Sei sulla pagina 1di 7

Chapter 1

1. The _______ is the physical path by which a message travels from sender to receiver. a. protocol b. message c. transmission medium d. sender 2. Twisted-pair wire, coaxial cable, and fiber-optic cable are all types of _______. a. protocols b. messages c. media d. data 3. A _______ is a set of rules governing data communication between two devices. a. protocol b. message c. medium d. sender 4. A _______ is a set of devices (nodes) connected by media links. a. message b. protocol c. network d. distributor 5. The _______ is the information (data) to be communicated. a. protocol b. message c. medium d. sender

6. The message can consist of _______. a. text b. images c. video d. any of the above 7. The _______ is the device that sends the message.

a. protocol b. network c. sender d. medium 8. The source can be a _______. a. computer b. telephone handset c. video camera d. any of the above 9. The receiver can be a _______. a. computer b. telephone handset c. video camera d. any of the above 10. Transit time and response time measure the _______ of a network. a. performance b. reliability c. security d. longevity 11. The number of users on a network has the greatest impact on the network's _______. a. performance b. reliability c. security d. none of the above 12. Network failure is primarily a _______ issue. a. performance b. reliability c. security d. none of the above 13. _______ is a network reliability issue. a. The number of users b. The type of transmission medium c. The frequency of failure d. Unauthorized access 14. The time it takes for a network to recover after a failure is a network _______ issue. a. performance b. reliability

c. security d. none of the above 15. _______ is a network reliability issue. a. Catastrophe b. The number of users c. The type of transmission medium d. Unauthorized access 16. Unauthorized access is a network _______ issue. a. performance b. reliability c. security d. none of the above

17. A virus is a network _______ issue. a. performance b. reliability c. security d. none of the above 18. Encryption techniques improve a network's _______. a. performance b. reliability c. security d. longevity 19. A _______ is illicitly introduced code that damages a network device. a. protocol b. virus c. catastrophe d. medium 20. Passwords are used to improve the _______ of a network. a. performance b. reliability c. security d. longevity 21. Unauthorized access and viruses are issues dealing with network _______. a. performance b. reliability c. security d. none of the above

22. Which of the following are network reliability issues? a. frequency of failure b. recovery time after a failure c. catastrophe d. all of the above 23. When a hacker penetrates a network, this is a network _______ issue. a. performance b. reliability c. security d. none of the above 24. When a server goes down, this is a network _______ issue. a. performance b. reliability c. security d. none of the above 25. When an earthquake severs a fiber-optic cable, this is a network _______ issue. a. performance b. reliability c. security d. none of the above 26. When a network upgrades to a transmission medium with a data rate that is 100 times faster, this improves the _______ of the network. a. performance b. reliability c. security d. none of the above 27. A company doubles the number of nodes on its network. The greatest impact will be on the _______ of the network a. performance b. reliability c. security d. none of the above

28. A company changes its network configuration so that only one router instead of two can access the Internet. The greatest impact will be on the _______ of the network.

a. performance b. reliability c. security d. none of the above 29. A company buys a computer to serve as a backup to its main server. This will mainly affect the _______ of the network. a. performance b. reliability c. security d. none of the above 30. A company requires its users to change passwords every month. This improves the _______ of the network. a. performance b. reliability c. security d. none of the above 31. A company requires each employee to power off his computer at the end of the day. This rule was implemented to make the network _______. a. perform better b. more reliable c. more secure d. more error-free 32. The key element of a protocol is _______. a. syntax b. semantics c. timing d. all of the above

33. _______ refers to the structure or format of the data, the order in which they are presented. a. Syntax b. Semantics c. Timing d. none of the above 34. _______ refers to the meaning of each section of bits. a. Syntax b. Semantics c. Timing d. none of the above

35. _______ refers to when data should be sent and how fast the data can be sent. a. Syntax b. Semantics c. Timing d. none of the above 36. A protocol that specifies that the receiver address occupy the first byte of the data packet differs in _______ from a protocol that specifies that the receiver address occupy the third byte of the data packet. a. syntax b. semantics c. timing d. all of the above 37. Proprietary and nonproprietary standards are both classified as _______ standards. a. de facto b. de jure c. a or b d. none of the above

38. A _______ standard has been legislated by an officially recognized body. a. de facto b. de jure c. a or b d. none of the above 39. A _______ standard has not been approved by an organized body but has been adopted as a standard through widespread use. a. de facto b. de jure c. a or b d. none of the above 40. A _______ standard is one originally invented by a commercial organization as a basis for the operation of its products. a. proprietary b. nonproprietary c. de jure d. a and b

41. A _______ standard is one originally developed by a group or committee that has passed it into the public domain. a. proprietary b. nonproprietary c. de jure d. a and b 42. A _______ standard is often referred to as a closed standard because it closes off communication between systems produced by different vendors. a. proprietary b. nonproprietary c. de jure d. a and b

Potrebbero piacerti anche