BUA 27576

subject Type Homework Help
subject Pages 14
subject Words 1655
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In general, performance on a LAN _________ with an increase in the number of
devices or the length of the wire.
A. increases
B. decreases
C. fluctuates
D. does not change
The Wireless Application Protocol (WAP) is:
A. proprietary protocol developed in the USA for wireless security
B. dependent on the specific network technologies employed
C. an Internet standard that replaces HTML, HTTP, and XML
D. designed to overcome many of the limitations hindering acceptance of mobile data
services
Which of the following is not one of the speeds found in a modern Ethernet LAN?
A. 10 Mbps
B. 100 Mbps
page-pf2
C. 100 Gbps
D. 10 Gbps
The ________ works on behalf of user actors and user applications and is
their representative within the e-mail service.
A. MUA
B. MHS
C. MSA
D. MTA
Advantages of a web/database system as compared to a more traditional database
approach include:
A. improved functionality and ease of administration
B. ease of administration and transaction tracking
C. rapid development and flexible information presentation
D. easy deployment and improved functionality
page-pf3
In modern communication systems, data is sent from one point to another via:
A. input data
B. alternating current (A/C)
C. pressure changes
D. electromagnetic signals
Present-day television, both broadcast and cable, employ:
A. frequency division multiplexing
B. separate channel multiplexing
C. separate frequency multiplexing
D. common channel multiplexing
page-pf4
The IP address is assigned to a network interface on a host when ________.
A. the OS boots up
B. the PC connects to the Internet
C. an application is run
D. the user requests one
Which of the following is a characteristic of a backend network?
A. high data rate
B. distributed access
C. limited distance
D. all of the above
The primary mechanism used in implementing denial-of-service attacks is the:
A. worm
B. Trojan horse
page-pf5
C. bot
D. all of the above
When HTTPS is used, which element of the communication is encrypted?
A. URL of the requested document
B. contents of the document
C. cookies sent from browser to server
D. all of the above
The function of a __________ protocol is to control access to the transmission medium
and to provide an orderly and efficient use of that capacity.
A. LLC
B. SAN
C. MAC
D. MAN
page-pf6
Repudiation refers to a user either denying sending data or a user denying receiving or
possessing the data.
_________ screens use thin sandwiches of glass containing a liquid-crystal material to
display images.
A. PDF
B. LCD
C. CRT
D. all of the above
The current IP specification uses addresses to identify hosts that consist of:
A. 16 bits
page-pf7
B. 64 bits
C. 32 bits
D. 128 bits
Digital signals are:
A. continuous
B. discrete
C. discontinuous
D. none of the above
The service-oriented architecture (SOA) is a form of client/server computing.
page-pf8
________ is concerned with the content of the signal.
A. Digital transmission
B. Analog transmission
C. Digital signaling
D. Analog signaling
In digital systems, the information rate and the capacity of a digital channel are
measured in:
A. mhz
B. dps
C. bps
D. ghz
The __________ is a 32-bit cyclic redundancy check (CRC), based on all fields except
preamble, SFD, and FCS.
A. FCS
page-pf9
B. extension
C. SFD
D. none of the above
When a mobile unit moves, it may connect with a different base station. This action is
called ____________.
A. a handoff
B. a transfer
C. a reconfiguration
D. a dropped signal
The three forces that have driven the architecture and evolution of data communications
and networking facilities are:
A. Traffic growth, advances in technology, and legal considerations
B. Traffic growth, development of services, and advances in technology
C. Development of services, advances in technology, and legal considerations
page-pfa
D. Advances in technology, lower costs, and greater capacities
IPv6 includes ________ address fields.
A. 16-bit
B. 32-bit
C. 64-bit
D. 128-bit
Which of the following is a higher-layer protocol defined as part of SSL?
A. the Handshake Protocol
B. the Change Cipher Spec Protocol
C. the Alert Protocol
D. all of the above
page-pfb
Standards are important when devices must communicate together; the
four characteristics governed by these standards are:
A. mechanical, electrical, functional, and procedural
B. electrical, physical, functional, and signaling
C. fundamental, mechanical, procedural, and protocol
D. protocol, fundamental, physical, and signaling
An advantage of an intranet-based approach to corporate computing is:
A. rapid prototyping and deployment of new services
B. supports a range of distributed computing architectures
C. supports a range of media types
D. all of the above
page-pfc
The frequency of human speech is in the range of:
A. 20 " 1000 Hz.
B. 20 " 3400
C. 300 " 3400 Hz.
D. 10 " 25,000 Hz.
The ________ is the link between the subscriber and the network, also referred to as the
subscriber loop or local loop.
A. subscribers
B. subscriber line
C. exchanges
D. trunks
In ATM, the basic transmission unit is the ________.
A. frame
B. cell
page-pfd
C. packet
D. segment
___________ encompasses any subscription-based or pay-per-use service that extends
an organization's existing IT capabilities over the Internet in real time.
A. Cloud computing
B. ISP
C. DDP
D. Client/server architecture
In most _______________ protocols, the data link protocol entity is responsible not
only for detecting errors using the CRC, but for recovering from those errors by
retransmitting damaged frames.
A. data link control
B. logical link control
C. media access control
D. all of the above
page-pfe
The _________ (IRA) character set is the most common format for English language
text files.
Two major types of layer 2 switches are available for use in business
networks: store-and-forward switch and ____________.
The _________ is the place where telephone companies terminate customer lines and
locate switching equipment to interconnect those lines with other networks.
page-pff
_________ connects client systems to Web servers on the Internet and its primary
function is to establish a connection with the server and send HTML pages back to the
user's browser.
The number of computers and terminals at work in the world today is over 100 million.
A _______ modem permits Internet access over cable television networks.
Using what is known as a link state routing algorithm, the ________ protocol is widely
used as an interior router protocol in TCP/IP networks.
page-pf10
A ________ is a computer, usually a high-powered workstation or a mainframe, that
houses information for manipulation by networked clients.
_________ data take on continuous values on some interval; for example, voice and
video are continuously varying patterns of intensity.
________ refers to the combination of HTTP and SSL to implement secure
communication between a Web browser and a Web server.
page-pf11
The ________ service supports the communication of individual pictures, charts, or
drawings.
A worm is a program that can replicate itself and send copies from computer to
computer across network connections.
Subnetworks are connected by devices referred to as __________, which provide a
communications path and perform the necessary relaying and routing functions so that
data can be exchanged between devices attached to different subnetworks in the
internet.
page-pf12
In order to achieve the greatest return on their data communication investments, it is
important for businesses to maximize the amount of information carried over their
transmission lines.
SSL provides three categories of security: confidentiality, message integrity, and
___________.
The major difference between Category 3 UTP and Category 5 UTP is that the latter
uses a larger sized wire for the conductors.
_________ is a subjective measure of the user's perception of the overall value of the
network application or service.
page-pf13
The ________ is a global information system logically linked together by a globally
unique address space based on the Internet Protocol or its subsequent
extensions/follow-ons.
Because of increased functionality of modern layer 2 switches, bridges have been
replaced by these types of switches.
Traffic analysis is an active attack.
page-pf14
Generic decryption (GD) technology enables the antivirus program to easily detect even
the most complex polymorphic viruses while
maintaining fast scanning speeds.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.