This website uses cookies to ensure you have the best experience. Learn more

Chapter 3 Essay

1371 words - 6 pages

Chapter Review Activities
Use the features in this section to study and review the topics in this chapter.
answer These Questions
1. Which of the following is true about a TCP/IP network?
a. The network uses only standards defined in TCP/IP RFCs.
b. The network uses standards defined in TCP/IP RFCs, plus other standards.
c. The IT personnel must choose to use TCP or IP.
d. The network must use only LANs, but no WANs.
2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.)
a. TCP/IP architecture
c. Ethernet
d. TCP/IP mapping
3. Think generically about the idea of a networking standard, ignoring any particular standard or ...view middle of the document...

c. The physical layer sits just below the data link layer.
d. The network layer sits in the middle of the five layers.
6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these
standards groups is typically the source of external LAN standards? (Choose two answers.)
a. ITU
c.Vendor groups
7. Which of the following is not a typical reason for a group of ten companies to start a vendor group, for the purpose of pushing a new networking technology?
a. To get products that use this technology to market more quickly
b. To increase overall acceptance of the technology by having more vendors that support the technology
c. To improve the chances that the technology will be standardized
d. To keep intellectual property rights to the technology inside the company
8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology?
a. HTTP is a Layer 5 protocol.
b. IP is a network layer protocol.
c. TCP is a Layer 2 protocol.
d. Leased lines are Layer 7 standards.
9. Historically, which of the following models were the earliest models used in corporate networks?
a. Vendor models
c. OSI
d. ATM
10. Which of the following statements is true when comparing the OSI and the TCP/IP model as defined in RFC 1122?
a. Two layer names match.
b. The lower four layers of TCP/IP define the same kinds of functions as the matching layer numbers from OSI.
c. The TCP/IP five-layer model is old and has been replaced by the seven-layer OSI model.
d. The TCP/IP application layer defines functions that match closely to only two OSI layers (application and presentation).
11. A network engineer connects two PCs (PC1 and PC2) using Ethernet NICs and an Ethernet cable that has copper wires inside. The two PCs communicate successfully. Which of the following happens when PC1 sends bits to PC2?
a. PC1’s NIC uses its decoder.
b. The PCs use one wire to create a circuit to send data from PC1 to PC2.
c. The PCs use two wires to create a circuit to send data from PC1 to PC2.
d. PC1 converts the bits to sound waves, and the NIC uses an A/D converter to send the data over the cable.
12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the data?
a. The Ethernet header lists PC2’s MAC address so that PC2 will realize that the data is meant for PC2.
b. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying...

Other Papers Like Chapter 3

Chapter 3 Mini Case Essay

1424 words - 6 pages A 1 2 B C D E F 3 Chapter 3 Mini Case 4 5 The first part of the case , presented in Chapter 2, discussed Computron Industries’ situation after an expansion 6 program. A large loss occurred in 2010, rather than the expected profit. As a result, its managers, directors, and 7 investors are concerned about the firm’s survival . 8 9 Donna Jamison was brought in as an assistant to Fred Campo, Computron 's chairman, who had the task

Ethics Chapter 3 Essay

708 words - 3 pages CHAPTER 3 Emerging Business Ethics Issues Chapter Objectives • To define ethical issues in the context of organizational ethics • To examine ethical issues as they relate to the basic values of honesty, fairness, and integrity • To delineate abusive and intimidating behavior, lying, conflicts of interest, bribery, corporate intelligence, discrimination, sexual harassment, environmental issues, fraud, insider trading, intellectual

Mgmt340 Chapter 3, 4

615 words - 3 pages Chapter 3: Problems 2 & 4 2. What are some sources of risk in a systems analysis and design project, and how does a project manager cope with risk during the stages of project management? 2. Some sources of risk in a systems analysis and design project are resources, current technology, and rules and regulations. Sometimes, resources are not always available whether it be manpower or materials and software. Current technology can

Chapter 1-3

3667 words - 15 pages Prototyping Chapter 1 Usability Testing Final Design Chapter 2 Chapter 3 B. Project Table IV. Project Resource A. People People typically have an abstract idea of what they want as an end result, but do not know what software should do. Skilled and experienced software engineers recognize incomplete, ambiguous, or even contradictory requirements at this point. B. Hardware and Software The system that user want to do is simply

Chapter 3 Questions

913 words - 4 pages 1. Which of the following is true about 1 bit? c. Represents one binary digit 2. Which of the following terms means approximately 106 bytes? b. Megabyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term

Chapter 3 Questions

888 words - 4 pages Building TCP/IP Networks Kerry Pullum Introduction to Networking (NT1210) Adrian Driver October 6, 2014 Building TCP/IP Networks 1. Which of the following is true about a TCP/IP network? b. The network uses standards defined in TCP/IP RFCs, plus other standards 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) c. Ethernet d. TCP/IP mapping 3. Think generically about the idea of a networking

Chapter 3 Solutions Manual

1756 words - 8 pages CHAPTER 3 SYSTEMS DEVELOPMENT AND DOCUMENTATION TECHNIQUES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 3.1 Data Flows: merchandise, payment, cash and register tape Date Source: customer Processes: capture sales and payment, give cash and register tape to manager Storage: sales file (register tape), cash register 3.2 It is usually not sufficient to use just one documentation tool. Every tool documents a

Chern's Case Chapter 3

534 words - 3 pages Chern Case – Chapter 3 The “Canadian” Legal Context Possible inequities: | Cause? | Solution? | Table A-2There seems to be preference in the selection of Asians, males and Hispanic persons | When analyzing Table A-2, which compares the percentage of males, females, Whites, Blacks, Asians, and Hispanics employed in a job category with their availability in the relevant population of qualified people interested in the position, we’ve come

Chapter 3 Assignment 1

1318 words - 6 pages Annette Durie NT1210 Unit 3 Assignment 1 Key Terms: TCP/IP Network – A computer network that uses the standards defined and referenced by the TCP/IP model. Networking Standard – A document that details information aabout some technology or protocol related to networking, and that document has been passed through a review and approval process that certifies the document as a standard. TCP/IP model – An open collection of standards related

Pm Chapter 3 Anwers

831 words - 4 pages CHAPTER 3 – Organization: Structure and Culture Review Questions : 1. What are the relative advantages and disadvantages of the functional, matrix, and dedicated team approaches to managing projects? A ) The functional approach : Advantages: • There is no radical alteration in basic structures of the parent organization. • Maximum flexibility in use of staff within functional units. • In-depth expertise can be brought to

Chapter 3 Procrastination

689 words - 3 pages CHAPTER 3 Methodology The descriptive method of research was used in this study. Descriptive method is a fact-finding study with adequate and accurate interpretation of the results. It describe with emphasis on what actually exist, or any practices that is involved on our study

Related Essays

Chapter 3 Essay

3370 words - 14 pages Chapter 3 Methodology This third chapter discussed the methods that the researcher has used in order to collate and evaluate the data in accordance to the goal of the study. Methodology is like a strategy or plan for achieving some goal; methods are the tactics that can be used to service the goals of the methodology. In essence, methodologies provide the blueprints that prescribe how the tools should be used. Considerably, the researcher

Chapter 3 Essay

2796 words - 12 pages Review Questions Chapter 1 1.3 Describe the approach taken to the handling of data in the early file-based systems. In the early file based system their all data was in written form, due to the lake of education, due to the in-familiarity with new techniques, lake of computer knowledge so all the data required would be stored in a file or files owned by the programs. Discuss the disadvantages of this approach. Different

Chapter 3 Essay

3343 words - 14 pages CHAPTER STUDY OBJECTIVES 1. Analyze the effect of business transactions on the basic accounting equation. Each business transaction must have a dual effect on the accounting equation. For example, if an individual asset is increased, there must be a corresponding (a) decrease in another asset, or (b) increase in a specific liability, or (c) increase in stockholders’ equity. 2. Explain what an account is and how it helps in the recording

Week 3 Chapter 5 Essay

399 words - 2 pages Chapter: Chapter 5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way