How many bits can be represented with each signal change

Assignment Help Computer Networking
Reference no: EM131325171

Multiple-Choice Questions:

1. Which of the following is NOT a feature of an Intranet?
A. uses Internet based standards, such as HTML and SMTP
B. is used to connect both local and remote sites into one network
C. is used to distribute content to the general Internet
D. can be effectively managed

2. Which of the following does distributed processing typically not support?
A. applications
B. device controller
C. data
D. mainframes

3. Which of the following is NOT a benefit of distributed data processing?
A. increased responsiveness to organizational needs
B. better correspondence to organizational patterns
C. greater user involvement and control
D. enhanced centralization of data definitions

4. Which of the following is not a function provided by servers in client/server systems?
A. printing services
B. data entry
C. database services
D. gateways

5. The three ways of organizing data for use by an organization are:
A. centralized, replicated, and partitioned
B. centralized, structured, and partitioned
C. structured, replicated, and partitioned
D. centralized, replicated, and structured

6. A data center can occupy:
A. a single room in a building
B. one or more floors
C. an entire building
D. all of the above

7. A DDP facility may include:
A. a central data center
B. satellite data centers
C. a community of peer computing facilities
D. all of the above

8. Which of the following is NOT a requirement for the Corporate Computing Function?
A. provide computing services in a reliable, professional, and technically competent manner
B. deploying technology in ways that make the work productive and not be concerned about whether or not the technology makes work enjoyable for employees
C. provide computing capabilities to all organizational units that need them
D. assist in satisfying the special computing needs of user departments

9. Which of the following is common in today's data centers?
A. redundant/backup power supplies
B. environmental controls
C. data communication connections
D. all of the above

10. No redundancy guarantees for servers, storage systems, network equipment, and communication connections to Internet or other networks; single path for power and cooling distribution; no redundant components; and availability: 99.671% are ____ characteristics of data centers.
A. Tier 1
B. Tier 2
C. Tier 3
D. Tier 4

11. Analog signals are:
A. continuous
B. discrete
C. discontinuous
D. all of the above

12. Digital signals are:
A. continuous
B. discrete
C. discontinuous
D. none of the above

13. In modern communication systems, data is sent from one point to another via:
A. input data
B. alternating current (A/C)
C. pressure changes
D. electromagnetic signals

14. One of the main differences between amplifiers and repeaters is that:
A. amplifiers forward noise as well as data
B. amplifiers clean the signal and then forward it
C. amplifiers increase the amount of attenuation
D. amplifiers focus primarily on digital signals

15. An encoding scheme is used:
A. in digital transmission to map binary digits to signal elements
B. in analog transmission to clean up the quality of the transmission
C. to help minimize errors
D. all of the above

16. Each signal change or element is called a:
A. bit
B. byte
C. baud
D. signal

17. If a carrier wave is modulated with 4 amplitudes and 4 phase changes, how many possible signal combinations are there?
A. 4
B. 8
C. 16
D. 32

18. A carrier wave is modulated with 4 amplitudes and 4 phase changes; how many bits can be represented with each signal change?
A. 1
B. 2
C. 3
D. 4

19. In Non Return to Zero encoding schemes, the signal or voltage level does not return to 0v (zero volts); one of the problems with this type of encoding is that:
A. it is sometimes difficult to synchronize the timing of the transmitter and the receiver
B. it does not work well with serial communications
C. the signal ground of the transmitter is often different from that of the receiver
D. it works only for analog signals

20. Asynchronous transmission includes a start and stop bit with each character transmitted to ensure:
A. that the total number of bits is a factor of 10
B. to allow a continuous stream of data
C. to prevent single bit errors from occurring
D. to allow the receiver to maintain synchronization with the sender

21. A paradigm for electronic communications where a dedicated path is opened and maintained during the exchange is called .
A. message switching
B. circuit switching
C. packet switching
D. data switching

22. A paradigm for electronic communications where messages are split into blocks of data with limited size, which are then transmitted one-by-one across the network is called _____ .
A. message switching
B. circuit switching
C. packet switching
D. data switching

23. The first two important applications developed for the ARPANET were:
A. Telnet and FTP
B. Telnet and email
C. FTP and email
D. email and world-wide-web

24. The first "killer application" for the ARPANET was ______.
A. Telnet
B. FTP
C. email
D. remote login

25. The development of an internationally distributed collection of multimedia files addressed using universal resource locators led to the:
A. Telnet package
B. email system
C. world-wide-web
D. FTP package

26. The problem of using IP numbers for addressing hosts in the Internet are resolved using ______.
A. the concept of domains and the use of domain names
B. the use of Telnet applications
C. the use of email servers
D. splitting IP addresses into four octets

27. The Domain Name System (DNS) is comprised of four elements; which of the following is NOT one of these elements?
A. DNS database
B. IP addresses
C. name servers
D. resolvers

28. The key features of the DNA database are:
A. variable-depth hierarchy for names, distributed databases, and name servers
B. resolvers, distributed databases, and name servers
C. distribution controlled by the database, resolvers, and distributed databases
D. variable-depth hierarchy for names, distributed databases, and distribution controlled by the database

29. _____ is telecommunications equipment that is located on the customer's physical location rather than on the provider's premises or in between.
A. CPE
B. ISP
C. CO
D. IXP

30. A company that provides other companies or individuals with access to, or presence on, the Internet is a(n) _ _ .
A. point of presence
B. ISP
C. network service provider
D. central office

31. The TCP/IP architecture contains _____ layers.
A. two
B. three
C. four
D. five

32. Wireless networking brings:
A. increased security risks
B. management headaches
C. increased demands on support staff
D. all of the above

33. _____ is a Cisco proprietary product.
A. VoIP
B. SKINNY
C. SMTP
D. SIP

34. The key elements of a protocol are:
A. syntax, structure, timing
B. syntax, semantics, timing
C. structure, semantics, format
D. format, syntax, semantics

35. Which of the following is a commonly used set of standards for computer communications?
A. SLA
B. ISO
C. POP
D. TCP/IP

36. A device that connects networks with differing addressing schemes, packet sizes and interfaces is called a _ _ _.
A. hub
B. router
C. switch
D. repeater

37. The current IP specification uses addresses to identify hosts that consist of:
A. 16 bits
B. 64 bits
C. 32 bits
D. 128 bits

38. The newer IPv6 specification uses addresses to identify hosts that consist of:
A. 128 bits
B. 64 bits
C. 32 bits
D. 16 bits

39. The ______ layer is concerned with the exchange of data between a computer and the network to which it is attached.
A. transport
B. application
C. network access
D. physical

40. The ______ layer contains the logic needed to support the various user applications.
A. network access
B. physical
C. application
D. transport.

Reference no: EM131325171

Questions Cloud

How us co inc could implement a money market hedge : Assume that US Co Inc has net receivables of CHF100,000 in 90 days.- Suggest how US Co Inc could implement a money market hedge.
Discuss specific conflict that you observed in organization : For this assignment, write an essay that is a completely full three pages in length. In this essay, discuss a specific conflict that you observed in an organization, and analyze the behaviors and outcomes of that conflict
How us co inc could implement a money market hedge : Assume that US Co Inc has net payables of 200,000 Ballarian watsits (BLW) in 180 days.- Suggest how US Co Inc could implement a money market hedge.
Discuss the case - sandwich blitz : Sandwich Blitz Scenario: As part of your reading you were introduced to the business case study, Sandwich Blitz, Inc. which you will continue to consider at various times throughout this course. Refer back to the description of the company and to ..
How many bits can be represented with each signal change : A carrier wave is modulated with 4 amplitudes and 4 phase changes; how many bits can be represented with each signal change? The ______ layer contains the logic needed to support the various user applications.
What would be the translation gain or loss : If Manana's balance sheet remained as above but the peso moved to 25 pesos per dollar, what would be the translation gain or loss if translated by the monetary/ non-monetary method?
Review book - tao te ching - lao tzu : Give a brief account in your own words of the reading assigned - Offer a brief commentary on and critique of the reading
Derive an optimal capital budget for ajax : Use the marginal cost and marginal revenue concepts developed in this chapter to derive an optimal capital budget for Ajax
What physicians think about electronic health records : You've researched what physicians think about electronic health records. But what do you yourself think? Share your feelings about electronic health records

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Explore ways to secure a wireless network

Explore ways to secure a wireless network and present your findings in a brief report(1 page is fine, more is ok). Talk about your own experiences with using a wireless network, including the things you do to keep the network secure.

  Make a program which manages a registry of compact discs

make a program that manages a registry of compact discs cds. the register may e.g. based on a doubly linked list

  What are the three main types of network media

Question 1: What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways? Question 2: What are the three main types of network media?

  Explain the networking features

Explains the networking features , different kinds of networks and also how they are arranged,Describe what is Networking and also explain the types of networks

  Upgrade the network servers for the entire company

Suppose you are a network administrator and your boss indicates that a budget has been set aside to upgrade the network servers for the entire company.

  Computing successive values of congestion window

Determine successive values of congestion window in bytes?

  Create a basic diagram that depicts a star network topology

Create a basic diagram that depicts a star network topology with a switch as the central communications node. The focus here is on the network communications equipment for this LAN so include only that equipment and end nodes on the network.

  Differences between classful and classless routing

Explain the differences between- a routing protocol and a routed protocol, classful and classless routing and Distance Vector Routing Protocols and Link State Routing Protocols

  Discuss functionality of component of network

Discuss the functionality of each component and the role the components play in the operation of the network and the Internet.

  Ms visio to draw the network diagrams

Connect 2 buildings 3 storey high with a distance of 500m between each building. Each floor is occupied by the Finance Department, Administration Department and Computing Department.

  What networking and communications changes

What networking and communications changes were introduced in the past decade (2000s), and what were their implications - what factors are involved in selecting the architecture that is right for your organization?

  Explain the purposes of poe in wlan design

Explain the purposes of POE in WLAN design. Provide at least 3 scenarios of POE being used as the prime element in WLAN design to address the projects cost

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd