What numeric range is commonly referred to as well-known ports? * 0-1023 9. What numeric port range is commonly used by clients in a client-server communication session? * 49152–65535 10. What do you believe would be the result of installing and configuring a web server to “listen” on ports other than 80 and 443?
Which of the following physical topologies has the inherent weakness of a single point of failure? C. Star NT1210 Quiz 2 1. With digital circuits, Telcos typically create circuits for data communication as permanent circuits, rather than expecting the endpoints to dial a phone number. These circuits are usually referred to as ______. D. leased lines 2.
c. IP provides logical addressing and routing services. 19. d. None of the answers is correct. 20. A. Data-link header b. Network layer header c. Transport layer header It could be all 4 though since a web browser ia an application.
8. (TCO G) _____ is a simple method that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. 9. (TCO G) A _____ is an organizational department that is responsible for monitoring and fixing overall network problems. 10.
a. cost assessment b. technology design c. needs analysis d. narrow and deep analysis e. distribution layering Answer: a, Easy, p. 275 13. Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing MAN networks, network designers tend to err on the side of building too small a network e. In designing BN networks, network designers tend to err on the side of building too small a
1. Information technology is a contemporary term that describes the combination of computer technology with _________________________ technology? a) Electrical and communications b) Instrumentation c) Telecommunication d) Mechanical 2) Which of the following is a front office information system? a) Human resources b) Sales c) Financial management d) Manufacturing 3) Which of the following is not one of the project management functions? a) Controlling b) Organizing c) Opening d) Closing 4) A ____________ is a graphical network model that depicts a project’s tasks and the relationships between those task.
• Question 26 Multiple networks were needed to transmit documents, voice, and video because: • Question 27 Which of the following is not a characteristic of intranets? • Question 28 What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have. • Question 29 Networks transmit __________, which carry voice or data between a sender and a receiver. • Question 30 When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the
8. Web Address - can be defined as an address string containing the access protocol, domain name, and file or resource path which is normally used to specify the address of a web page, 9. Web page - a hypertext document connected to the World Wide Web. 10. Protocol - When computers communicate with each other, there needs to be a common set of rules and instructions that each computer follows.
8. (TCO G) _____ is a simple method that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. 9. (TCO G) A _____ is an organizational department that is responsible for monitoring and fixing overall network problems. 10.
Week 2 Seminar Exercises Questions Review Questions 1. A globally interconnected commercial world has emerged from the technical advances that created the Internet. Has its creation increased or decreased the need for organizations to maintain secure operation of their systems? Why? Answer: Its creation has increased the need for organizations to maintain secure operation of their systems.