Ask Computer Network & Security Expert

Multiple-Choice Questions:

1. Which of the following is NOT a feature of an Intranet?
A. uses Internet based standards, such as HTML and SMTP
B. is used to connect both local and remote sites into one network
C. is used to distribute content to the general Internet
D. can be effectively managed

2. Which of the following does distributed processing typically not support?
A. applications
B. device controller
C. data
D. mainframes

3. Which of the following is NOT a benefit of distributed data processing?
A. increased responsiveness to organizational needs
B. better correspondence to organizational patterns
C. greater user involvement and control
D. enhanced centralization of data definitions

4. Which of the following is not a function provided by servers in client/server systems?
A. printing services
B. data entry
C. database services
D. gateways

5. The three ways of organizing data for use by an organization are:
A. centralized, replicated, and partitioned
B. centralized, structured, and partitioned
C. structured, replicated, and partitioned
D. centralized, replicated, and structured

6. A data center can occupy:
A. a single room in a building
B. one or more floors
C. an entire building
D. all of the above

7. A DDP facility may include:
A. a central data center
B. satellite data centers
C. a community of peer computing facilities
D. all of the above

8. Which of the following is NOT a requirement for the Corporate Computing Function?
A. provide computing services in a reliable, professional, and technically competent manner
B. deploying technology in ways that make the work productive and not be concerned about whether or not the technology makes work enjoyable for employees
C. provide computing capabilities to all organizational units that need them
D. assist in satisfying the special computing needs of user departments

9. Which of the following is common in today's data centers?
A. redundant/backup power supplies
B. environmental controls
C. data communication connections
D. all of the above

10. No redundancy guarantees for servers, storage systems, network equipment, and communication connections to Internet or other networks; single path for power and cooling distribution; no redundant components; and availability: 99.671% are ____ characteristics of data centers.
A. Tier 1
B. Tier 2
C. Tier 3
D. Tier 4

11. Analog signals are:
A. continuous
B. discrete
C. discontinuous
D. all of the above

12. Digital signals are:
A. continuous
B. discrete
C. discontinuous
D. none of the above

13. In modern communication systems, data is sent from one point to another via:
A. input data
B. alternating current (A/C)
C. pressure changes
D. electromagnetic signals

14. One of the main differences between amplifiers and repeaters is that:
A. amplifiers forward noise as well as data
B. amplifiers clean the signal and then forward it
C. amplifiers increase the amount of attenuation
D. amplifiers focus primarily on digital signals

15. An encoding scheme is used:
A. in digital transmission to map binary digits to signal elements
B. in analog transmission to clean up the quality of the transmission
C. to help minimize errors
D. all of the above

16. Each signal change or element is called a:
A. bit
B. byte
C. baud
D. signal

17. If a carrier wave is modulated with 4 amplitudes and 4 phase changes, how many possible signal combinations are there?
A. 4
B. 8
C. 16
D. 32

18. A carrier wave is modulated with 4 amplitudes and 4 phase changes; how many bits can be represented with each signal change?
A. 1
B. 2
C. 3
D. 4

19. In Non Return to Zero encoding schemes, the signal or voltage level does not return to 0v (zero volts); one of the problems with this type of encoding is that:
A. it is sometimes difficult to synchronize the timing of the transmitter and the receiver
B. it does not work well with serial communications
C. the signal ground of the transmitter is often different from that of the receiver
D. it works only for analog signals

20. Asynchronous transmission includes a start and stop bit with each character transmitted to ensure:
A. that the total number of bits is a factor of 10
B. to allow a continuous stream of data
C. to prevent single bit errors from occurring
D. to allow the receiver to maintain synchronization with the sender

21. A paradigm for electronic communications where a dedicated path is opened and maintained during the exchange is called .
A. message switching
B. circuit switching
C. packet switching
D. data switching

22. A paradigm for electronic communications where messages are split into blocks of data with limited size, which are then transmitted one-by-one across the network is called _____ .
A. message switching
B. circuit switching
C. packet switching
D. data switching

23. The first two important applications developed for the ARPANET were:
A. Telnet and FTP
B. Telnet and email
C. FTP and email
D. email and world-wide-web

24. The first "killer application" for the ARPANET was ______.
A. Telnet
B. FTP
C. email
D. remote login

25. The development of an internationally distributed collection of multimedia files addressed using universal resource locators led to the:
A. Telnet package
B. email system
C. world-wide-web
D. FTP package

26. The problem of using IP numbers for addressing hosts in the Internet are resolved using ______.
A. the concept of domains and the use of domain names
B. the use of Telnet applications
C. the use of email servers
D. splitting IP addresses into four octets

27. The Domain Name System (DNS) is comprised of four elements; which of the following is NOT one of these elements?
A. DNS database
B. IP addresses
C. name servers
D. resolvers

28. The key features of the DNA database are:
A. variable-depth hierarchy for names, distributed databases, and name servers
B. resolvers, distributed databases, and name servers
C. distribution controlled by the database, resolvers, and distributed databases
D. variable-depth hierarchy for names, distributed databases, and distribution controlled by the database

29. _____ is telecommunications equipment that is located on the customer's physical location rather than on the provider's premises or in between.
A. CPE
B. ISP
C. CO
D. IXP

30. A company that provides other companies or individuals with access to, or presence on, the Internet is a(n) _ _ .
A. point of presence
B. ISP
C. network service provider
D. central office

31. The TCP/IP architecture contains _____ layers.
A. two
B. three
C. four
D. five

32. Wireless networking brings:
A. increased security risks
B. management headaches
C. increased demands on support staff
D. all of the above

33. _____ is a Cisco proprietary product.
A. VoIP
B. SKINNY
C. SMTP
D. SIP

34. The key elements of a protocol are:
A. syntax, structure, timing
B. syntax, semantics, timing
C. structure, semantics, format
D. format, syntax, semantics

35. Which of the following is a commonly used set of standards for computer communications?
A. SLA
B. ISO
C. POP
D. TCP/IP

36. A device that connects networks with differing addressing schemes, packet sizes and interfaces is called a _ _ _.
A. hub
B. router
C. switch
D. repeater

37. The current IP specification uses addresses to identify hosts that consist of:
A. 16 bits
B. 64 bits
C. 32 bits
D. 128 bits

38. The newer IPv6 specification uses addresses to identify hosts that consist of:
A. 128 bits
B. 64 bits
C. 32 bits
D. 16 bits

39. The ______ layer is concerned with the exchange of data between a computer and the network to which it is attached.
A. transport
B. application
C. network access
D. physical

40. The ______ layer contains the logic needed to support the various user applications.
A. network access
B. physical
C. application
D. transport.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92079769
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As