Exam 17: Network Protocols
Exam 1: Computer Systems Overview45 Questions
Exam 2: Operating System Overview45 Questions
Exam 3: Process Description and Control45 Questions
Exam 4: Threads45 Questions
Exam 5: Concurrency: Mutual Exclusion and Synchronization45 Questions
Exam 6: Concurrency: Deadlock and Starvation45 Questions
Exam 7: Memory Management45 Questions
Exam 8: Virtual Memory45 Questions
Exam 9: Uniprocessor Scheduling45 Questions
Exam 10: Multiprocessor and Real-Time Scheduling45 Questions
Exam 11: Io Management and Disk Scheduling45 Questions
Exam 12: File Management45 Questions
Exam 13: Embedded Operating Systems45 Questions
Exam 14: Computer Security Threats45 Questions
Exam 15: Computer Security Techniques45 Questions
Exam 16: Distributed Processing, Clientserver, and Clusters45 Questions
Exam 17: Network Protocols45 Questions
Exam 18: Distributed Process Management45 Questions
Select questions type
The _________ provides support for distributed applications such as electronic mail, file transfer, and remote terminal access.
Free
(Multiple Choice)
4.9/5
(53)
Correct Answer:
D
The distributed operating system does not rely on a communications architecture for basic communications functions.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
A __________ is a set of rules governing the exchange of data between two entities.
Free
(Short Answer)
4.8/5
(37)
Correct Answer:
protocol
The structured set of modules that implements the communications function is referred to as a __________ .
(Short Answer)
4.8/5
(27)
The __________ contains all the logic that is unique to the file transfer application, such as transmitting passwords, file commands, and file records.
(Multiple Choice)
4.9/5
(39)
The most widely used communications architecture the _________ protocol suite.
(Short Answer)
4.8/5
(31)
A __________ is a processor that connects two networks, and whose primary function is to relay data from one network to the other on a route from the source to the destination end system.
(Short Answer)
4.8/5
(39)
__________ accommodates both text and binary files, and is used to send files from one system to another using features that provide controlled access.
(Multiple Choice)
4.9/5
(42)
The __________ contains the logic needed to support the various user applications.
(Multiple Choice)
4.9/5
(35)
The key elements of a protocol are: syntax, timing and _________ .
(Short Answer)
4.9/5
(45)
The _________ covers the physical interface between a data transmission device and a transmission medium or network.
(Multiple Choice)
4.9/5
(40)
UDP guarantees delivery, preservation of sequence, or protection against duplication.
(True/False)
5.0/5
(30)
A _________ is a common operating system shared by a network of computers.
(Short Answer)
4.7/5
(35)
The communications software above the network access layer needs to be concerned about the specifics of the network to be used.
(True/False)
4.8/5
(41)
The __________ is a configuration in which there is a network of application machines, usually single-user workstations and one or more "server" machines.
(Short Answer)
4.8/5
(38)
In the __________ configuration the server machines provide network wide services or applications, such as file storage and printer management.
(Multiple Choice)
4.9/5
(28)
___________ is implemented only in the end systems and keeps track of the blocks of data being transferred to assure that all are delivered reliably to the appropriate application.
(Short Answer)
4.7/5
(37)
A protocol is used for communication between entities in different systems.
(True/False)
4.8/5
(42)
The leading edge of research and development for distributed systems is in the area of distributed operating systems.
(True/False)
4.8/5
(29)
The concept of _________ was developed in the 1980s in the UNIX environment and enables communication between a client and server process and may be either connection oriented or connectionless.
(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)