Академический Документы
Профессиональный Документы
Культура Документы
1. As part of the five-layer network model used in this textbook, the data link layer sits
directly between:
A) the operational and the application layers
B) the network and the application layers
C) the network and transport layers
D) the physical and the application layers
E) the physical and the network layers
2. Which of the following is true with respect to the data link layer?
A) It accepts streams of bits from the application layer.
B) It is responsible for getting a message from one computer to another (one node to
another) without errors.
C) It accepts messages from the physical layer.
D) It performs routing functions.
E) It organizes data from the physical layer and passes these coherent messages to the
application layer.
B
3. ____________ is not a function of a data link protocol.
A) Media access control
B) Message delineation
C) Amplitude shift keying
D) Indicating when a message starts and stops
E) Error control
F) 802.11g
C
4. Media access control:
A) is not very important in point-to-point with full duplex configuration
B) is not very important in local area networks
Page 1
Page 2
B) the server or front end processor works consecutively through a list of clients to
determine who should have access to the media
C) the front end processor must wait for a response from the polled client or terminal
D) one computer starts the poll and passes it to the next computer on the multipoint
circuit
E) there is never a chance for collision, or two computers trying to send data at the
same time
A
9. In general, controlled approaches:
A) work better than contention approaches for small networks that have low usage
B) work better than contention approaches for large networks that have high usage
C) work better than contention approaches for all sizes of networks
D) do not require a host, server, or active monitor to assign media access control
E) have many collisions
B
10. In a _________ , more than one data bit is changed by the error-causing condition.
A) burst error
B) data rate shift
C) Trellis-coded modulation
D) uniform distribution
E) amplitude key shift
Page 3
15. ____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa,
in a data transmission.
A) Contracted bits
B) Polled bits
C) Inverse multiplexed bits
D) Flipped bits
E) Bit delineation
Page 4
Page 5
20. Cross-talk:
A) occurs when one circuit picks up signals in another
B) is always bothersome because it has a high signal strength
C) decreases with increased proximity of two wires
D) decreases during wet or damp weather
E) increases with lower frequency signals
A
21. When a signal is reflected back to the transmitting equipment, it is called a(n)
_________.
A) jitter
B) echo
C) crosstalk
D) attenuation
E) impulse noise
B
22. The loss of power a signal suffers as it travels from the transmitting computer to a
receiving computer is:
A) jitter
B) spiking
C) attenuation
D) intermodulation noise
E) echo
C
23. If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz
and they form a new signal of 2000 MHz; this is an example of:
A) intermodulation noise
B) attenuation
C) echo
D) jitter
Page 6
E) harmonic distortion
A
24. When the output signal from an amplifier on a circuit is different from the input signal,
this is called _________________.
A) intermodulation noise
B) attenuation
C) echo
D) jitter
E) harmonic distortion
E
25. A phase hit is likely to be:
A) spikes
B) a short term shift out of phase
C) intermodulation noise
D) white noise
E) Gaussian noise
26. _____________ is an effective way to prevent impulse noise, cross talk, and
intermodulation noise.
A) Shielding wires
B) Adding fluorescent lights
C) Adding repeaters to a circuit
D) Adding amplifiers to a circuit
E) Shorting a circuit
A
27. _____________ is an effective way to prevent attenuation.
A) Shielding wires
B) Adding fluorescent lights
C) Adding repeaters or amplifiers to a circuit
Page 7
Page 8
C) 00100101
D) 10110110
E) 11111110
B
32. The probability of detecting an error, given that one has occurred, using parity checking
is about:
A) 100%
B) 0%
C) 50%
D) 75%
E) 98%
C
33. Using parity, the probability for detecting an error, given that one has occurred, is:
A) about 50% for either even or odd parity
B) about 70% for even parity and 30% for odd parity
C) about 30% for even parity and 70% for odd parity
D) about 0% for either even or odd parity
E) about 100% for either even or odd parity
A
34. The probability of detecting an error, provided that one has occurred, using cyclic
redundancy checking is about:
A) 75%
B) 0%
C) exactly 100%
D) 50%
E) > 99%
Page 9
38. With __________ ARQ, the sender pauses for a response from the receiver to alter each
message or packet of data.
A) open window
B) halt and be recognized (HBR)
C) sliding window
D) stop and wait
E) continuous
D
Page 10
39. With __________ ARQ, the sender immediately sends the next message or packet of
data.
A) continuous
B) immediate
C) open window
D) stop-and-wait
E) halt and be recognized (HBR)
A
40. ______________ controls errors by detecting and correcting them at the receiving end
without retransmission of the original message.
A) Hamming code
B) Huffman encoding
C) Front end processing
D) Wave division multiplexing
E) Hub polling
A
41. Asynchronous transmission:
A) is used to transmit each character simultaneously with all other characters
B) has a pre-determined, fixed time between sending characters
C) is typically used on multipoint half duplex circuits
D) uses a continuous series of start bits as an idle signal
E) is also known as start-stop transmission
E
42. Which of the following is not a type of asynchronous file transfer protocol?
A) XMODEM-CRC
B) OSCAR
C) XMODEM
D) XMODEM-1K
E) ZMODEM
Page 11
Page 12
47. Which of the following is not a type of synchronous data link protocol?
A) SDLC
B) KERMIT
C) PPP
D) HDLC
E) Ethernet (IEEE 802.3)
48. In communication protocols, _________ are used to convey the user's meaning.
A) information bits
B) overhead bits
C) stop bits
D) start bits
E) flag bits
49. _________________ is defined as the total number of information bits divided by the
total number of bits in the transmission.
A) Asynchronous rate
B) Protocol percentage
C) Throughput
D) Transmission Rate of Information Bits
E) Transmission efficiency
Page 13
Page 14