Ch1
1 – A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. a.Intranet
b.I-net
c.Local Area Network
d.Extranet
Answer: A, page 7
2 – A backbone network is:
a.a high speed central network that connects other networks in a distance from hundreds of feet to several miles. b.a group of personal computers or terminals located in the same general area and connected by a common cable so they can exchange information. c.a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d.a network covering a large area of up to 5000 miles.
Answer: A, page 7
3 – The Internet standards organization that will allow anyone to join is __________________. a.ISO
b.ISO-2
c.IETF
d.ANSI
Answer: C, page 14
4 – A _____________ is the input-output hardware device at the end user’s end of a communication circuit in a client-server network. a.host
b.client
c.access card
d.server
Answer: B, page 5
5 – BYOD stands for
a.Bring Your Own Device
b.Bring Your Own Data
c.Build Your Own Device
d.Build Your Own Drape
Answer: C, page 3
6 – The three stages of the de jure standardization process are ______________________. a.specification, identification of choices and acceptance.
b.planning, implementing and acceptance.
c.brainstorming, identification and implementing.
d.specification, formalization, and acceptance.
Answer: A, page 14
7 – The network layer performs the same functions in both the OSI and Internet models and is responsible for routing messages from the source computer to the destination computer. Answer: True, page 8
8 – The session layer also handles session accounting so the correct party receives the bill. Answer: True, page 9
9 – ANSI is a voting participant in the ISO.
Answer: True, page 14
10 – Ethernet is an example of a presentation layer protocol. Answer: False, page 9
Ch 2
1 – ________ is the presentation of information to the user and the acceptance of the user’s commands. a.data storage
b.data access logic
c.application logic
d.presentation logic
Answer: D, page 27
2 – An application program function is __________, or the processing required to access data. a.data access logic
b.data storage
c.application logic
d.presentation logic
Answer: A, page 27
3 – An user must type in a URL for a web page, which stands for: a.Unknown
Resource Locator
b.Unknown Router Location
c.Uniform Router Location
d.Uniform Resource Locator
Answer: D, page 36
4 – The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private
b. public
c. community
d. hybrid
Answer: A, page 27
5 – The software that runs on the mail server is referred to as the ____________ a.Mail server
b.Mail user agent
c.Mail runner
d.Mail transfer agent
Answer: D, page 40
6 – Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. Answer: True, page 35
7 – Middleware is the software that sits between the application software on the client and the application software on the server. Answer: True, page 30
8 – The presentation logic works with the client computer in a client-server network. Answer: True, page 27
9 – A “thin client” approach places most of the application logic on the client. Answer: False, page 31
10 – The very first data communications networks were client-server networks. Answer: False, page 28
Ch 3
1 – Networks designed to transmit primarily computer data are likely to be ________. a.translucent
b.sticky
c.digital
d.noisy
Answer: C, page 61
2 – Having a conversation with someone using a cellular phone is an example of _________ transmission. a.analog
b.full-duplex
c.half-duplex
d.complex
Answer: B, page 63
3 – ____________ is one of the most commonly used coding schemes used in data transmission. a.ASCII
b.ISB
c.BYOD
d.ATM
Answer: A, page 72
4 – The two basic types of media are:
a.local and wide
b.guided and wireless
c.static and quiet
d.American and Russian
Answer: B, page 66
5 – The earliest type of fiber optic systems were:
a.Graded index multimode
b.Attenuated
c.Multimode
d.Single mode
Answer: C, page 68
6 – Which of the following is the most secure wired media? a.coaxial cable
b.unshielded twisted pair
c.shielded twisted pair
d.fiber optic cable
Answer: D, page 68
7 – Microwave transmissions require a line of sight between any two points. Answer: True, page 69
8 – Each computer can use the circuit at the same time in multipoint circuit configuration. Answer: False, page 62
9 – A walkie-talkie is an example of half-duplex transmission. Answer: True, page 63
10 – The medium is the physical matter or substance that carries the voice or data transmission. Answer: True. Page 66
Ch 4
1 – The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about: a.55%
b.About 99%
c.100%
d.45%
Answer: B, page 99
2 – Which of the following is not a type of synchronous protocol? a.SDLC
b.VT100
c.HDLC
d.Ethernet
Answer: B, page 103
3 – TRIB, an acronym that relates to throughput, stands for: a.Throughput Reduction of Information Barriers
b.Transmission Rate of Information Bits
c.Throughput Rate of Iso-synchronous Bytes
d.Transmission Regulation for Inverse-multiplexing Bands
Answer: B, page 109
4 – ARQ means that:
a.a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b.the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c.a sender is using a data link protocol called Asynchronous Repeating reQuest d.a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines Answer: A, page 99
5 – In ARQ, a NAK:
a.is sent by the recipient if the message was received without error b.is sent by the sender at the same time as it sends a data packet c.is sent by the recipient if the message contains an error d.refers to non-asynchronous Kermit technique
Answer: C, page 100
6 – Asynchronous transmission:
a.uses simultaneously
b.has existed before the agriculture age
c.is commonly used with all of other characters
d.each character is transmitted independently of all other characters Answer: D, page 103
7 – Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit. Answer: True, page 94
8 – Media access controls refer to the need to control when computers transmit. Answer: True, page 93
9 – Parity checking can only detect an error when an even number of bits are switched. Answer: False, page 98
10 – Retransmission is the simplest method for error correction. Answer: