Вы находитесь на странице: 1из 6

BIT107/DIP206 TUTORIAL 8 – TOPIC 8 AND 9

TRUE OR FALSE

1. Protocol architectures are a set of complementary protocol modules governing


communication between entities in a network.

2. TCP/IP is a protocol architecture.

3. UDP provides guaranteed delivery of messages.

4. LANs and WANs are usually isolated entities.

5. A router is a more complex intermediate system than a bridge.

6. EOIP encourages the development of IP applications for all major types of business data
as well as IP-based, or IP-compliant, telecommunications transport.

7. The System Network Architecture of IBM is a proprietary layered protocol architecture.

8. Standards can be developed simultaneously for protocols at each layer of the architecture.

9. Wireless networks cannot be deployed without the aid of the network administrators.

10. WLAN standards have been designed to replace Ethernet.

11. IP is also becoming the language of the telephone system.

12. There are many protocols and technologies to select from when building an entire
communication system.

13. OSI is another standardized architecture that is often used to describe communications
functions but is now rarely implemented.

14. When two or more computers are interconnected via a communication network, the set of
computer stations is referred to as a “computer connection”.

15. The network access layer contains the logic needed to support the various user
applications.

MULTIPLE CHOICE

1. The TCP/IP architecture contains ________ layers.


A. two B. three C. four D. five

2. Wireless networking brings:


A. increased security risks B. management headaches
C. increased demands on support staff D. all of the above

3. ________ is a Cisco proprietary product.


A. VoIP B. SKINNY C. SMTP D. SIP
4. The key elements of a protocol are:
A. syntax, structure, timing B. syntax, semantics, structure
C. structure, semantics, format D. format, syntax, semantics

5. Which of the following is a commonly used set of standards for computer


communications?
A. SLA B. ISO C. POP D. TCP/IP

6. A device that connects networks with differing addressing schemes, packet sizes and
interfaces is called a ___________.
A. hub B. router C. switch D. repeater

7. The current IP specification uses addresses to identify hosts that consist of:
A. 16 bits B. 64 bits C. 32 bits D. 128 bits

8. The newer IPv6 specification uses addresses to identify hosts that consist of:
A. 128 bits B. 64 bits C. 32 bits D. 16 bits

9. The ________ layer is concerned with the exchange of data between a computer and the
network to which it is attached.
A. transport B. application C. network access D. physical

10. The ________ layer contains the logic needed to support the various user applications.
A. network access B. physical C. application D. transport

11. Transport PDUs are typically called ________.


A. channels B. segments C. bridges D. frames

12. The ________ layer covers the physical interface between a data transmission device and
a transmission medium or network.
A. physical B. transport C. application D. network

13. IP appends a header of control information to each segment to form a(n)


__________.
A. IP datagram B. end system C. checksum D. port

14. The ________ supports a basic electronic mail facility by providing a mechanism for
transferring messages among separate hosts.
A. SNMP B. SSH C. HTTP D. SMTP

15. The _________ is used to send files from one system to another under user command.
A. UDP B. SMTP C. FTP D. SSH

SHORT ANSWER
1. __________ networking brings with it the advantages of connectivity without being
tethered, faster/lower cost deployment and the connection of geographically remote
sites.

2. ________ is an Internet-based standard and is the framework for developing a


complete range of computer communications standards.
3. The combination of data from the next higher layer and control information is known
as a __________.

4. The network access protocol appends a network access header to the data it receives
from the transport layer, creating a network access PDU, typically called a
__________.

5. An error detection code is also referred to as a frame check sequence or a ________.

6. Two protocol architectures have served as the basis for the development of
interoperable protocol standards: the OSI reference model and the ________.

7. A _________ is a device that connects two networks and whose primary function is to
relay data from one network to the other on a route from the source to the destination
end system.

8. For most applications running as part of the TCP/IP architecture, the transport layer
protocol is _________.

9. The standard network management protocol for TCP/IP networks is _________.

10. In 1995 the Internet Engineering Task Force issued a specification for a next-
generation IP; this specification was turned into a standard in 1996 known as
_________.

11. Features of ________ include mailing lists, return receipts, and forwarding.

12. ________ provides a secure remote logon capability, which enables a user at a
terminal or personal computer to logon to a remote computer and function as if
directly connected to that computer.

13. _________ connects client systems to Web servers on the Internet and its primary
function is to establish a connection with the server and send HTML pages back to the
user’s browser.

14. Subnetworks are connected by devices referred to as __________, which provide a


communications path and perform the necessary relaying and routing functions so that
data can be exchanged between devices attached to different subnetworks in the
internet.

15. A _________ is a facility that provides a data transfer service among devices attached
to the network.
TRUE OR FALSE

1. Database applications are among the most common client-server implementations.

2. Most client/server environments emphasize the use of a GUI.

3. Middleware is used to overcome lack of standardization.

4. Traditional client/server architecture is also called 3-tier architecture.

5. Intranets are expensive to implement, but inexpensive to maintain.

6. Client-server computing is fundamentally based on networking.

7. Support tools for intranets are easily available.

8. In a 3-tier client-server implementation, the client is typically a “thin client”.

9. A server-based processing model uses a “fat server” rather than a “fat client”.

10. Implementing an extranet removes the need for a company to maintain a public web site.

11. Typically cloud computing services will be rented from an external company that hosts
and manages them.

12. The service-oriented architecture (SOA) is a form of client/server computing.

13. The client/server architecture is a blend of decentralized and centralized computing.

14. A cloud broker evaluates the services provided by a cloud provider in terms of security
controls, privacy impact, performance, and so on.

15. NIST defines three service models that can be viewed as nested service alternatives:
SaaS, PaaS, and IaaS.

MULTIPLE CHOICE

1. ________ is a set of function and call programs that allow clients and servers to
intercommunicate.
A. IaaS B. SQL C. API D. Middleware

2. A computer that houses information for manipulation by networked clients is a


__________.
A. server B. minicomputer C. PaaS D. broker

3. A _________ is a networked information requester that can query a database or other


information.
A. host B. client C. server D. auditor

4. ________ is a method for addressing, creating, updating, or querying relational databases.


A. SQL B. API C. UTI D. GUI
5. ________ is software that improves connectivity between a client application and a
server.
A. SQL B. API C. Middleware D. SAP

6. Which of the following is NOT a class of client/server processing?


A. host-based processing B. server-based processing
C. client-based processing D. network-based processing

7. Advantages of a web/database system as compared to a more traditional database


approach include:
A. improved functionality and ease of administration
B. ease of administration and transaction tracking
C. rapid development and flexible information presentation
D. easy deployment and improved functionality

8. ________ machines are typically single-user PCs or workstations that provide a highly
user-friendly interface to the end user.
A. Client B. Host C. Server D. Networked

9. _________ processing refers to the traditional mainframe environment in which all or


virtually all of processing is done on a central host.
A. Host-based B. Server-based C. Client-based D. Cooperative

10. In a ________ processing configuration, the application processing is performed in an


optimized fashion, taking advantage of the strengths of both client and server machines
and of the distribution of data.
A. host-based B. server-based C. client-based D. cooperative

11. All applications operate over a uniform _________.


A. SQL B. API C. SaaS D. IaaS

12. A common method for encapsulating communication in a distributed system is the


__________.
A. SQL B. PaaS C. RPC D. API

13. An advantage of an intranet-based approach to corporate computing is:


A. rapid prototyping and deployment of new services
B. supports a range of distributed computing architectures
C. supports a range of media types
D. all of the above

14. A benefit of extranets is:


A. reduced costs B. coordination
C. customer satisfaction D. all of the above

15. A person or organization that maintains a business relationship with, and uses service
from, cloud providers is a __________.
A. cloud carrier B. cloud broker C. cloud consumer D. cloud auditor
SHORT ANSWER

1. A(n) _________ uses Internet technology and applications to provide in-house support
for distributed applications.

2. ________ is a set of function and call programs that allow clients and servers to
intercommunicate.

3. A _________ is a networked information requestor, usually a PC or workstation, that can


query database and/or other information from a server.

4. ________ is a set of drivers, APIs, or other software that improves connectivity between a
client application and a server.

5. A _________ is a database in which information access is limited to the selection of rows


that satisfy all search criteria.

6. A ________ is a computer, usually a high-powered workstation or a mainframe, that


houses information for manipulation by networked clients.

7. ________ is a language developed by IBM and standardized by ANSI for addressing,


creating, updating, or querying relational databases.

8. The traditional client/server architecture involves two levels, or tiers: a client tier and a
_________ tier.

9. __________ products are typically based on one of three underlying mechanisms:


message passing, remote procedure calls, and object-oriented mechanisms.

10. With ___________, or asynchronous primitives, a process is not suspended as a result of


issuing a Send or Receive.

11. __________ binding means that a logical connection is established between the two
processes at the time of the RPC and that as soon as the values are returned, the
connection is dismantled.

12. With __________ binding, a connection that is set up for an RPC is sustained after the
procedure return.

13. _________ is a term used to refer to the implementation of Internet technologies within a
corporate organization rather than for external connection to the global Internet.

14. A _________ is a generalization of the firewall approach and takes advantage of IP


security capabilities to allow secure communications between external users and the
company’s intranet.

15. The _________ is a networking facility that provides connectivity and transport of cloud
services between cloud consumers and cloud providers.

Вам также может понравиться