch hub bridge

router

Which of the following accurately describe the Simple Mail Transfer Protocol? uses textual control messages transfers text messages and images uses stream paradigm sends one copy of a message

uses textual control messages uses stream paradigm sends one copy of a message

The four major types of information carried over business networks are: news voice data video image

voice data video image

Match each part of the domain name below: xxx.yyy.zzz Individual Computer Group or Organization Top-Level Domain

x = Individual y = group or organization z = top level domain


Related study sets

Chapter 2: The Chemistry Of Life - PRACTICE QUESTIONS

View Set

Lifepac Family Consumer Unit 2, Lesson 1

View Set