Chapter 7_
.docx
keyboard_arrow_up
School
California State University, Fullerton *
*We aren’t endorsed by this school
Course
409
Subject
Computer Science
Date
Jun 21, 2024
Type
docx
Pages
15
Uploaded by MagistrateJellyfish20290
1.
A(n) _____________ is not a common type of dedicated server.
a.
file server
b.
print server
c.
database server
d.
collision server
e.
web server
2.
A(n) ____________ allows many users to share the same set of files on a common, shared disk drive.
a.
print server
b.
database server
c.
file server
d.
piconet server
e.
remote access server
3.
Which of the following is not a basic LAN component?
a.
client
b.
PAD
c.
server
d.
network interface card
e.
network operating system
4.
Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?
a.
cost (relative to fiber)
b.
thickness (relative to coax)
c.
weight (relative to coax)
d.
flexibility (relative to coax)
e.
security (relative to fiber)
5.
Of the following, which is not true about fiber optic cable?
a.
It is thinner than unshielded twisted pair cable.
b.
It is lighter than unshielded twisted pair cable.
c.
It has a very low capacity.
d.
It is more expensive than CAT5 unshielded twisted pair cable.
e.
It is a type of guided media.
6.
Which of the following is not a purpose for using hubs in a network?
a.
to act as a communications server
b.
to connect network cables
c.
to prevent attenuation
d.
to act as a junction box
e.
none of the above
7.
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
a.
fiber
b.
infrared frequencies
c.
coax cable
d.
unshielded twisted pair
e.
shielded twisted pair
8.
Hubs:
a.
usually incorporate repeaters or amplifiers
b.
allow for simultaneous communication for all of the computers connected to them
c.
limit the distance of a network to a few meters in length
d.
are a difficult method to connect network cables
e.
operate at the application layer
9.
_____________ is the software that controls the network.
a.
Network Operating System
b.
Client Operating System
c.
Embedded Operating System
d.
Network Control System
e.
Network Software System
10. The server version of the Network Operating System does not:
a.
provide the software that performs the functions associated with the physical layer.
b.
provide the software that performs the functions associated with the data link layer.
c.
provide the software that performs the functions associated with the application layer.
d.
provide the software that performs the functions associated with the network layer.
e.
usually provide the software that performs the functions associated with the computer’s own operating system.
11. _____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
a.
Network Services
b.
Directory Services
c.
Client Services
d.
Computing Services
e.
Remote Access Services
12. A _________ is a group of centrally organized, related resources.
a.
workgroup
b.
domain
c.
server
d.
clie
nt
e.
sharepoint
13. A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a/n ___________.
a.
ADS
b.
domain
c.
forest
d.
tree
e.
NDS
14. A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
a.
user profile
b.
user access log
c.
network profile
d.
network operating system
e.
server allocation list
15. The cheapest time to install network cabling is:
a.
during the construction of the building.
b.
as soon as the building is completed.
c.
as soon as the building is occupied.
d.
about five years after the building is occupied so that the exact office locations for each network computer is known.
e.
any time that a network needs to be installed.
16. Ethernet LAN was developed by:
a.
IBM.
b.
ARPANET.
c.
DEC, Xerox, and Intel.
d.
University of Minnesota.
e.
CERN laboratory in Geneva.
17. ___________ is how the network works conceptually.
a.
Physical topology
b.
Logical topology
c.
Network topology
d.
Ethernet
e.
Media access control
18. The type of logical topology that hub-based Ethernet uses is a:
a.
ring
b.
bus
c.
star
d.
mesh
e.
interconnected
19. A logical bus topology:
a.
is always used by token ring protocol LANs.
b.
has all computers connected to each other in point-to-point connections.
c.
is limited to short distances since devices like a hub or repeater cannot be used with this type of topology.
d.
permits every message to be received by every computer on the bus, even when those messages are intended for other computers.
e.
has a central control device, such as a mainframe.
20. Media access control refers to:
a.
the price of fiber optic cable.
b.
security over floppy disks in a user environment.
c.
the ability for a user to use multimedia equipment in a LAN.
d.
controlling access to a media by more than one computer in a LAN.
e.
the control over coax cable installed by a cable service provider
21. Which of the following is not true about CSMA/CD?
a.
The acronym refers to Carrier Sense Multiple Access with Collision Detection
b.
It is used in token ring protocol LANs
c.
It is a contention-based media access control technique
d.
When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit
e.
Computers on the circuit ‘listen’ before transmitting
22. _________ is not a type of Ethernet specification.
a.
100Base-T
b.
10GbE
c.
1000Base-T (1GbE)
d.
10Base-T
e.
Securenet
23. 100Base-T:
a.
supports 100 Mbps data rate
b.
is inexpensive
c.
runs on twisted pair
d.
is more dominant than token ring
e.
all of the answers are correct
24. 100 Base-T:
a.
can run at either full- or half-duplex
b.
is one of the oldest forms of Ethernet
c.
is one of the slowest forms of Ethernet
d.
can only be used over coaxial cables
e.
has only one version, 100Base-SLCX
25. ________ is a hybrid version of Ethernet that uses either 10Base-T, 100Base-T, or 1000Base-T.
a.
Mullion Ethernet
b.
Base-T Ethernet
c.
10/100/1000 Ethernet
d.
Token ring Ethernet
e.
FDDI Ethernet
26. Switch-based Ethernet:
a.
uses a hub to connect computers
b.
has a physical topology of a ring
c.
has a logical topology of a ring
d.
has a logical topology of a bus
e.
usually enables all attached circuits to send or receive packets simultaneously
27. A switch uses a _____________ that is very similar to a routing table used in a router.
a.
cable plan
b.
forwarding table
c.
network server
d.
reversing table
e.
switching mullion
28. Which of the following is not true about layer-2 switched Ethernet?
a.
A switch replaces the hub.
b.
The physical topology is the same as the physical topology of shared Ethernet: n a ring.
c.
The logical topology is a star.
d.
The switch uses a forwarding table to switch the frame to the correct circuit/computer.
e.
The switch chooses which frame to transmit first if it receives more than one frame destined for the same computer at the same time, and stores the other frame(s) temporarily.
29. Which of the following is not true about switched Ethernet?
a.
The switch has a physical bus topology.
b.
It uses a switch instead of a hub.
c.
Most switches support full duplex circuits.
d.
It essentially provides a point-to-point connection between computers.
e.
It has forwarding tables in which entries are learned over time.
30. Which of the following is a mode in which a switch reads in the first 64 bytes of the Ethernet frame and then begins forwarding out the frame on an outgoing port?
a.
fast learning switching
b.
routing switching
c.
fragment-free switching
d.
store switching
e.
cut switching
31. Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
a.
multipoint
b.
point-to-point
c.
shared
d.
ring
e.
star
32. Wired Ethernet is becoming a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. .
a.
host
b.
legacy
c.
caching
d.
hub
e.
peak
33. Which of the following can provide fault tolerance for the storage space on a server?
a.
RAID
b.
SCSI
c.
IDE
d.
USB
e.
EIDE
34. Which of the following is not a potential bottleneck for LAN performance?
a.
number and speed of hard disks in the server
b.
amount of memory in the server
c.
speed of server’s CPU
d.
network interface card
e.
all of the answers are potential bottlenecks for LAN performance
35. If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)?
a.
adding one or more additional servers
b.
upgrading the server’s CPU with a faster CPU
c.
increasing the amount of memory of the server
d.
increasing the number and speed of hard disks in the server
e.
replacing the cable with fiber optic cable
36. To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s),
you can:
a.
increase the CPU of the server
b.
upgrade to a bigger circuit
c.
increase the number of hard disks on the server
d.
increase the amount of disk capacity of the server
e.
increase the amount of memory of the server
37. Breaking a network into smaller parts is called network:
a.
fragmentation
b.
segmentation
c.
localization
d.
allocation
e.
mitigation
38. Which of the following is not an effective way to reduce LAN network demand:
a.
move files to client computers
b.
use disk caching on the client machines
c.
find an application that places a large demand on the network and run it a time when the network is lightly loaded
d.
add hidden nodes
e.
shift the users’ routines
39. 39. Which of the following is not a WLAN standard?
a.
802.11ac
b.
802.11a
c.
802.3
d.
802.11b
e.
802.11g
40. The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________.
a.
802.11n
b.
802.11a
c.
802.3
d.
802.11b
e.
802.11g
41. A(n) _____________ is used in a computer to connect it to a WLAN.
a.
Ethernet NIC
b.
antennae
c.
wireless NIC
d.
access point
e.
hub
42. A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
a.
Ethernet NIC
b.
antennae
c.
wireless NIC
d.
access point
e.
hub
43. How many channels does the 802.11ac standard provide for communication between the access point and clients?
a.
4
b.
6
c.
8
d.
11
e.
2
44. __________ antennas transmit the signal in all directions.
a.
directional
b.
microware
c.
omnidirectional
d.
radio
e.
vertical
45. __________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.
a.
directional
b.
microware
c.
omnidirectional
d.
radio
e.
vertical
46. CSMA/CA is an acronym for:
a.
Carrier Sense Multiple Access with Collision Acknowledgment
b.
Carrier Sense Mode Access with Carrier Avoidance
c.
Carrier Sense Multiple Access with Collision Avoidance
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
FAT consists of 2 major components. One component is the file allocation tables and the other is the ___________.
Directory entries
Data structure
Physical layout
Reserved area
arrow_forward
47.
The current copy of the database is identified by a pointer, called ____________ which is stored on disk.
a.
Db-pointer
b.
Update log
c.
Update log records
d.
All of the mentioned
arrow_forward
366.
___________ itself is a file owned by the operating system
a.
Logical file
b.
Record
c.
Database
d.
Directory
arrow_forward
Analyze the following figure and select the right statement
The "".qt"" directory can be read/written/executed by root user while other users can write/execute it.
The "".qt"" directory can be read/executed by root user while other users can only execute it.
The "".qt"" directory can be read/written/executed by root user while other users can read/execute it.
The "".qt"" directory can be executed by root user while other users can read/write/execute it.
arrow_forward
When it comes to shared memory, how does the Microsoft Windows API make use of memory-mapped files?
arrow_forward
The directory entry tracks the ____________.
Files ending cluster
Files starting cluster
File size
File name
arrow_forward
OS-level formatting creates a file known to be
a.
File Allocation Table
b.
File Access Table
c.
File Index Table
d.
File Transfer Table
arrow_forward
I need the answer as soon as possible
arrow_forward
Explain the concept of file systems in Windows, with a focus on NTFS (New Technology File System). What are the advantages of NTFS over FAT32?
arrow_forward
How does the Microsoft Windows API implement shared memory using memory-mapped files?
arrow_forward
USE C SHARP LANGUAGE AND CODE MUST GET COMPILED IN VISUAL STUDIO.
QUESTION PROVIDED IN ATTACH IMAGE.
arrow_forward
An ASP.NET application typically ends when
a) ASP.NET is shut down
b) IIS is shut down
c) no more pages of the application are being executed
d) all of the sessions that are accessing the application end
arrow_forward
LDAP objects are organized in a(n) ____________________ directory structure.
arrow_forward
What role do memory-mapped files play in Microsoft Windows' application programming interface (API) when it comes to shared memory?
arrow_forward
Fill in the blank question- Only answer needed without explanation
Q. ________ command moves the directory with the files.
arrow_forward
How does the MS Windows API use memory-mapped files to implement shared memory?
arrow_forward
142.
The subsystem responsible for the allocation of buffer space is called as _______
a.
Buffer allocator
b.
Buffer manager
c.
Buffer enhancer
d.
Buffer intermediary
arrow_forward
130.
The middle computer system which is accessed to access database server is classified as
a.
host server
b.
application server
c.
database server
d.
client server
arrow_forward
What are the challenges associated with directory operations when handling very large files or a massive number of small files?
arrow_forward
linux
arrow_forward
What is the abbreviation for the compressed form of the Common User Access in operating systems?
arrow_forward
MINIX Programming - Please provide screenshots of what was changed so I can read it better and how to find the file
Modify the MINIX 3 scheduler to keep track of how much CPU time each user process has had recently. When no task or server wants to run, pick the user process that has had the smallest share of CPU.
arrow_forward
MINIX Programming - Please provide screenshots of what was changed so I can read it better and how to find the file
Modify the MINIX 3 scheduler to keep track of how much CPU time each user process has had recently. When no task or server wants to run, pick the user process that has had the smallest share of CPU.
DO NOT COPY AND PASTE SOME GENERAL ANSWER FROM SOMEWHERE ELSE
arrow_forward
File Management: UNIX
Describe what happens for each of the following uses of the 'mv' command:
moving a regular file onto an existing regular file
moving a directory onto an existing regular file
moving a directory onto another existing directory
moving a directory onto a subdirectory within itself
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
Related Questions
- FAT consists of 2 major components. One component is the file allocation tables and the other is the ___________. Directory entries Data structure Physical layout Reserved areaarrow_forward47. The current copy of the database is identified by a pointer, called ____________ which is stored on disk. a. Db-pointer b. Update log c. Update log records d. All of the mentionedarrow_forward366. ___________ itself is a file owned by the operating system a. Logical file b. Record c. Database d. Directoryarrow_forward
- Analyze the following figure and select the right statement The "".qt"" directory can be read/written/executed by root user while other users can write/execute it. The "".qt"" directory can be read/executed by root user while other users can only execute it. The "".qt"" directory can be read/written/executed by root user while other users can read/execute it. The "".qt"" directory can be executed by root user while other users can read/write/execute it.arrow_forwardWhen it comes to shared memory, how does the Microsoft Windows API make use of memory-mapped files?arrow_forwardThe directory entry tracks the ____________. Files ending cluster Files starting cluster File size File namearrow_forward
- OS-level formatting creates a file known to be a. File Allocation Table b. File Access Table c. File Index Table d. File Transfer Tablearrow_forwardI need the answer as soon as possiblearrow_forwardExplain the concept of file systems in Windows, with a focus on NTFS (New Technology File System). What are the advantages of NTFS over FAT32?arrow_forward
- How does the Microsoft Windows API implement shared memory using memory-mapped files?arrow_forwardUSE C SHARP LANGUAGE AND CODE MUST GET COMPILED IN VISUAL STUDIO. QUESTION PROVIDED IN ATTACH IMAGE.arrow_forwardAn ASP.NET application typically ends when a) ASP.NET is shut down b) IIS is shut down c) no more pages of the application are being executed d) all of the sessions that are accessing the application endarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE LSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningMicrosoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,