Deck 2: Protocol Architecture, tcpip, and

ملء الشاشة (f)
exit full mode
سؤال
It is not necessary for each host on a subnet to have an unique global internet address.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Secure Shell (SSH)enables the user and the remote server to authenticate each other.
سؤال
Distributed data communications can be said to involve three agents: applications,computers,and networks.
سؤال
TCP numbers the segments that it sends to a particular destination port sequentially.
سؤال
FTP provides a basic electronic mail transport facility.
سؤال
Procedures needed to allow data to traverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture.
سؤال
The primary function of a gateway is to relay data from one network to the other on its route from the source to the destination end system.
سؤال
The driving force behind the development of IP was the need for more addresses.
سؤال
In a ________ the modules are arranged in a vertical stack.Each layer in the stack performs a related subset of the functions required to communicate with another system.

A)protocol architecture
B)NSP
C)protocol data unit
D)frame relay
سؤال
Traffic on a network or internet can be divided into two broad categories: elastic and inelastic.
سؤال
Facsimile,computer aided design,publishing and medical imaging are all ________ based applications.

A)text
B)image
C)video
D)audio
سؤال
For most applications running as part of the TCP/IP protocol architecture,the transport layer protocol is TCP.
سؤال
The ________ protocol architecture is a result of protocol research and development conducted on the experimental packet switched network ARPANET.

A)internet
B)physical
C)host-to-host
D)network access
سؤال
The software used at the network access layer is not dependent on the type of network used because circuit switching,packet switching and local area networks all have the same standards.
سؤال
VoIP,streaming audio,and streaming video are not considered multimedia applications because each involves a single media type.
سؤال
The ________ layer contains the logic needed to support the various user applications.

A)internet
B)physical
C)transport
D)application
سؤال
Each protocol provides a set of rules for the exchange of data between systems.
سؤال
The key features of a protocol are: syntax,semantics and ________.

A)presentation
B)timing
C)network access
D)peer layering
سؤال
The OSI protocol architecture consists of five layers: physical, network access,internet,transport and application.
سؤال
In the application layer of TCP/IP,for each different type of application,a separate module is needed that is peculiar to that application.
سؤال
The primitive issued by a service provider to either indicate that a procedure has been invoked by the peer service user on the connection and to provide the associated parameters or notify the service user of a provider initiated action is ________.

A)request
B)confirm
C)indication
D)response
سؤال
Traffic that can adjust to changes in delay and throughput across an internet and still meet the needs of its applications is ________ traffic.
سؤال
A ________ is the layered structure of hardware and software that supports the exchange of data between systems and supports distributed applications such as electronic mail and file transfer.
سؤال
________ provides a basic electronic mail transport facility.

A)TELNET
B)SNMP
C)UDP
D)SMTP
سؤال
Human-computer interaction involving text,graphics,voice and video is _____.

A)elastic traffic
B)multimedia
C)information delivery
D)media
سؤال
The most widely used protocol architecture is the ________ protocol suite,which consists of physical,network access,internet,transport,and application layers.
سؤال
In the TCP/IP protocol architecture,the ________ layer is concerned with specifying the characteristics of the transmission medium,the nature of the signals and the data rate.
سؤال
The addiction of control information to data is referred to as ________.
سؤال
Computer games,multiplayer network games,infotainment,and interactive audio visual productions are examples of applications in the _________ domain of multimedia systems.

A)information management
B)information publishing
C)telecommunication
D)entertainment
سؤال
The ________ layer is concerned with the exchange of data between an end system and the network to which it is attached.

A)internet
B)physical
C)host-to-host
D)network access
سؤال
The communication task can be organized into three relatively independent layers: network access layer,application layer,and ________ layer.

A)transport
B)media
C)physical
D)processing
سؤال
The header format for TCP is a minimum of ________ octets.

A)16
B)8
C)20
D)160
سؤال
Each application on a computer has an address that is unique within that computer known as ________ or ports that allow the transport layer to support multiple applications at each computer.
سؤال
If the initiator receives confirmation that the requested service has had the desired effect at the other end,it is referred to as a ________ service.
سؤال
________ provides a secure remote logon capability which enables a user at a terminal or personal computer to logon to a remote computer function as if directly connected to that computer.
سؤال
An example of ________ traffic is real time traffic such as voice and video.

A)delay variation
B)elastic
C)multimedia information
D)inelastic
سؤال
Information that can be entered via a keyboard and is directly readable and printable is ________.

A)audio
B)graphic
C)video
D)text
سؤال
Electronic mail,remote logon,network management and Web access are examples of ________ applications.

A)elastic
B)real-time
C)file transfer
D)transport
سؤال
Databases,information kiosks,hypertexts,electronic books,and multimedia expert systems are examples of multimedia ________ systems.
سؤال
The services between adjacent layers in a protocol architecture are expressed in terms of ________ and parameters.
سؤال
IPv6 includes ________ bit source and destination address fields.
سؤال
________ is when the sending TCP includes a code that is a function of the contents of the remainder of the segment.The receiving TCP performs the same calculation and compares the result with the incoming code.A discrepancy results if there has been some error in transmission.
سؤال
The standard network management protocol for TCP/IP networks is ________.
سؤال
In the TCP/IP architecture constituent networks are referred to as ________.
سؤال
The two commonly used transport level protocols used as part of the TCP/IP protocol suite are TCP and ________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Protocol Architecture, tcpip, and
1
It is not necessary for each host on a subnet to have an unique global internet address.
False
2
Secure Shell (SSH)enables the user and the remote server to authenticate each other.
True
3
Distributed data communications can be said to involve three agents: applications,computers,and networks.
True
4
TCP numbers the segments that it sends to a particular destination port sequentially.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
FTP provides a basic electronic mail transport facility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
Procedures needed to allow data to traverse multiple interconnected networks is found in the internet layer of the TCP/IP protocol architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
The primary function of a gateway is to relay data from one network to the other on its route from the source to the destination end system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
The driving force behind the development of IP was the need for more addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
In a ________ the modules are arranged in a vertical stack.Each layer in the stack performs a related subset of the functions required to communicate with another system.

A)protocol architecture
B)NSP
C)protocol data unit
D)frame relay
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
Traffic on a network or internet can be divided into two broad categories: elastic and inelastic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Facsimile,computer aided design,publishing and medical imaging are all ________ based applications.

A)text
B)image
C)video
D)audio
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
For most applications running as part of the TCP/IP protocol architecture,the transport layer protocol is TCP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ________ protocol architecture is a result of protocol research and development conducted on the experimental packet switched network ARPANET.

A)internet
B)physical
C)host-to-host
D)network access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
The software used at the network access layer is not dependent on the type of network used because circuit switching,packet switching and local area networks all have the same standards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
VoIP,streaming audio,and streaming video are not considered multimedia applications because each involves a single media type.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
The ________ layer contains the logic needed to support the various user applications.

A)internet
B)physical
C)transport
D)application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
Each protocol provides a set of rules for the exchange of data between systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
The key features of a protocol are: syntax,semantics and ________.

A)presentation
B)timing
C)network access
D)peer layering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
The OSI protocol architecture consists of five layers: physical, network access,internet,transport and application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
In the application layer of TCP/IP,for each different type of application,a separate module is needed that is peculiar to that application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
The primitive issued by a service provider to either indicate that a procedure has been invoked by the peer service user on the connection and to provide the associated parameters or notify the service user of a provider initiated action is ________.

A)request
B)confirm
C)indication
D)response
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
Traffic that can adjust to changes in delay and throughput across an internet and still meet the needs of its applications is ________ traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ________ is the layered structure of hardware and software that supports the exchange of data between systems and supports distributed applications such as electronic mail and file transfer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
________ provides a basic electronic mail transport facility.

A)TELNET
B)SNMP
C)UDP
D)SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
Human-computer interaction involving text,graphics,voice and video is _____.

A)elastic traffic
B)multimedia
C)information delivery
D)media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
The most widely used protocol architecture is the ________ protocol suite,which consists of physical,network access,internet,transport,and application layers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
In the TCP/IP protocol architecture,the ________ layer is concerned with specifying the characteristics of the transmission medium,the nature of the signals and the data rate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
The addiction of control information to data is referred to as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
Computer games,multiplayer network games,infotainment,and interactive audio visual productions are examples of applications in the _________ domain of multimedia systems.

A)information management
B)information publishing
C)telecommunication
D)entertainment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ________ layer is concerned with the exchange of data between an end system and the network to which it is attached.

A)internet
B)physical
C)host-to-host
D)network access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
The communication task can be organized into three relatively independent layers: network access layer,application layer,and ________ layer.

A)transport
B)media
C)physical
D)processing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The header format for TCP is a minimum of ________ octets.

A)16
B)8
C)20
D)160
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
Each application on a computer has an address that is unique within that computer known as ________ or ports that allow the transport layer to support multiple applications at each computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
If the initiator receives confirmation that the requested service has had the desired effect at the other end,it is referred to as a ________ service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
________ provides a secure remote logon capability which enables a user at a terminal or personal computer to logon to a remote computer function as if directly connected to that computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
An example of ________ traffic is real time traffic such as voice and video.

A)delay variation
B)elastic
C)multimedia information
D)inelastic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
Information that can be entered via a keyboard and is directly readable and printable is ________.

A)audio
B)graphic
C)video
D)text
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
Electronic mail,remote logon,network management and Web access are examples of ________ applications.

A)elastic
B)real-time
C)file transfer
D)transport
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
Databases,information kiosks,hypertexts,electronic books,and multimedia expert systems are examples of multimedia ________ systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
The services between adjacent layers in a protocol architecture are expressed in terms of ________ and parameters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
IPv6 includes ________ bit source and destination address fields.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
________ is when the sending TCP includes a code that is a function of the contents of the remainder of the segment.The receiving TCP performs the same calculation and compares the result with the incoming code.A discrepancy results if there has been some error in transmission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The standard network management protocol for TCP/IP networks is ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
In the TCP/IP architecture constituent networks are referred to as ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The two commonly used transport level protocols used as part of the TCP/IP protocol suite are TCP and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.