Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
LECTURER:
Phil Roy
TIME:
READING TIME:
Ten Minutes
NUMBER OF QUESTIONS:
INSTRUCTIONS TO CANDIDATES:
1.
Enter your name, student number and signature at the bottom of this page.
2.
This is a closed book examination, therefore no written material, reference books or notes will be permitted into
the examination room.
3.
4.
Mark your answers to the multiple choice questions, Part A, on the general purpose answer sheet.
5.
Answers to Part B and Part C are to be written in the examination answer booklets provided
6.
There are 100 marks in total. Part A 40 marks, Part B 25 marks, Part C 35 marks,
INSTRUCTIONS TO INVIGILATORS:
1.
Page 1 of 14
STUDENT SIGNATURE:..
Transport
Presentation
Application
Session
99%
90%
80%
70%
3. Which term describes the process where data is packaged with necessary protocol
information as it passes through layers of the OSI reference model?
a.
b.
c.
d.
Wrapping
Encapsulation
Encryption
Protocolisation
4. The sharing of a medium and its link by two or more devices is called
a.
b.
c.
d.
Modulation
Encoding
Line discipline
Multiplexing
5. What component of an unshielded twisted pair cable reduces its susceptibility to crosstalk?
a.
b.
c.
d.
Page 2 of 14
6. The addition of unwanted electromagnetic energy onto a cable between transmitter and
receiver is:
a.
b.
c.
d.
Attenuation
Noise
Amplitude
Spectrum
7. A network style where the application and presentation logic resides on the client and the
data storage logic resides on a server is called:
a.
b.
c.
d.
Client/Server
Client Based
Host Base
Peer-to-Peer
8. When a bridge receives a packet that has a destination MAC address located on the same
segment from which it came, the packet is:
a.
b.
c.
d.
Forwarded
Blocked
Repeated on all segments
All of the above
9. ISDN basic rate interface (BRI) multiplexes _______________ separate data channels.
a.
b.
c.
d.
One
Two
Three
Four
IEEE 802.2
IEEE 802.3
IEEE 802.4
IEEE 802.5
Page 3 of 14
Circuit-switched
Packet-switched
Large
Heavily loaded
8 bits
16 bits
32 bits
48 bits
14. The concept that describes the merger of previously distinct telephony and information
technologies and markets is called:
a.
b.
c.
d.
e.
Unification
Bundling
Outsourcing
Merger
Convergence
16. Which of the following is the most commonly used standard for computer communications?
a.
b.
c.
d.
e.
SLA
TCP/IP
ISO
USD
DLINK
17. Which of the following does not represent a digital form of information?
a. An MP3 player
b. A Compact Disk containing music recordings
c. A watch that displays date as DD:MM:YYYY
ITC242 Spring Examination 2005
Page 4 of 14
Byte
Nibble
Pixel
Bit
Octet
19. The time interval between when a user presses a key and when the result of that action
arrives at his or her workstation is called the:
a.
b.
c.
d.
e.
Response time
Turn-around time
Think time
Delay time
Transmission time
Telnet package
Email system
World-wide-web
FTP package
Domain resource locator
22. Some of the problems of using IP numbers for addressing hosts in the Internet are resolved
using:
a.
b.
c.
d.
e.
Page 5 of 14
Presentation layer
Session layer
TCP Layer
Data link layer
Physical layer
Application layer
Connection layer
Transport layer
Internet layer
Network access layer
26. A widely used extension to the RFC 822 framework that expands what can be sent via email
is called
a.
b.
c.
d.
e.
MIME
ASCII
VoIP
SMTP
IMAP
27. SMTP is not concerned with the format or content of messages, except for two exceptions.
Which of the following is one of these exceptions?
a.
b.
c.
d.
Page 6 of 14
d. Access-based processing
e. Cooperative processing
29. Which of the following describes class C networks?
a.
b.
c.
d.
30. Which of the following LAN technologies has the highest capacity?
a.
b.
c.
d.
Ethernet
Fast Ethernet
Wireless LAN
Gigabit Ethernet
31. Which of the following is NOT one of the stated advantages of packet switching over circuit
switching?
a.
b.
c.
d.
Page 7 of 14
a.
b.
c.
d.
36. A carrier wave is modulated with 4 amplitudes and 4 phase changes. How many bits can be
represented with each signal change?
a.
b.
c.
d.
e.
1
2
3
4
5
37. Multiplexing technique where multiple users use distinct time slots such that the transmitted
bits are shared by all users is called:
a.
b.
c.
d.
e.
Plaintext
Ciphertext
Key
Encryption algorithm
Page 8 of 14
e. Facilities that enable the detection, isolation, and correction of abnormal operation of
the OSI environment
40. Which type of satellites orbit at an altitude of approximately 35,000 km, remain above the
same spot on the earths surface but suffer from significant propagation delay?
a.
b.
c.
d.
Page 9 of 14
Router
fast
SAN
IEEE 802.11a
bluetooth
Reliability
protocol
VoIP
asymmetric
Degradation
high speed
SMTP
gigabit
Bridge
intranet
TCP
management agent
symmetric
Synchronou
s
hub
WAP
IEEE 802.11g
availability
frame
transport
DHCP
SNMP
token ring
Parity
white
PDU
IDS
Physical
Extranet
attenuation
UDP
SIP
1) Thermal noise is uniformly distributed across the frequency spectrum and hence is often
referred to as ____white______ noise.
2) A ___protocol_____ is a set of semantic and syntactic rules that describe how to transmit
data, especially across a network.
3) A ____PDU_______ is a segment of data generated by a specific layer in a protocol stack;
usually consists of a block of data from a higher layer encapsulated by the next lower layer
with a header and trailer. It is passed to the corresponding layer on another device across a
network.
4) Layer 4 of the OSI reference model is the _____transport_____ layer. It provides reliable
transfer of data between end points.
5) _____SIP_____ is an application level control protocol for setting up, modifying and
terminating real time sessions between participants over an IP data network.
6) Internet telephony is also commonly referred to as _____VoIP_____.
7) __SMTP____ is the standard protocol for transferring mail between hosts in the TCP/IP
protocol suite.
8) ___Intranet___ is the term used to refer to the implementation of internet technologies
within a corporate organisation.
9) An ___extranet___ makes use of TCP/IP protocols and applications to provide access to
corporate resources to other companies, customers and suppliers located outside the
corporate network.
10) A layer 4 protocol that is part of the TCP/IP protocol architecture, ____UDP____ is a
connectionless unreliable protocol.
ITC242 Spring Examination 2005
Page 10 of 14
Page 11 of 14
IEEE 802.11a
Page 12 of 14
IEEE 802.11b
IEEE 802.11g
Answer
Frequency
IEEE 802.11a
5Ghz
54Mbps
IEEE 802.11b
2.4Ghz
11Mbps
IEEE 802.11g
2.4Ghz
54Mbps
6. Show all working and any assumptions for the following. Given a resolution of 320 pixels x
240 pixels, 1 byte of colour information per pixel and a transmission rate of 30 frames per
second:
a. Calculate the bandwidth necessary for this signal.
b. A 512MB flash drive after formatting has an actual capacity of 498MB (498,000,000 Bytes).
What length of transmission could be stored on the 512MB flash drive?
c. In addition to the 1 byte of colour, sixteen levels of intensity are to be added for each pixel.
What length of transmission could now be stored on the 512MB flash drive?
Answer:
a. 320 x 240 x 8bits x 30fps = 18.4 Mbps
b. 498MB / (18.4Mbps / 8) = 216.5 secs = 3min 36.5 secs
c. 16 levels of intensity require an additional 4 bits per pixel.
498MB / (320 x 240 x 8 x 4 x 30fps)/8 = 498MB/9.2 = 54.13 secs
Page 13 of 14
7. Describe the three types of modulation shown as (a), (b) and (c) in the following diagram.
Answer:
Answer removed similar question in Assignment 2.
Page 14 of 14