BUA 23122

subject Type Homework Help
subject Pages 12
subject Words 1482
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
There are basically four ways to divide the spectrum among active users: frequency
division multiple access (FDMA), time division multiple access
(TDMA), code division multiple access (CDMA), and ______________.
Important objectives of computer security include:
A. confidentiality
B. integrity
C. availability
D. all of the above
When using HTTP, a network data object or service that can be identified by a URL is
called a ____________.
A. client
B. server
C. host
D. resource
page-pf2
A _________ is a networked information requester that can query a database or other
information.
A. host
B. client
C. server
D. auditor
A DDP facility may include:
A. a central data center
B. satellite data centers
C. a community of peer computing facilities
D. all of the above
page-pf3
When using data communications with 8-bit codes, the number of alphabetic symbols
A. must be exactly 256
B. must be exactly 512
C. can be greater than 1024 bytes
D. must be less than 256
A device that connects networks with differing addressing schemes, packet sizes and
interfaces is called a ___________.
A. hub
B. router
C. switch
D. repeater
The development of an internationally distributed collection of multimedia files
addressed using universal resource locators led to the:
A. Telnet package
B. email system
page-pf4
C. world-wide-web
D. FTP package
This short-wavelength option supports duplex links of up to 275 m using 5-μm
multimode or up to 550 m using 50-μm multimode fiber. Wavelengths are in the range
of 770"860 nm.
A. 1000BASE-SX
B. 1000BASE-T
C. 1000BASE-LX
D. 1000BASE-CX
Which of the following represents a digital form of information?
A. a gas gauge
B. a fax transmission
C. a watch that displays time as HH:MM
D. a page filled with English prose
page-pf5
Which of the following describes class B networks?
A. Many networks, each with a few hosts
B. Medium number of networks, each with a medium number of hosts
C. Few networks, each with many hosts
D. A network dedicated to multicast applications
Which of the following is NOT a common component of an error control process?
A. damaged frame
B. error detection
C. positive acknowledgement
D. retransmission after timeout
page-pf6
Which of following is NOT one of the designs that determines data rate and distance?
A. the number of senders
B. the number of receivers
C. transmission impairment
D. bandwidth
________ is software that improves connectivity between a client application and a
server.
A. SQL
B. API
C. Middleware
D. SAP
A carrier wave is modulated with 4 amplitudes and 4 phase changes; how many bits can
be represented with each signal change?
A. 1
page-pf7
B. 2
C. 3
D. 4
________ data take on discrete values; examples are text, integers, and binary data.
The number of different characters that can be represented in the International
Reference Alphabet text code is:
A. 512
B. 256
C. 128
D. 64
page-pf8
A common method for encapsulating communication in a distributed system is the
__________.
A. SQL
B. PaaS
C. RPC
D. API
The magnitude of delay variation, called ________ , is a critical factor in
realtime applications.
A. jitter
B. stuttering
C. supernetting
D. latency
Which of the following is an advantage of circuit switching?
A. provides speed conversion
page-pf9
B. compatible with voice
C. appears nonblocking
D. logical multiplexing
The simplest approach to error detection is to append a parity bit to the end of a block
of data.
Commonly referred to as cell relay, _________ is a culmination of advancements in
both circuit switching and packet switching
A. asynchronous transfer mode
B. frame relay
C. convergence
D. MAN
page-pfa
The ________ layer covers the physical interface between a data transmission device
and a transmission medium or network.
A. physical
B. transport
C. application
D. network
In Non Return to Zero encoding schemes, the signal or voltage level does not return to
0v (zero volts); one of the problems with this type of encoding is that:
A. it is sometimes difficult to synchronize the timing of the transmitter and the receiver
B. it does not work well with serial communications
C. the signal ground of the transmitter is often different from that of the receiver
D. it works only for analog signals
page-pfb
The first "killer application" for the ARPANET was ________.
A. Telnet
B. FTP
C. email
D. remote login
Two notable consumer electronic gadgets that are impacting the traffic load on
networks are the digital versatile disc and the digital still camera.
The type of attack on communications lines and networks known as traffic analysis
belongs to the general category of ____________.
A. active attacks
B. passive attacks
C. administrative attacks
D. none of the above
page-pfc
Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate
B. high-speed interface
C. distributed access
D. extended distance
Which of the following is not an example of intrusion:
A. guessing and cracking passwords
B. running a packet sniffer on a workstation to capture user names and passwords
C. using an unattended, logged-in workstation without permission
D. all of the above are examples of intrusion
page-pfd
Which of the following is a generic term that describes sharing of a communications
channel by multiple communicating stations?
A. multiprogramming
B. multiplexing
C. multi-access channels
D. digital channels
Which of the following is NOT one of the ways that frequency spectrum can be divided
among active users?
A. frequency division multiple access
B. time division multiple access
C. code division multiple access
D. cell division multiple access
Analog signals are less susceptible to noise interference and are more prone to
attenuation than digital signals.
page-pfe
Support tools for intranets are easily available.
PoE makes it possible to distribute both power and data using Ethernet cabling.
In general, public and Internet mail systems offer access to a wider range of services
and more robust applications.
page-pff
An antenna with a fixed area receives more signal power.
One way to assure that the packet is received by all members of the group is to
___________ a copy of each packet to each network in the configuration, over the
least-cost route for each network.
__________ antenna architecture is the most important of the enhancements provided
by 802.11n.
__________ networking brings with it the advantages of connectivity without being
tethered, faster/lower cost deployment and the connection of geographically remote
sites.
page-pf10
In a __________ network data are transmitted in a sequence of small chunks that are
passed through the network from switching node to switching node along some path
leading from source to destination.
Both analog and digital information can be encoded as either analog or digital signals.
Parity checking for error detection is most reliable for checking communications using
high data rates.
page-pf11
_________ is a term used to refer to the implementation of Internet technologies within
a corporate organization rather than for external connection to the global Internet.
Voice communication can only be done using an analog signal.
A security intrusion is defined as a successful attempt by a user to gain access to a
system or system resource without proper authorization.
Attenuation is the reduction in signal strength as the signal propagates down the
transmission path.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.