Chapter 6: Data Communication: Delivering Information Anywhere and Anytime

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

Chapter 6: Data Communication: Delivering Information Anywhere and Anytime

MULTIPLE CHOICE
1. The amount of data that can be transferred from one point to another in one second is called ____.
a. bandwidth c. router
b. controller d. protocol

2. In _____ data transmission, multiple pieces of data are sent simultaneously.


a. narrowband c. broadband
b. wide area d. modular

3. ____ cables are thick cables that can be used for both data and voice transmissions.
a. Conductive c. Coaxial
b. Broadcast d. Base

4. ____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light
path through wire cables.
a. Twisted-pair c. Coaxial
b. Copper line d. Fiber-optic

5. ____ media operate on line-of-sight.


a. Terrestrial microwave c. Coaxial
b. Multipoint d. Fiber optic

6. In ____ processing, each department has its own computer for performing processing tasks.
a. centralized c. distributed
b. decentralized d. modular

7. The ____ layer of the OSI model serves as the window through which applications access network
services.
a. Application c. Network
b. Presentation d. Data link

8. The _____ layer of the OSI model formats message packets.


a. Session c. Presentation
b. Application d. Network
9. The ____ layer of the OSI model generates the receiver’s address and ensures the integrity of
messages by making sure packets are delivered without error, in sequence, and with no loss or
duplication.
a. Application c. Session
b. Presentation d. Transport

10. The ____ layer of the OSI model specifies the electrical connections between computers and the
transmission medium, and is primarily concerned with transmitting binary data, or bits over a
communication network
a. Application c. Physical
b. Transport d. Data link
11. Another name for a network interface card is a(n) ____.
a. Ethernet c. network card
b. adapter card d. local area network

12. LANs are used most often to ____.


a. integrate services, such as e-mail and file sharing
b. link computers that are geographically far apart
c. provide Internet service to cellular phones including smartphones
d. provide wireless networking services

13. A network ____ represents a network’s physical layout.


a. hierarchy c. protocol
b. model d. topology

14. In a bus topology, ____ are used at each end of the cable to absorb the signal.
a. emulators c. stoppers
b. terminators d. nodes

15. A hierarchical topology is also called a ____ topology.


a. layered c. tree
b. mixed d. vertical

16. Traditional mainframe networks use a ____ topology.


a. ring c. mesh
b. star d. hierarchical

17. A ____ is a hardware device that allows several nodes to share one communication channel.
a. multiplexer c. router
b. controller d. front-end processor

18. The ____ topology is costly and difficult to maintain and expand.
a. star c. ring
b. mesh d. bus

19. The Transmission Control Protocol (TCP) operates at the OSI model’s ____ layer.
a. Data link c. Transport
b. Physical d. Network

20. The process of deciding which path the data takes on a network is called ____.
a. convergence c. roaming
b. divergence d. routing

21. A routing table lists ____.


a. nodes on a network
b. the IP address of the router
c. the protocols that each node understands
d. the packets to be sent

22. A ____ router can build tables that identify addresses on each network.
a. pervasive c. dynamic
b. passive d. static
23. What is the first step in client/server communication?
a. The results are formatted and displayed.
b. The server receives the query.
c. The client accepts a request.
d. The user creates a query.

24. ____ scaling refers to adding more workstations (clients).


a. Static c. Vertical
b. Dynamic d. Horizontal

25. The most common n-tier architecture involves ____ tiers.


a. two c. four
b. three d. five

26. A ____ network is a network operating on a radio frequency (RF), consisting of radio cells, each
served by a fixed transmitter.
a. dynamic c. wireless area
b. mobile d. horizontal

27. ____ is using a cellular phone outside of a carrier’s limited service area.
a. Routing c. Roaming
b. Teleprocessing d. Surfing

28. In the context of the technologies developed to improve the efficiency and quality of digital
communications, ____ divide(s) each channel into six time slots.
a. Time Division Multiple Access (TDMA)
b. Transmission Control Protocol (TCP)
c. Mobile Telephone Switching Offices (MTSOs)
d. Code Division Multiple Access (CDMA)

29. Within the ____ technique for wireless security, a user’s computer and the AP use a master key to
negotiate for a key that will be used for a session.
a. Wired Equivalent Privacy c. Wi-Fi Protected Access
b. Service Set Identifier d. Wi-Fi Protected Access 2

30. In data communication, ____ refers to integrating voice, video, and data so that multimedia
information can be used for decision making.
a. spoofing c. telepresence
b. convergence d. teleprocessing

You might also like