Exam 6: Data Communication: Delivering Information Anywhere and Anytime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ layer of the OSI model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error,in sequence,and with no loss or duplication.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

A ____ is a hardware device that allows several nodes to share one communication channel.

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

Communication media connect sender and receiver devices.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

True

Define a wide area network and discuss typical transfer speeds.

(Essay)
5.0/5
(49)

In a star topology,the ____________________ computer supplies the main processing power.

(Short Answer)
4.8/5
(45)

The process of deciding which path the data takes on a network is called ____.

(Multiple Choice)
4.9/5
(39)

____________________ topology works well for companies that are geographically dispersed.

(Short Answer)
4.8/5
(32)

A routing table lists ____.

(Multiple Choice)
4.7/5
(26)

____________________ are rules that govern data communication,including error detection,message length,and transmission speed.

(Short Answer)
5.0/5
(41)

____________________ media include twisted pair cable,coaxial cable,and fiber optics.

(Short Answer)
4.9/5
(39)

It is important to separate an organization's core functions from the data communication systems that support them.

(True/False)
4.8/5
(39)

What is the first step in client / server communication?

(Multiple Choice)
4.8/5
(43)

In the Open Systems Interconnection model,the session layer is responsible for formatting message packets.

(True/False)
4.8/5
(30)

In ____________________ routing,one node is in charge of selecting the path for all packets.

(Short Answer)
4.9/5
(34)

In a bus topology,____ are used at each end of the cable to absorb the signal.

(Multiple Choice)
4.8/5
(44)

Within the ____ technique for wireless security,a user's computer and the AP use a master key to negotiate for a key that will be used for a session.

(Multiple Choice)
4.9/5
(35)

The amount of data that can be transferred from one point to another in one second is called ____.

(Multiple Choice)
4.8/5
(38)

The ____ layer of the OSI model specifies the electrical connections between computers and the transmission medium,and is primarily concerned with transmitting binary data,or bits over a communication network

(Multiple Choice)
4.8/5
(35)

Centralized processing is the primary configuration used in data communications today.

(True/False)
4.9/5
(39)

Describe a star topology.

(Essay)
4.9/5
(42)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)