Deck 6: Data Communication: Delivering Information Anywhere and Anytime

Full screen (f)
exit full mode
Question
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).
Use Space or
up arrow
down arrow
to flip the card.
Question
Wireless network traffic can be captured with sniffers.
Question
WPA (Wi-Fi Protected Access)keys are longer than WEP (Wired Equivalent Privacy)keys, and are therefore more difficult to break.
Question
Protocols are devices that connect users to the Internet.
Question
Gigabit Ethernet is a LAN transmission standard capable of 1 Gbps and 10 Gbps data transfer speeds.
Question
Unlike the other disadvantages of wireless, throughput is expected to become a bigger problem in the future.
Question
Any packet-switching network can handle multimedia data.
Question
The data transfer speeds of local area networks (LANs)typically range from 100 Mbps to 10 Gbps.
Question
In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).
Question
A ring topology needs more cables to connect the nodes within a network than a star topology.
Question
An access point (AP)is the part of a wireless local area network (WLAN)that connects it to other networks.
Question
Data communication systems increase inventory costs.
Question
A company's BYOD strategy requires employees to use the organization's computers, tablets, smartphones, or other devices for work purposes.
Question
Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.
Question
Distributed processing maintains decentralized control and centralized operations.
Question
The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.
Question
Terrestrial microwave systems use Earth-based transmitters and receivers for transmitting data.
Question
Narrowband is capable of transmitting a maximum of 60,000 bps.
Question
In a centralized processing system, processing power is distributed among several locations.
Question
EAP (Extensible Authentication Protocol)keys are dynamically generated based on the user's SSID and password.
Question
Which statement is true of the different forms of sender and receiver devices?

A)Thin clients have processing power.
B)Smart terminals are full-featured computers.
C)Workstations serve as stand-alone systems.
D)Netbook computers are high-cost computers with disks.
Question
In the context of data communication, which of the following media is based on "line of sight"?

A)A terrestrial microwave
B)A mechanical wave
C)A coaxial cable
D)A fiber-optic cable
Question
_____ have the highest bandwidth of any communication medium.

A)Coaxial cables
B)Fiber-optic cables
C)Twisted pair copper cables
D)Ethernet cables
Question
Virtual meetings are not considered cost effective applications of data communication systems for managers.
Question
_____ is the electronic transfer of data from one location to another.

A)Data communication
B)Data interpretation
C)Data mining
D)Data exchange
Question
The Internet and data communication systems facilitate lifelong learning.
Question
Which problem is resolved by distributed processing?

A)Lack of coordination in centralized processing
B)Lack of responsiveness in centralized processing
C)Lack of security in decentralized processing
D)Lack of individuality in decentralized processing
Question
_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.

A)An analog modem
B)Digital subscriber line
C)Code division multiple access
D)A cable modem
Question
Transmission of data across satellites is an example of data communication through _____.

A)conducted media
B)radiated media
C)induced media
D)uprooted media
Question
The _____ layer of the Open Systems Interconnection (OSI)model provides services that support users' tasks, such as file transfers, database access, and e-mail.

A)Application
B)Presentation
C)Network
D)Data Link
Question
Identify a true statement about the different forms of sender and receiver devices.

A)Thin clients have no processing power.
B)Smart terminals are full-featured computers.
C)Workstations are the same as supercomputers.
D)Netbook computers do not save data to servers.
Question
In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.

A)narrowband
B)baseband
C)broadband
D)sideband
Question
A(n)_____ is a device that connects a user to the Internet.

A)drafter
B)modem
C)cookie
D)applet
Question
_____ are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.

A)Twisted pair cables
B)Copper line cables
C)Air-spaced coaxial cables
D)Fiber-optic cables
Question
In the context of data communication, a _____ is based on "line of sight."

A)twisted pair wire
B)satellite
C)coaxial cable
D)fiber-optic cable
Question
In _____, each department has its own computer for performing processing tasks.

A)centralized processing
B)decentralized processing
C)distributed processing
D)modular processing
Question
The decrease in telecommuters is an example of how the boundaries between work and personal life are becoming less clear-cut as data communication becomes more available in both homes and businesses.
Question
Identify an advantage of centralized processing.

A)It helps in exercising tight control over system operations and applications.
B)It is highly responsive to users' needs.
C)It has the highest fault tolerance.
D)It is highly compatible with organizational growth because workstations can be added easily.
Question
_____ are conducted media that can be used for both data and voice transmissions.

A)Terrestrial microwaves
B)Broadcast radios
C)Coaxial cables
D)Satellite dishes
Question
_____ is the amount of data that can be transferred from one point to another in one second.

A)Bandwidth
B)Packet
C)Latency
D)Protocol
Question
Which layer of the Open Systems Interconnection (OSI)model specifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network?

A)Application
B)Transport
C)Data Link
D)Physical
Question
The _____ of the Open Systems Interconnection (OSI)model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.

A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
Question
_____ is the physical link between a network and a workstation.

A)The session layer
B)An adapter card
C)An html address
D)A network topology
Question
Which layer of the Open Systems Interconnection (OSI)model formats message packets?

A)Session
B)Application
C)Presentation
D)Network
Question
Internet Protocol (IP)operates at the _____ of the Open Systems Interconnection (OSI)model.

A)Transport layer
B)Physical layer
C)Data Link layer
D)Network layer
Question
_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).

A)Fiber-optic cables
B)Satellites
C)Ethernet cables
D)Terrestrial microwaves
Question
The process of deciding which path data takes on a network is called _____.

A)converging
B)diverging
C)roaming
D)routing
Question
_____ allows the linking of devices running on many different platforms.

A)Time Division Multiple Access
B)Transmission Control Protocol\Internet Protocol
C)A mobile telephone switching office
D)A public switched telephone network
Question
A hierarchical topology is also called a _____ topology.

A)layered
B)mixed
C)tree
D)vertical
Question
Identify an advantage of the bus topology.

A)It makes fault diagnosis easy.
B)It detects problems easily due to its centralized control.
C)It handles steady traffic well.
D)It is effective even when network traffic is heavy.
Question
Transmission Control Protocol operates at the _____ of the Open Systems Interconnection (OSI)model.

A)Network layer
B)Physical layer
C)Transport layer
D)Data Link layer
Question
A network _____ represents a network's physical layout.

A)utility
B)packet
C)protocol
D)topology
Question
In the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal.

A)emulator
B)terminator
C)stopper
D)node
Question
A network interface card (NIC)operates at the Open Systems Interconnection (OSI)model's _____ layers.

A)Presentation and Application
B)Session and Presentation
C)Network and Transport
D)Physical and Data Link
Question
In a(n)_____ topology, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.

A)star
B)ring
C)octagonal
D)mesh
Question
Local area networks (LANs)are used to _____.

A)integrate services to a single building or campus
B)link computers that are geographically far apart
C)connect various wide area networks in metropolitan areas
D)provide communication services spanning several cities or states
Question
Identify a topology used by traditional mainframe networks.

A)A ring topology
B)A star topology
C)A mesh topology
D)A hierarchical topology
Question
Compared with a star topology, a hierarchical topology:

A)allows network expansion more easily.
B)has cable layouts that are easy to modify.
C)offers a great deal of network control and lower cost.
D)is more effective at handling heavy but short bursts of traffic.
Question
A _____ is a hardware device that allows several nodes to share one communication channel.

A)multiplexer
B)controller
C)terminator
D)router
Question
_____ is responsible for packet forwarding.

A)Internet Protocol
B)Transmission Control Protocol
C)User Datagram Protocol
D)Extensible Authentication Protocol
Question
_____  is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.

A)Narrowband
B)Baseband
C)Broadband
D)Sideband
Question
_____  is a set of rules that governs data communication, including error detection, message length, and transmission speed.

A)Throughput
B)Attenuation
C)A topology
D)A protocol
Question
In the context of communication media, _____ media  provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.

A)radiated
B)conducted
C)wireless
D)non-guided
Question
Which event takes place in the most basic client\server configuration?

A)The results of a query are sent to the server.
B)The server sends a request to the client over a network.
C)The client receives and processes a query.
D)The user creates a query by running client software.
Question
In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.

A)Time Division Multiple Access
B)time of observation
C)statistical time division multiplexing
D)Time Slot Allocation
Question
In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps.

A)4G network
B)Asynchronous Transfer Mode
C)3G network
D)IP multimedia subsystem
Question
_____ refers to using a cellular phone outside of a carrier's limited service area.

A)Routing
B)Teleprocessing
C)Roaming
D)Surfing
Question
A(n)_____ is a network connection device that can build tables that identify addresses on each network.

A)switch
B)adapter card
C)dynamic router
D)hub
Question
In the early days of computer technology, which   system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers?

A)Centralized processing
B)Decentralized processing
C)Distributed processing
D)Interconnected processing
Question
In the context of data communication, which is true of convergence?

A)It changes the path that data takes each time a connection is made.
B)It allows the transmission of a limited amount of information in a specific period of time.
C)It requires major network upgrades, because video requires much more bandwidth.
D)It synchronizes devices before establishing a communication link.
Question
_____  is the loss of power in a signal as it travels from the sending device to the receiving device.

A)Attenuation
B)Convergence
C)Throughput
D)Bandwidth
Question
The Wi-Fi Protected Access 2 (WPA2)uses _____ to obtain a master key, which is in turn used to negotiate for a key that will be used for a session.

A)Internet Protocol
B)Service Set Identifier
C)Wired Equivalent Privacy
D)Extensible Authentication Protocol
Question
Which statement is true of the types of client\server architectures?

A)An n-tier architecture tests software easily.
B)An n-tier architecture helps improve network performance.
C)A two-tier architecture allows easy upgrades of applications.
D)A two-tier architecture requires minor modifications in case of any changes in application logic.
Question
A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

A)dynamic network
B)mobile network
C)mesh network
D)wired network
Question
A routing table lists _____.

A)nodes on a network
B)the IP address of a router
C)the protocols that each node understands
D)packets to be sent
Question
Horizontal scaling of a client\server architecture means _____.

A)migrating the network to decentralized servers
B)migrating the network to a faster communication media
C)adding more proxy servers
D)adding more workstations
Question
In the context of security of wireless networks, which is true of Wired Equivalent Privacy (WEP)?

A)It is suitable for large networks with high bandwidths.
B)It is the most secure system for wireless networks.
C)In WEP, keys are dynamically generated based on the user's ID and password.
D)In WEP, a key must be entered manually into the access point and the client computer.
Question
Communication media that use an antenna for transmitting data through air or water are called _____ .

A)radiated media
B)conducted media
C)wired media
D)guided media
Question
In the two-tier architecture of the client\server model, _____.

A)the presentation logic is always on the client
B)the data management logic is always on the client
C)the application logic is always on the server
D)the application logic is always on the client
Question
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.

A)immersion
B)convergence
C)telepresence
D)integration
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/121
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Data Communication: Delivering Information Anywhere and Anytime
1
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).
True
2
Wireless network traffic can be captured with sniffers.
True
3
WPA (Wi-Fi Protected Access)keys are longer than WEP (Wired Equivalent Privacy)keys, and are therefore more difficult to break.
True
4
Protocols are devices that connect users to the Internet.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
5
Gigabit Ethernet is a LAN transmission standard capable of 1 Gbps and 10 Gbps data transfer speeds.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
6
Unlike the other disadvantages of wireless, throughput is expected to become a bigger problem in the future.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
7
Any packet-switching network can handle multimedia data.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
8
The data transfer speeds of local area networks (LANs)typically range from 100 Mbps to 10 Gbps.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
9
In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
10
A ring topology needs more cables to connect the nodes within a network than a star topology.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
11
An access point (AP)is the part of a wireless local area network (WLAN)that connects it to other networks.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
12
Data communication systems increase inventory costs.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
13
A company's BYOD strategy requires employees to use the organization's computers, tablets, smartphones, or other devices for work purposes.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
14
Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
15
Distributed processing maintains decentralized control and centralized operations.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
16
The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
17
Terrestrial microwave systems use Earth-based transmitters and receivers for transmitting data.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
18
Narrowband is capable of transmitting a maximum of 60,000 bps.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
19
In a centralized processing system, processing power is distributed among several locations.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
20
EAP (Extensible Authentication Protocol)keys are dynamically generated based on the user's SSID and password.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
21
Which statement is true of the different forms of sender and receiver devices?

A)Thin clients have processing power.
B)Smart terminals are full-featured computers.
C)Workstations serve as stand-alone systems.
D)Netbook computers are high-cost computers with disks.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
22
In the context of data communication, which of the following media is based on "line of sight"?

A)A terrestrial microwave
B)A mechanical wave
C)A coaxial cable
D)A fiber-optic cable
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
23
_____ have the highest bandwidth of any communication medium.

A)Coaxial cables
B)Fiber-optic cables
C)Twisted pair copper cables
D)Ethernet cables
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
24
Virtual meetings are not considered cost effective applications of data communication systems for managers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
25
_____ is the electronic transfer of data from one location to another.

A)Data communication
B)Data interpretation
C)Data mining
D)Data exchange
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
26
The Internet and data communication systems facilitate lifelong learning.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
27
Which problem is resolved by distributed processing?

A)Lack of coordination in centralized processing
B)Lack of responsiveness in centralized processing
C)Lack of security in decentralized processing
D)Lack of individuality in decentralized processing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
28
_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.

A)An analog modem
B)Digital subscriber line
C)Code division multiple access
D)A cable modem
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
29
Transmission of data across satellites is an example of data communication through _____.

A)conducted media
B)radiated media
C)induced media
D)uprooted media
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
30
The _____ layer of the Open Systems Interconnection (OSI)model provides services that support users' tasks, such as file transfers, database access, and e-mail.

A)Application
B)Presentation
C)Network
D)Data Link
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
31
Identify a true statement about the different forms of sender and receiver devices.

A)Thin clients have no processing power.
B)Smart terminals are full-featured computers.
C)Workstations are the same as supercomputers.
D)Netbook computers do not save data to servers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
32
In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.

A)narrowband
B)baseband
C)broadband
D)sideband
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
33
A(n)_____ is a device that connects a user to the Internet.

A)drafter
B)modem
C)cookie
D)applet
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
34
_____ are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables.

A)Twisted pair cables
B)Copper line cables
C)Air-spaced coaxial cables
D)Fiber-optic cables
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
35
In the context of data communication, a _____ is based on "line of sight."

A)twisted pair wire
B)satellite
C)coaxial cable
D)fiber-optic cable
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
36
In _____, each department has its own computer for performing processing tasks.

A)centralized processing
B)decentralized processing
C)distributed processing
D)modular processing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
37
The decrease in telecommuters is an example of how the boundaries between work and personal life are becoming less clear-cut as data communication becomes more available in both homes and businesses.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
38
Identify an advantage of centralized processing.

A)It helps in exercising tight control over system operations and applications.
B)It is highly responsive to users' needs.
C)It has the highest fault tolerance.
D)It is highly compatible with organizational growth because workstations can be added easily.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
39
_____ are conducted media that can be used for both data and voice transmissions.

A)Terrestrial microwaves
B)Broadcast radios
C)Coaxial cables
D)Satellite dishes
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
40
_____ is the amount of data that can be transferred from one point to another in one second.

A)Bandwidth
B)Packet
C)Latency
D)Protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
41
Which layer of the Open Systems Interconnection (OSI)model specifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network?

A)Application
B)Transport
C)Data Link
D)Physical
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
42
The _____ of the Open Systems Interconnection (OSI)model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.

A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
43
_____ is the physical link between a network and a workstation.

A)The session layer
B)An adapter card
C)An html address
D)A network topology
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
44
Which layer of the Open Systems Interconnection (OSI)model formats message packets?

A)Session
B)Application
C)Presentation
D)Network
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
45
Internet Protocol (IP)operates at the _____ of the Open Systems Interconnection (OSI)model.

A)Transport layer
B)Physical layer
C)Data Link layer
D)Network layer
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
46
_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).

A)Fiber-optic cables
B)Satellites
C)Ethernet cables
D)Terrestrial microwaves
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
47
The process of deciding which path data takes on a network is called _____.

A)converging
B)diverging
C)roaming
D)routing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
48
_____ allows the linking of devices running on many different platforms.

A)Time Division Multiple Access
B)Transmission Control Protocol\Internet Protocol
C)A mobile telephone switching office
D)A public switched telephone network
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
49
A hierarchical topology is also called a _____ topology.

A)layered
B)mixed
C)tree
D)vertical
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
50
Identify an advantage of the bus topology.

A)It makes fault diagnosis easy.
B)It detects problems easily due to its centralized control.
C)It handles steady traffic well.
D)It is effective even when network traffic is heavy.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
51
Transmission Control Protocol operates at the _____ of the Open Systems Interconnection (OSI)model.

A)Network layer
B)Physical layer
C)Transport layer
D)Data Link layer
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
52
A network _____ represents a network's physical layout.

A)utility
B)packet
C)protocol
D)topology
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
53
In the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal.

A)emulator
B)terminator
C)stopper
D)node
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
54
A network interface card (NIC)operates at the Open Systems Interconnection (OSI)model's _____ layers.

A)Presentation and Application
B)Session and Presentation
C)Network and Transport
D)Physical and Data Link
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
55
In a(n)_____ topology, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.

A)star
B)ring
C)octagonal
D)mesh
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
56
Local area networks (LANs)are used to _____.

A)integrate services to a single building or campus
B)link computers that are geographically far apart
C)connect various wide area networks in metropolitan areas
D)provide communication services spanning several cities or states
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
57
Identify a topology used by traditional mainframe networks.

A)A ring topology
B)A star topology
C)A mesh topology
D)A hierarchical topology
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
58
Compared with a star topology, a hierarchical topology:

A)allows network expansion more easily.
B)has cable layouts that are easy to modify.
C)offers a great deal of network control and lower cost.
D)is more effective at handling heavy but short bursts of traffic.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
59
A _____ is a hardware device that allows several nodes to share one communication channel.

A)multiplexer
B)controller
C)terminator
D)router
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
60
_____ is responsible for packet forwarding.

A)Internet Protocol
B)Transmission Control Protocol
C)User Datagram Protocol
D)Extensible Authentication Protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
61
_____  is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.

A)Narrowband
B)Baseband
C)Broadband
D)Sideband
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
62
_____  is a set of rules that governs data communication, including error detection, message length, and transmission speed.

A)Throughput
B)Attenuation
C)A topology
D)A protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
63
In the context of communication media, _____ media  provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.

A)radiated
B)conducted
C)wireless
D)non-guided
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
64
Which event takes place in the most basic client\server configuration?

A)The results of a query are sent to the server.
B)The server sends a request to the client over a network.
C)The client receives and processes a query.
D)The user creates a query by running client software.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
65
In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.

A)Time Division Multiple Access
B)time of observation
C)statistical time division multiplexing
D)Time Slot Allocation
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
66
In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps.

A)4G network
B)Asynchronous Transfer Mode
C)3G network
D)IP multimedia subsystem
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
67
_____ refers to using a cellular phone outside of a carrier's limited service area.

A)Routing
B)Teleprocessing
C)Roaming
D)Surfing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
68
A(n)_____ is a network connection device that can build tables that identify addresses on each network.

A)switch
B)adapter card
C)dynamic router
D)hub
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
69
In the early days of computer technology, which   system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers?

A)Centralized processing
B)Decentralized processing
C)Distributed processing
D)Interconnected processing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
70
In the context of data communication, which is true of convergence?

A)It changes the path that data takes each time a connection is made.
B)It allows the transmission of a limited amount of information in a specific period of time.
C)It requires major network upgrades, because video requires much more bandwidth.
D)It synchronizes devices before establishing a communication link.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
71
_____  is the loss of power in a signal as it travels from the sending device to the receiving device.

A)Attenuation
B)Convergence
C)Throughput
D)Bandwidth
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
72
The Wi-Fi Protected Access 2 (WPA2)uses _____ to obtain a master key, which is in turn used to negotiate for a key that will be used for a session.

A)Internet Protocol
B)Service Set Identifier
C)Wired Equivalent Privacy
D)Extensible Authentication Protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
73
Which statement is true of the types of client\server architectures?

A)An n-tier architecture tests software easily.
B)An n-tier architecture helps improve network performance.
C)A two-tier architecture allows easy upgrades of applications.
D)A two-tier architecture requires minor modifications in case of any changes in application logic.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
74
A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

A)dynamic network
B)mobile network
C)mesh network
D)wired network
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
75
A routing table lists _____.

A)nodes on a network
B)the IP address of a router
C)the protocols that each node understands
D)packets to be sent
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
76
Horizontal scaling of a client\server architecture means _____.

A)migrating the network to decentralized servers
B)migrating the network to a faster communication media
C)adding more proxy servers
D)adding more workstations
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
77
In the context of security of wireless networks, which is true of Wired Equivalent Privacy (WEP)?

A)It is suitable for large networks with high bandwidths.
B)It is the most secure system for wireless networks.
C)In WEP, keys are dynamically generated based on the user's ID and password.
D)In WEP, a key must be entered manually into the access point and the client computer.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
78
Communication media that use an antenna for transmitting data through air or water are called _____ .

A)radiated media
B)conducted media
C)wired media
D)guided media
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
79
In the two-tier architecture of the client\server model, _____.

A)the presentation logic is always on the client
B)the data management logic is always on the client
C)the application logic is always on the server
D)the application logic is always on the client
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
80
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.

A)immersion
B)convergence
C)telepresence
D)integration
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 121 flashcards in this deck.