Exam 17: Network Protocols

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _________ provides support for distributed applications such as electronic mail, file transfer, and remote terminal access.

Free
(Multiple Choice)
4.9/5
(53)
Correct Answer:
Verified

D

The distributed operating system does not rely on a communications architecture for basic communications functions.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

A __________ is a set of rules governing the exchange of data between two entities.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

protocol

The structured set of modules that implements the communications function is referred to as a __________ .

(Short Answer)
4.8/5
(27)

The __________ contains all the logic that is unique to the file transfer application, such as transmitting passwords, file commands, and file records.

(Multiple Choice)
4.9/5
(39)

The most widely used communications architecture the _________ protocol suite.

(Short Answer)
4.8/5
(31)

A __________ is a processor that connects two networks, and whose primary function is to relay data from one network to the other on a route from the source to the destination end system.

(Short Answer)
4.8/5
(39)

__________ accommodates both text and binary files, and is used to send files from one system to another using features that provide controlled access.

(Multiple Choice)
4.9/5
(42)

The __________ contains the logic needed to support the various user applications.

(Multiple Choice)
4.9/5
(35)

The key elements of a protocol are: syntax, timing and _________ .

(Short Answer)
4.9/5
(45)

The _________ covers the physical interface between a data transmission device and a transmission medium or network.

(Multiple Choice)
4.9/5
(40)

UDP guarantees delivery, preservation of sequence, or protection against duplication.

(True/False)
5.0/5
(30)

A _________ is a common operating system shared by a network of computers.

(Short Answer)
4.7/5
(35)

The communications software above the network access layer needs to be concerned about the specifics of the network to be used.

(True/False)
4.8/5
(41)

The __________ is a configuration in which there is a network of application machines, usually single-user workstations and one or more "server" machines.

(Short Answer)
4.8/5
(38)

In the __________ configuration the server machines provide network wide services or applications, such as file storage and printer management.

(Multiple Choice)
4.9/5
(28)

___________ is implemented only in the end systems and keeps track of the blocks of data being transferred to assure that all are delivered reliably to the appropriate application.

(Short Answer)
4.7/5
(37)

A protocol is used for communication between entities in different systems.

(True/False)
4.8/5
(42)

The leading edge of research and development for distributed systems is in the area of distributed operating systems.

(True/False)
4.8/5
(29)

The concept of _________ was developed in the 1980s in the UNIX environment and enables communication between a client and server process and may be either connection oriented or connectionless.

(Short Answer)
4.8/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)