CST 1215 Part 3 – Flashcards
Unlock all answers in this set
Unlock answersquestion
When using a ring topology, a ____ can be used to connect to another network that uses the same protocol. a. star c. router b. central controller d. bridge
answer
D
question
In the ____ topology, all sites are connected to a single communication line running the length of the network. a. bus c. star b. ring d. gateway
answer
A
question
A ____ includes information technology that operates within a radius of approximately 10 meters of an individual and is centered around that one person. a. PAN c. WAN b. MAN d. LAN
answer
A
question
A ____ is a device and software used to connect two or more local area networks or systems that use different protocols; it translates one network's protocol into another, resolving hardware and software incompatibilities. a. router c. bridge b. gateway d. tree
answer
B
question
The maximum circumference for a MAN is ____. a. 10 miles c. 100 kilometers b. 50 kilometers d. 200 miles
answer
C
question
Under the Domain Name Service (DNS) protocol, in the address [email protected], the host name is ____. a. someone c. name2 b. name1 d. name3
answer
B
question
When using the routing information protocol (RIP) to transfer data from one network to another, the path ____ is chosen. a. with the fastest server c. with the shortest response time b. that is most secure d. with the smallest number of hops
answer
D
question
____ is an example of a circuit-switched network. a. A telephone system c. The United States Postal Service b. The Internet d. A local area network
answer
A
question
Which characteristic is true of packet switching? a. Preferred in low volume networks c. Preferred for voice communications b. Easily overloaded d. Transmits in batches
answer
D
question
In the ____ path-selection approach, the destination and sequence number of a packet are added to the information uniquely identifying the message to which the packet belongs; each packet is then handled independently and a route is selected as each packet is accepted into the network. a. physical circuit c. telegram b. datagram d. virtual circuit
answer
B
question
Carrier sense multiple access (CSMA) is a ____-based access protocol. a. round robin c. contention b. reservation d. detection
answer
C
question
If a collision occurs when using CSMA/CD, a jamming signal is sent immediately to both sending nodes, which then wait ____ before trying again. a. one millisecond c. one minute b. one second d. a random period
answer
D
question
In the distributed-queue, dual bus (DQDB) protocol, a node can use Bus 2 to send a ____ to its upstream neighbors. a. reservation c. free slot b. message d. token
answer
A
question
The ___, which makes technical recommendations about data communication interfaces, took on the task of creating a universal network architecture, resulting in the OSI Reference Model. a. IEEE 802 Committee b. High-Level Data Link Organization c. International Organization for Standardization d. Transmission Control and Internet Committee
answer
C
question
In the OSI transport protocol model, Layer Seven, the ____ layer, provides the interface to users and is responsible for formatting user data before passing it to lower layers for transmission to a remote host. a. physical c. presentation b. network d. application
answer
D
question
The TCP/IP reference model has ____ layers that roughly correlate to the OSI's seven layers. a. two c. seven b. four d. ten
answer
B
question
When was the first version of UNIX written? a. 1969 c. 1975 b. 1971 d. 1984
answer
A
question
____ is a family of IEEE standards that define a portable operating system interface to enhance the portability of programs from one operating system to another. a. POSIX c. LINUX b. POSFIX d. STD
answer
A
question
For multiprogramming systems, most UNIX operating systems use either ____ management techniques. a. indirect paging and hot swapping c. virtual memory and swapping b. simple memory and paging d. swapping or demand paging memory
answer
D
question
UNIX uses a ____ to keep track of which processes are using shared program code. a. pointer c. binary file b. text table d. database
answer
B