UsingMIS_chapter6 - Exam...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Exam Name___________________________________ TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) A computer network is a group of connected computers that communicate with each other. 1) 2) A computer network between Seattle and Philadelphia is made possible through a LAN. 2) 3) The computer network at the four-block campus of Seattle Grace Hospital would be a LAN. 3) 4) A university would employ a WAN to connect its campuses in two cities. 4) 5) With a WAN, an organization can place communications lines wherever it wants, because all lines reside on its premises. 5) 6) An intranet is a private internet that is used exclusively within an organization. 6) 7) UTP cable contains sets of wires that are twisted together to improve signal quality. 7) 8) If the LAN connection carries a lot of traffic, UTP cables may be used instead of optical fiber cables. 8) 9) Wireless devices communicate to each other via the switch on the LAN device. 9) 10) Wired devices communicate to each other via the access point on the LAN device. 10) 11) If the wired devices need to connect to wireless ones, they do so via the switch, then to the access point, and then to the wireless devices. 11) 12) For two devices to communicate, they must use the same protocol. 12) 13) Wired LAN connections use a protocol standard called Ethernet to communicate. 13) 14) Wired LAN connections use the IEEE 802.3 protocol, while wireless LAN connections use the IEEE 802.11 protocol. 14) 15) NICs which support 10/100/1000 allow for transmission at a rate of 10, 100, or 1,000 Mbps. 15) 16) The abbreviations k, M, and G have the same meaning for computer memory as they have for communication speeds. 16) 17) Communications speeds are expressed in bytes, whereas memory sizes are expressed in bits. 17) 18) Bluetooth is a wireless protocol designed for transmitting data over long distances, replacing cables. 18) 19) A modem converts digital data into analog signals and vice versa. 19) 1 20) DSL lines that have different upload and download speeds are called ADSL. 20) 21) Most homes and small businesses can use ADSL because they transmit as much data as they receive. 21) 22) Larger businesses, in which the transmitting speeds are the same as the receiving speeds, need SDSL lines. 22) 23) Symmetrical digital subscriber lines offer the same fast speed for uploads and downloads. 23) 24) For users, the speed of networks using a cable modem varies depending on how other users are using the network. 24) 25) Cable modems modulate in such a way that their signals do not interfere with TV signals. 25) 26) Cable modems and DSL modems use the same protocols. 26) 27) Broadband lines have speeds in excess of 256 kbps. 27) 28) Narrowband transmission speeds typically do not exceed 56 kbps. 28) 29) FTP is the protocol used between browsers and Web servers. 29) 30) HTTPS is the secure version of HTTP. 30) 31) When using HTTPS, you should assume that all of your communication is open and that whatever you are typing or saying could be known by anyone else. 31) 32) HTTP has a secure version, but FTP does not. 32) 33) When you send a file using FTP, you are using the Web, but not the Internet. 33) 34) A packet is a piece of a message that is handled by programs that implement IP. 34) 35) A router is a special-purpose computer that moves packet traffic according to the rules of the IP protocol. 35) 36) TCP provides internet routing and IP provides reliable internet transport. 36) 37) ICANN controls the assignment of private IP addresses. 37) 38) When a computer accesses a private Web server within the LAN, it uses a private IP address. 38) 39) A domain name is a worldwide-unique name that is affiliated with a public IP address. 39) 40) An IP address can have only one domain name affiliated to it. 40) 2 41) The owner of a domain name can change the affiliated IP addresses at its discretion. 41) 42) Web servers run on a server-tier computer and manage HTTP traffic by sending and receiving Web pages to and from clients. 42) 43) HTML is the most common language for defining the structure and layout of Web pages. 43) 44) VPN communications are not secure because they are transmitted over the public Internet. 44) 45) VPNs enable remote access, both by employees and by any others who have been registered with the VPN server. 45) 46) VPN uses software encryption to secure data. 46) 47) Firewalls can only filter inbound traffic; they have no effect on outbound traffic. 47) 48) Packet-filtering firewalls are the most sophisticated type of firewall. 48) 49) Firewalls disallow traffic from illegitimate sites, but not legitimate sites. 49) 50) The ACL encodes the rules which contain the firewall's permitted and forbidden addresses. 50) MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 51) A computer ________ is a collection of computers that communicate with one another over transmission lines. A) network B) server C) application D) database 51) 52) Computers that reside in different geographic locations are connected using a(n) ________. A) XML B) LAN C) URL D) WAN 52) 53) Which of the following is the distinguishing feature of local area networks? A) bandwidth B) hardware requirement C) single location D) number of computers 53) 54) Which of the following statements is true about WANs? A) All the computers are located on property of the organization that operates the WAN. B) They are private internet that are used exclusively within an organization. C) They connect computers that reside in a single geographic location. D) They connect computers located in more than one geographic location. 54) 55) Private networks of networks are called ________. A) wide area networks C) local area networks 55) B) internets D) ethernets 56) A private internet that is that is used exclusively within an organization is called a(n) ________. A) router B) ethernet C) intranet D) server 3 56) 57) A(n) ________ is a set of rules that two communicating devices follow. A) codec B) attribute C) URL D) protocol 57) 58) To provide seamless flow of data across networks that comprise an Internet, an elaborate scheme called a(n) ________ is used. A) ADSL B) ethernet C) ISDN D) layered protocol 58) 59) The various computers and printers on a LAN are connected to a ________,which is a special-purpose computer that receives and transmits wired traffic on the LAN. A) codec B) protocol layer C) port D) switch 59) 60) The hardware component that connects a printer's circuitry to the network is called a(n) ________. A) NIC B) switch C) router D) port 60) 61) An NIC built into the computer's circuitry is called a(n) ________. A) layered NIC B) onboard NIC C) second-tier NIC D) port NIC 61) 62) The UTP cables are replaced by optical fiber cables when ________. A) the NIC cards are removed or replaced in the network B) the computers in the network have onboard NICs C) the networks use intranets D) the connection carries a lot of traffic 62) 63) Which of the following statements is true about UTP cables? A) They can carry less traffic than optical fiber cables. B) They carry signals in the form of light rays. C) They offer higher speeds than optical fiber cables. D) They have a glass core that reflects signals. 63) 64) For a printer or laptop to connect to a wireless LAN, it must have a(n) ________. A) ONIC B) UTP C) WNIC D) DSL 64) 65) The ________ is the component of a LAN device that processes wireless traffic and communicates with the wired switch. A) server B) access point C) packet D) router 65) 66) Which of the following statements is true about IEEE 802.3? A) It is the network protocol for Bluetooth. B) It is the most popular protocol for wired LAN connections. C) It is a network protocol for wireless LAN connections. D) It is the universal standard protocol for onboard NICs. 66) 67) The IEEE 802.3 protocol standard is also known as ________. A) HTTP B) Ethernet C) TCP/IP D) Bluetooth 68) Which of the following statements is true about the IEEE 802.11 protocol? A) It cannot be processed by access points. B) It can be used by WNICs. C) It is used for wired LAN connections. D) It is also known as Ethernet. 4 67) 68) 69) Communications speeds are measured in ________. A) bits B) packets C) hertz D) bytes 70) IEEE 802.11g protocol allows speeds of up to ________. A) 27 Mbps B) 99 Mbps C) 54 Mbps D) 10 Mbps 71) Wireless devices connect to a wireless LAN using a(n) ________. A) routing table B) root server C) access point D) switch 72) ________ is a wireless protocol used to communicate over short distances. A) Bluetooth B) Ethernet C) IEEE 802.3 D) Firewire 69) 70) 71) 72) 73) Which of the following statements about LAN protocols is true? A) The access point uses the 802.3 and 802.11 standards. B) The IEEE 802.11 protocol is also called Ethernet. C) WNICs operate on the 802.3 protocol and communicate with the switch. D) The switch operates on the 802.11 standard. 73) 74) Which of the following statements is true about access points? A) It sends messages to NICs using the 802.11 protocol. B) It communicates with the switch using the 802.11 protocol. C) It sends and receives wireless traffic using the 802.11 protocol. D) It communicates with WNICs using both the 802.3 and 802.11 protocols. 74) 75) Which of the following is a function of an ISP? A) It connects computers within a LAN. B) It describes how messages are to be packaged and processed for wired transmission over the LAN. C) It transmits data over short distances, replacing cables. D) It pays for the Internet on behalf of users. 75) 76) A ________ must be used to convert an analog signal to a digital one when trying to transmit data over a typical phone line. A) tunnel B) DSL C) modem D) fiber optic switch 76) 77) Which of the following is true of DSL modems? A) DSL modems use the same protocols as cable modems. B) The signals of DSL modems do not interfere with voice telephone service. C) DSL services and speed are standardized across applications. D) DSL modems use cable lines for data transmission. 77) 78) ________ transmission is good for homes and small businesses because they receive more data than they transmit. A) ADSL B) DSL C) UTP D) SDSL 78) 79) If a business needs the same receiving and transmitting speeds, it should select ________ modems. A) UTP B) SDSL C) ADSL D) DSL 79) 5 80) Which of the following statements is true for the use of DSL transmission? A) Homes use ADSL as they receive more data than they transmit. B) ADSL is used if the transmission and reception speeds are the same. C) Large businesses use ADSL as they require the same speeds in both directions. D) SDSL lines offer faster receiving speeds and slower transmitting speeds. 80) 81) What is the performance guarantee offered by SDSL connections? A) They offer a data backup and recovery service. B) They offer higher receiving and lower transmitting speeds. C) They offer the same fast speed in both directions. D) They provide dedicated lines for data transmission. 81) 82) ________ modems modulate in such a way that they do not interfere with TV signals, even though they use the same lines. A) Leased line B) DSL C) Dial-up D) Cable 82) 83) Which of the following is true about cable modems? A) Performance is stable in spite of the number of users sending and receiving data. B) Cable modems generally use the same protocols as DSL modems. C) Cable modems provide high-speed data transmission using telephone cables. D) The signals from cable modems do not interfere with TV signals. 83) 84) Broadband communications have transmission speeds in excess of ________. A) 1024 kbps B) 1.2 Mbps C) 512 kbps D) 256 kbps 84) 85) ________ lines typically have transmission speeds of less than 56 kbps. A) Broadband B) Narrowband C) Wireless D) Optical fiber 85) 86) The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture. A) VOIP B) TCP/IP C) FTP D) ICANN 86) 87) The IEEE 802.3 and 802.11 protocols ________. A) operate at the application layer of TCP/IP architecture B) operate at the transport layer of TCP/IP architecture C) are protocols for browsers and Web servers. D) concern data transmission within a network 87) 88) Which of the following statements is true for the TCP/IP protocol architecture? A) The IEEE 802.3 and 802.11 LAN protocols operate at the top two layers. B) HTTP is the most important protocol in the transport layer. C) The topmost layer concerns protocols for applications like browsers and Web servers. D) The TCP protocol is used on the application layer of the TCP/IP protocol architecture. 88) 89) The application layer of the TCP/IP protocol architecture ________. A) uses the HTTP and HTTPS protocols B) generally uses the TCP protocol C) provides internet routing using the IP protocol D) uses the IEEE 802.3 and 802.11 LAN protocols 89) 6 90) In which of the following cases is a user using the Internet, but not the Web? A) while using a browser such as Safari or Google Chrome B) while sending sensitive data like credit card numbers using HTTPS C) while emailing or text messaging using HTTP D) while sending a file using the FTP 91) Which of the following protocols guarantees a secure transmission? A) SMTP B) FTP C) HTTP 90) D) HTTPS 91) 92) The ________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport. A) IP B) HTTP C) TCP D) SMTP 92) 93) The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________. A) IP B) SMTP C) TCP D) HTTP 93) 94) A(n) ________ is a piece of a message that is handled by programs that implement IP. A) packet B) attribute C) router D) switch 94) 95) A ________ is a special-purpose computer that moves packet traffic according to the rules of the IP protocol. A) firewire B) router C) modem D) switch 95) 96) Private IP addresses ________. A) are assigned by ICANN C) identify a device on the Internet 96) B) identify a device within a LAN D) must be unique across the world 97) Which of the following is true for private IP addresses? A) Traffic does not have to be rerouted whenever a computer is moved. B) Using private IP addresses does not conserve public IP addresses. C) Every computer has to register a public IP address with ICANN. D) Private IP addresses cannot be reused by multiple users. 97) 98) A ________ is a worldwide-unique identification label that is affiliated with a public IP address. A) domain name B) protocol C) tag D) URL 98) 99) ________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients. A) Routers B) Web servers C) Domains D) Switches 99) 100) A(n) ________ contains the URL of the Web page to find when the user clicks it. A) attribute B) domain C) IP address D) hyperlink 100) 101) The attribute for a hyperlink is ________. A) style B) text 101) C) title D) href 102) A(n) ________ uses the Internet or other internet to create the appearance of private, point-to-point connections. A) ATM B) VPN C) SMTP D) Ethernet 7 102) 103) The connection between the VPN client and VPN server is called a(n) ________. A) tunnel B) access point C) data highway D) client-server interface 103) 104) Which of the following is true about virtual private networks? A) VPNs do not allow remote access for users. B) As they are transmitted over the public Internet, VPN transmissions are not secure. C) They create public, point-to-point connections between users. D) VPN software encrypts messages to ensure secure transmissions. 104) 105) ________ communications are secure, even though they are transmitted over the Internet. A) FTP B) DSL C) ATM D) VPN 105) 106) A ________ is a computing device that prevents unauthorized network access. A) firewall B) modem C) switch D) router 106) 107) A(n) ________ firewall examines each part of the message and decides whether it will let that part pass through to the network. A) perimeter B) ACL C) internal D) packet-filtering 107) 108) A firewall has a(n) ________, which encodes the rules stating which addresses are to be allowed and which are to be prohibited. A) digital subscriber list B) moderator C) access control list D) internet protocol 108) 109) ________ firewalls are the simplest type of firewall. A) Perimeter B) Circuit-level 109) C) Packet-filtering 110) Packet-filtering firewalls perform all of the following except ________. A) filter outbound traffic B) disallow traffic from particular sites C) block any address that management chooses D) encrypt data for transmission ESSAY. Write your answer in the space provided or on a separate sheet of paper. 111) What is a computer network? Describe the various networks. 112) What are the components of a LAN? 113) Describe the major protocols of a LAN. 114) List the functions of an ISP. 115) What is a modem? Briefly describe the modem types. 116) Explain the TCP/IP protocol architecture. 8 D) ACL 110) 117) List some functions of a LAN device. 118) Describe the three-tier architecture for web appilcations like e-commerce. 119) What is a VPN? Explain how VPNs ensure the security of transmissions. 120) Briefly explain a firewall and list the types of firewalls. 9 ...
View Full Document

This note was uploaded on 01/13/2012 for the course BCIS 3610 taught by Professor Sherry during the Spring '11 term at University of Texas at Austin.

Ask a homework question - tutors are online