BUA 90996

subject Type Homework Help
subject Pages 6
subject Words 519
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Back-end networks are used in situations where a few large computers must be
connected for low-volume data transfers.
ARPANET was the first message-switching network.
VoIP, streaming audio, and streaming video are considered _________ applications
even though each involves a single media type.
There are three major types of MPLS VPNs deployed in today's networks: Layer 2
(VPLS), Layer 3 (VPRN), and ___________.
page-pf2
Intrusion detection is based on the assumption that the behavior of the intruder differs
from that of a legitimate user in ways that can be quantified.
An ________ is a physical facility that provides the infrastructure to move data between
connected networks.
To aid in the development of cabling plans, standards have been issued that specify the
cabling types and layout for office, data center, and apartment buildings; these
standards are referred to as __________.
page-pf3
When using wireless networks, there are limitations on which frequencies can be used
for the channels.
_________ is the ability to determine, in real time, where someone is, how he or
she prefers to be reached, and what he or she is currently doing.
Convergence refers to the merger of previously distinct telephony and information
technologies and markets.
The Internet is a central component of most enterprise networks.
page-pf4
A representation of images that uses straight and curved line segments is called
________.
A virus can be prepended or postpended to an executable program, or it can be
embedded in some other fashion.
When using message switching instead of packet switching, a dedicated path must be
established between the parties for all messages that are sent.
page-pf5
The source and destination address fields in the TCP header each contain a 32-bit
Internet address.
Computerization has enhanced the range of features available to businesses for voice
communication.
Another rule of thumb is that as the frequency increases, the easier it is to disrupt the
signal.
Cloud computing is being embraced by all major business software vendors with the
exception of Oracle.
page-pf6
Sometimes called computer room networks, __________ networks are used
to interconnect large systems such as mainframes, supercomputers, and mass storage
devices that typically need to transfer large volumes of data between one another.
When all the stations in the BSS are mobile stations, with no connection to other BSSs,
the BSS is called an ___________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.