Deck 6: Data Communication and the Cloud
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
Play
Full screen (f)
Deck 6: Data Communication and the Cloud
1
A(n)________ is a set of rules that two communicating devices follow.
A)domain
B)attribute
C)protocol
D)database
A)domain
B)attribute
C)protocol
D)database
C
2
The distinguishing characteristic of a LAN is ________.
A)that it connects at multiple locations
B)that it connects at a single location
C)that it is a network of networks
D)that all lines need not reside at the same geographic location
A)that it connects at multiple locations
B)that it connects at a single location
C)that it is a network of networks
D)that all lines need not reside at the same geographic location
B
3
Which of the following is true of DSL modems?
A)DSL modems use television lines for data transmission.
B)Their signals do not interfere with voice telephone service.
C)DSL modems use the same protocols as cable modems.
D)DSL services and speed are standardized across applications.
A)DSL modems use television lines for data transmission.
B)Their signals do not interfere with voice telephone service.
C)DSL modems use the same protocols as cable modems.
D)DSL services and speed are standardized across applications.
B
4
In order for a printer or a laptop to connect to a wireless LAN,it must have a ________.
A)WNIC
B)UTP
C)POP
D)VPN
A)WNIC
B)UTP
C)POP
D)VPN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following purposes does an HTTP protocol serve?
A)flow among switches and access points
B)provide reliable internet transporting
C)enable communication among programs
D)conduct internet routing
A)flow among switches and access points
B)provide reliable internet transporting
C)enable communication among programs
D)conduct internet routing
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
Which protocol standard used for wired LAN connections specifies hardware characteristics,such as which wire carry which signals?
A)intranet
B)WiMax
C)Ethernet
D)EVDO
A)intranet
B)WiMax
C)Ethernet
D)EVDO
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
The computers in two separate company sites must be connected using a ________.
A)LAN
B)WAN
C)SOHO LAN
D)MAC
A)LAN
B)WAN
C)SOHO LAN
D)MAC
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN.
A)protocol
B)switch
C)domain
D)SOHO LAN
A)protocol
B)switch
C)domain
D)SOHO LAN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
The WNIC devices connect to a(n)________,which is the component of the LAN device that processes wireless traffic and communicates with the wired switch.
A)router
B)PSDN
C)optical fiber cable
D)access point
A)router
B)PSDN
C)optical fiber cable
D)access point
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
A ________ connects computers at different geographic locations.
A)LAN
B)WAN
C)VPN
D)SOHO LAN
A)LAN
B)WAN
C)VPN
D)SOHO LAN
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Devices such as wireless mice and keyboards use ________ to connect to the computer.
A)NIC
B)broadband
C)cable
D)Bluetooth
A)NIC
B)broadband
C)cable
D)Bluetooth
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
A ________ is used to provide seamless flow of data across networks.
A)layered protocol
B)point-to-point protocol
C)switch
D)UTP
A)layered protocol
B)point-to-point protocol
C)switch
D)UTP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true of cable modems?
A)Cable modems provide high-speed data transmission using telephone cables.
B)Performance of cable modems is stable irrespective of the number of users sending and receiving data.
C)Cable modems generally use the same protocols as DSL modems.
D)The signals from cable modems do not interfere with TV signals.
A)Cable modems provide high-speed data transmission using telephone cables.
B)Performance of cable modems is stable irrespective of the number of users sending and receiving data.
C)Cable modems generally use the same protocols as DSL modems.
D)The signals from cable modems do not interfere with TV signals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
What is the protocol commonly used for wireless LAN?
A)IEEE 802.11n
B)EVDO
C)DSL
D)IEEE 802.3
A)IEEE 802.11n
B)EVDO
C)DSL
D)IEEE 802.3
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements about LAN protocols is true?
A)The access point uses both the 802.3 and 802.11 standards.
B)The IEEE 802.11 protocol is also called Ethernet.
C)The switch operates on the 802.11 standard.
D)WNICs operate on the 802.3 protocol and communicate with the switch.
A)The access point uses both the 802.3 and 802.11 standards.
B)The IEEE 802.11 protocol is also called Ethernet.
C)The switch operates on the 802.11 standard.
D)WNICs operate on the 802.3 protocol and communicate with the switch.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
Narrowband lines typically have transmission speeds less than ________.
A)256 kbps
B)56 kbps
C)126 kbps
D)64 kbps
A)256 kbps
B)56 kbps
C)126 kbps
D)64 kbps
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
Each device on the LAN has a hardware component called the ________ that connects the device's circuitry to the cable.
A)UTP
B)switch
C)NIC
D)POP
A)UTP
B)switch
C)NIC
D)POP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is true of an ISP?
A)An ISP converts digital data in the user's computer to an analog signal.
B)An ISP facilitates a one-way information transfer process between the user's computer and the Internet.
C)An ISP provides free access to the Internet.
D)An ISP serves as a user's gateway to the Internet.
A)An ISP converts digital data in the user's computer to an analog signal.
B)An ISP facilitates a one-way information transfer process between the user's computer and the Internet.
C)An ISP provides free access to the Internet.
D)An ISP serves as a user's gateway to the Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following protocols is commonly used by LAN?
A)IEEE 802.3
B)DSL
C)EVDO
D)WiMax
A)IEEE 802.3
B)DSL
C)EVDO
D)WiMax
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
The IEEE 802.3 protocol standard is also known as ________.
A)TCP/IP
B)Ethernet
C)Bluetooth
D)HTTP
A)TCP/IP
B)Ethernet
C)Bluetooth
D)HTTP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is a component of the user tier?
A)computers that have browsers that request and process Web pages
B)computers that run Web servers and process application programs
C)computers that run a DBMS that processes SQL requests
D)computers that work to minimize customer delays in a facility called a Web farm
A)computers that have browsers that request and process Web pages
B)computers that run Web servers and process application programs
C)computers that run a DBMS that processes SQL requests
D)computers that work to minimize customer delays in a facility called a Web farm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
A Local Area Network (LAN)would be used to connect computers located in Seattle and Philadelphia.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
In the three-tier architecture arrangement,what is the second tier?
A)Web tier
B)database tier
C)server tier
D)user tier
A)Web tier
B)database tier
C)server tier
D)user tier
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
________ is the most common language for defining the structure and layout of Web pages.
A)HTML
B)VPN
C)Flash
D)XML
A)HTML
B)VPN
C)Flash
D)XML
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
A ________ receives requests from users via the Web server,takes some action,and returns a response to the users via the Web server.
A)database server
B)commerce server
C)URL
D)Web farm
A)database server
B)commerce server
C)URL
D)Web farm
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
A ________ must be used to convert a computer's digital data to an analog,or wavy,signal.
A)tunnel
B)switch
C)modem
D)router
A)tunnel
B)switch
C)modem
D)router
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
A SOHO LAN requires that a dozen or more computers and printers be connected.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)________ is a unique name that is affiliated with a public IP address.
A)tag
B)protocol
C)domain name
D)assigned name
A)tag
B)protocol
C)domain name
D)assigned name
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
With a WAN,an organization can place communications lines wherever it wants because all lines reside on its premises.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is true of VPN?
A)VPN communications are secure even though they are transmitted over the public Internet.
B)One disadvantage of VPN is that it does not encrypt messages.
C)Remote access is difficult in case of VPN.
D)It is a virtual,private pathway over a public or shared network from the client to the server.
A)VPN communications are secure even though they are transmitted over the public Internet.
B)One disadvantage of VPN is that it does not encrypt messages.
C)Remote access is difficult in case of VPN.
D)It is a virtual,private pathway over a public or shared network from the client to the server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
The S in HTTPS stands for ________.
A)site
B)safety
C)speed
D)secure
A)site
B)safety
C)speed
D)secure
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
What is a VPN?
A)It is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
B)It is an add-on to browsers that was developed by Adobe and is useful for providing animation,movies,and other advanced graphics inside a browser.
C)It is the most common language for defining the structure and layout of Web pages.
D)It uses the Internet to create private point-to-point connections.
A)It is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web.
B)It is an add-on to browsers that was developed by Adobe and is useful for providing animation,movies,and other advanced graphics inside a browser.
C)It is the most common language for defining the structure and layout of Web pages.
D)It uses the Internet to create private point-to-point connections.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following provides reliable internet transport?
A)HTTP
B)TCP
C)FTP
D)DSL
A)HTTP
B)TCP
C)FTP
D)DSL
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
The ________ is the Internet-based network of browsers and servers that process HTTP or HTTPS.
A)FTP
B)SMTP
C)Web
D)Data link
A)FTP
B)SMTP
C)Web
D)Data link
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
What is an IP address?
A)It is a protocol that specifies the routing of the pieces of your data communication through the networks that comprise any internet (including the Internet).
B)It is a number that identifies a particular device.
C)It is a piece of a message that is handled by programs that implement IP.
D)It is a program that breaks your traffic up into pieces and sends each piece along its way.
A)It is a protocol that specifies the routing of the pieces of your data communication through the networks that comprise any internet (including the Internet).
B)It is a number that identifies a particular device.
C)It is a piece of a message that is handled by programs that implement IP.
D)It is a program that breaks your traffic up into pieces and sends each piece along its way.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
When an individual uses the Internet,but not the Web,he or she is using ________.
A)FTP
B)HTTP
C)SOAP
D)XUP
A)FTP
B)HTTP
C)SOAP
D)XUP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is true of Web servers?
A)They are not programs.
B)They run on a user tier computer.
C)They can manage items in a shopping cart.
D)They send and receive Web pages to and from clients.
A)They are not programs.
B)They run on a user tier computer.
C)They can manage items in a shopping cart.
D)They send and receive Web pages to and from clients.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following means an address on the Internet?
A)FTP
B)DSL
C)URL
D)ISP
A)FTP
B)DSL
C)URL
D)ISP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
One very common use of FTP is to ________.
A)maintain Web sites
B)transmit emails
C)format responses
D)implement protocol
A)maintain Web sites
B)transmit emails
C)format responses
D)implement protocol
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
A protocol is a set of rules that two communicating devices follow.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
The IEEE 802.3 protocol is used for wired LAN connections.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
An access point is a special-purpose computer that receives and transmits wired traffic on the LAN.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
Wireless mice use Bluetooth to connect to the computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
Cable modems provide high-speed data transmission using phone lines.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Each wired computer or printer on the LAN has a network interface card (NIC).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Bluetooth is a protocol that can transmit data over long distances.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
Optical fiber cables carry light ray signals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
The protocols used on the Internet are arranged according to a structure known as the TCP/IP Protocol architecture.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Leased lines are also called PSDN.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
Routers convert digital data into analog signals.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
The most popular protocol for WAN is the IEEE 802.3 protocol.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
An HTTPS connection is a secure connection.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
An access name is a unique name that is affiliated with a public IP address.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
LAN connections cannot be made with optical fiber cables.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
Very few LAN connections are made using unshielded twisted pair (UTP)cable.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
Broadband lines have speeds less than 56 kbps.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
DSL operates on the same lines as voice telephones.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
Narrowband lines have speeds greater than 256 kbps.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
File Transfer Protocol is used for email transmissions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
The TCP/IP Protocol architecture is a scheme of a single protocol type.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
What are cable modems?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
What is a domain name? What is the procedure to get a domain name?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
What is the IP Protocol architecture?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
What are the different tiers in the three-tier architecture?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Hyperlinks are pointers to other Web pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
The user tier consists of computers,phones,and other devices.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
A tunnel is a virtual,private pathway over a public or shared network from the VPN client to the VPN server.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Name some common application layer protocols.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
What is Bluetooth? What are its uses?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
Explain Transmission Control Protocol (TCP).
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
How does a wireless NIC work?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
What is the difference between a LAN and a WAN? Give an example of how each one could be used in business.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Differentiate between private and public IP addresses.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
What is the difference between a Web server and a commerce server?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
What is a VPN and how does it work?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
What are the three important functions of an ISP?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
A Virtual Private Network (VPN)is a type of LAN.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
The server tier consists of computers that run a DBMS that processes SQL requests to retrieve and store data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
To ensure acceptable performance,commercial Web sites usually are supported by several or even many Web server computers in a facility called a Web farm.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
What is an NIC? Why is it important to a LAN?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck