Exam 9: Network Organization Concepts
Exam 1: Introducing Operating Systems40 Questions
Exam 2: Memory Management: Simple Systems40 Questions
Exam 3: Memory Management: Virtual Memory Systems40 Questions
Exam 4: Processor Management40 Questions
Exam 5: Process Management40 Questions
Exam 6: Concurrent Processes40 Questions
Exam 7: Device Management40 Questions
Exam 8: File Management40 Questions
Exam 9: Network Organization Concepts40 Questions
Exam 10: Management of Network Functions40 Questions
Exam 11: Security and Ethics40 Questions
Exam 12: System Management40 Questions
Exam 13: Unix Operating Systems46 Questions
Exam 14: Windows Operating Systems40 Questions
Exam 15: Linux Operating Systems40 Questions
Exam 16: Android Operating Systems40 Questions
Select questions type
When using a ring topology,a ____ can be used to connect to another network that uses the same protocol.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
Circuit switching is a communication model in which a dedicated communication path is established between two hosts.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
Addressing protocols are normally unrelated to the network topology and geographic location of each site.
Free
(True/False)
5.0/5
(40)
Correct Answer:
False
Usually,the term "____" indicates a specific computer system whose services and resources can be used from remote locations.
(Multiple Choice)
4.8/5
(40)
A ____ includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person.
(Multiple Choice)
4.7/5
(47)
A ____ is a device and software used to connect two or more local area networks or systems that use different protocols; it translates one network's protocol into another,resolving hardware and software incompatibilities.
(Multiple Choice)
4.8/5
(41)
The geometric arrangement of connections (cables,wireless,or both)that link the nodes in a networked system is called a ____.
(Multiple Choice)
4.8/5
(31)
Round robin access control is an inefficient technique when there are many nodes transmitting over long periods of time.
(True/False)
4.9/5
(28)
Under the Domain Name Service (DNS)protocol,in the address someone@name1.name2.name3.name4,the host name is ____.
(Multiple Choice)
4.9/5
(47)
In the OSI transport protocol model,Layer Seven,the ____ layer,provides the interface to users and is responsible for formatting user data before passing it to lower layers for transmission to a remote host.
(Multiple Choice)
4.7/5
(28)
The physical topology of a network may not reflect its logical topology.
(True/False)
4.7/5
(26)
When deciding which network topology configuration to use,designers should keep in mind four criteria: ____.
(Multiple Choice)
4.8/5
(42)
In a bus network topology,devices are physically connected by means of cables that run between them,and the cables pass through a centralized controller mechanism called the bus.
(True/False)
4.8/5
(36)
In the ____ path-selection approach,the destination and sequence number of a packet are added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network.
(Multiple Choice)
4.8/5
(31)
The Transmission Control Protocol/Internet Protocol (TCP/IP)reference model is the basis for Internet communications and is the most widely used network layer protocol today.
(True/False)
4.8/5
(47)
Bridging between two homogeneous networks occurs at Layer 2 of the OSI transport protocol model,the data link layer.
(True/False)
4.8/5
(36)
The ___,which makes technical recommendations about data communication interfaces,took on the task of creating a universal network architecture,resulting in the OSI Reference Model.
(Multiple Choice)
4.8/5
(45)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)