Deck 3: Data Link Layer

Full screen (f)
exit full mode
Question
All of the following are advantages of using broadcasting to send data except _____.

A)it is simple
B)it is inexpensive
C)it can be used for networks of any size
D)it does not require any controllers to regulate who can transmit data
Use Space or
up arrow
down arrow
to flip the card.
Question
In Ethernet,CSMA/ CD refers to _____.

A)Carrier Sense multiple access with collision detection
B)Carrier Sense multiple access with collision deference
C)Collision Sense for multiple access computers and devices
D)Carriers Sense for multiple access computers and devices
Question
When the data link layer detects errors in incoming data,it typically _____.

A)attempts to fix the error
B)accepts the data anyway
C)accepts the data,but marks it so that upper layers can fix the error
D)deletes the data
Question
In computer networking,medium access control is the method used to determine _____.

A)who can enter the office
B)who can send data over a shared medium
C)who can determine the data rate of the physical medium
D)who can mediate a dispute between two or more end users
Question
Echo is not a useful error detection techniques in computer networking because _____.

A)it is complex to use
B)it is difficult to implement
C)it is time consuming
D)errors may cancel out during the echo
Question
A technology that uses broadcasting to transmit data sends the data to _____.

A)all computers on the Internet
B)only the intended destination of the data
C)all stations on the network
D)None of the above
Question
The functions of the data link layer include _____.

A)routing
B)local addressing and error-detection
C)segmentation and re-assembly of data
D)link data networks
Question
The data link is responsible for sending data between _____.

A)devices on a single network
B)devices on neighboring networks
C)devices anywhere on the Internet
D)None of the above
Question
CRC is an error-detecting algorithm that checks data integrity by _____.

A)using redundant information
B)computing a polynomial algorithm based checksum
C)using echo
D)discarding data
Question
If the data is 101011 and the divisor is 1011,the CRC remainder is _____.

A)110
B)101
C)001
D)010
Question
A disadvantage of using broadcasting to transmit data is that _____.

A)it is inexpensive
B)it is simple
C)most users who receive the data have no use for the data
D)it leads to too many errors
Question
In computer networking,a collision is a situation where _____.

A)an end user collides with his workstation
B)two or more end users collide with each other at the water cooler
C)two or more end users get into an argument over who has access to the network
D)two or more demands are placed on a network that can only handle one demand at a time
Question
The Ethernet address MAC address)has _____ bits.

A)32
B)64
C)48
D)16
Question
A network using Ethernet can be up to ______ in radius.

A)1,000 meters
B)100 meters
C)10 miles
D)indefinite
Question
If the data is 111011 and the divisor is 1101,the CRC remainder is _____.

A)110
B)101
C)111
D)010
Question
In computer networking,carrier sensing refers to _____.

A)monitoring the medium to detect whether another station is transmitting data
B)monitoring network carriers ex.AT&T,Comcast etc)to ensure quality of service
C)sensing the network load of the network carriers ex.AT&T,Comcast etc)
D)None of the above
Question
When the data link layer deletes incoming frames,the lost frames are recovered by _____.

A)the network layer
B)the transport layer
C)the application layer
D)the physical layer
Question
All of the following are examples of using broadcasting to transmit data except _____.

A)satellite radio transmission
B)college classroom
C)spam email
D)junk mail
E)a letter in the mail addressed to a friend
Question
The most common data link layer technology used in corporate networks is _____.

A)TCP
B)Internet
C)Ethernet
D)IP
Question
The receiver of a data packet determines that the packet was sent to it by looking at _____.

A)the destination address of the packet
B)the source address of the packet
C)the frame check sequence field
D)The start of frame delimiter
Question
One character in the hexadecimal notation represents _______ bits.

A)2
B)4
C)6
D)8
Question
Most modern corporate Ethernets use switches instead of hubs.
Question
The first 24 bits of a MAC address identify the _____.

A)manufacturer of the network card
B)computer on the network
C)owner of the computer network
D)owner of the IP address
Question
Switches discover the MAC addresses of computers connected on the different ports by looking at the _____.

A)source address of outgoing packets
B)destination address of outgoing packets
C)destination address of incoming packets
D)source address of incoming packets
Question
Switches improve the efficiency of Ethernets by _____.

A)reducing errors
B)speeding transmission rates
C)reducing collisions
D)improving signals
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Data Link Layer
1
All of the following are advantages of using broadcasting to send data except _____.

A)it is simple
B)it is inexpensive
C)it can be used for networks of any size
D)it does not require any controllers to regulate who can transmit data
C
2
In Ethernet,CSMA/ CD refers to _____.

A)Carrier Sense multiple access with collision detection
B)Carrier Sense multiple access with collision deference
C)Collision Sense for multiple access computers and devices
D)Carriers Sense for multiple access computers and devices
A
3
When the data link layer detects errors in incoming data,it typically _____.

A)attempts to fix the error
B)accepts the data anyway
C)accepts the data,but marks it so that upper layers can fix the error
D)deletes the data
D
4
In computer networking,medium access control is the method used to determine _____.

A)who can enter the office
B)who can send data over a shared medium
C)who can determine the data rate of the physical medium
D)who can mediate a dispute between two or more end users
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Echo is not a useful error detection techniques in computer networking because _____.

A)it is complex to use
B)it is difficult to implement
C)it is time consuming
D)errors may cancel out during the echo
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
A technology that uses broadcasting to transmit data sends the data to _____.

A)all computers on the Internet
B)only the intended destination of the data
C)all stations on the network
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
The functions of the data link layer include _____.

A)routing
B)local addressing and error-detection
C)segmentation and re-assembly of data
D)link data networks
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
The data link is responsible for sending data between _____.

A)devices on a single network
B)devices on neighboring networks
C)devices anywhere on the Internet
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
CRC is an error-detecting algorithm that checks data integrity by _____.

A)using redundant information
B)computing a polynomial algorithm based checksum
C)using echo
D)discarding data
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
If the data is 101011 and the divisor is 1011,the CRC remainder is _____.

A)110
B)101
C)001
D)010
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
A disadvantage of using broadcasting to transmit data is that _____.

A)it is inexpensive
B)it is simple
C)most users who receive the data have no use for the data
D)it leads to too many errors
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
In computer networking,a collision is a situation where _____.

A)an end user collides with his workstation
B)two or more end users collide with each other at the water cooler
C)two or more end users get into an argument over who has access to the network
D)two or more demands are placed on a network that can only handle one demand at a time
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The Ethernet address MAC address)has _____ bits.

A)32
B)64
C)48
D)16
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
A network using Ethernet can be up to ______ in radius.

A)1,000 meters
B)100 meters
C)10 miles
D)indefinite
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
If the data is 111011 and the divisor is 1101,the CRC remainder is _____.

A)110
B)101
C)111
D)010
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
In computer networking,carrier sensing refers to _____.

A)monitoring the medium to detect whether another station is transmitting data
B)monitoring network carriers ex.AT&T,Comcast etc)to ensure quality of service
C)sensing the network load of the network carriers ex.AT&T,Comcast etc)
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
When the data link layer deletes incoming frames,the lost frames are recovered by _____.

A)the network layer
B)the transport layer
C)the application layer
D)the physical layer
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
All of the following are examples of using broadcasting to transmit data except _____.

A)satellite radio transmission
B)college classroom
C)spam email
D)junk mail
E)a letter in the mail addressed to a friend
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
The most common data link layer technology used in corporate networks is _____.

A)TCP
B)Internet
C)Ethernet
D)IP
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
The receiver of a data packet determines that the packet was sent to it by looking at _____.

A)the destination address of the packet
B)the source address of the packet
C)the frame check sequence field
D)The start of frame delimiter
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
One character in the hexadecimal notation represents _______ bits.

A)2
B)4
C)6
D)8
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
Most modern corporate Ethernets use switches instead of hubs.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
The first 24 bits of a MAC address identify the _____.

A)manufacturer of the network card
B)computer on the network
C)owner of the computer network
D)owner of the IP address
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Switches discover the MAC addresses of computers connected on the different ports by looking at the _____.

A)source address of outgoing packets
B)destination address of outgoing packets
C)destination address of incoming packets
D)source address of incoming packets
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Switches improve the efficiency of Ethernets by _____.

A)reducing errors
B)speeding transmission rates
C)reducing collisions
D)improving signals
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.