MGMT 55681

subject Type Homework Help
subject Pages 28
subject Words 2917
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Data can exist in either analog or _________ form.
A(n) _________ signal is one in which the signal intensity varies in a smooth fashion
over time.
A(n) _________ signal is one in which the signal intensity maintains a constant level
for some period of time and then changes to another constant level.
page-pf2
The simplest sort of signal is a(n) _________ signal, in which the same signal pattern
repeats over time.
The __________ is the maximum height of the wave above or below a given reference
point.
The _________ is the number of times the signal makes a complete cycle within a
given time frame.
page-pf3
________ is a measure of the position of the waveform relative to a given moment of
time within the period of a signal.
The _________ of a signal is defined as the distance between two points of
corresponding phase of two consecutive cycles, such as maximum amplitudes or where
the wave crosses zero.
The _________ of a signal is the range of frequencies that it contains.
page-pf4
For guided media such as twisted pair, coaxial cable, and optical fiber, the most
significant sources of signal quality impairments are: attenuation and attenuation
distortion, delay distortion, and __________.
The four categories of noise are: thermal noise, intermodulation, impulse noise, and
__________.
__________ has been experienced by anyone who, while having a telephone
conversation, has been able to hear another telephone conversation.
page-pf5
The rate at which data can be transmitted over a given communication path, or channel,
under given conditions, is referred to as the ___________.
The designer of a communications facility must deal with four factors: the bandwidth of
the signal, the data rate that is used for digital information, the amount of noise and
other impairments, and the level of __________ that is acceptable.
The width of the range of frequencies that comprise the signal is the ________.
page-pf6
Which of the following LAN technologies has the highest capacity?
A. Ethernet
B. Fast Ethernet
C. Fibre Channel
D. Gigabit Ethernet
A basic service set (BSS) is:
A. the smallest building block of a wireless LAN
B. the same as an access point
C. the same as a control module
D. always connected to a backbone distribution system
A typical coverage area for a WLAN has a diameter of _________.
A. 25 " 50 m
B. 100"300 m
page-pf7
C. 150 " 250 m
D. 200 " 300 m
Data communications via circuit switching involves three phases:
A. connect, transfer, hang-up
B. ring, talk, hang-up
C. dial, transfer, disconnect
D. establishment, data transfer, disconnect
Each station attaches to a node, and the collection of nodes is referred to as a ________
network
page-pf8
Two different technologies are used in wide area switched networks: circuit switching
and _________ switching.
Communication via circuit switching involves three phases: circuit establishment,
________, and circuit disconnect.
Another well-known application of circuit switching is the _________ used to
interconnect telephones within a building or office.
A public telecommunications network can be described using four generic architectural
components: subscribers, subscriber line, exchanges, and _________.
page-pf9
______ are the means by which the network is managed and by which calls are
established, maintained, and terminated.
________ signals identify a subscriber.
The term ________ refers to those signals that provide information to the subscriber
about the status of a call.
page-pfa
_________ signals are used for the maintenance, troubleshooting, and overall operation
of the network.
In the _________ approach, each packet is treated independently, with no reference to
packets that have gone before.
In the _________ approach, a preplanned route is established before any packets are
sent.
Typically, the network provider owns a set of packet-switching nodes and links these
together with leased lines provided by a carrier such as AT&T. Such a network is called
a ________ , reflecting the fact that the network adds value to the underlying
transmission facilities.
page-pfb
_________ involves the process of designing and implementing the network to meet the
organization's unique requirements.
__________ allows users to plan for network expansion and modifications arising as
their needs change.
With ________, the calling user (program or individual) supplies the phone number of a
URI (Universal Resource Indicator, a form of URL), which then triggers a set of
protocol interactions resulting in the placement of the call.
page-pfc
Prior to cellular radio, mobile radio and telephone services required:
A. a high-power transmitter/receiver
B. multiple transmitters/receivers
C. only one or two dedicated channels
D. that many channels be used, which exceed the frequency capacity
A partitioned database is by definition not a replicated database.
Replicated databases involve copying all or part of the database to additional
computers.
page-pfd
Intranets use the same communication protocols and applications as the Internet.
Extranets use different protocols and applications than are used in Intranets.
Big data and the evolution of data processing and communications technologies
continue to reshape the balance of centralized and distributed processing within
enterprise networks.
Wireless networks are more susceptible than wired networks to interference, signal loss,
noise, and eavesdropping.
page-pfe
The three types of requirements for networking resulting from DDP are connectivity,
availability, and performance.
Like the Internet, intranets are difficult to manage.
Centralized data processing typically involves terminals connected to large computers
in a central data processing facility.
page-pff
The loudness of a signal is measured by its amplitude.
Retail point-of-sale systems are an example of horizontal partitioning of data
processing.
A data processing facility may depart in varying degrees from the centralized data
processing organization by implementing a DDP strategy.
In a centralized architecture, the data processing for an application takes place on the
user's computing device.
page-pf10
Database applications are always distributed applications.
When using HTTP, an application program that accepts connections in order to service
requests by sending back responses is called a ___________.
A. client
B. server
C. host
D. resource
The three ways of organizing data for use by an organization are:
A. centralized, replicated, and partitioned
B. centralized, structured, and partitioned
C. structured, replicated, and partitioned
page-pf11
D. centralized, replicated, and structured
Undetected and uncorrected errors can degrade performance and response times in any
system that handles large volumes of data.
At _________ the IP header is exposed and so filtering or firewalls can be applied to IP
addresses.
A. layer 1
B. layer 2
C. layer 3
D. layer 4
page-pf12
________ are electric or electromagnetic representations of data.
Which of the following represents the most basic unit of digital information?
A. byte
B. nibble
C. pixel
D. bit
The WiFi standard known as Privacy with message integrity can be described as
follows:
A. a way of ensuring the privacy of the individual using WiFi
B. a technique that ensures that the data transmitted using WiFi have not been altered
C. a way of providing mutual authentication between a user and an AS
D. none of the above
page-pf13
_______ are the devices that attach to the network.
A. Subscribers
B. Subscriber line
C. Exchanges
D. Trunks
When using ATM, which of the following is NOT one of the advantages for the use of
virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C. the network performance and reliability is enhanced
D. channel connection setup times are reduced
page-pf14
Which of the following describes class A networks?
A. Many networks, each with a few hosts
B. Medium number of networks, each with a medium number of hosts
C. Few networks, each with many hosts
D. A dedicated network, with a set number of hosts
When examining a MAC frame of data, starting with the first bit, which of
the following describes the order of the various headers found in the frame?
A. MAC, LLC, IP, and TCP
B. TCP, IP, MAC, and LLC
C. TCP, IP, LLC, and MAC
D. MAC, IP, TCP, and LLC
An error-detecting scheme that employs a unique prime number is called:
A. parity checking
B. frame sequence checking
page-pf15
C. error checking and error correcting
D. cyclic redundancy check
Problems with using a single Local Area Network (LAN) to interconnect devices on a
premise include:
A. insufficient reliability, limited capacity, and inappropriate network interconnection
devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network interconnection
devices
D. limited distances, limited capacity, and inappropriate network interconnection
devices
For a given system, multiple access is based on _______.
A. TDMA
B. FDMA
C. CDMA
D. all of the above
page-pf16
The _________ specifies the station that sent the frame.
A. MAC client data
B. SFD
C. SA
D. FCS
________ machines are typically single-user PCs or workstations that provide a highly
user-friendly interface to the end user.
A. Client
B. Host
C. Server
D. Networked
page-pf17
Which of the following types of intermediate devices can be used in an HTTP network?
A. proxies
B. gateways
C. tunnels
D. all of the above
IP appends a header of control information to each segment to form a(n) __________.
A. IP datagram
B. end system
C. checksum
D. port
Which of the following is not a function provided by servers in client/server systems?
A. printing services
B. data entry
page-pf18
C. database services
D. gateways
Standard voice telephone lines, such as those found in residences, limit bandwidth to:
A. 300 Hz
B. 3,400 Hz
C. 20,000 Hz
D. 1,410,000 Hz
With __________ virtualization software is used to allow a piece of computer hardware
to simultaneously run multiple operating system images.
A. network
B. server
C. operating system
D. storage
page-pf19
An _________ is a continuously varying electromagnetic wave that may be transmitted
over both guided and unguided media.
Which of the following is a type of scanning strategy?
A. hit list
B. topological
C. local subnet
D. all of the above
________ is a technique for assuring that a transmitting entity does not overwhelm a
receiving entity with data.
page-pf1a
Public switched services include which of the following?
A. ISDN
B. WAE
C. dial-up/modem
D. all of the above
Systems using common channel signaling:
A. employ a separate virtual channel for connection setup
B. carry connection information within each frame
C. use an expanded control field
D. do not use channels
page-pf1b
IPSec transport mode provides protection primarily for:
A. the Internet layer
B. upper-layer protocols
C. network and link-layer protocols
D. all of the above
Any entity that has station functionality and provides access to the distribution system
via the wireless medium for associated stations.
A. access point
B. basic service set
C. extended service set
D. coordination function
A computer that houses information for manipulation by networked clients is a
__________.
A. server
B. minicomputer
page-pf1c
C. PaaS
D. broker
Information that is delivered as a unit between MAC users.
A. MPDU
B. ESS
C. MSDU
D. DS
Which of the following lists the items in order such that the associated
channel capacities are increasing?
A. ATM, X.25, Frame Relay, and ISDN
B. ISDN, ATM, Frame Relay, and X.25
C. ATM, Frame Relay, ISDN, and X.25
D. X.25, ISDN, Frame Relay, and ATM
page-pf1d
A seven-octet pattern of alternating 0s and 1s used by the receiver to establish bit
synchronization is a ________.
A. source address
B. start frame delimiter
C. preamble
D. destination address
________ uses multiple carrier signals at different frequencies, sending some of the bits
on each channel.
A. FWD
B. DMT
C. WDM
D. TDM
page-pf1e
Which of the following is NOT one of the components of the WAP specification?
A. A framework for wireless telephony applications
B. A full-featured communications protocol stack
C. A programming model based on the WWW
D. A markup language adhering to XML
_________ is an identifier for a set of interfaces in which a packet is delivered to all
interfaces identified by that address.
An example of _________ is traffic analysis, in which an adversary is able to gain
information from observing the pattern of traffic on a network, such as the amount of
traffic between particular pairs of hosts on the network.
page-pf1f
A masquerader is a legitimate user who accesses data, programs, or resources for which
such access is not authorized.
A _________ is a device that connects two networks and whose primary function is to
relay data from one network to the other on a route from the source to the destination
end system.
In an operation very similar to that performed by a modem, analog data can be
represented by a digital signal; the device that performs this function is a ________.
A number of protocols are instrumental in supporting multimedia traffic.
page-pf20
The set of time slots dedicated to one source, from frame to frame, is called a
________.
It may happen that two or more stations attempt to transmit at about the same time; if
this happens, there will be a _________ .
The spectrum of a signal is:
A. the lowest frequency value subtracted from the highest
B. the range of frequencies in the signal
C. all of the frequencies from 0 to the highest frequency used
D. the average of the highest frequency and the lowest
page-pf21
Almost all wide area networks use circuit switching.
__________ refers to live meetings or presentations in which participants access
the meeting or presentation via a mobile device or the Web, either over the Internet or
corporate intranet.
End users should not run virus protection software that examines incoming mail
because the administrators of the email servers have already checked for viruses.
page-pf22
Basic packet switching technology has recently been developed to replace circuit
switching.
Typically, a firewall is inserted between the premises network and the Internet to
establish a controlled link and to erect an outer security wall or perimeter.
Implementing an extranet removes the need for a company to maintain a public web
site.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.