Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Q1. The first transcontinental telephone service was established in the 1940s.
a. true
b. false

Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET.
a. true
b. false

Q3. Telecommunications is the transmission of voice and video as well as data and implies transmitting a longer distance than in a data communication network.
a. true
b. false

Q4. At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller packets and opening a connection to a server for transferring the packets.
a. true
b. false

Q5. The internet standards organization that will allow anyone to join is _________(C)_________.
a. ANSI
b. ISO
c. IETF
d. IEEE
e. ITU-T

Q6. An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization.
a. true
b. false


Q7. The function of the file server is to:
a. store data and software programs that can be used by client computers on the network.
b. manage all printing requests from clients on the network.
c. transfer e-mail messages to other servers on the network.
d. store HTML documents for an Internet or intranet web site.
e. coordinate the communication of client and servers on the network.

Q8. The World Wide Web was conceived at University of Utah as part of the development of the Internet.
a. true
b. false

Q9. As the demand for more and more network applications grow; host-based computing becomes the best solution.
a. true
b. false

Q10. The acronym, HTML, refers to:
a. Header Markup Language
b. Hypertext Markup Locator
c. Hypertext Markup Language
d. Hypertext Markup Library
e. Hypertext Modulating Language

Q11. To use the Web, each client computer requires a data link layer software package called a Web browser.
a. true
b. false

 

Q12. Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.
a. true
b. false

Q13. A ________ is a group of computers linked together so that they act as one computer.
a. workstation
b. transaction terminal
c. cluster
d. network computer
e. transaction terminal

Q14. Client-server architectures:
a. cannot connect computers that use different hardware
b. are one of the least used network architectures today
c. can use middleware to provide a standard way of communicating between software from more than one vendor
d. assign the responsibility for the presentation logic to the server
e. were the earliest type of network architectures

Q15. A walkie-talkie is an example of half-duplex transmission.
a. true
b. false

Q16. ____________ refers to the transmission characteristics of the circuit.
a. handshaking
b. virtual circuit
c. bonding
d. logical circuit
e. physical circuit


Q17. Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.
a. voice converter
b. modem
c. codec
d. multiplexer
e. demodulator

Q18. How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels?
a. 64
b. 32
c. 16
d. 8
e. 6

Q19. ______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
a. Line-of-sight effect
b. Multimode index
c. Saturation effect
d. Raindrop attenuation
e. Propagation delay

Q20. __________ is a line-of-sight type of wireless media.
a. coaxial cable
b. microwave
c. radio
d. twisted pair
e. fiber optic


Q21. In simplex transmission, the data flows in both directions at the same time.
a. true
b. false

Q22. Microwave transmissions require a line of sight between any two points.
a. true
b. false

Q23. Gaussian noise is a special type of attenuation.
a. true
b. false

Q24. In data transmission, data errors are uniformly distributed in time.
a. true
b. false

Q25. Overhead bits are used for error checking and marking the start and end of characters and packets.
a. true
b. false
Answer: True

Q26. With odd parity (assume that the parity bit (the right-most bit) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
a. 01101011
b. 00011011
c. 00100101
d. 10110110
e. 11111110


Q27. The two categories of network errors are: lost data and delimited data.
a. true
b. false

Q28. Another term for stop-and-wait ARQ is sliding window.
a. true
b. false

Q29. _____________ is an effective way to prevent attenuation.
a. Shielding wires
b. Adding fluorescent lights
c. Adding repeaters or amplifiers to a circuit
d. Changing multiplexing techniques
e. Shorting a circuit

Q30. Quality of Service routing is a special type of connection-oriented routing in which different connections are assigned different priorities.
a. true
b. false

Q31. The data link layer address is generally encoded in a network card by the card's manufacturer.
a. true
b. false

Q32. A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
a. unicast message
b. multicast message
c. broadcast message
d. guided message
e. radiated message

Q33. TCP is the network layer protocol used on the Internet today.
a. true
b. false

Q34. Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.
a. true
b. false

Q35. A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection.
a. ACK
b. NAK
c. SYN
d. ARQ
e. FIN

Q36. Software with multiprotocol stacks refers to the fact that the software supports several different transport/network protocols.
a. true
b. false

Q37. A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.
a. true
b. false

Q38. Resource sharing refers to having users access the same data files, exchange information via e-mail, or use the Internet.
a. true
b. false

Q39. A hierarchical tree of domains within one organization that are linked to other trees in the organization is called a ___________.
a. ADS
b. domain
c. forest
d. tree
e. NDS

Q40. Peer-to-peer networks have computers that are permanently assigned as network servers.
a. true
b. false

Q41. Software Publishers Association has embarked upon an aggressive software audit program to check the number of illegal software copies on LANs.
a. true
b. false

Q42. 10/100 Ethernet:
a. uses 100 Mbps throughout the entire network
b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use
c. uses 10 Mbps throughout 100% of the entire network
d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
e. uses 10 Gbps throughout 100% of the entire network

Q43. The type of logical topology that Ethernet uses is a:
a. ring
b. bus
c. star
d. mesh
e. interconnected

Q44. A Bluetooth network is called ____________.
a. WLAN
b. Piconet
c. LAN
d. area
e. WAN

Q45. The maximum data rate of Bluetooth is:
a. 2 Mbps
b. 4 Mbps
c. 1 Mbps
d. 11 Mbps
e. 5 Mbps

Q46. Another name for distributed coordination function (DCF) is __________.
a. distributed carrier sense method
b. physical carrier sense method
c. physical carrier sense mode
d. distributed carrier sense mode
e. distributed coordination mode

Q47. Directional antennas produce a stronger signal over longer distances than omnidirectional antennas.
a. true
b. false


Q48. War driving refers to a computer cracking technique that involves driving through a neighborhood with a wireless-enabled notebook computer and mapping houses and businesses that have wireless access points.
a. true
b. false

Q49. A(n) _____________ is required to connect a computer to WLAN.
a. Ethernet NIC
b. antennae
c. wireless NIC
d. access point
e. hub

Q50. Placing a server in a WLAN instead of wired LAN is a good way to improve WLAN performance.
a. true
b. false

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92080098
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

Assume that the number of customers who arrive at a water

Assume that the number of customers who arrive at a water ice stand follows the Poisson distribution with an average rate of 6.4 per 30 minutes. What is the probability that more than one customer will arrive during the ...

Fiona told her friend that she is very fortunate as the

Fiona told her friend that she is very fortunate as the slow-down in the economy has not decreased sales in her grocery store by much compared to sales of new cars in his car dealership. Explain what Fiona meant using th ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to pr ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As