Version 2 4&5 Key

.docx

School

California State University, Fullerton *

*We aren’t endorsed by this school

Course

409

Subject

Computer Science

Date

Jun 7, 2024

Type

docx

Pages

5

Uploaded by MagistrateJellyfish20290

1. The transport layer must break messages from the application layer into several _____ that can be sent to the network layer. a. bits b. bytes c. frames d. segments e. strings 2. When a signal is reflected back to the transmitting equipment, it is called a(n) _________. a. white noise b. echo c. crosstalk d. attenuation e. impulse noise 3. ____________ is an effective way to prevent attenuation. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuit d. Changing multiplexing techniques e. Shorting a circuit 4. Media access control: a. is not very important in point-to-point with full duplex configuration. b. is not very important in local area networks. c. is not very important in a point-to-point with a half-duplex configuration. d. is not very important in a multipoint configuration. e. does not control when computers transmit. 5. With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements. a. frequency division b. connection-oriented c. PCMCIA d. connectionless e. application net 6. A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255 7. ____________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control
8. In general, controlled approaches: a. work better than contention approaches for small networks that have low usage. b. work better than contention approaches for large networks that have high usage. c. work better than contention approaches for all sizes of networks. d. do not require a host, server, or active monitor to assign media access control. e. have many collisions. 9. Which of the following media is least susceptible to noise? a. fiber optic cable b. coaxial cable c. twisted pair d. unshielded twisted pair e. shielded twisted pair 10. On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. a. amplifiers b. repeaters c. multiplexers d. digitizers e. Modems 11. ______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing 12. Using parity, the probability for detecting an error, given that one has occurred, is: a. about 50% for either even or odd parity. b. about 70% for even parity and 30% for odd parity. c. about 30% for even parity and 70% for odd parity. d. about 0% for either even or odd parity. e. about 100% for either even or odd parity. 13. With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR) 14. Calculating the actual throughput of a data communication network is: a. not normally required for synchronous networks because they are so fast b. complex because many factors affect throughput c. simple because packet size is the primary factor affecting throughput d. not needed for satellite-based networks e. far less complicated if the system operates on a contention basis 15. _________________ is defined as the total number of information bits divided by the total number of bits in the transmission. a. Asynchronous rate b. Protocol percentage c. Throughput d. Transmission Rate of Information Bits e. Transmission efficiency
16. TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures 17. The data link layer uses the ________ to recognize the source and destination addresses. a. MAC address b. IP address c. URL d. Email address e. Local router 18. The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 120-bit e. 320-bit 19. ICANN: a. developed the IPX/SPX network layer protocol b. assigns data link layer addresses c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet d. developed X.25 network layer protocol e. refers to Interchange Computer Addressing Networks and Nodes 20. The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table 21. ____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing 22. The data link layer uses the ________ to recognize the source and destination addresses. a. MAC address b. IP address c. URL d. Email address e. Local router
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help