Mid-Term Exam Network Fundamentals Name: __________________ 3/9/2016 Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. Which system on the network shares resources? a. Client c. Terminal b. Server d. Sharing device 2. The ____ creates, sends as well as receives, and reads the frames moving across in the network. a. UTP c. Radio Waves b. Fiber Cable d. NIC 3. A frame sent to a ____ is processed by every single NIC on the network. a. Server's IP Address c. Broadcast Address b. Default Gateway Address d. Hub 4. The ____ protocol uses a unique dotted-octal numbering system based on four eight-bit numbers to identify each machine on a network. a. IP c. TCP/IP b. TCP d. IPX 5. Which of the following devices is used to link multiple networks? a. Hubs c. NICs b. Routers d. Network expansion cards 6. Which of the following protocols allow the exchange of files on different computers across the network? a. FTP c. IP b. TCP d. HTTP 7. Layer 5 in the OSI model is also referred to as the ____ layer. a. Data-link c. Network b. Session d. Presentation 8. A hub belongs to the ____ layer. a. Network c. Transport b. Physical d. Data-link 9. The ____ layer controls the movement of a router during data transmission. a. Network c. Physical b. Transport d. Session 10. At the Application layer, the ____ protocol is used to request data from the Web server. a. TCP c. HTTP b. IP d. NetBEUI 11. A user wants to transfer a text file from a Windows 9x system to a Windows XP system. Which layer in the OSI model will smooth out the encoding differences between the two operating systems? a. Transport layer c. Presentation layer b. Session layer d. Application layer 12. Which of the following is NOT a valid IP address? a. 192.168.12.3 c. 212.78.23.256 b. 202.135.24.2 d. 255.255.0.1 ____ 13. In a ____ topology, computers connect to every other computer in the network via a dedicated line. a. bus c. ring b. star d. mesh ____ 14. Which cable type is the best choice for long distance transmission of data? a. CAT1 c. RG-6 b. RG-58 d. Fiber optic ____ 15. The ____ contains circuitry that takes incoming frames from one cable and repeats them to every other wire on the network. a. Repeater c. Router b. Switch d. Hub ____ 16. Which category of UTP supports speed up to 100 megabits per second? a. Category 2 c. Category 4 b. Category 3 d. Category 5 (5e) ____ 17. A repeater operates at the ____ layer of the OSI model. a. Physical c. Transport b. Data Link d. Network ____ 18. An Ethernet switch is a special ____ that can place some devices into their own collision domains. a. Node c. Repeater b. Hub d. Bridge ____ 19. Which of the following technologies is designed to work as a high-speed backbone to support large networks? a. Token Ring c. Fast Ethernet b. Ethernet d. FDDI ____ 20. Which IEEE standard defines wireless networking? a. 802.3 c. 802.11 b. 802.5 d. 802.1 ____ 21. Which device should be used to connect a Token Ring LAN to an Ethernet LAN? a. Switch c. Hub b. Router d. None of the above ____ 22. Which of the following connectors does ThinNet use? a. RJ-45 c. BNC b. ST d. DIX ____ 23. Which of the following cabling systems uses RJ connectors? a. Coax c. UTP b. STP d. Fiber ____ 24. Which of the following RJ variants uses eight-wire cables? a. RJ-11 c. RJ-8 b. RJ-12 d. RJ-45 ____ 25. Which of the following expansion slots is fast, 32-bit, and self-configuring? a. ISA c. PCI b. EISA d. MCA ____ 26. Which of the following protocols handle assembly and disassembly of packets during data transmission across the network? a. IP c. TCP/IP b. TCP d. SPX ____ 27. Which device is responsible for performing most of the Data Link functions? a. NIC c. Router b. Hub d. Cable ____ 28. ____ means the ability of a system to continue functioning even when some part of it has failed. a. Redundancy c. Fault Tolerance b. Failover d. Capacity ____ 29. Which of the following cables is NOT a part of the cable group? a. Coax c. Metal b. Fiber d. Twisted pair ____ 30. Which of the following devices filter network traffic, thus preserving network bandwidth? a. Hubs c. Repeaters b. Switches d. Bridges Completion Complete each sentence or statement. 31. ____Embedded______ SQL specification provides SQL interface to programming languages, specifically Ada, C, COBOL, FORTRAN, MUMPS, Pascal, and PL/I. Applications may thereby integrate program control structures with SQL data manipulation capabilities. 32. When accessing a SQL stored procedure from an object-oriented language / API ___functions____ are used to pass arguments to and from the application to the procedure. 33. A(n) _____view_____ is a virtual table whose contents are defined by a query. Like a real table, a it consists of a set of named columns and rows of data. 34. By using ______joins_______ in SQL, you can retrieve data from two or more tables based on logical relationships between the tables.. 35. The ____COMMIT_____ command in SQL causes all data changes in a transaction to be made permanent. 36. The_____CREATE____ command causes an object (a table, for example) to be created within the database. 37. A(n) _____index______ allows the database program to find data in a table without scanning the entire table. 38. ____UPDATE_____ statements in SQL change data in one or more records in a relational database management systemmode. 39. A(n) ____trigger_____ is a fragment of code that you tell SQL / Oracle to run before or after a table is modified. 40. A(n) ______primary key_______ is a value that can be used to identify a particular row in a table.. Essay 41. Explain the difference between a procedure and a trigger. What processes can a trigger perform on a database. 42. Code the SQL statements necessary to make a Categories table in the Northwinds database that relates to the Products table and alots for a Category to have many Products (searchable by category name), and a Product to belong to only one Category. 43. Explain the difference between an outer join and an inner join. 44. List and explain at least three advantages of using stored procedures? 45. Explain the N(3)-tier architecture in regards to database-driven applications? Which tier do you think is the most important and why? 46. Define what a constraint is in SQL. List and explain at least three different types of constraints. 47. What is a view and what are the advantages of using them in a SQL database? 48. What is the difference between the having clause and the group by clause in SQL? 49. Explain the having clause and when it should be used in a SQL query? 50. What do you thing is the most important factor of database administration and why? Network Fundamentals Mid-Term Exam Answer Section MULTIPLE CHOICE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. B D C A B A B B A C C C D D D D A B D C B C C D C B A C C D COMPLETION 31. Cyclic Redundancy Check CRC 32. network protocol 33. Virtual Private Network VPN 34. Physical 35. 802.10 36. broadband 37. 38. 39. 40. MAC address Packet sniffers crossover Wireless Access Port WAP ESSAY 41. A resource is a particular device on the network that can be shared with other systems. Typical resources include files, folders, and printers. 42. Encryption is the technique used by network administrators to provide security to data sent over the Internet. For encryption to work both the sending and receiving system must know the encryption methods and must be able to encrypt and decrypt the files. 43. The two main advantages of using fiber optic cables are: a. They can be used in high EMI areas. b. They enable long distance data transmission. 44. Any device on the network that has a MAC address is called a node. 45. A backbone is a segment, usually a high speed one, that connects other segments. 46. The steps in the installation of a NIC are: a. Installing the NIC physically in the device. b. Assigning free system resources to the NIC. c. Installing the drivers for the NIC. 47. The advantages of buying name-brand NICs are: a. They are better made, have extra features and are easy to return if they turn out to be defective. b. It is easy to replace a missing driver on a name-brand NIC, and to be sure that the drivers work well. 48. A protocol is a predetermined set of rules that describe how two devices or software should communicate with each other in the network. 49. Since both the users are able to view their shared resources there is no problem with the NIC or the hub. The possible cause of the problem could be that either the database of user names residing on A's system is not able to authenticate user B or user B has no privileges to copy the file. 50. List and describe the seven layers of the OSI model.