Exam 2: Protocol Architecture, tcpip, and

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Each protocol provides a set of rules for the exchange of data between systems.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

The two commonly used transport level protocols used as part of the TCP/IP protocol suite are TCP and ________.

Free
(Short Answer)
4.8/5
(28)
Correct Answer:
Verified

User Datagram Protocol (UDP)

Procedures needed to allow data to traverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture.

Free
(True/False)
4.8/5
(41)
Correct Answer:
Verified

True

The software used at the network access layer is not dependent on the type of network used because circuit switching,packet switching and local area networks all have the same standards.

(True/False)
4.9/5
(39)

Computer games,multiplayer network games,infotainment,and interactive audio visual productions are examples of applications in the _________ domain of multimedia systems.

(Multiple Choice)
4.8/5
(34)

A ________ is the layered structure of hardware and software that supports the exchange of data between systems and supports distributed applications such as electronic mail and file transfer.

(Short Answer)
4.8/5
(36)

________ provides a basic electronic mail transport facility.

(Multiple Choice)
4.7/5
(30)

The primary function of a gateway is to relay data from one network to the other on its route from the source to the destination end system.

(True/False)
4.9/5
(44)

The communication task can be organized into three relatively independent layers: network access layer,application layer,and ________ layer.

(Multiple Choice)
4.8/5
(33)

Human-computer interaction involving text,graphics,voice and video is _____.

(Multiple Choice)
4.8/5
(29)

The services between adjacent layers in a protocol architecture are expressed in terms of ________ and parameters.

(Short Answer)
4.8/5
(36)

Secure Shell (SSH)enables the user and the remote server to authenticate each other.

(True/False)
4.8/5
(39)

VoIP,streaming audio,and streaming video are not considered multimedia applications because each involves a single media type.

(True/False)
4.9/5
(29)

FTP provides a basic electronic mail transport facility.

(True/False)
4.8/5
(42)

________ is when the sending TCP includes a code that is a function of the contents of the remainder of the segment.The receiving TCP performs the same calculation and compares the result with the incoming code.A discrepancy results if there has been some error in transmission.

(Short Answer)
4.9/5
(42)

In a ________ the modules are arranged in a vertical stack.Each layer in the stack performs a related subset of the functions required to communicate with another system.

(Multiple Choice)
4.8/5
(31)

Facsimile,computer aided design,publishing and medical imaging are all ________ based applications.

(Multiple Choice)
4.7/5
(36)

The addiction of control information to data is referred to as ________.

(Short Answer)
4.8/5
(31)

In the application layer of TCP/IP,for each different type of application,a separate module is needed that is peculiar to that application.

(True/False)
4.8/5
(35)

Traffic on a network or internet can be divided into two broad categories: elastic and inelastic.

(True/False)
4.8/5
(32)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)