RCDD Chapter 16 Data Network Design

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Letad1
L
Letad1
Community Contributor
Quizzes Created: 13 | Total Attempts: 5,886
Questions: 137 | Attempts: 221

SettingsSettingsSettings
RCDD Quizzes & Trivia

Registered Communications Distribution Designer (RCDD)


Questions and Answers
  • 1. 

    The criteria used to choose routes are known as:

    • A.

      Hops

    • B.

      Metrics

    • C.

      Costs

    • D.

      Paths

    Correct Answer
    B. Metrics
    Explanation
    Metrics are the criteria used to choose routes. Metrics refer to the various parameters or measurements that are used to evaluate and compare different routes. These metrics can include factors such as bandwidth, delay, reliability, and load. By considering these metrics, network administrators can determine the most efficient and reliable route for data transmission.

    Rate this question:

  • 2. 

    Geographic distance is the best measure for choosing a routing path

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Rarely is geographic distance the best measure

    Rate this question:

  • 3. 

    Routers process ________ by examining layer 3 addressing information

    • A.

      Frames

    • B.

      Bits

    • C.

      Datagrams

    • D.

      Information

    Correct Answer
    C. Datagrams
    Explanation
    Routers process datagrams by examining layer 3 addressing information. Routers are network devices that operate at the network layer of the OSI model. They receive packets (datagrams) from one network and determine the best path to forward them to the destination network based on the layer 3 addressing information, such as IP addresses. Routers make decisions based on this addressing information to efficiently route the packets to their intended destinations.

    Rate this question:

  • 4. 

    What is a combination of hardware and software, typically in the form of a specialized device:

    • A.

      Switch

    • B.

      Bridge

    • C.

      Router

    • D.

      Gateway

    Correct Answer
    C. Router
    Explanation
    A router is a combination of hardware and software that is typically in the form of a specialized device. It is used to connect multiple networks together and direct data packets between them. Routers use routing tables and protocols to determine the best path for data transmission. They are commonly used in homes and businesses to connect to the internet and create local area networks (LANs). Routers are essential for efficient and secure data communication between different networks.

    Rate this question:

  • 5. 

    Which type of frame processing is the fastest, but least reliable.

    • A.

      Store and forward

    • B.

      Cut-through

    • C.

      Modified cut-through

    Correct Answer
    B. Cut-through
    Explanation
    Cut-through frame processing is the fastest method as it starts forwarding the frame as soon as the destination address is received, without waiting for the complete frame. However, it is also the least reliable method as it doesn't perform any error checking before forwarding the frame. This means that if there are any errors in the frame, they will be propagated to the destination, potentially causing data corruption.

    Rate this question:

  • 6. 

    Which type of frame processing is the most common:

    • A.

      Cut through

    • B.

      Modified cut through

    • C.

      Store and forward

    Correct Answer
    B. Modified cut through
    Explanation
    Modified cut through is the most common type of frame processing. In modified cut through, the switch begins forwarding the frame before it has been fully received, only after examining the destination address. This type of processing offers a balance between low latency and error checking, as it quickly forwards frames while still being able to detect and discard frames with errors. This approach is commonly used in modern networking switches to optimize performance while maintaining data integrity.

    Rate this question:

  • 7. 

    Which type of frame processing is the most reliable, but slowest.

    • A.

      Cut-through

    • B.

      Store-and-forward

    • C.

      Modified cut-through

    Correct Answer
    B. Store-and-forward
    Explanation
    Store-and-forward frame processing is the most reliable but slowest method. In this method, the switch receives the entire frame before forwarding it to the destination. It checks the frame for errors, discards any corrupted frames, and only forwards error-free frames. This process ensures that the destination receives the complete and error-free frame, making it the most reliable method. However, because the switch has to wait for the entire frame before forwarding, it introduces additional latency, making it the slowest method compared to cut-through and modified cut-through processing.

    Rate this question:

  • 8. 

    The higher the latency, the higher the rated performance of the port or switch.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The lower the latency, the higher the rated performance

    Rate this question:

  • 9. 

    What is used to describe the amount of time it takes a port or switch to process a frame

    • A.

      Flow control

    • B.

      Latency

    • C.

      Rise time

    • D.

      Forwarding time

    Correct Answer
    B. Latency
    Explanation
    Latency is the correct answer because it refers to the amount of time it takes for a port or switch to process a frame. It is a measure of the delay or time lag experienced in data transmission. Latency can be affected by various factors such as network congestion, distance, and processing capabilities of the devices involved. By understanding and minimizing latency, network administrators can optimize the efficiency and performance of their networks.

    Rate this question:

  • 10. 

    If a hub generates frames faster than the switch port can forward them, the switch can stop hub transmission by generating one or more false collision signals. This method is called:

    • A.

      Error stopping

    • B.

      Backpressure

    • C.

      Rate control

    • D.

      Bit sequencing

    Correct Answer
    B. Backpressure
    Explanation
    Backpressure is a method used by a switch to stop a hub from transmitting frames faster than the switch port can handle. The switch generates false collision signals, which causes the hub to back off and stop transmitting temporarily. This technique helps to regulate the flow of data and prevent congestion in the network.

    Rate this question:

  • 11. 

    Select the true statements about a switch

    • A.

      Can also be called a multiport bridge

    • B.

      Creates multiple collision domains

    • C.

      Creates a single collision domain

    • D.

      Creates multiple broadcast domains

    • E.

      Creates a single broadcast domain

    Correct Answer(s)
    A. Can also be called a multiport bridge
    B. Creates multiple collision domains
    E. Creates a single broadcast domain
    Explanation
    A switch can also be called a multiport bridge because it operates at the data link layer and connects multiple devices together. It creates multiple collision domains because each port on the switch has its own separate collision domain, which helps to reduce collisions and improve network performance. However, a switch creates a single broadcast domain because it forwards broadcast packets to all connected devices.

    Rate this question:

  • 12. 

    A switch contains a series of connections linking each port to every other port, this is referred to as a _________ or ____________.

    • A.

      Backplane

    • B.

      Port matrix

    • C.

      Switch matrix

    • D.

      Switched plane

    Correct Answer(s)
    A. Backplane
    C. Switch matrix
    Explanation
    A switch contains a series of connections linking each port to every other port. This is commonly known as a backplane or switch matrix. The backplane is the physical infrastructure that allows for the connections between ports, while the switch matrix refers to the logical organization of these connections within the switch.

    Rate this question:

  • 13. 

    A port on a switch can be described as a ___________ connection

    • A.

      Shared

    • B.

      Dedicated

    • C.

      Balanced

    Correct Answer
    B. Dedicated
    Explanation
    A port on a switch can be described as a dedicated connection because it is exclusively assigned to a single device. This means that the bandwidth and resources of the port are dedicated solely to that device, ensuring a consistent and reliable connection without any interference or competition from other devices.

    Rate this question:

  • 14. 

    A port on a hub is referred to as a ___________ connection

    • A.

      Dedicated

    • B.

      Shared

    Correct Answer
    B. Shared
    Explanation
    A port on a hub is referred to as a shared connection because in a hub, all the ports are connected to a single shared network. This means that the bandwidth and resources of the network are shared among all the devices connected to the hub. Any data transmitted through one port is broadcasted to all other ports, which can lead to collisions and slower transmission speeds. Therefore, a port on a hub is considered a shared connection.

    Rate this question:

  • 15. 

    A managed hub is capable of being monitored, but not controlled through network management software.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    can be managed and controlled

    Rate this question:

  • 16. 

    A standard equipment rack with 42U capacity can contain how many servers

    • A.

      150

    • B.

      168

    • C.

      172

    • D.

      178

    Correct Answer
    B. 168
    Explanation
    A standard equipment rack with 42U capacity can contain 168 servers. Each U (unit) in the rack can accommodate one server, therefore, multiplying the number of U's (42) by the number of servers per U (1), we get a total of 42 servers.

    Rate this question:

  • 17. 

    The NIC connects a station to what:

    • A.

      HUB

    • B.

      Switch

    • C.

      Network medium

    • D.

      Access point

    Correct Answer
    C. Network medium
    Explanation
    The NIC (Network Interface Card) connects a station to the network medium. The network medium refers to the physical infrastructure that allows data to be transmitted between devices, such as cables or wireless signals. The NIC acts as the interface between the station and the network medium, enabling the transmission and reception of data. It provides the necessary hardware and software components to establish a connection and communicate with other devices on the network.

    Rate this question:

  • 18. 

    How many server blades can you place into a chassis occupying three rack units.

    • A.

      6

    • B.

      12

    • C.

      18

    • D.

      24

    Correct Answer
    B. 12
    Explanation
    A server blade is a compact, modular server unit that can be inserted into a chassis. In this question, the chassis occupies three rack units. Each rack unit can accommodate four server blades. Therefore, to determine the number of server blades that can be placed into the chassis occupying three rack units, we multiply the number of rack units (3) by the number of server blades per rack unit (4), which equals 12.

    Rate this question:

  • 19. 

    What term is used to describe the device with which a user accesses an organizational network.

    • A.

      Switch

    • B.

      Station

    • C.

      Provider

    • D.

      Scanner

    Correct Answer
    B. Station
    Explanation
    A station is the term used to describe the device with which a user accesses an organizational network. This can refer to a computer, laptop, or any other device that allows a user to connect to and access the network. The station acts as an interface between the user and the network, providing access to resources and allowing communication within the organization.

    Rate this question:

  • 20. 

    Who manages the internet

    • A.

      Internet Research Task Force (IRTF)

    • B.

      Internet Research Steering Group (IRSG)

    • C.

      Internet Engineering Task Force (IETF)

    • D.

      Internet Corporation for Assigned Names and Numbers (ICANN)

    Correct Answer
    C. Internet Engineering Task Force (IETF)
    Explanation
    The Internet Engineering Task Force (IETF) manages the internet. They are responsible for developing and promoting internet standards and protocols. The IETF consists of a large community of engineers and researchers who collaborate to ensure the smooth functioning and evolution of the internet. They work on various technical aspects such as designing protocols, addressing security concerns, and improving network performance. Their efforts play a crucial role in maintaining the interoperability and reliability of the internet.

    Rate this question:

  • 21. 

    Who oversees internet naming and addressing

    • A.

      Internet Engineering Task Force (IETF)

    • B.

      Internet Research Task Force (IRTF)

    • C.

      Internet Corporation for Assigned Names and Numbers (ICANN)

    • D.

      Internet Research Steering Group (IRSG)

    Correct Answer
    C. Internet Corporation for Assigned Names and Numbers (ICANN)
    Explanation
    ICANN is responsible for overseeing internet naming and addressing. They manage and coordinate the Domain Name System (DNS), which is the system that translates domain names into IP addresses. ICANN also plays a crucial role in assigning unique identifiers and managing the allocation of IP addresses and top-level domains. They work to ensure the stability and security of the internet's naming and addressing systems, as well as promote competition and choice in the domain name market.

    Rate this question:

  • 22. 

    IEEE 802.4 is used for:

    • A.

      Broadband wireless access working group

    • B.

      Media Independent handoff working group

    • C.

      Logical link control (LLC) working group

    • D.

      Token bus working group

    Correct Answer
    D. Token bus working group
    Explanation
    IEEE 802.4 is used for the Token bus working group. This group is responsible for developing and maintaining standards for token bus networks, which are a type of local area network (LAN) that uses a token-passing mechanism to control access to the network. The token bus working group focuses on defining the protocols and specifications necessary for the operation of token bus networks, including the physical layer, medium access control, and logical link control layers.

    Rate this question:

  • 23. 

    IETF stands for

    • A.

      International Engineering Task Force

    • B.

      Internet Engineering Task Force

    • C.

      Internal Electrical Task Force

    Correct Answer
    B. Internet Engineering Task Force
    Explanation
    The correct answer is "Internet Engineering Task Force." The IETF is an open international community of network designers, operators, vendors, and researchers that develops and promotes Internet standards. It is responsible for the development and maintenance of protocols, such as TCP/IP, that are fundamental to the functioning of the Internet. The organization focuses on creating and improving standards through a consensus-driven process that involves working groups, meetings, and discussions among its members.

    Rate this question:

  • 24. 

    Who manages the IETF

    • A.

      Internet Engineering Steering Group (IESG)

    • B.

      Internet Research Task Force (IRTF)

    • C.

      Internet Research Steering Group (IRSG)

    • D.

      Internet Corporation for Assigned Names and Numbers (ICANN)

    Correct Answer
    A. Internet Engineering Steering Group (IESG)
    Explanation
    The IETF (Internet Engineering Task Force) is managed by the Internet Engineering Steering Group (IESG). The IESG is responsible for the overall management and coordination of the technical work carried out within the IETF. They oversee the development of Internet standards and protocols, review and approve proposed standards, and provide guidance and direction to working groups. The IESG consists of area directors who are appointed by the Internet Architecture Board (IAB) and work together to ensure the smooth operation and progress of the IETF.

    Rate this question:

  • 25. 

    IP addresses may be assigned to devices for internal use. Such devices may also connect to the internet.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    IP addresses may be assigned to devices for internal use, such devices are not connected to the internet

    Rate this question:

  • 26. 

    Which terms below are alternate terms used to describe MAC addresses:

    • A.

      Ethernet address

    • B.

      Hardware address

    • C.

      Device address

    • D.

      LAN address

    • E.

      Physical address

    Correct Answer(s)
    A. Ethernet address
    B. Hardware address
    C. Device address
    D. LAN address
    E. Physical address
    Explanation
    The terms "Ethernet address," "Hardware address," "Device address," "LAN address," and "Physical address" are all alternate terms used to describe MAC addresses. These terms refer to the unique identifier assigned to a network interface controller (NIC) by the manufacturer. MAC addresses are used in Ethernet networks to ensure that data is sent to the intended recipient.

    Rate this question:

  • 27. 

    Which recommendation (nonzero dispersion shifted optical fiber) was introduced in the early 1990's, optimized for emerging dense wave division multiplexing (DWDM) applications.

    • A.

      ITU-T Recommendation G.452

    • B.

      ITU-T Recommendation G.655

    • C.

      ITU-T Recommendation G.523

    • D.

      ITU-T Recommendation G.711

    Correct Answer
    B. ITU-T Recommendation G.655
    Explanation
    ITU-T Recommendation G.655 was introduced in the early 1990s and was optimized for emerging dense wave division multiplexing (DWDM) applications. This recommendation specifically focuses on nonzero dispersion shifted optical fiber, which is designed to minimize the effects of dispersion in high-speed optical communication systems. By reducing dispersion, G.655 fiber allows for higher data transmission rates and increased capacity in DWDM systems, making it an ideal choice for the evolving telecommunications industry in the 1990s.

    Rate this question:

  • 28. 

    ONU stands for:

    • A.

      Outside Network Unit

    • B.

      Optical Networking Unit

    • C.

      Original Network Unit

    • D.

      Optical Network Unit

    Correct Answer
    D. Optical Network Unit
    Explanation
    ONU stands for Optical Network Unit. This is a device used in fiber optic communication systems to convert optical signals into electrical signals. It is typically used in passive optical networks (PONs) to connect end-user devices to the network. The ONU receives the optical signal from the central office and converts it into an electrical signal that can be used by the connected device. Therefore, Optical Network Unit is the correct answer.

    Rate this question:

  • 29. 

    Gigabit ethernet over PTP optical fiber provides enough bandwidth to ensure a very long life span for the network infrastructure: namely, the optical fiber infrastructure may be amortized over long periods of time ranging from ____ years or more.

    • A.

      10 years

    • B.

      15 years

    • C.

      20 years

    • D.

      25 years

    Correct Answer
    C. 20 years
    Explanation
    Gigabit Ethernet over PTP optical fiber provides a high-speed and reliable network connection. Optical fiber infrastructure is known for its durability and longevity. By using this technology, the network infrastructure can be utilized for a significant period of time, allowing for a long-term investment. A lifespan of 20 years or more is feasible, ensuring that the network infrastructure remains viable and efficient for an extended period.

    Rate this question:

  • 30. 

    What are the three subscriber access network topologies where the EFM Task Force expects that ethernet can provide increased performance and functionality over traditional first mile access technologies:

    • A.

      Point-to-multipoint on optical fiber

    • B.

      Point-to-point (PTP) on optical fiber

    • C.

      Point-to-multipoint on balanced twisted pair

    • D.

      Point-to-point (PTP) on balanced twisted pair

    Correct Answer(s)
    A. Point-to-multipoint on optical fiber
    B. Point-to-point (PTP) on optical fiber
    D. Point-to-point (PTP) on balanced twisted pair
  • 31. 

    If you see a picture of a network and it includes a picture of a house that is labeled ahomea what does the picture refer to.

    • A.

      Wireless

    • B.

      Primary rate ISDN

    • C.

      Ethernet in the first mile (802.3ah)

    • D.

      OC3 networks

    Correct Answer
    C. Ethernet in the first mile (802.3ah)
    Explanation
    The picture refers to Ethernet in the first mile (802.3ah). This is because the picture includes a house labeled "ahome," which suggests that it represents a residential or home network. Ethernet in the first mile (802.3ah) is a standard that specifically addresses the last mile connectivity for residential and small business networks, making it the most appropriate choice based on the given information.

    Rate this question:

  • 32. 

    Select the true statements about a PAN

    • A.

      50 ft

    • B.

      33 ft

    • C.

      Bluetooth

    • D.

      802.11

    • E.

      802.15

    Correct Answer(s)
    B. 33 ft
    C. Bluetooth
    E. 802.15
    Explanation
    A PAN (Personal Area Network) is a network that connects devices within a short range, typically up to 33 feet. Bluetooth is a wireless technology commonly used for PANs, allowing devices to communicate and transfer data over short distances. 802.15 is the IEEE standard for wireless personal area networks, which includes technologies like Bluetooth. Therefore, the true statements about a PAN in this case are 33 ft, Bluetooth, and 802.15.

    Rate this question:

  • 33. 

    Synchronization occurs at which layer of the OSI model

    • A.

      Layer 7

    • B.

      Layer 6

    • C.

      Layer 5

    • D.

      Layer 4

    Correct Answer
    C. Layer 5
    Explanation
    Synchronization occurs at Layer 5 of the OSI model, also known as the Session layer. This layer is responsible for establishing, maintaining, and terminating connections between network devices. Synchronization refers to the process of coordinating the timing of data transmission between the sender and receiver. The Session layer ensures that data is sent and received in a synchronized manner, allowing for reliable communication between devices.

    Rate this question:

  • 34. 

    Which layer of the OSI model is divided into the LLC and MAC layers

    • A.

      Physical layer

    • B.

      Session layer

    • C.

      Network layer

    • D.

      Data link layer

    Correct Answer
    D. Data link layer
    Explanation
    The correct answer is the Data link layer. The Data link layer of the OSI model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The LLC layer is responsible for managing communication between devices over a network, while the MAC layer handles the physical addressing and access to the network media.

    Rate this question:

  • 35. 

    Routers operate at which layer of the OSI

    • A.

      Layer 2

    • B.

      Layer 3

    • C.

      Layer 4

    • D.

      Layer 5

    Correct Answer
    B. Layer 3
    Explanation
    Routers operate at Layer 3 of the OSI model, also known as the network layer. This layer is responsible for logical addressing and routing of data packets across different networks. Routers use IP addresses to determine the best path for forwarding data packets from the source to the destination network. They make decisions based on network layer information, such as IP addresses, to direct traffic between different networks. Therefore, routers operate at Layer 3 to facilitate inter-network communication.

    Rate this question:

  • 36. 

    Frames contain how many bits

    • A.

      32 bits

    • B.

      24 bits

    • C.

      48 bits

    • D.

      8 bits

    Correct Answer
    C. 48 bits
    Explanation
    Frames in computer networking typically contain a header and a payload. The header includes information such as source and destination addresses, error detection codes, and other control bits. The payload contains the actual data being transmitted. The size of a frame is usually measured in bits. In this case, the correct answer is 48 bits, indicating that the frames being referred to in the question have a size of 48 bits.

    Rate this question:

  • 37. 

    Frames are used on what layer of the OSI model

    • A.

      Layer 1

    • B.

      Layer 2

    • C.

      Layer 3

    • D.

      Layer 4

    Correct Answer
    B. Layer 2
    Explanation
    Frames are used on Layer 2 of the OSI model. Layer 2, also known as the Data Link layer, is responsible for the reliable transmission of data between adjacent network nodes. It provides error detection and correction, as well as flow control mechanisms. Frames are the units of data that are transmitted at this layer, encapsulating the data from the upper layers and adding necessary control information such as source and destination addresses.

    Rate this question:

  • 38. 

    Encryption and compression occur at which layer of the OSI.

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Transport

    Correct Answer
    B. Presentation
    Explanation
    Encryption and compression occur at the Presentation layer of the OSI model. This layer is responsible for formatting and presenting data to the application layer. Encryption is the process of converting data into a secret code to protect it from unauthorized access, while compression reduces the size of data to optimize transmission and storage. Both of these processes are typically performed at the Presentation layer before the data is passed on to the application layer for further processing.

    Rate this question:

  • 39. 

    Packets contain how many bits

    • A.

      8 bits

    • B.

      32 bits

    • C.

      24 bits

    • D.

      48 bits

    Correct Answer
    B. 32 bits
    Explanation
    Packets in computer networking typically contain a fixed number of bits. In this case, the correct answer is 32 bits. This means that each packet carries 32 binary digits of data. These packets are used to transmit information across a network, and the size of the packet can vary depending on the specific network protocol being used. In this scenario, the packets are specifically designed to carry 32 bits of information.

    Rate this question:

  • 40. 

    Billing occurs at which layer of the OSI model

    • A.

      Layer 6

    • B.

      Layer 5

    • C.

      Layer 4

    • D.

      Layer 3

    Correct Answer
    C. Layer 4
    Explanation
    Billing occurs at Layer 4 of the OSI model because Layer 4 is responsible for establishing, maintaining, and terminating connections between applications. This layer manages the flow of data and ensures that it is delivered reliably and error-free. Billing is a process that involves tracking and recording the usage of resources or services, which typically occurs at the application layer. Therefore, it makes sense for billing to occur at Layer 4, where the connections and data flow between applications are managed.

    Rate this question:

  • 41. 

    Protocol stacks provide which of the following:

    • A.

      Each layer provides a cost to the overall application

    • B.

      Upper layers provide services to lower layers

    • C.

      Only the upper most layer actually provides a service

    • D.

      Service access points (SAPs) are the connection points between layers

    Correct Answer
    D. Service access points (SAPs) are the connection points between layers
    Explanation
    Protocol stacks provide service access points (SAPs) as the connection points between layers. SAPs allow communication between the different layers of the protocol stack by providing a standardized interface for exchanging data and requests. Each layer in the protocol stack can access the services provided by the layer below it through these SAPs. Therefore, the correct answer is that SAPs are the connection points between layers in a protocol stack.

    Rate this question:

  • 42. 

    Email resides at which layer of the OSI model

    • A.

      Layer 7

    • B.

      Layer 6

    • C.

      Layer 5

    • D.

      Layer 4

    Correct Answer
    A. Layer 7
    Explanation
    Layer 7 of the OSI model is the application layer. This layer is responsible for providing network services to applications, such as email, file transfer, and web browsing. It interacts directly with the end-user and provides a means for applications to access the network services. Since email is an application that relies on network services, it resides at layer 7 of the OSI model.

    Rate this question:

  • 43. 

    The objective of the OSI model is to provide a ____________ approach for the development of all types of networks.

    • A.

      Structured

    • B.

      Practical

    • C.

      Varied

    • D.

      Efficient

    Correct Answer
    A. Structured
    Explanation
    The objective of the OSI model is to provide a structured approach for the development of all types of networks. This means that the model aims to organize and categorize the different functions and protocols involved in networking in a systematic and logical manner. By providing a structured approach, the OSI model helps ensure that networks are designed and implemented in a consistent and standardized way, making them easier to understand, manage, and troubleshoot.

    Rate this question:

  • 44. 

    In the 1970's what was introduced:

    • A.

      Hubs

    • B.

      Personal computers

    • C.

      Minicomputers

    • D.

      Networking

    Correct Answer
    C. Minicomputers
    Explanation
    In the 1970s, minicomputers were introduced. Minicomputers were smaller and less expensive than mainframe computers, making them more accessible to businesses and institutions. They were capable of performing many of the same tasks as mainframes, such as data processing and calculations, but on a smaller scale. The introduction of minicomputers revolutionized the computing industry by bringing computing power to a wider audience and paving the way for the development of personal computers in the following decade.

    Rate this question:

  • 45. 

    In what year did the ISO introduce the OSI model

    • A.

      1976

    • B.

      1978

    • C.

      1982

    • D.

      1986

    Correct Answer
    B. 1978
    Explanation
    The ISO introduced the OSI model in 1978.

    Rate this question:

  • 46. 

    Mainframes were introduced in the:

    • A.

      1950's

    • B.

      1960's

    • C.

      1970's

    • D.

      1980's

    Correct Answer
    A. 1950's
    Explanation
    Mainframes were introduced in the 1950's. During this time, computers were large and expensive, and were primarily used by large organizations such as government agencies and corporations. Mainframes played a crucial role in data processing and served as the backbone of many organizations' computing infrastructure. They were known for their reliability, high processing power, and ability to handle large amounts of data. The 1950's marked the beginning of the mainframe era, which continued to evolve and dominate the computing industry for several decades.

    Rate this question:

  • 47. 

    Video conferencing is bandwidth intense.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Video conferencing requires a significant amount of bandwidth because it involves transmitting and receiving live audio and video data in real-time. This data needs to be sent and received quickly to maintain a smooth and uninterrupted video conference experience. The higher the quality of the audio and video, the more bandwidth is required. Additionally, video conferencing often involves multiple participants, each requiring their own stream of data, further increasing the bandwidth demands. Therefore, it is true that video conferencing is bandwidth intense.

    Rate this question:

  • 48. 

    Which type of design is referred to as a top down design

    • A.

      Physical design

    • B.

      Functional design

    Correct Answer
    B. Functional design
    Explanation
    Functional design is referred to as a top-down design because it starts with the overall system or product and then breaks it down into smaller components or modules. This approach focuses on understanding the desired functionality and requirements of the system before diving into the details of how it will be implemented. It allows for a systematic and structured approach to designing complex systems, where the high-level design decisions are made first and then refined and detailed at lower levels. This helps ensure that the final design aligns with the intended functionality and goals of the system.

    Rate this question:

  • 49. 

    One of the standards associated with VoIP is _______, an ITU-T coding and compression standard first issued in 1988 for converting speech into a 64 kb/s data stream.

    • A.

      G.711

    • B.

      G.723.1

    • C.

      G.726

    • D.

      G.729

    Correct Answer
    A. G.711
    Explanation
    G.711 is the correct answer for this question. It is an ITU-T coding and compression standard that was first issued in 1988. G.711 is used for converting speech into a 64 kb/s data stream in VoIP.

    Rate this question:

  • 50. 

    For an organizational network to support voice applications it must be:

    • A.

      Packet switching capable

    • B.

      Quality of service (QoS) capable

    • C.

      VLAN capable

    • D.

      Convergent capable

    Correct Answer
    B. Quality of service (QoS) capable
    Explanation
    For an organizational network to support voice applications, it must be capable of providing quality of service (QoS). QoS ensures that voice traffic is prioritized and given sufficient bandwidth, low latency, and minimal packet loss to maintain a high level of call quality. Without QoS capabilities, voice applications may suffer from poor audio quality, delays, and dropped calls, making it essential for the network to prioritize voice traffic over other types of data. Packet switching, VLAN capability, and convergence are also important for efficient network communication, but QoS is specifically required for supporting voice applications.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 29, 2012
    Quiz Created by
    Letad1

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.