MIS 564

203 Questions  I  By Quizcreationhelp
Please take the quiz to rate it.

Management Quizzes & Trivia

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Modern (1990s and beyond) data communication networks are characterized by:
A.
B.
C.
D.
E.
2.  In 1983, the Internet was split into two parts, one dedicated solely to the military and one dedicated to university research centers. The two parts were called:
A.
B.
C.
D.
E.
3.  Which of the following is not true about a server?
A.
B.
C.
D.
E.
4.  Networks that are designed to connect similar computers that share data and software with each other are called:
A.
B.
C.
D.
E.
5.  The function of the file server is to :
A.
B.
C.
D.
E.
6.  A local area network is:
A.
B.
C.
D.
E.
7.  A backbone network is:
A.
B.
C.
D.
E.
8.  A metropolitan area network is:
A.
B.
C.
D.
E.
9.  Which of the following is not a property of a WAN:
A.
B.
C.
D.
E.
10.  Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
A.
B.
C.
D.
E.
11.  Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?
A.
B.
C.
D.
E.
12.  The ____________ layer of the OSI model is responsible for data format translation.
A.
B.
C.
D.
E.
13.  In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.
A.
B.
C.
D.
E.
14.  Which is not a function of the physical layer:
A.
B.
C.
D.
E.
15.  The _________ layer is responsible for routing of messages from the sender to the final destination.
A.
B.
C.
D.
E.
16.  Which of the following is not a function of the data link layer?
A.
B.
C.
D.
E.
17.  Which of the following is a function of the transport layer?
A.
B.
C.
D.
E.
18.  Which of the following is a term used to group together the physical and data link layers?
A.
B.
C.
D.
E.
19.  Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?
A.
B.
C.
D.
E.
20.  In which layer of the Internet model would the HTTP standard be used?
A.
B.
C.
D.
E.
21.  A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.
A.
B.
C.
D.
E.
22.  The network layer of the Internet model uses the _____________ protocol to route messages though the network.
A.
B.
C.
D.
E.
23.  The primary reason for networking standards is to:
A.
B.
C.
D.
E.
24.  Which of the following is not true about de juro standards?
A.
B.
C.
D.
E.
25.  Which of the following is not true about de facto standards?
A.
B.
C.
D.
E.
26.  The three stages of the de juro standardization process are ______________________.
A.
B.
C.
D.
E.
27.  Which of the following is true about ISO:
A.
B.
C.
D.
E.
28.  Which of the following is not true about ITU-T:
A.
B.
C.
D.
E.
29.  The internet standards organization that will allow anyone to join is __________________.
A.
B.
C.
D.
E.
30.  Which standards body is responsible for the development of local area network (LAN) standards?
A.
B.
C.
D.
E.
31.  Which of the following is not an important future trend in communication and networking?
A.
B.
C.
D.
E.
32.  The integration of voice, video, and data communications is also known as __________.
A.
B.
C.
D.
E.
33.  A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network
A.
B.
C.
D.
E.
34.  A ________ is a group of computers linked together so that they act as one computer
A.
B.
C.
D.
E.
35.  ______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.
A.
B.
C.
D.
E.
36.  ________ is the presentation of information to the user and the acceptance of the user’s commands.
A.
B.
C.
D.
E.
37.  Client-server architectures:
A.
B.
C.
D.
E.
38.  In a client-server network, _________ gets software from different vendors to work together.
A.
B.
C.
D.
E.
39.  In the three tier architecture the software on the client computer is responsible for____________.
A.
B.
C.
D.
E.
40.  A “thin client” architecture approach:
A.
B.
C.
D.
E.
41.  With the “thin client” architecture, when an application changes, only the _________ with the application logic needs to be updated.
A.
B.
C.
D.
E.
42.  The idea for a special hypertext network, called the World Wide Web, was conceived of by:
A.
B.
C.
D.
E.
43.  Marc Andreessen led a team that developed the first graphical Web browser, which was called:
A.
B.
C.
D.
E.
44.  To interact with the World Wide Web, a client computer needs an application layer software package called a:
A.
B.
C.
D.
E.
45.  Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.
A.
B.
C.
D.
E.
46.  To get a page from the Web, a user must type in a URL, which stands for:
A.
B.
C.
D.
E.
47.  The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.
A.
B.
C.
D.
E.
48.  There are optional and required parts of an HTTP request. They are:
A.
B.
C.
D.
E.
49.  There are required and optional parts of an HTTP response. They are:
A.
B.
C.
D.
E.
50.  A response status code of 404 means:
A.
B.
C.
D.
E.
51.  The acronym, HTML, refers to:
A.
B.
C.
D.
E.
52.  The most commonly used e-mail standard is:
A.
B.
C.
D.
E.
53.  In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:
A.
B.
C.
D.
E.
54.  Which of the following is not a user agent package?
A.
B.
C.
D.
E.
55.  Another term for a user agent is:
A.
B.
C.
D.
E.
56.  IMAP (Internet Message Access Protocol):
A.
B.
C.
D.
E.
57.  In a ___________ architecture, computers are both client and server, thus sharing the work.
A.
B.
C.
D.
E.
58.  With a _____________, one computer acts as several servers.
A.
B.
C.
D.
E.
59.  The acronym, MIME, refers to:
A.
B.
C.
D.
E.
60.  Which of the following is not true about Telnet?
A.
B.
C.
D.
E.
61.  _________ is a special type of one directional videoconferencing in which content is sent from the server to the user.
A.
B.
C.
D.
E.
62.  The software that runs on the mail server is referred to as the ____________
A.
B.
C.
D.
E.
63.  Two fundamentally different types of data are:
A.
B.
C.
D.
E.
64.  Which of the following is not a key advantage of digital transmission?
A.
B.
C.
D.
E.
65.  A(n) __________ circuit is another name for a multipoint configuration.
A.
B.
C.
D.
E.
66.  Which is not true about point-to-point circuits?
A.
B.
C.
D.
E.
67.  Having a conversation with someone using a cellular phone is an example of _________ transmission.
A.
B.
C.
D.
E.
68.  The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.
A.
B.
C.
D.
E.
69.  The two basic types of media are:
A.
B.
C.
D.
E.
70.  The type of media usually installed on homes and businesses by the telephone company is called ____________.
A.
B.
C.
D.
E.
71.  Another term for the weakening of a signal over distance is:
A.
B.
C.
D.
E.
72.  Which of the following media can best withstand harsh environmental conditions?
A.
B.
C.
D.
E.
73.  __________ is a line-of-sight type of wireless media.
A.
B.
C.
D.
E.
74.  _____________ can be thought of as dividing the circuit horizontally.
A.
B.
C.
D.
E.
75.  Microwave transmission:
A.
B.
C.
D.
E.
76.  ______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
A.
B.
C.
D.
E.
77.  Which of the following is not an important factor to consider when selecting media to be used in a network?
A.
B.
C.
D.
E.
78.  Which of the following is the most secure wired media?
A.
B.
C.
D.
E.
79.  A coding scheme that uses 10 bits to represent each character is capable of representing_________ different characters.
A.
B.
C.
D.
E.
80.  ____________ is one of the most commonly used coding schemes used in data transmission.
A.
B.
C.
D.
E.
81.  The representation of the character A by the group of 8 bits, 01000001, is an example of:
A.
B.
C.
D.
E.
82.  Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?
A.
B.
C.
D.
E.
83.  The height of a sound wave is called its:
A.
B.
C.
D.
E.
84.  _____________ is not a form of modulation used to transform digital data into analog signals.
A.
B.
C.
D.
E.
85.  ____________ refers to changing the shape of the signal waves in different ways to represent a 1 or a 0.
A.
B.
C.
D.
E.
86.  With respect to converting digital data into analog signals, AM stands for:
A.
B.
C.
D.
E.
87.  If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is :
A.
B.
C.
D.
E.
88.  The acronym, Modem, stands for _________________.
A.
B.
C.
D.
E.
89.  Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.
A.
B.
C.
D.
E.
90.  If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is?
A.
B.
C.
D.
E.
91.  A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.
A.
B.
C.
D.
E.
92.  Frequency division multiplexing:
A.
B.
C.
D.
E.
93.  Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
A.
B.
C.
D.
E.
94.  As part of the five-layer network model used in this textbook, the data link layer sits directly between:
A.
B.
C.
D.
E.
95.  ____________ is not a function of a data link protocol.
A.
B.
C.
D.
E.
96.  Media access control:
A.
B.
C.
D.
E.
97.  Which of the following is not a controlled access method of media access control?
A.
B.
C.
D.
E.
98.  Which of the following is true about roll call polling?
A.
B.
C.
D.
E.
99.  With contention:
A.
B.
C.
D.
E.
100.  In general, controlled approaches:
A.
B.
C.
D.
E.
101.  Errors on a network can occur:
A.
B.
C.
D.
E.
102.  Which of the following media is least susceptible to noise?
A.
B.
C.
D.
E.
103.  ____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.
A.
B.
C.
D.
E.
104.  The familiar background static on radios and telephones is called:
A.
B.
C.
D.
E.
105.  Cross-talk:
A.
B.
C.
D.
E.
106.  The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
A.
B.
C.
D.
E.
107.  _____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
A.
B.
C.
D.
E.
108.  _____________ is an effective way to prevent attenuation.
A.
B.
C.
D.
E.
109.  On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
A.
B.
C.
D.
E.
110.  Which of the following is not an error detection method used in the data link layer?
A.
B.
C.
D.
E.
111.  With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
A.
B.
C.
D.
E.
112.  The probability of detecting an error, given that one has occurred, using parity checking is about:
A.
B.
C.
D.
E.
113.  The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:
A.
B.
C.
D.
E.
114.  ARQ means that:
A.
B.
C.
D.
E.
115.  In ARQ, a NAK:
A.
B.
C.
D.
E.
116.  Stop-and-wait ARQ uses ___________ type of data flow.
A.
B.
C.
D.
E.
117.  Asynchronous transmission:
A.
B.
C.
D.
E.
118.  Synchronous transmission:
A.
B.
C.
D.
E.
119.  Which of the following is true about the data link protocol, SDLC:
A.
B.
C.
D.
E.
120.  Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
A.
B.
C.
D.
E.
121.  Which of the following is true about the data link protocol, PPP?
A.
B.
C.
D.
E.
122.  In communication protocols, _________ are used to convey the user¡¯s meaning.
A.
B.
C.
D.
E.
123.  _________________ is defined as the total number of information bits divided by the total number of bits in the transmission.
A.
B.
C.
D.
E.
124.  Calculating the actual throughput of a data communication network is:
A.
B.
C.
D.
E.
125.  TRIB, an acronym that relates to throughput, stands for:
A.
B.
C.
D.
E.
126.  The ____________ layer links the application layer with the network layer and is responsible for end-to-end delivery of messages.
A.
B.
C.
D.
E.
127.  __________ is NOT a function of the transport layer.
A.
B.
C.
D.
E.
128.  _______ is the dominant network protocol today.
A.
B.
C.
D.
E.
129.  Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
A.
B.
C.
D.
E.
130.  TCP/IP:
A.
B.
C.
D.
E.
131.  A typical TCP packet has a _______ header of control information.
A.
B.
C.
D.
E.
132.  The source port number tells the destination station _____________.
A.
B.
C.
D.
E.
133.  TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
A.
B.
C.
D.
E.
134.  The older version of IP has a ________ header of control information.
A.
B.
C.
D.
E.
135.  The newer form of IP, version 6 (Ipv6):
A.
B.
C.
D.
E.
136.  Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:
A.
B.
C.
D.
E.
137.  The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
A.
B.
C.
D.
E.
138.  The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
A.
B.
C.
D.
E.
139.  Which of the following is not a protocol used at the application layer.
A.
B.
C.
D.
E.
140.  UDP is not commonly used for:
A.
B.
C.
D.
E.
141.  With QoS routing different __________ are defined, each with different priorities.
A.
B.
C.
D.
E.
142.  An application layer address using TCP/IPv4 looks like:
A.
B.
C.
D.
E.
143.  A client computer is assigned a data link layer address by:
A.
B.
C.
D.
E.
144.  ICANN:
A.
B.
C.
D.
E.
145.  A(n) ________ refers to a group of computers that are logically grouped together by IP number.
A.
B.
C.
D.
E.
146.  A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
A.
B.
C.
D.
E.
147.  Dynamic addressing:
A.
B.
C.
D.
E.
148.  ___________ is the translation of application layer addresses into IP addresses.
A.
B.
C.
D.
E.
149.  Server name resolution is done using the:
A.
B.
C.
D.
E.
150.  When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
A.
B.
C.
D.
E.
151.  When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
A.
B.
C.
D.
E.
152.  _________ is a specially formatted request used to perform IP address to data link address resolution.
A.
B.
C.
D.
E.
153.  ___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
A.
B.
C.
D.
E.
154.  The _____________ is used by a computer to determine how messages will travel through the network.
A.
B.
C.
D.
E.
155.  In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
A.
B.
C.
D.
E.
156.  The three fundamental approaches to routing are:
A.
B.
C.
D.
E.
157.  With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.
A.
B.
C.
D.
E.
158.  _______________ is a type of dynamic routing.
A.
B.
C.
D.
E.
159.  One drawback to dynamic routing is:
A.
B.
C.
D.
E.
160.  A type of message that is used when sending a message from one computer to another computer is called a:
A.
B.
C.