Network Fundamentals Mid-Term Exam

advertisement
Mid-Term Exam
Network Fundamentals
Name: __________________
3/9/2016
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
____
____
____
____
____
____
____
____
____
____
____
____
1. Which system on the network shares resources?
a. Client
c. Terminal
b. Server
d. Sharing device
2. The ____ creates, sends as well as receives, and reads the frames moving across in the network.
a. UTP
c. Radio Waves
b. Fiber Cable
d. NIC
3. A frame sent to a ____ is processed by every single NIC on the network.
a. Server's IP Address
c. Broadcast Address
b. Default Gateway Address
d. Hub
4. The ____ protocol uses a unique dotted-octal numbering system based on four eight-bit numbers to identify
each machine on a network.
a. IP
c. TCP/IP
b. TCP
d. IPX
5. Which of the following devices is used to link multiple networks?
a. Hubs
c. NICs
b. Routers
d. Network expansion cards
6. Which of the following protocols allow the exchange of files on different computers across the network?
a. FTP
c. IP
b. TCP
d. HTTP
7. Layer 5 in the OSI model is also referred to as the ____ layer.
a. Data-link
c. Network
b. Session
d. Presentation
8. A hub belongs to the ____ layer.
a. Network
c. Transport
b. Physical
d. Data-link
9. The ____ layer controls the movement of a router during data transmission.
a. Network
c. Physical
b. Transport
d. Session
10. At the Application layer, the ____ protocol is used to request data from the Web server.
a. TCP
c. HTTP
b. IP
d. NetBEUI
11. A user wants to transfer a text file from a Windows 9x system to a Windows XP system. Which layer in the
OSI model will smooth out the encoding differences between the two operating systems?
a. Transport layer
c. Presentation layer
b. Session layer
d. Application layer
12. Which of the following is NOT a valid IP address?
a. 192.168.12.3
c. 212.78.23.256
b. 202.135.24.2
d. 255.255.0.1
____ 13. In a ____ topology, computers connect to every other computer in the network via a dedicated line.
a. bus
c. ring
b. star
d. mesh
____ 14. Which cable type is the best choice for long distance transmission of data?
a. CAT1
c. RG-6
b. RG-58
d. Fiber optic
____ 15. The ____ contains circuitry that takes incoming frames from one cable and repeats them to every other wire
on the network.
a. Repeater
c. Router
b. Switch
d. Hub
____ 16. Which category of UTP supports speed up to 100 megabits per second?
a. Category 2
c. Category 4
b. Category 3
d. Category 5 (5e)
____ 17. A repeater operates at the ____ layer of the OSI model.
a. Physical
c. Transport
b. Data Link
d. Network
____ 18. An Ethernet switch is a special ____ that can place some devices into their own collision domains.
a. Node
c. Repeater
b. Hub
d. Bridge
____ 19. Which of the following technologies is designed to work as a high-speed backbone to support large networks?
a. Token Ring
c. Fast Ethernet
b. Ethernet
d. FDDI
____ 20. Which IEEE standard defines wireless networking?
a. 802.3
c. 802.11
b. 802.5
d. 802.1
____ 21. Which device should be used to connect a Token Ring LAN to an Ethernet LAN?
a. Switch
c. Hub
b. Router
d. None of the above
____ 22. Which of the following connectors does ThinNet use?
a. RJ-45
c. BNC
b. ST
d. DIX
____ 23. Which of the following cabling systems uses RJ connectors?
a. Coax
c. UTP
b. STP
d. Fiber
____ 24. Which of the following RJ variants uses eight-wire cables?
a. RJ-11
c. RJ-8
b. RJ-12
d. RJ-45
____ 25. Which of the following expansion slots is fast, 32-bit, and self-configuring?
a. ISA
c. PCI
b. EISA
d. MCA
____ 26. Which of the following protocols handle assembly and disassembly of packets during data transmission
across the network?
a. IP
c. TCP/IP
b. TCP
d. SPX
____ 27. Which device is responsible for performing most of the Data Link functions?
a. NIC
c. Router
b. Hub
d. Cable
____ 28. ____ means the ability of a system to continue functioning even when some part of it has failed.
a. Redundancy
c. Fault Tolerance
b. Failover
d. Capacity
____ 29. Which of the following cables is NOT a part of the cable group?
a. Coax
c. Metal
b. Fiber
d. Twisted pair
____ 30. Which of the following devices filter network traffic, thus preserving network bandwidth?
a. Hubs
c. Repeaters
b. Switches
d. Bridges
Completion
Complete each sentence or statement.
31. ____Embedded______ SQL specification provides SQL interface to programming languages,
specifically Ada, C, COBOL, FORTRAN, MUMPS, Pascal, and PL/I. Applications may thereby
integrate program control structures with SQL data manipulation capabilities.
32. When accessing a SQL stored procedure from an object-oriented language / API ___functions____ are used
to pass arguments to and from the application to the procedure.
33.
A(n) _____view_____ is a virtual table whose contents are defined by a query. Like a real table, a it consists of a set of
named columns and rows of data.
34.
By using ______joins_______ in SQL, you can retrieve data from two or more tables based on logical relationships
between the tables..
35. The ____COMMIT_____ command in SQL causes all data changes in a transaction to be made
permanent.
36. The_____CREATE____ command causes an object (a table, for example) to be created within the
database.
37.
A(n) _____index______ allows the database program to find data in a table without scanning the entire table.
38. ____UPDATE_____ statements in SQL change data in one or more records in a relational database
management systemmode.
39. A(n) ____trigger_____ is a fragment of code that you tell SQL / Oracle to run before or after a table
is modified.
40. A(n) ______primary key_______ is a value that can be used to identify a particular row in a table..
Essay
41. Explain the difference between a procedure and a trigger. What processes can a trigger perform on a
database.
42. Code the SQL statements necessary to make a Categories table in the Northwinds database that relates to the
Products table and alots for a Category to have many Products (searchable by category name), and a Product
to belong to only one Category.
43. Explain the difference between an outer join and an inner join.
44. List and explain at least three advantages of using stored procedures?
45. Explain the N(3)-tier architecture in regards to database-driven applications? Which tier do you think is the
most important and why?
46. Define what a constraint is in SQL. List and explain at least three different types of constraints.
47. What is a view and what are the advantages of using them in a SQL database?
48. What is the difference between the having clause and the group by clause in SQL?
49. Explain the having clause and when it should be used in a SQL query?
50. What do you thing is the most important factor of database administration and why?
Network Fundamentals Mid-Term Exam
Answer Section
MULTIPLE CHOICE
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
B
D
C
A
B
A
B
B
A
C
C
C
D
D
D
D
A
B
D
C
B
C
C
D
C
B
A
C
C
D
COMPLETION
31. Cyclic Redundancy Check
CRC
32. network protocol
33. Virtual Private Network
VPN
34. Physical
35. 802.10
36. broadband
37.
38.
39.
40.
MAC address
Packet sniffers
crossover
Wireless Access Port
WAP
ESSAY
41. A resource is a particular device on the network that can be shared with other systems. Typical resources
include files, folders, and printers.
42. Encryption is the technique used by network administrators to provide security to data sent over the Internet.
For encryption to work both the sending and receiving system must know the encryption methods and must
be able to encrypt and decrypt the files.
43. The two main advantages of using fiber optic cables are:
a. They can be used in high EMI areas.
b. They enable long distance data transmission.
44. Any device on the network that has a MAC address is called a node.
45. A backbone is a segment, usually a high speed one, that connects other segments.
46. The steps in the installation of a NIC are:
a. Installing the NIC physically in the device.
b. Assigning free system resources to the NIC.
c. Installing the drivers for the NIC.
47. The advantages of buying name-brand NICs are:
a. They are better made, have extra features and are easy to return if they turn out to be defective.
b. It is easy to replace a missing driver on a name-brand NIC, and to be sure that the drivers work well.
48. A protocol is a predetermined set of rules that describe how two devices or software should communicate
with each other in the network.
49. Since both the users are able to view their shared resources there is no problem with the NIC or the hub. The
possible cause of the problem could be that either the database of user names residing on A's system is not able
to authenticate user B or user B has no privileges to copy the file.
50. List and describe the seven layers of the OSI model.
Download