iclicker questions cnit 201e last revised 1-21-10

Post on 17-Jan-2016

225 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

iClicker iClicker QuestionsQuestions

CNIT 201ECNIT 201E

Last revised 1-21-10

After 1.3After 1.3

When rumors go from one person to When rumors go from one person to another, the final message is different another, the final message is different

than the starting one. Which than the starting one. Which communication rule is being violated?communication rule is being violated?

A.A. Identify sender and receiverIdentify sender and receiver

B.B. MethodMethod

C.C. LanguageLanguage

D.D. Speed and timing of deliverySpeed and timing of delivery

E.E. ConfirmationConfirmation1 of 5

What protocol is used to obtain Web What protocol is used to obtain Web pages from a server?pages from a server?

A.A. HTTPHTTP

B.B. SMTPSMTP

C.C. POPPOP

D.D. XMPPXMPP

E.E. SIPSIP2 of 5

What protocol is used for VoIP phone What protocol is used for VoIP phone calls?calls?

A.A. HTTPHTTP

B.B. SMTPSMTP

C.C. POPPOP

D.D. XMPPXMPP

E.E. SIPSIP3 of 5

What device is this?What device is this?

A.A. LAN SwitchLAN Switch

B.B. LAN MediaLAN Media

C.C. Wireless MediaWireless Media

D.D. WAN MediaWAN Media

E.E. CloudCloud4 of 5

What device is this?What device is this?

A.A. LAN SwitchLAN Switch

B.B. FirewallFirewall

C.C. RouterRouter

D.D. Wireless RouterWireless Router

E.E. CloudCloud5 of 5

After 1.44After 1.44

Which characteristic of network Which characteristic of network architecture depends on redundant architecture depends on redundant links?links?

A.A. Fault toleranceFault tolerance

B.B. ScalabilityScalability

C.C. Quality of serviceQuality of service

D.D. SecuritySecurity

E.E. All of the aboveAll of the above1 of 5

Which characteristic of network Which characteristic of network architecture depends on a hierarchical architecture depends on a hierarchical

layered design?layered design?

A.A. Fault toleranceFault tolerance

B.B. ScalabilityScalability

C.C. Quality of serviceQuality of service

D.D. SecuritySecurity

E.E. All of the aboveAll of the above2 of 5

Which terms best describe the modern Which terms best describe the modern Internet architecture?Internet architecture?

A.A. Packet switched connectionlessPacket switched connectionless

B.B. Packet switched connection-orientedPacket switched connection-oriented

C.C. Circuit switched connectionlessCircuit switched connectionless

D.D. Circuit switched connection-orientedCircuit switched connection-oriented

E.E. None of the aboveNone of the above

3 of 5

Which feature of network architecture Which feature of network architecture enables manufacturers to build new enables manufacturers to build new devices with confidence that they will work devices with confidence that they will work properly with the existing infrastructure?properly with the existing infrastructure?

A.A. Hierarchical layered structureHierarchical layered structure

B.B. PeeringPeering

C.C. StandardsStandards

D.D. Distributed servicesDistributed services

E.E. None of the aboveNone of the above4 of 5

Which traffic type requires the lowest Which traffic type requires the lowest quality of service priority?quality of service priority?

A.A. Phone callsPhone calls

B.B. Streaming videoStreaming video

C.C. Stock purchasesStock purchases

D.D. EmailEmail

E.E. SCADA signals to control power SCADA signals to control power plant machineryplant machinery

5 of 5

After 1.6After 1.6

Which of these features are provided in Which of these features are provided in a secure network?a secure network?

A.A. ConfidentialityConfidentiality

B.B. IntegrityIntegrity

C.C. AvailabilityAvailability

D.D. All of the aboveAll of the above

E.E. None of the aboveNone of the above

1 of 4

Which of these features are provided by Which of these features are provided by using checksums?using checksums?

A.A. ConfidentialityConfidentiality

B.B. IntegrityIntegrity

C.C. AvailabilityAvailability

D.D. All of the aboveAll of the above

E.E. None of the aboveNone of the above

2 of 4

Which of these features are provided by Which of these features are provided by a firewall?a firewall?

A.A. ConfidentialityConfidentiality

B.B. IntegrityIntegrity

C.C. AvailabilityAvailability

D.D. All of the aboveAll of the above

E.E. None of the aboveNone of the above

3 of 4

Which of these features are provided by Which of these features are provided by antivirus software?antivirus software?

A.A. ConfidentialityConfidentiality

B.B. IntegrityIntegrity

C.C. AvailabilityAvailability

D.D. All of the aboveAll of the above

E.E. None of the aboveNone of the above

4 of 4

Binary Lesson 1Binary Lesson 1NybblesNybbles

Base TenBase Ten

Normal NumbersNormal Numbers Each place has one of these Each place has one of these

values:values: 0 1 2 3 4 5 6 7 8 90 1 2 3 4 5 6 7 8 9

147 = 1*100 + 4*10 + 7147 = 1*100 + 4*10 + 7 Or 1*10^2 + 4*10^1 + 7*10^0Or 1*10^2 + 4*10^1 + 7*10^0

Base TenBase Ten

11 44 77

Ones placeNumber of ones

10^0

Tens placeNumber of tens

10^1

Hundreds placeNumber of hundreds

10^2

Base TwoBase Two

Binary NumbersBinary Numbers Each place has one of these Each place has one of these

values:values: 0 10 1

11 = 1 * 2 + 1 = 311 = 1 * 2 + 1 = 3 Or 1*2^1 + 2^0Or 1*2^1 + 2^0

Base TwoBase Two

11 00 11

Ones placeNumber of ones

2^0

Twos placeNumber of twos

2^1

Fours placeNumber of fours

2^2

Counting to 7Counting to 7

Base TwoBase Two Base TenBase Ten 00 0 0 11 1 1 1010 2 2 1111 3 3 100100 4 4 101101 5 5 110110 6 6 111111 7 7

Four Bits Make a NybbleFour Bits Make a Nybble

11 00 00 11

8s 4s 2s 1s

Counting to 15Counting to 15

Base Two Base TenBase Two Base Ten Base Two Base Base Two Base TenTen

00 0 0 1000 1000 8 8 11 1 1 1001 1001 9 9 1010 2 2 1010 1010 10 10 1111 3 3 1011 1011 11 11 100100 4 4 1100 1100 12 12 101101 5 5 1101 1101 13 13 110110 6 6 1110 1110 14 14 111111 7 7 1111 1111 15 15

Binary Lesson 1Binary Lesson 1NybblesNybbles

Base TenBase Ten

Normal NumbersNormal Numbers Each place has one of these Each place has one of these

values:values: 0 1 2 3 4 5 6 7 8 90 1 2 3 4 5 6 7 8 9

147 = 1*100 + 4*10 + 7147 = 1*100 + 4*10 + 7 Or 1*10^2 + 4*10^1 + 7*10^0Or 1*10^2 + 4*10^1 + 7*10^0

Base TenBase Ten

11 44 77

Ones placeNumber of ones

10^0

Tens placeNumber of tens

10^1

Hundreds placeNumber of hundreds

10^2

Base TwoBase Two

Binary NumbersBinary Numbers Each place has one of these Each place has one of these

values:values: 0 10 1

11 = 1 * 2 + 1 = 311 = 1 * 2 + 1 = 3 Or 1*2^1 + 2^0Or 1*2^1 + 2^0

Base TwoBase Two

11 00 11

Ones placeNumber of ones

2^0

Twos placeNumber of twos

2^1

Fours placeNumber of fours

2^2

Counting to 7Counting to 7

Base TwoBase Two Base TenBase Ten 00 0 0 11 1 1 1010 2 2 1111 3 3 100100 4 4 101101 5 5 110110 6 6 111111 7 7

Four Bits Make a NybbleFour Bits Make a Nybble

11 00 00 11

8s 4s 2s 1s

Counting to 15Counting to 15

Base Two Base TenBase Two Base Ten Base Two Base Base Two Base TenTen

00 0 0 1000 1000 8 8 11 1 1 1001 1001 9 9 1010 2 2 1010 1010 10 10 1111 3 3 1011 1011 11 11 100100 4 4 1100 1100 12 12 101101 5 5 1101 1101 13 13 110110 6 6 1110 1110 14 14 111111 7 7 1111 1111 15 15

iClicker iClicker QuestionsQuestions

NybblesNybbles

What is 7 in binary?What is 7 in binary?

A.A. 1010

B.B. 100100

C.C. 10001000

D.D. 11011101

E.E. 011101111 of 5

What is 101 in decimal?What is 101 in decimal?

A.A. 11

B.B. 22

C.C. 55

D.D. 66

E.E. 772 of 5

Convert the decimal value 10 to binary:Convert the decimal value 10 to binary:

A.A. 11

B.B. 1010

C.C. 22

D.D. 10001000

E.E. 101010103 of 5

Convert the binary value 10 to decimal:Convert the binary value 10 to decimal:

A.A. 11

B.B. 1010

C.C. 22

D.D. 10001000

E.E. 101010104 of 5

Convert the binary value 1011 to Convert the binary value 1011 to decimal:decimal:

A.A. 11

B.B. 1010

C.C. 1111

D.D. 1313

E.E. 14145 of 5

top related