Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

10. A method of transmitting two or more signals over the same medium. The signals are interleaved with those of the other signals and transmitted

10. A method of transmitting two or more signals over the same medium. The signals are interleaved with those of the other signals and transmitted as a continuous stream.

a. Wavelength division multiplexing

b. Frequency division multiplexing

c. Time division multiplexing

d. Period division multiplexing

11. A logical connection created between two devices, mapped trough switches in a shared network is known as a:

a. Simulated circuit

b. Cyber circuit

c. Virtual circuit

d. Emulated circuit

12. What is the term given to the cell-based packet switching technology used in WANs, which uses cells of a fixed length for backbone and infrastructure in large communications companies?

a. Backbone infrastructure transfer mode

b. Multiprotocol Label Switching mode

c. Asynchronous Transfer Mode

d. Cell-based switching mode

13. Using VPN connections over inexpensive Internet connections is a popular WAN alternative. Name two VPN advantages over other WAN methods.

14. The generic term for the WAN customer equipment thats usually the responsibility of the customer and includes routers, modems and CSU/DSUs is known as:

a. Customer Premises Equipment

b. Client Premises Equipment

c. Resident Premises Equipment

d. Customer Building Equipment

15. In reference to provider provided WAN equipment, the connection between the demarcation point and the CO is called the?

a. Established loop

b. Local loop

c. Embedded loop

d. Demarcation point loop

16. (choose true or false) Through the Windows server software, users can create dial-up or VPN network connections to a remote access server

17. When making a dial-up connection onto a WAN, the ______________ sets up the Point-to-Point Protocol connection and defines communications parameters

a. Network Control Protocol

b. Link Control Protocol

c. Dial-up control protocol

d. Association control protocol

18. A networking model in which emote servers hosted on the Internet are used by companies to store, manage, and process data, is known as:

a. Cloud computing

b. High-level computing

c. External computing

d. Peripheral computing

19. Name two benefits of using the cloud.

20. In reference to the main categories of Cloud computing, Google Apps is an example of:

a. Software as a service

b. Platform as a service

c. Infrastructure as a service

d. Framework as a service

21. In reference to the main categories of Cloud computing, when customers use the service providers tool and infrastructure as they develop their applications, this is known as:

a. Software as a service

a. Infrastructure as a service

c. Platform as a service

d. Framework as a service

22. In reference to the main categories of Cloud computing, when a customer needs more storage space or more processing, they just pay for the additional requirements. This is known as:

a. Software as a service

b. Infrastructure as a service

c. Platform as a service

d. Framework as a service

Part 4 - Additional Questions

Which protocol is used for dial-up and to create VPNs?

Point-to-point protocol

Point-to-point Tunneling protocol

Link Control Protocol

Network Control Protocol

Part 5

Please complete the following questions from pages 449-452. (1 point each)

1. For what purpose is a CSU/DSU used?

a. Modulates a digital signal into an analog signal

b. Creates a digital connection between a LAN device and the WAN link

c. Routes packets from the LAN to the WAN

d. Creates a WAN connection over the public switched telephone network

2. Which term best describes the place in a WAN connection where the customers responsibility ends and the providers responsibility begins?

a. Data circuit-terminating equipment

b. Demarcation point

c. CPE

d. Central office

3. Which of the following can best be described as developing applications by using a service providers development tools and infrastructure?

a. Hosted applications

b. Hosted networking

c. Hosted platforms

d. Hosted infrastructure

4. Which wireless WAN technology has a standard for fixed and mobile devices?

a. WiMAX

b. LTE

c. Satellite

d. LTE-Advanced

5. Which wireless WAN technology might not be suitable for voice applications because of latency?

a. WiMAX

b. LTE

c. Satellite

d. LTE-Advanced

Part 6

Please open the following web site (3 points). Answer the following questions:

How Cloud Computing Works: http://computer.howstuffworks.com/cloud-computing/cloud-computing.htm

1. The author of the article discusses the two sections of cloud computing: front end and back end. Differentiate between those two.

2. In reference to clients and also the back end of the cloud, the purpose of ______ is to allows networked computers to communicate with each other.

a. Intermediate-ware

b. Client-ware

c. Middle-ware

d. Central-ware

3. One way a hacker can cause cloud computing companies a major headache is to records a clients key strokes. This software is known as _______ software:

a. Logging

b. Key logging

c. Stroke logging

d. Strategic logging

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

5 Does it lead to a better job for the staff?

Answered: 1 week ago

Question

The nature and importance of the global marketplace.

Answered: 1 week ago