Chapter 6: Data Communication: Delivering Information Anywhere and Anytime
Chapter 6: Data Communication: Delivering Information Anywhere and Anytime
Chapter 6: Data Communication: Delivering Information Anywhere and Anytime
MULTIPLE CHOICE
1. The amount of data that can be transferred from one point to another in one second is called ____.
a. bandwidth c. router
b. controller d. protocol
3. ____ cables are thick cables that can be used for both data and voice transmissions.
a. Conductive c. Coaxial
b. Broadcast d. Base
4. ____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light
path through wire cables.
a. Twisted-pair c. Coaxial
b. Copper line d. Fiber-optic
6. In ____ processing, each department has its own computer for performing processing tasks.
a. centralized c. distributed
b. decentralized d. modular
7. The ____ layer of the OSI model serves as the window through which applications access network
services.
a. Application c. Network
b. Presentation d. Data link
10. The ____ layer of the OSI model specifies the electrical connections between computers and the
transmission medium, and is primarily concerned with transmitting binary data, or bits over a
communication network
a. Application c. Physical
b. Transport d. Data link
11. Another name for a network interface card is a(n) ____.
a. Ethernet c. network card
b. adapter card d. local area network
14. In a bus topology, ____ are used at each end of the cable to absorb the signal.
a. emulators c. stoppers
b. terminators d. nodes
17. A ____ is a hardware device that allows several nodes to share one communication channel.
a. multiplexer c. router
b. controller d. front-end processor
18. The ____ topology is costly and difficult to maintain and expand.
a. star c. ring
b. mesh d. bus
19. The Transmission Control Protocol (TCP) operates at the OSI model’s ____ layer.
a. Data link c. Transport
b. Physical d. Network
20. The process of deciding which path the data takes on a network is called ____.
a. convergence c. roaming
b. divergence d. routing
22. A ____ router can build tables that identify addresses on each network.
a. pervasive c. dynamic
b. passive d. static
23. What is the first step in client/server communication?
a. The results are formatted and displayed.
b. The server receives the query.
c. The client accepts a request.
d. The user creates a query.
26. A ____ network is a network operating on a radio frequency (RF), consisting of radio cells, each
served by a fixed transmitter.
a. dynamic c. wireless area
b. mobile d. horizontal
27. ____ is using a cellular phone outside of a carrier’s limited service area.
a. Routing c. Roaming
b. Teleprocessing d. Surfing
28. In the context of the technologies developed to improve the efficiency and quality of digital
communications, ____ divide(s) each channel into six time slots.
a. Time Division Multiple Access (TDMA)
b. Transmission Control Protocol (TCP)
c. Mobile Telephone Switching Offices (MTSOs)
d. Code Division Multiple Access (CDMA)
29. Within the ____ technique for wireless security, a user’s computer and the AP use a master key to
negotiate for a key that will be used for a session.
a. Wired Equivalent Privacy c. Wi-Fi Protected Access
b. Service Set Identifier d. Wi-Fi Protected Access 2
30. In data communication, ____ refers to integrating voice, video, and data so that multimedia
information can be used for decision making.
a. spoofing c. telepresence
b. convergence d. teleprocessing