study 2 final

docx

School

George Mason University *

*We aren’t endorsed by this school

Course

105

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by ChiefRiver7339

Report
Review OSI models all people seem to need data protection Class A uni0-127 Class B uni128-191 Class C uni192-223 Class D multi 224-239 Class E experimental 240-255 TIPS for the exam Module 7 software-what happens when u buy a software 1 time –no updates Different licensing agreement Module 6 Backlighting--LCD screens—DMA—Hot plugging--Expansion chord Module8/9: QoS quality of service—jitter-latency -packet loss-bandwidth Special IP addresss OSIM model layers IPv4 Classes 0-127 NHHH 128-191 NNHH 192-223 NNNH 224-239 240-255 1. How many layers are there in the TCP/IP protocol suite? a. 2 b. 3 c. 4 d. 5 e. 6 Answer: C 2. IPv6 addresses are how many bits long? a. 32 b. 64 c. 100 d. 128 hexadecimal e. 256 Answer : D 3. UDP provides sequencing, error control and flow control just like TCP a. True b. False Answer:B
4. Which of the following are standard twisted pair cables? a. CAT 2 b. CAT 3 c. CAT 5 d. All of the above e. None of the above Answer :D 5. Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user? a. Edge Computing b. Workplace Hub c. Contextual Computing d. 5G Wireless Answer :C 6. Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user’s existing technologies (including hardware, software, and services) into a one stop connected platform? a. Edge Computing b. Workplace Hub c. Contextual Computing d. 5G Wireless Answwer: B 7. Which are simulation types for implementing of virtual reality technology? a. Non-Immersive b. Semi-Immersive c. Fully-Immersive d. All of the above e. None of the above Answer : D 8. Which of the following are Deep Learning Algorithms? a. Convolutional Neural Network (CNN) b. Deep Neural Network (DNN) c. Long Short-Term Memory (LSTM) d. All of the Above e. None of the Above Answer: D 9. Which of the following is the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions?
a. Internet of Everything (IOE) b. Big Data Analytics c. Contextual Computing d. Mobile Payments Answer: B 10. Which of the following networks is a subnet? a. 128.0.0.0 b. 10.0.0.0 c. 192.168.1.0 d. 172.16.64.0 Answer : D 11. In terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7? a. Class A b. Class B c. Class C d. Class D e. Class E Answer A 12. Decryption is the process of converting plaintext into ciphertext a. True b. False Answer :B 13. Suppose you are creating a simple password for an iPhone and the character set consists of ten numerals on the keypad: 0, 1, 2, 3,…, 9 and the password length is six digits. Using the formula P = C password length , what is the number of passwords? a. 100 b. 1000 c. 10000 d. 1000000 Answer :D 14. Serial  transmission is described as transmitting a group of bits at a single instant in time, which requires multiple paths a. True b. False Answer B 15. Use the Signal to Noise ratio formula below to solve a scenario where A receiver has an input power of 22.2 mW while the noise power is 23.3 uW. Find the SNR for the receiver.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
a. 162.35 dB b. 29.79 dB c. 19.79 dB d. 952.79 dB Answer B 16. Malware refers to any computer program designed to surreptitiously enter a digital device.   a. True b. False Answer A 17. Private-key functions involve the use of two keys during the process of Private-key encryption. a. True b. False Answer B 18. Which OSI layer offers reliable, connection-oriented data communication services? a. application b. presentation c. session d. transport e. network Answer D 19. Which of the following is an IPv4 address? a. 2001:cdba:0000:0000:0000:0000:3257:9652 b. 172.30.3 c. 164.20.31.9 d. 4004:cdba:0000:0000:0000:0000:3257:8134 Answer C 20. Which of the following is self-propagating and self-replicating? a. Virus b. Worm c. Denial of service attack d. CERT e. None of the above Answer B