Huruf D Pictures, Images and Photos

Sabtu, 23 April 2011

IT II chapter 2 ver.3.0

1.What is the physical topology when all the computers in a network connect to a central point?
point-to-point
*star
ring
bus

2. What does the term media access control describe?
*the rules for coordinating the use of the medium
a list of users allowed to use the network
the system administrator's role in controlling access to the network
how to determine which media type is best for a network

3.What is the purpose of protocols?
*to provide a controlled sequence of messages between systems
to define which users have access to the network
to allow the network administrator to decentralize control
to limit access to network resources

4.Which features are LANs generally designed to accommodate?
*many users, high speed, limited geographical area
many users, high speed, broad geographical area
few users, low speed, limited geographical area
few users, low speed, broad geographical area

5.Peer-to-peer and client/server networks share many characteristics. What is unique to the client/server environment?
Passwords may be required to access shared resources.
Local data files and devices can be shared by several users.
Computers typically communicate using request/response protocols.
*Security and resource management scales easily as the network grows.

6.Which statement is true of peer-to-peer networks?
They scale easily as the size of the network grows.
Security is easily maintained.
*Computers may change roles from client to server as needed.
At least one computer functions as a dedicated server.


7.What is one disadvantage of a client/server network?
*It can have a single point of failure.
It does not scale well to large networks.
It requires each user to be trained to perform administrative tasks.
It is less secure than a peer-to-peer network.


8.What is one advantage of directory and name services?
All directories are kept in a single location.
User names have a standardized format.
*Text names are easier to remember than numeric addresses.
Network resources are bound to a physical location


9. What is an advantage of Linux?
Linux is easy to use.
With copyrights, Linux experiences fast technological growth.
*Linux is free for public use.
Linux has an organized source of development.


10.What are two advantages of Windows over Linux? (Choose two.)
Windows can be used publicly for free.
*Windows is easier to use than Linux.
Unlike Linux, Windows is standardized through the efforts of many independent sources.
*Unlike Linux, Windows has an organized source of funding and development.

11.Why are open source technologies appealing to many people?
A more organized source of funding and development is available.
Proprietary technologies involve cooperation between many companies.
De facto standards allow for more choice.
*Users are not bound by copyright laws.

12.Which of the following statements is true of print sharing?
It requires a company to purchase more printers.
It makes it more difficult for an administrator to control printers.
*It allows for more efficient use of printers.
It limits the user to a single network printer.


13.What do transport layer protocols use to identify the application needed to process data?
* ports
MAC addresses
IP addresses
DNS
flags

14.Which network layer protocol enables routers to discover the best path between networks using hop count?
IP
*RIP
ARP
OSPF


15.Which of the following works as a "storage and retrieval" application?
Telnet
* e-mail
DNS
SNMP


16.Which statement best describes a serial link?
* Bits of information are transmitted across the link one after another.
Bits of information are randomly transmitted across the link.
Bits of information are sent across a dedicated link in one direction only.
Bits of information are only sent using dial-up or ISDN lines.


17.Which of the following is the most popular physical LAN topology?
ring
* star
bus
fiber


18.Which DSL technology is most commonly used?
SDSL
ADSL
VDSL
IDSL


19.Which technology provides the best support for upload-intensive Internet tasks?
ISDN
* cable modem service
analog modem service
ADSL


20.Which access control method is specified in the IEEE 802.3 standard?
CSMA/CA
*CSMA/CD
token passing
store and forward

21.What is a major advantage of UTP?
* It is inexpensive.
It is highly resistant to electromagnetic interference.
It limits the number of hosts on a network.
It is an inexpensive way to interconnect remote location


22.Which two types of cabling will support 100BASE-X? (Choose two.)
Category 2
*Category 5
*two-strand fiber-optic
50-ohm coaxial


23.Which of the following statements best describes full-duplex transmission?
Data can be sent across bus hubs and switches.
*Data can be simultaneously sent and received.
Data can only be sent in one direction.
Data can be sent and then received