MHR 52535

subject Type Homework Help
subject Pages 12
subject Words 1596
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which of the following is the most commonly used standard for
computer communications?
A. SLA
B. TCP/IP
C. ISO
D. USD
A design factor relating to the transmission medium and the signal to determine the data
rate and distance is:
A. bandwidth
B. transmission impairments
C. interference
D. all of the above
When using cellular networks, __________.
A. a single base station can serve multiple cells
B. adjacent cells must use the same frequencies
page-pf2
C. adjacent cells are assigned different frequencies
D. non-adjacent cells are assigned different frequencies
Each signal change or element is called a:
A. bit
B. byte
C. baud
D. signal
The _________ is fundamentally a client/server application running over the Internet
and TCP/IP intranets.
A. World Wide Web
B. ADMD
C. MDA
D. Hypertext Transfer Protocol
page-pf3
A paradigm for electronic communications where messages are split into blocks of data
with limited size, which are then transmitted one-by-one across the network is called
_________.
A. message switching
B. circuit switching
C. packet switching
D. data switching
ATM provides a flexible set of traffic control mechanisms that are based on the type of
user data.
A ___________ is a separate network to handle storage needs.
A. NAN
page-pf4
B. LAN
C. SAN
D. MAC
In the past, the data processing function was organized around a single computer.
Today, it is much more common to find many computers linked by networks. This
approach to data processing is called:
A. decentralized computing
B. client computing
C. distributed computing
D. connected computing
The 802.11i architecture consists of ________ main ingredients.
A. one
B. two
C. three
page-pf5
D. four
________ is a notification from either a station or an AP that an existing association is
terminated.
A. Association
B. Reassociation
C. Disassociation
D. all of the above
Before a station can transmit or receive frames on a WLAN, its identity and address
must be known. For this purpose, a station must establish a(n) _________ with an AP
within a particular BSS.
A. Association
B. Reassociation
C. Disassociation
D. all of the above
page-pf6
_________ enables an established association to be transferred from one AP to another,
allowing a mobile station to move from one BSS to another.
A. Association
B. Reassociation
C. Disassociation
D. all of the above
Which of the following is a common technique for error control?
A. error detection
B. retransmission after timeout
C. positive acknowledgement
D. all of the above
page-pf7
This is defined as a station movement from one BSS to another within the same ESS. In
this case, delivery of data to the station requires that
the addressing capability be able to recognize the new location of the station.
A. ISS transition
B. no transition
C. BSS transition
D. ESS transition
________ is popular for constructing private networks within geographically dispersed
organizations and is increasingly used to provide business-user access to public
telephone networks
A. UTI-1
B. PBX
C. FDM
D. T-1
Given a resolution of 320 pixels x 240 pixels, 1 byte of color information per pixel and
a transmission rate of 30 frames per second, calculate the bandwidth necessary for this
page-pf8
signal:
A. 18.4 Mbps
B. 2.3 Mbps
C. 18.4 Kbps
D. 6 Mbps
________ is a Cisco proprietary product.
A. VoIP
B. SKINNY
C. SMTP
D. SIP
The value of the DS field, referred to as the DS ________, is the label used to classify
packets for differentiated services.
A. QoS
B. codepoint
page-pf9
C. SLA
D. supernetting
_________ is capable of representing symbols and characters used in all the major
languages spoken around the world.
A. UTF-8
B. ASCII
C. IRA
D. UCST
A benefit of extranets is:
A. reduced costs
B. coordination
C. customer satisfaction
D. all of the above
page-pfa
Because of its characteristics, free space loss is a particular problem in:
A. microwave tower transmissions
B. WANS
C. dial up or modem transmissions
D. satellite transmissions
A data center can occupy:
A. a single room in a building
B. one or more floors
C. an entire building
D. all of the above
page-pfb
The Domain Name System (DNS) is comprised of four elements; which of
the following is NOT one of these elements?
A. DNS database
B. IP addresses
C. name servers
D. resolvers
________ is a method for addressing, creating, updating, or querying relational
databases.
A. SQL
B. API
C. UTI
D. GUI
Which of the following is NOT one of the characteristics of a building wiring scheme
using a structured cabling system?
A. the scheme refers to the wiring within a commercial building
page-pfc
B. the scheme must accommodate the need for separate cabling systems for each of
data, voice, and video applications
C. the scope of the system includes cabling to support of all types of information
transfer, including voice, LANs, video and image transmission, and other forms of data
transmission
D. the cable layout is designed to encompass distribution to all work areas within the
building, so that relocation of equipment does not require rewiring but simply requires
plugging the equipment into a preexisting outlet in the new location
Which of the following is NOT a class of client/server processing?
A. host-based processing
B. server-based processing
C. client-based processing
D. network-based processing
The _________ specifies the station(s) for which the frame is intended. It may be
a unique physical address, a group address, or a broadcast address.
A. DA
B. SA
page-pfd
C. SFD
D. preamble
A set of one or more interconnected BSSs and integrated LANs that appear as a single
BSS to the LLC layer at any station associated with one of these BSSs.
A. MPDU
B. ESS
C. MSDU
D. DS
Routing takes place at the ___________ layer.
A. network
B. link
C. data control
D. physical
page-pfe
For sizable blocks of data, asynchronous transmission is far more efficient than
synchronous.
One of the challenges when adopting a top down design approach to networks is that
the company must understand the individual
needs of each department and be responsive.
Convergence can be thought of in terms of a three-layer model of
enterprixe communications: applications, enterprise services, and _________.
page-pff
Two types of multiplexing techniques discussed in this chapter are FDM and _______.
In a __________ data processing architecture, data processing is done on one, or a
cluster of computers, generally powerful and/or physically large, located in a central
data processing facility.
A ___________ is a form of virus explicitly designed to hide itself from detection
by antivirus software.
The layout of the browser display is controlled by the __________ standard, which
defines embedded commands in text files that specify features of the browser display,
such as the fonts, colors, images and their placement on the display, and the location of
the locations where the user can invoke the hyperlinks and their targets.
page-pf10
_________ is an identifier for a set of interfaces in which a packet is delivered to one of
the interfaces identified by that address (the "nearest" one, according to the routing
protocols' measure of distance).
The distinguishing feature of the _________ is that it provides access to corporate
resources by authorized outside clients, typically suppliers and customers of the
organization.
PBX and Centrex systems provide similar functionality from the users point-of-view.
page-pf11
The typical coverage area for a wireless LAN is 300 to 500 meters.
Response time is extremely important when implementing email systems.
In general, the performance of a LAN declines with increased lengths of connections
and/or the number of devices using it.
The IP address is obtained either by looking it up in a configuration file or dynamically,
via the ______________.
page-pf12
A _________ is a bundle of virtual channels that have the same endpoints.
The most widely used high-speed LANs in today's enterprise networks are referred to as
_________ and were developed by the IEEE 802.3 standards committee.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.