Exam 9: Network Organization Concepts
Exam 1: Introducing Operating Systems38 Questions
Exam 2: Early Memory Management Systems40 Questions
Exam 3: Memory Management Includes Virtual Memory39 Questions
Exam 4: Processor Management40 Questions
Exam 5: Process Synchronization39 Questions
Exam 6: Concurrent Processes40 Questions
Exam 7: Device Management40 Questions
Exam 8: File Management40 Questions
Exam 9: Network Organization Concepts40 Questions
Exam 10: Management of Network Functions40 Questions
Exam 11: Security and Ethics40 Questions
Exam 12: System Management40 Questions
Exam 13: Unix Operating Systems43 Questions
Exam 14: Windows Operating Systems40 Questions
Exam 15: Linux Operating Systems40 Questions
Exam 16: Android Operating Systems40 Questions
Select questions type
The ___,which makes technical recommendations about data communication interfaces,took on the task of creating a universal network architecture,resulting in the OSI Reference Model.
(Multiple Choice)
4.7/5
(36)
The objective of a hybrid configuration is to select among the strong points of each topology and combine them to meet that system's communications requirements most effectively.
(True/False)
4.9/5
(45)
In the ____ path-selection approach,the destination and sequence number of a packet are added to the information uniquely identifying the message to which the packet belongs;each packet is then handled independently and a route is selected as each packet is accepted into the network.
(Multiple Choice)
4.9/5
(37)
If a collision occurs when using CSMA/CD,a jamming signal is sent immediately to both sending nodes,which then wait ____ before trying again.
(Multiple Choice)
4.8/5
(40)
Carrier sense multiple access (CSMA)is a ____-based access protocol.
(Multiple Choice)
4.9/5
(32)
When deciding which network topology configuration to use,designers should keep in mind four criteria: ____.
(Multiple Choice)
4.8/5
(37)
In the distributed-queue,dual bus (DQDB)protocol,a node can use Bus 2 to send a ____ to its upstream neighbors.
(Multiple Choice)
4.9/5
(37)
Under the Domain Name Service (DNS)protocol,in the address someone@name1.name2.name3.name4,the host name is ____.
(Multiple Choice)
4.7/5
(49)
Round robin access control is an inefficient technique when there are many nodes transmitting over long periods of time.
(True/False)
4.9/5
(36)
When using a ring topology,a ____ can be used to connect to another network that uses the same protocol.
(Multiple Choice)
4.7/5
(44)
When using the distributed-queue,dual bus (DQDB)protocol,transmission on each bus consists of a steady stream of fixed-size slots.
(True/False)
4.8/5
(39)
In a bus network topology,devices are physically connected by means of cables that run between them,and the cables pass through a centralized controller mechanism called the bus.
(True/False)
4.9/5
(36)
A ____ includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person.
(Multiple Choice)
4.9/5
(43)
A ____ is a device and software used to connect two or more local area networks or systems that use different protocols;it translates one network's protocol into another,resolving hardware and software incompatibilities.
(Multiple Choice)
4.8/5
(34)
In the OSI transport protocol model,Layer Seven,the ____ layer,provides the interface to users and is responsible for formatting user data before passing it to lower layers for transmission to a remote host.
(Multiple Choice)
4.7/5
(25)
A common goal of all networked systems is to provide a convenient way to share resources while controlling users' access to them.
(True/False)
4.9/5
(40)
A local area network (LAN)is generally owned,used,and operated by a single organization and allows computers to communicate directly through a common communication line.
(True/False)
4.9/5
(37)
When using the routing information protocol (RIP)to transfer data from one network to another,the path ____ is chosen.
(Multiple Choice)
4.9/5
(28)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)