The first transcontinental telephone service was established

Assignment Help Computer Networking
Reference no: EM131325500

Q1. The first transcontinental telephone service was established in the 1940s.
a. true
b. false

Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET.
a. true
b. false

Q3. Telecommunications is the transmission of voice and video as well as data and implies transmitting a longer distance than in a data communication network.
a. true
b. false

Q4. At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller packets and opening a connection to a server for transferring the packets.
a. true
b. false

Q5. The internet standards organization that will allow anyone to join is _________(C)_________.
a. ANSI
b. ISO
c. IETF
d. IEEE
e. ITU-T

Q6. An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization.
a. true
b. false


Q7. The function of the file server is to:
a. store data and software programs that can be used by client computers on the network.
b. manage all printing requests from clients on the network.
c. transfer e-mail messages to other servers on the network.
d. store HTML documents for an Internet or intranet web site.
e. coordinate the communication of client and servers on the network.

Q8. The World Wide Web was conceived at University of Utah as part of the development of the Internet.
a. true
b. false

Q9. As the demand for more and more network applications grow; host-based computing becomes the best solution.
a. true
b. false

Q10. The acronym, HTML, refers to:
a. Header Markup Language
b. Hypertext Markup Locator
c. Hypertext Markup Language
d. Hypertext Markup Library
e. Hypertext Modulating Language

Q11. To use the Web, each client computer requires a data link layer software package called a Web browser.
a. true
b. false

 

Q12. Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.
a. true
b. false

Q13. A ________ is a group of computers linked together so that they act as one computer.
a. workstation
b. transaction terminal
c. cluster
d. network computer
e. transaction terminal

Q14. Client-server architectures:
a. cannot connect computers that use different hardware
b. are one of the least used network architectures today
c. can use middleware to provide a standard way of communicating between software from more than one vendor
d. assign the responsibility for the presentation logic to the server
e. were the earliest type of network architectures

Q15. A walkie-talkie is an example of half-duplex transmission.
a. true
b. false

Q16. ____________ refers to the transmission characteristics of the circuit.
a. handshaking
b. virtual circuit
c. bonding
d. logical circuit
e. physical circuit


Q17. Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.
a. voice converter
b. modem
c. codec
d. multiplexer
e. demodulator

Q18. How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels?
a. 64
b. 32
c. 16
d. 8
e. 6

Q19. ______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
a. Line-of-sight effect
b. Multimode index
c. Saturation effect
d. Raindrop attenuation
e. Propagation delay

Q20. __________ is a line-of-sight type of wireless media.
a. coaxial cable
b. microwave
c. radio
d. twisted pair
e. fiber optic


Q21. In simplex transmission, the data flows in both directions at the same time.
a. true
b. false

Q22. Microwave transmissions require a line of sight between any two points.
a. true
b. false

Q23. Gaussian noise is a special type of attenuation.
a. true
b. false

Q24. In data transmission, data errors are uniformly distributed in time.
a. true
b. false

Q25. Overhead bits are used for error checking and marking the start and end of characters and packets.
a. true
b. false
Answer: True

Q26. With odd parity (assume that the parity bit (the right-most bit) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
a. 01101011
b. 00011011
c. 00100101
d. 10110110
e. 11111110


Q27. The two categories of network errors are: lost data and delimited data.
a. true
b. false

Q28. Another term for stop-and-wait ARQ is sliding window.
a. true
b. false

Q29. _____________ is an effective way to prevent attenuation.
a. Shielding wires
b. Adding fluorescent lights
c. Adding repeaters or amplifiers to a circuit
d. Changing multiplexing techniques
e. Shorting a circuit

Q30. Quality of Service routing is a special type of connection-oriented routing in which different connections are assigned different priorities.
a. true
b. false

Q31. The data link layer address is generally encoded in a network card by the card's manufacturer.
a. true
b. false

Q32. A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message

Q33. TCP is the network layer protocol used on the Internet today.
a. true
b. false

Q34. Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.
a. true
b. false

Q35. A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection.
a. ACK
b. NAK
c. SYN
d. ARQ
e. FIN

Q36. Software with multiprotocol stacks refers to the fact that the software supports several different transport/network protocols.
a. true
b. false

Q37. A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.
a. true
b. false

Q38. Resource sharing refers to having users access the same data files, exchange information via e-mail, or use the Internet.
a. true
b. false

Q39. A hierarchical tree of domains within one organization that are linked to other trees in the organization is called a ___________.
a. ADS
b. domain
c. forest
d. tree
e. NDS

Q40. Peer-to-peer networks have computers that are permanently assigned as network servers.
a. true
b. false

Q41. Software Publishers Association has embarked upon an aggressive software audit program to check the number of illegal software copies on LANs.
a. true
b. false

Q42. 10/100 Ethernet:
a. uses 100 Mbps throughout the entire network
b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use
c. uses 10 Mbps throughout 100% of the entire network
d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
e. uses 10 Gbps throughout 100% of the entire network

Q43. The type of logical topology that Ethernet uses is a:
a. ring
b. bus
c. star
d. mesh
e. interconnected

Q44. A Bluetooth network is called ____________.
a. WLAN
b. Piconet
c. LAN
d. area
e. WAN

Q45. The maximum data rate of Bluetooth is:
a. 2 Mbps
b. 4 Mbps
c. 1 Mbps
d. 11 Mbps
e. 5 Mbps

Q46. Another name for distributed coordination function (DCF) is __________.
a. distributed carrier sense method
b. physical carrier sense method
c. physical carrier sense mode
d. distributed carrier sense mode
e. distributed coordination mode

Q47. Directional antennas produce a stronger signal over longer distances than omnidirectional antennas.
a. true
b. false


Q48. War driving refers to a computer cracking technique that involves driving through a neighborhood with a wireless-enabled notebook computer and mapping houses and businesses that have wireless access points.
a. true
b. false

Q49. A(n) _____________ is required to connect a computer to WLAN.
a. Ethernet NIC
b. antennae
c. wireless NIC
d. access point
e. hub

Q50. Placing a server in a WLAN instead of wired LAN is a good way to improve WLAN performance.
a. true
b. false

Reference no: EM131325500

Questions Cloud

Identify the two variables in your research problem : Identify a topic of interest and write a research problem, based on your topic of interest, that specifically looks at the relationship between two variables.
Energy should we be using in florida : What alternative form(s) of energy should we be using in Florida and why?
Determine prices of lookback and modified lookback calls : Determine the prices of lookback and modified lookback calls and puts. For the modified lookbacks, use an exercise price of 95.
Which expenditures would not be included included in cost : What options does a business have while financing its operations? Which of the following expenditures would not be included in the cost of a fixed asset?
The first transcontinental telephone service was established : The first transcontinental telephone service was established in the 1940s.The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET.
Generate a 16-dimensional codebook of size 64 : Comment on the differences in the mean squared errors and the quality of the reconstructed images. You can use the program trvqsp_img to obtain the codebooks.
Which of the two articles was more persuasive why : Reflect on your original opinion of your topic in 50 to 75 words. Consider the following questions for your response: Which of the two articles was more persuasive? Why? Has your opinion changed after reading the articles? Why or why not
Determine the appropriate number of puts and shares to hold : You plan to use puts, which are selling for $23.72 and have an exercise price of 510. Determine the appropriate number of puts and shares to hold. What is the insured value of the portfolio?
Perform the research needed to meet the source requirements : Write a new thesis statement that covers your paper's topic and direction (what you want the reader to understand when the essay is completed) - Perform the research needed to meet the source requirements (minimum 3 additional sources). You may n..

Reviews

Write a Review

Computer Networking Questions & Answers

  Subnetting and supernetting

What are the key differences between the following two terms: subnetting and supernetting? Provide examples for each - Do you expect IPv6 will replace IPv4 completely in the coming future

  Suppose that we are using the simple model for

assume we are using the simple model for floating-point representation as given in this book the representation uses a

  Network discussion - application layer collapse

Application layer protocols such as HTTP, FTP, SMTP, DNS, and P2P networks. Pick up one protocol that you are familiar with and write a brief overview using your own words.

  Executing privileged commands without the root password

Explain how you would allow the user to execute a specific, privileged command without giving the user the root password or permission to use the sudo to run any command with root privileges. Provide the exact steps you would follow and clearly ex..

  Write a paper on virtual private network

Write a paper on Virtual Private Network. In your paper, you need to discuss: VPN, Aadvantages and disadvantages of VPN and Protocols such as IPsec, PPTP, and PP2TP.

  Research report on the chosen topic with brief supportive

research report on the chosen topic with brief supportive descriptions about the challenges problems relevant

  Criteria a company chooses for use edi and an extranet

When a company opens a private market space, it may use EDI, an extranet, EDI/Internet, various web services, XML or just the Internet with regular encryption.

  Explain the basics of networking and security issues

The project text needs to be grammatically correct with correct spelling and sentence structure when applicable. Remember to cite ideas that are not your own - Explain the basics of networking and security issues to other people.

  Determine about the crash if rip is used

The node in Denver crashes completely. How do the other nodes in the country find out about the crash if RIP is used? If OSPF is used?

  Create a program that estimates the radio signal strength

Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zones, and proportionally assign to them signal strength ranges (%).

  Discuss how the mcqm system connects all processes

Start the paper with a brief overview and description of FDA and ISO regulations that exist to protect consumers. Briefly discuss how the MCQM system connects all processes critical to compliance.

  Describe the hardware you will purchase

Describe the hardware you will purchase or build (inclusive of computers, memory, storage, video cards, printers, routers and cabling). Justify your hardware selection

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd