quiz2-sol
2 Pages

quiz2-sol

Course Number: CS 898, Fall 2009

College/University: Wichita State

Word Count: 582

Rating:

Document Preview

CS 898T Mobile and Wireless Networks Quiz 2 - Name: Spring 2004 (50 points - 2 points for each problem) ( B ) 1. Which layer of the OSI model translates physical addresses to logical addresses? (A) physical layer (B) network layer (C) transport layer (D) session layer ( B ) 2. Which IEEE standard denes the LLC and MAC sublayers? (A) 802.1 (B) 802.2 (C) 802.3 (D) 802.5 ( B ) 3. 10Base-T can support segments of up...

Unformatted Document Excerpt
Coursehero >> Kansas >> Wichita State >> CS 898

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

898T CS Mobile and Wireless Networks Quiz 2 - Name: Spring 2004 (50 points - 2 points for each problem) ( B ) 1. Which layer of the OSI model translates physical addresses to logical addresses? (A) physical layer (B) network layer (C) transport layer (D) session layer ( B ) 2. Which IEEE standard denes the LLC and MAC sublayers? (A) 802.1 (B) 802.2 (C) 802.3 (D) 802.5 ( B ) 3. 10Base-T can support segments of up to (A) 10 m (B) 100 m (C) 200 m (D) 500 m ( A ) 4. A network is wired using a single length of coaxial cable, with nodes connected at various points along the cable. Which network topology is in use? (A) bus (B) star (C) ring (D) mesh ( B ) 5. Which network connectivity device(s) function at the network layer of the OSI model? (check D all that apply) (A) bridges (B) routers (C) hubs (D) brouters ( C ) 6. Which device is likely to be used only in wide-area networks? (A) router (B) bridge (C) CSU/DSU (D) hub ( D ) 7. Which media access method is used in wireless LAN? (A) CDMA/CD (B) CDMA/CA (C) CSMA/CD (D) CSMA/CA ( C ) 8. Which Ethernet standard uses UTP cable? (A) 10Base2 (B) 10Base5 (C) 10Base-T (D) 10Base-F ( A ) 9. Which type of WAN media uses a modem? (A) PSTN (B) X.25 (C) ISDN (D) Frame Relay ( C ) 10. Which of the following WAN technologies oers the highest bandwidth? (A) T1 (B) T3 (C) OC-3 (D) ISDN ( A ) 11. Which of the following WAN technologies use packet switching? (check all that apply) B, D (A) ISDN (B) ATM (C) SONET (D) Frame Relay ( B ) 12. Which of the following WAN types typically use ber optic media? (A) ISDN (B) SONET (C) DS3 (D) T1 ( B ) 13. An Ethernet link is working at 20 Megabaud. What is the data transfer rate for this link? (A) 5 Mbps (B) 10 Mbps (C) 20 Mbps (D) 80 Mbps. ( D ) 14. Which modulation is techniques used in 802.11g? (A) FHSS (B) QPSK (C) DSSS (D) OFDM ( A ) 15. Based on the QoS, which application requires high reliability? (A) Web access (B) audio on demand (C) videoconference (D) none of the above ( A ) 16. An 802.16 network has a channel width of 20 MHz. When QPSK is used, what is the transfer rate? (A) 40 Mbps (B) 64 Mbps (C) 80 Mbps (D) 120 Mbps ( B ) 17. A DHCP server can be used to provide the same functionality as a(n): (A) ICMP server (B) RARP server (C) TFTP server (D) none of the above ( D ) 18. The UDP provides a delivery service that is: (A) connection-oriented and reliable (B) connectionless and reliable (C) connection-oriented and unreliable (D) connectionless and unreliable ( B ) 19. Which function is not used in UDP socket programming in C? (A) bind (B) accept (C) socket (D) sendto ( D ) 20. Which is not a routing algorithm or protocol? (A) AODV (B) BGP (C) OSPF (D) none of the above ( D ) 21. The assigned port for the POP server is: (A) 21 (B) 23 (C) 25 (D) 110 ( A ) 22. A media server is transmit...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Wichita State - CS - 898
CS 898T Mobile and Wireless Networks Quiz 4 - Name: Spring 2004 (50 points - 2 points for each problem) ( D ) 1. The PDA falls into the category of: (A) xed and wired (B) mobile and wired (C) xed and wireless (D) mobile and wireless ( D ) 2. What fre
Wichita State - CS - 898
CS 898t - Mobile and Wireless Networks Summer 2005 Course Syllabus Time and Place: M,Tu,W,Th 11:00 AM - 12:15 PM (Class), 12:25 - 12:50 PM (Lab), 128 Jabara Hall Textbook: C. Siva Ram Murthy and B.S. Manoj, Ad Hoc Wireless Networks: Architectures and
Wichita State - CS - 898
CS 898T Mobile and Wireless Networks Quiz 5 - Name: Spring 2004 (50 points - 2 points for each problem) ( D ) 1. Which is not the advantage of WLANs? (A) exibility (B) design (C) cost (D) none of the above ( C ) 2. Which is not a design goal of WLANs
Wichita State - CS - 898
CS 898T Mobile and Wireless Networks Quiz 1 - Name: Spring 2004 (50 points - 2 points for each problem) ( D ) 1. TCP/IP is a (A) protocol (B) hardware (C) software (D) network architecture ( C ) 2. What is the baud rate of the standard 10-Mbps Ethern
Wichita State - CS - 898
CS 898T Mobile and Wireless Networks Quiz 3 - Name: Spring 2004 (50 points - 2 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C ) 2. 100Base-T can support transfer rate of up to (A) 1 Gbps
Wichita State - CS - 898
Key Management in IP-Based Mobile and Wireless NetworksChin-Chih Chang Computer Science Department Wichita State University Wichita, KS 67260-0083, U.S.A.AbstractMobile and wireless networks pose a number of challenges in key management due to th
Wichita State - CS - 898
A Study on SETI@home Distributed Network Kim Hamlin Department of Computer Science Wichita State University, Wichita, KS 67260, USA {khamlin@cs.twsu.edu}Abstract SETI@home is a widely recognized as one of the most successful implementations of dist
Wichita State - CS - 898
XML W EB SERVICE SThere is a six-page attachment on the back.HANGNING QIU CS843 TERM PAPER MAY 9, 2003XML WEB SERVICESPage 2 of 21XML W EB SERVICE SIntroductionThis paper is an essay on XML Web services and is accompanied with a case stud
Wichita State - CS - 898
A Study on Public Key Cryptography CS 843 Distributed Computing SystemLaurentius Purba May 9, 2003Research PaperContents1. Introduction 2. Technical detail 3. Symmetric Cryptosystems: DES 4. Public-Key Cryptosystems: RSA 5. An Example 6. Imple
Wichita State - CS - 898
CS 898t - Mobile and Wireless Networks Spring 2003 Course Syllabus Time and Place: M,W 5:35 PM - 6:50 PM (Class), 7:00-7:25 PM (Lab), 127 Jabara Hall Textbook: Jochen Schiller, Mobile Communications, 2/E, Addison-Wesley, 2004, ISBN: 0-321-12381-6 Ref
Wichita State - CS - 898
Security & Efficiency in AdHoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State UniversityWhy Adhoc Networking?An Adhoc Network is a connection of wireless systems, transferring data between themselves
Wichita State - CS - 540
CS 540 Operating Systems Test 1 - Name: Date: Wednesday, March 10, 2004 (in class) Part 1: (39 points - 3 points for each problem) ( B ) 1. In UNIX a utility which lets the users issue and execute commands is called: (A) Terminal handler (B) Shell (C
Wichita State - CS - 540
CS 540 - Operating Systems - Final Exam - Name: Date: Wenesday, May 12, 2004 Part 1: (78 points - 3 points for each problem) ( C ) 1. In UNIX a utility which reads commands from a terminal is called: (A) Terminal handler (B) Kernel (C) Command interp
Wichita State - CS - 540
CS 540 - Operating Systems - Final Exam - Name: Date: Tuesday, May 21, 2002 Part 1: (80 points - 4 points for each problem) ( b ) 1. Which is the advantage of multiprocessor systems? (a) Increased modularity (b) Increased reliability (c) Increased se
Wichita State - CS - 540
CS 540 - Operating Systems Spring 2003 Course Syllabus Time and Place: 3:30 PM-4:45 PM (Class), 4:55-5:20 PM (Lab), 127 Jabara Hall Textbook: Andrew S. Tanenbaum, Modern Operating Systems, 2nd Edition, Prentice Hall, 2001, ISBN: 0-13-031358-0 Instruc
Wichita State - CS - 540
CS 540 - Operating Systems Spring 2004 Course Syllabus Time and Place: 11:30 PM-12:20 PM (Class), 12:30-12:55 PM (Lab), 127 Jabara Hall Textbook: Andrew S. Tanenbaum, Modern Operating Systems, 2nd Edition, Prentice Hall, 2001, ISBN: 0-13-031358-0 Ins
Wichita State - CS - 540
CS 540 Midterm 1 - Sample Questions Spring 2002 (Chap 5 - 7)Part I: Choice Questions(d) 1. CPU burst distribution is generally characterized as a. constant b. linear c. po
Wichita State - CS - 742
CS 742 Computer Communication Networks Exam 2 - Name: Date: Monday, November 22, 2004 Part 1: (36 points - 3 points for each problem) ( A ) 1. Which framing approach is used in PPP? (A) character stung (B) bit stung (C) clock-based framing (D) freque
Wichita State - MATH - 321
Math321DiscreteMathI(3HoursCredit) WichitaStateUniversity,MathematicsandStatisticsDepartment Dealswithdiscretemathematics/structures,including. Propositionalandpredicatelogic,prooftechniques,recursion,inductions,and analysisofalgorithms. SetsandCombi
Wichita State - RE - 310
Real Estate 310Transfer of TitleTitle TransferReal Estate 310 Principles of Real Estate Dr. LonghoferDr. Longhofer Principles of Real Estate 1Title in Real Estate Title refers to the right to or ownership of land Title is simply a way of re
Wichita State - RE - 618
RE 618 / Fin 618 Real Estate Investment AnalysisLease vs. Own Analysis Example Dr. Stanley D. Longhofer 1) Marcus Products, Inc. (MPI) would like to open a new 45,000 square foot manufacturing facility in Highland, NJ. The new facility is expected
Wichita State - RE - 618
Leases & Building Measurement Practice Problems Solutions Dr. Stanley D. Longhofer 1) As the Director of Real Estate for Oncer Inc., you are looking for 15,000 square feet of usable area for a new office you will be opening in Wichita. You are cons
Wichita State - RE - 618
RE 618 / Fin 618 Real Estate Investment AnalysisHomework 1 Time Value of Money Review Dr. Stanley D. Longhofer The following problems review time value of money calculations from Finance 340. You will receive credit based on making a legitimate at
Wichita State - FIN - 340
Fin 340 Financial Management ISummer 2002 Final Exam Version A August 5, 2002 Dr. Stanley D. Longhofer Tu-Th 11:00-12:15 You have one hour and thirty minutes to complete this exam. I would spend a few minutes looking it over before you begin. Noti
Wichita State - CS - 540
CS 540 - Operating Systems - Test 2 - Name: Date: Friday, November 19, 2004 Part 1: (33 points - 3 points for each problem) ( C ) 1. Which strategy is used in the Bankers algorithm for dealing with deadlocks? (A) Deadlock Ignorance (B) Deadlock Detec
Wichita State - CS - 843
CS 843 - Distributed Computing Systems - Final Exam - Name: Date: Friday, May 16, 2003, 10:00 - 11:50 AM (200 + 20 (bonus) points) 1. Briey explain these terminologies. If they are acronyms, also write what they stand for. (24 points) (a) Software ag
Wichita State - CS - 843
Dassault Enovia, a Case Study of CORBA Int roduct ion Dist ribut ed Archit ect ure Orbix Im plem ent at ion Det ail ConlcusionIntroduction What 's a PLM solut ion ? Who uses PLM product s ? The dist ribut ed requirem ent of t he usersDi
Wichita State - CS - 843
CS843 Spring 2003 Distributed Computing SystemsResearch Paper ProposalInstructor: Dr. ChangName : Sim, Wee Wee-Proposed Topic:"EconGrid: Economy Driven Resource Management and Scheduling for World-Wide Grid Computing"Scope
Wichita State - CS - 540
CS 540 Operating Systems Test 2 - Name: Date: Thursday, April 25 , 2002 (in class) Part 1: (40 points - 4 points for each problem) ( b ) 1. Which is not a CPU scheduling criterion? (a) CPU utilization (b) Burst time (c) Throughput (d) Response time (
Wichita State - CS - 742
CS 742 - Computer Communication Networks Fall 2003 Course Syllabus Time and Place: M,W 3:10 - 4:20 PM (Class), 4:20 - 5:00 PM (Lab), 127 Jabara Hall Textbook: Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall PTR; 4th edition, 200
Wichita State - CS - 742
CS 742 Computer Communication Networks Final Exam - Name: Fall 2003 Part 1: (75 points - 3 points for each problem) ( A ) 1. WAP is a (A) protocol (B) hardware (C) software (D) network architecture ( C ) 2. An Ethernet link is working at 40 Megabaud.
Wichita State - CS - 742
CS 742 Computer Communication Networks Exam 1 - Name: Wednesday, October 13, 2004 Part 1: (33 points - 3 points for each problem) ( A ) 1. SSH is a (A) software (B) protocol (C) hardware (D) network architecture B ( D ) 2. The known port for the doma
Wichita State - RE - 611
Homework 3 Effective Borrowing Costs and Annual Percentage Rate Dr. Stanley D. Longhofer 1) Consider a $75,000, 30-year, fixed-rate mortgage with 7.75 percent interest and monthly payments. The lender requires that the borrower pay two points to ori
University of Illinois, Urbana Champaign - MATH - 0349
1Periodic cyclic homology of certain nuclear algebrasJacek BRODZKI a, Roger PLYMENb a School of Mathematical Sciences, University of Exeter, North Park Road, Exeter, EX4 4QE, U.K E-mail: brodzki@maths.ex.ac.uk b Department of Mathematics, Univers
University of Illinois, Urbana Champaign - DKOUKOU - 2
A RECIPROCITY THEOREM FOR CERTAIN HYPERGEOMETRIC SERIESBRUCE C. BERNDT1, and DIMITRIS KOUKOULOPOULOSAbstract. A reciprocity theorem for certain innite series of gamma functions found in Chapter 14 of Ramanujans second notebook is proved and genera
University of Illinois, Urbana Champaign - MATH - 0103
Deligne periods of mixed motives, K-theory and the entropy of certain Z n-actions Zby Christopher Deninger0Introduction| For a coherent sheaf M on the split n-torus Gn = spec A[Z n ] over a commutaZ m,Ative ring A there is a natural Z n -act
University of Illinois, Urbana Champaign - MATH - 0309
ON THE VANISHING OF CERTAIN K-THEORY NIL-GROUPSHANS JRGEN MUNKHOLM1 AND STRATOS PRASSIDIS1,2,3 Abstract. Let i , i = 0, 1, be two groups containing Cp , the cyclic group of prime order p, as a subgroup of index 2. Let = 0 Cp 1 . We show that the Ni
University of Illinois, Urbana Champaign - MATH - 0174
ELEMENTARY ABELIAN 2-PRIMARY PARTS OF K2 O AND RELATED GRAPHS IN CERTAIN QUADRATIC NUMBER FIELDSA. Vazzana1. Introduction. Let d = p1 pk be a product of rational primes congruent to 1 mod 8, let E = Q[ d], and let C(E) be the class group of E
University of Illinois, Urbana Champaign - CS - 477
Formal software development methodsMadhusudan Parthasarathy (madhu) Lecture #1: IntroductionMotivationSoftware validity is one of the main open problems in computer science.Bugs have been there forever. You cant wish them away (like pointer-ari
University of Illinois, Urbana Champaign - CS - 525
Distributed Computing manuscript No. (will be inserted by the editor)The Design of Novel Distributed Protocols from Dierential EquationsIndranil Gupta, Mahvesh Nagda, Christo Frank Devaraj {indy,nagda,devaraj}@cs.uiuc.eduDept. of Computer Science
University of Illinois, Urbana Champaign - CS - 04
Research Track PaperEfficient Closed Pattern Mining in the Presence of Tough Block ConstraintsKrishna Gade, Jianyong Wang, George KarypisComputer Science Department, Digital Technology Center, & Army HPC Research Center University of Minnesota,
University of Illinois, Urbana Champaign - CS - 591
Research Track PaperEfficient Closed Pattern Mining in the Presence of Tough Block ConstraintsKrishna Gade, Jianyong Wang, George KarypisComputer Science Department, Digital Technology Center, & Army HPC Research Center University of Minnesota,
University of Illinois, Urbana Champaign - CS - 05
Guaranteeing Correctness and Availability in P2P Range IndicesPrakash Linga, Adina Crainiceanu, Johannes Gehrke, Jayavel ShanmugasudaramCornell University Ithaca, New York{linga,adina, johannes, jai}@cs.cornell.educatastrophic if a search occas
University of Illinois, Urbana Champaign - CS - 591
Guaranteeing Correctness and Availability in P2P Range IndicesPrakash Linga, Adina Crainiceanu, Johannes Gehrke, Jayavel ShanmugasudaramCornell University Ithaca, New York{linga,adina, johannes, jai}@cs.cornell.educatastrophic if a search occas
University of Illinois, Urbana Champaign - CS - 498
Dynamic Programming: Sequence alignmentCS 498 SS Saurabh SinhaDNA Sequence Comparison: First Success Story Finding sequence similarities with genes of known function is a common approach to infer a newly sequenced genes function In 1984 Russell
University of Illinois, Urbana Champaign - CS - 598
Autonomous Systems Routing in the InternetWhat is an AS? A set of routers under a single technical administration Based on notion of autonomy of control Intradomain Routing (within an AS) RoutingPerformed using domain-specific algorith
University of Illinois, Urbana Champaign - CS - 498
Microarrays and CancerSegal et al. CS 498 SS Saurabh SinhaGenomics and pathology Genomics provides high-throughput measurements of molecular mechanisms Microarrays, ChIP-on-chip, etc. Genomics may provide the molecular underpinnings of patholo
University of Illinois, Urbana Champaign - CS - 498
Multiple Sequence AlignmentMultiple Alignment versus Pairwise Alignment Up until now we have only tried to align two sequences. What about more than two? And what for? A faint similarity between two sequences becomes signicant if present in many
University of Illinois, Urbana Champaign - CS - 498
CS 498 Expressive Grammars for Natural Language Processing: Theory and applicationsLecture 7Julia Hockenmaier juliahmr@cs.uiuc.edu 3324 Siebel CenterWhat weve done so far Context-free grammars Beyond CFGs: long-range dependencies The Penn Tre
Wichita State - RE - 611
RE 611 / Fin 611 Real Estate FinanceComparing Financial Alternatives Sample Quiz Questions Dr. Stanley D. Longhofer Multiple-choice Questions _ 1. Sylvesters existing mortgage has a nominal interest rate of 7.25 percent and his effective borrowing
Wichita State - RE - 611
RE 611 / Fin 611 Real Estate FinanceEffective Borrowing Costs and the APR / Charging Fees to Achieve Yield Practice Problems Solutions Dr. Stanley D. Longhofer Effective Borrowing Costs and the APR 1) Highpoint Mortgage has offered you a $95,000,
Wichita State - RE - 611
RE 611 / Fin 611 Real Estate FinanceSpring 2004 Final Exam Version A Suggested Solutions Dr. Stanley D. Longhofer Tu-Th 11:00-12:15 You have one hour and fifty minutes to complete this exam. Ive tried to eliminate any ambiguity about how to interp
University of Illinois, Urbana Champaign - CROPSCI - 270
University of Illinois Introduction to Applied EntomologyLecture 9: HymenopteraSpalangia nigroaenea, a parasite in the family Pteromalidae, depositing an egg into a house fly puparium. Photo by David Voegtlin.Hymenoptera: Including the sawflies
University of Illinois, Urbana Champaign - CROPSCI - 270
Study Guide for Exam 1 Nothing on the exam . you might, however, review the information on course requirements and grading . the importance of attendance, relative contributions of quiz scores, exam scores, collection, etc. Know what characteristics
University of Illinois, Urbana Champaign - CROPSCI - 270
University of Illinois Introduction to Applied EntomologyLecture 8: Thysanoptera through NeuropteraLecture 8 spans the following orders: Thysanoptera: the thrips Coleoptera: the beetles Neuroptera: alderflies, dobsonflies, fishflies, snakeflie
University of Illinois, Urbana Champaign - CROPSCI - 270
University of Illinois Introduction to Applied EntomologyLecture 11: Siphonaptera and DipteraSiphonaptera: The fleasCat flea adult (left) and larva (right) Siphon = tube; aptera = wingless Web sites to check: Siphonaptera (at The Wonderful World
University of Illinois, Urbana Champaign - CROPSCI - 270
Lab 12: Pests of Humans, Animals, and PropertyThe insects covered in this lab are Medical and Veterinary Pests: ticks, including the blacklegged tick, Ixodes scapularis Say (Acari: Ixodidae) mosquitoes (Diptera: Culicidae) cat flea, Ctenocephalid
University of Illinois, Urbana Champaign - CROPSCI - 270
University of Illinois CPSC 270, Introduction to Applied Entomology Fall, 2008Lecture 7 The Insect Orders - IIIsoptera > Homoptera Lecture 7 spans the following orders: Isoptera - the termites Dermaptera - the earwigs Embioptera* - the we
University of Illinois, Urbana Champaign - ECE - 329
VECTOR IDENTITIES4 Notation: f, g, are scalars; A, B, etc., are vectors; T is a tensor; I is the unit dyad. (1) A B C = A B C = B C A = B C A = C A B = C A B (2) A (B C) = (C B) A = (A C)B (A B)C (3) A (B C) + B (C A) + C (A
University of Illinois, Urbana Champaign - M - 408
University of Illinois, Urbana Champaign - M - 202
Cello melodic/harmonic pedal (color) - sounding pitches * length of 5 notes&#b0 4 2 A subset of WT(0,2) [mode 1]610&.Rhythmic pedal (talea) *15 values appears 7 times (with the beginning of an 8th time) * The color above a