sample midterm_solutions

docx

School

Santa Clara University *

*We aren’t endorsed by this school

Course

107

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

6

Uploaded by derleen101

Report
Sample Midterm - Solutions OMIS 111 Fall 2023 1. Which of the following are true? I. A local area network (LAN) connects other LANs and BNs located in different areas to each other and to wide area networks in a span from 3 to 30 miles. II. As the demand for more and more network applications grow; host-based computing becomes the best solution. III. Middleware is the software that sits between the application software on the client and the application software on the server. A. All B. Only I. C. I and III D. Only III E. None Answer: D 2. Which of the following are false? 6. . 8. a. A “thin client” approach places most of the application logic on the client. (False) b. Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. (True) c. Amplitude, frequency and phase are all characteristics of a sound wave. (True) d. A codec converts an incoming digital signal to an analog signal for transmission over an analog network. (False) e. Frequency division multiplexing divides the circuit into a set of different time slots. (False) Multiple Choice Questions: 9. Which of the following is not true about a server? a. stores data and software that can be accessed by the client. b. is the pathway through which messages travel. c. in client/server computing they work together over the network with client computers to support the business application. d. can only perform one function on a network.
e. stores documents and graphics that can be accessed from any Web browser. Answer: D 10. Which of the following is not true about de jure standards? a. They are always developed before de facto standards. (False) b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body. 11. One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture Answer: B 12. With the “thin client” architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software Answer: B 13. In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. user agent d. Webcast package e. gateway agent Answer: C 14. Which of the following is not a key advantage of digital transmission? a. It permits only low transmission rates. b. It is more efficient. c. It is simpler to integrate voice, video, and data on the same circuit. d. It is more secure. e. It produces fewer errors. Answer: A
15. Having a conversation with someone using a cellular phone is an example of _________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital Answer: B 16. The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire Answer: C 17. When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex Answer: A 18. Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals? a. phase b. attenuation c. bipolar d. bandwidth e. codec Answer: A 19. If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is : a. 890 Hz b. 8900 HZ c. 9100 Hz d. 9Khz e. 890 KHz Answer: C
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
20. How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels? a. 64 b. 32 c. 16 d. 8 e. 6 Answer: E 21. Frequency division multiplexing: a. operates by statistically time slicing the signal b. operates by dividing the signal into different frequencies c. uses a codec that divides signals into different channels d. operates by time slicing the signal e. operates by light dividing the signal Answer: B Essay Questions: 22. What is the purpose of a data and network communication standard? 23. Describe how a Web browser and Web server work together to send a web page to a user.  Draw a diagram and label the parts to assist you in your description. 24. Describe the difference between a two tier and three tier email message transfer, using diagrams and discussing how this approach differs from the two layer email transfer.  Do users always require the same architecture for email?  Why or why not?  Discuss. 25. HTTP basics. Consider the following string of ASCII characters that were captured by Ethereal when the browser sent an HTTP GET message (this is the actual content of an HTTP GET message). The characters <cr><lf> are carriage return and line feed characters (that is, the italicized character string <cr> in the text below represents the single carriage-return character that was contained at that point in the HTTP header). Answer the following questions, indicating where in the HTTP GET message below you find the answers. GET /cs453/index.html HTTP/1.1<cr><lf>Host: gaia.cs.umass.edu<cr><lf>User-Agent: Mozilla/5.0 (Windows;U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax) <cr><lf>Accept:ext/xml,application/xml,application/xhtml+xml,t ext/html;q=0.9,text/plain;q=0.8,image/png,*/ *;q=0.5<cr><lf>Accept-Language: en-us,en;q=0.5..Accept- Encoding: zip,deflate<cr><lf>Accept-Charset: ISO-8859-1,utf- 8;q=0.7,*;q=0.7..Keep-Alive: 300<cr> <lf>Connection:keep-alive<cr><lf><cr><lf>
a. What is the URL of the document requested by the browser? Make sure you give the hostname and the file name parts of the URL. b. What version of HTTP is the browser running? c. Is a Netscape or an Internet Explorer browser making the request? d. Is the browser requesting a non-persistent or a persistent connection? e. What is the IP address of the computer on which the browser is running? 26. E-Mail Protocols. Describe which of the following protocols use “pull system”: SMTP, POP3, IMAP, HTTP, TCP. 27. BitTorrent’s Algorithm, Peer Networks. In BitTorrent, suppose Alice provides chunks to Bob throughout a 30 second interval. Will Bob necessarily return the favor and provide chunks to Alice in this same interval? Why or why not? 28. Web Cashing. Describe how Web cashing can reduce the delay in receiving a requested object. Will Web cashing reduce the delay for all objects requested by a user or only for some of the objects? Why? 29. Data Rate vs. Bit Rate. Compare and contrast data rate (i.e., bits per second) and symbol rate (also called baud rate) by giving two concrete, different examples. 30. Multiplexers. If you were buying a multiplexer, why would you choose either TDM or FDM? 31. Media Access Control. What is media access control and why is it important? What are two examples of controlled access methods and contention based media access methods? When might one access method be preferred over another in a network, and why? Under what conditions do contention-based media access control techniques outperform controlled-access techniques (i.e., have lower response time)? Explain. 32. Multiple access protocols: voice-over-IP and data. We studied a number of multiple access protocols, including TDMA, CSMA, slotted Aloha, and token passing. a. Suppose you were charged with putting together a large LAN to support IP telephony (only) and that multiple users may want to carry on a phone call at the same time. Recall that IP telephony digitizes and packetizes voice at a constant bit rate when a user is making an IP phone call. How well suited are these four protocols for this scenario? Provide a brief (one sentence) explanation of each answer. b. Now suppose you were charged with putting together a LAN to support the occasional exchange of data between nodes (in this part of this question, there is no voice traffic). That is, any individual node does not have data to send very
often. How well suited are these four protocols for this scenario? Provide a brief (one sentence) explanation of each answer. c. Now suppose the LAN must support both voice and data and you must choose one of these multiple access strategies in order to support both applications on the same network, with the understanding that voice calls are more important than data. Which would you choose and why? How would voice and data be sent in this scenario? That is, which access protocol would you use, or adapt/modify, and why? 33. Polling. Consider a broadcast channel with N nodes and a transmission rate of R bps. Suppose the broadcast channel uses polling (with an additional polling node) for its multiple access. Suppose the amount of time from when a node completes transmission until the subsequent node is permitted to transmit (that is, the polling delay) is t poll . Suppose that within a polling round, a given node is allowed to transmit at most Q bits. Further suppose node 1, initially with no bits to send, receives Q bits to send. What is the maximum time from when node 1 receives the bits until it can begin to send them? 34. Addressing. Suppose a client computer wants to access a web page on a web server. Assume that it knows all of the IP addresses and data link layer addresses in the network, except those for the web server itself. Describe how the client would obtain the IP address for the web server. 35. TCP/IP Protocol. Consider a planet where everyone belongs to a family of six, every family lives in its own house, each house has a unique address, and each person in a given house has a unique name. Suppose this planet has a mail service that delivers letters from source house to destination house. The mail service requires that (1) the letter be in an envelope, and that (2) the address of the destination house (and nothing more) be clearly written on the envelope. Suppose each family has a delegate family member who collects and distributes letters for the other family members. The letters do not necessarily provide any indication of the recipients of the letters. a. Describe a protocol that the delegates can use to deliver letters from a sending family member to a receiving family member. b. In your protocol, does the mail service ever have to open the envelope and examine the letter in order to provide its service?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help