Nt1210 Ch 3 Review

In: Computers and Technology

Submitted By 106jae
Words 286
Pages 2
NT1210
Chapter 3 Review 1. B
2. C, D
3. C
4. A, D
5. C, D
6. A
7. D
8. B
9. B
10. D
11. C
12. C
13. C
14. D
15. B
16. A, D
17. A, C
18. B, C
19. B
20. B, C, D
Key Terms
TCP/IP Networking – Computer network that uses the standards defined by the TCP/IP model.
Networking standard – Document that details information about technology related to networking.
TCP/IP model – Collection of standards related to all parts of networking.
Open networking model – Model whose standards can be read and used to create products.
Open Systems Interconnection (OSI) Model – Open networking model developed by ISO.
Encoding – Process of varying the energy signal on a link so that bits can communicate over a link.
Header – Bytes of data, defined by some standard or protocol.
Trailer – Used almost exclusively by data link layer protocols.
Leased line – A physical line between two locations, provided by a telco.
Internet Protocol (IP) – The main TCP/IP network layer protocol.
IP address – A 32 bit binary number, often written in the DDN format.
IP routing – Forwarding an IP packet from end to end through a TCP/IP network.
Frame – Refers to the data link header and trailer plus data encapsulated in between
Packet – Refers to the network layer header plus any headers that follow through the user data.

Acronyms
TCP/IP – Transmission Control Protocol/Internet Protocol
TCP – Transmission Control Protocol
HTTP – Hypertext Transfer Protocol
LAN – Local Area Network
WAN – Wide Area Network
IEEE – Institute of Electrical and Electronic Engineers
ITU – International Telecommunications Union
RFC – Request for Comments
OSI – Open systems Interconnection Model
DDN – Dotted Decimal Notation
CO – Central Office…...

Similar Documents

Ch 3 Review

...Chapter 3 (REVIEW-Self study chapter) After studying this chapter, you should be able to: Understand basic accounting terminology. Explain double-entry rules. Explain how transactions affect the accounting equation. Identify the steps in the accounting cycle and the steps in the recording process. Explain the reasons for and prepare adjusting entries. Explain how the type of ownership structure affects the financial statements. Prepare closing entries and consider other matters relating to the closing process. Prepare a 10-column work sheet and financial statements. After studying Appendix 3A, you should be able to: Identify adjusting entries that may be reversed. THE ACCOUNTING INFORMATION SYSTEM The Accounting Information System Basic Terminology Event: The cause of changes of assets, liabilities, and equity Transaction: A transfer or exchange between two or more entities or parties Account: Where transactions are recorded - A separate account is used for each asset, liability, revenue, expense, gain, loss and capital (owner’s equity) Permanent accounts (or “real” accounts) * Asset, liability, and equity accounts * Appear on the balance sheet * Permanent accounts are not closed at year end Temporary accounts (or “nominal” accounts) * Revenue, expense, and dividend accounts * Revenue and expenses are on the income statement; dividends are on the statement of changes in shareholders equity. *......

Words: 1362 - Pages: 6

Nt1210 Lab 1 Reviews

...NT1210 INTRODUCTION TO COMPUTER DATA LAB 1.1: READING BINARY Exercise: 1.1.1 Create a mapping for decimal number 2931. 10^3 | 10^2 | 10^1 | 10^0 | 1000 | 100 | 10 | 1 | 2 | 9 | 3 | 1 | x | x | x | = 2931 = 2931 x | 2000 + | 900 + | 30 + | 1 | Exercise: 1.1.2 Create a mapping for binary number 110 subscript 2. 2^2 | 2^1 | 2^0 | 4 | 2 | 1 | x | x | x | 1 | 1 | = 6 = 6 0 | 4 + | 2 + | 0 | Exercise: 1.1.3 Create a mapping for binary number 11 subscript 2. 2^1 | 2^0 | 2 | 1 | x | x | 1 | = 3 = 3 1 | 2 + | 1 + | Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the binary number 11100010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 1 | 1 | 1 | 0 | 0 | 0 | 1 | = 226 = 226 0 | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.6: Create a binary conversion for the decimal value 156. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | = 10011100 = 10011100 x | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 128+ | 0+ |......

Words: 800 - Pages: 4

Nt1210 Chapter 3 Key Terms

...NT1210 Chapter 3 Key terms TCP/IP network-A computer network that uses the standards defined and referenced by the TCP/IP model. Networking standard-A document that details information about some technology or protocol related to networking and that document has been passed through a review and approval process that certifies the document as a standard. TCP/IP model-An open collection of standards related to all parts of networking, grouped together purposefully, so that if a company builds a network using these standards and using products that use these standard, the different network components will work together correctly. Open networking model-A networking model whose standards can been read and used to create products without payment to any one company. Open system Interconnection (OSI) model-An open networking model developed by ISO over the same time frame as TCP/IP. Encoding-The process of varying the energy signal on a link so that after the signal is decoded on the receiving device, bits have been communicated over the link. Header-Bytes of data, defined by some standard or protocol, and added in front of the user data that needs to be sent. Protocols use headers to store information that the protocol needs to communicate with other devices. Trailer-Bytes of data, defined by some standard or protocol, and added after the user data that needs to be sent. Used almost exclusively by data link layer protocols. Leased line-A physical link between two......

Words: 472 - Pages: 2

Nt1210 Lab 3

...NT1210 Lab 3.1 3.1.1 You wouldn’t be able to communicate with other devices. You would have to go back to hardline phone and using mail service. No more on the go communications. 3.1.2 The OSI model. It actually shows the process. 3.1.3 Physical, Data, Link, Network, Transport, Session and Presentation. 3.1.4 If its too general the reader wont understand completely. And if its too focused or granular on details it will bore the reader. 3.2.1 Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads ApplicationPresentationSession | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.2 3.2.3 First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the......

Words: 483 - Pages: 2

Nt1210 Chapter 4 Review

...Chapter 4 Review Multiple Choice 1. B & C 2. A & C 3. C & D 4. A & D 5. B 6. B 7. A & B 8. A 9. A 10. C 11. C 12. D 13. A & C 14. B 15. B 16. A & D 17. D 18. A & D 19. C 20. B, C & D Define Key Terms 1. Electrical Circuit - A complete loop of material that conducts electricity. 2. Frequency - When describing energy that acts like waves, the number of times that the entire waveform repeats per second. 3. Amplitude - When describing energy that acts like waves, when graphing the waveform centered on the X axis, and graphing some kind of power (for example, voltage) on the Y axis, the amplitude is the maximum height of the curve over the X axis. 4. Phase - When describing energy that acts like waves, in a sine wave, the specific point or place in the repeating continuous wave. 5. Bit Time - In an encoding scheme, the time period during which the encoding scheme sends an energy signal to represent 1 bit. 6. encoding scheme - A set of rules that define how to change the pattern of the waveforms of energy to represent binary 0s and 1s. 7. unshielded twisted-pair(UTP) - A type of cabling that uses pairs of copper wires, twisted together, with no additional shielding from the effects of EMI. 8. Core - In a fiber-optic cable, the glass fiber in the center of the cable over which light can pass. 9. Cladding - In a fiber-optic cable, the material around the core that helps direct light back into the core. 10. radio waves - Electromagnetic energy in a...

Words: 412 - Pages: 2

Nt1210 Lab 3

...Mason Schwarz NT1210 1/14/15 Lab 3 Lab 3.1 The network reference models refer to the TCP and the OSI models of communication between machine and server. The TCP model has a 5 layer process, whereas the OSI model has a 7 layer process. Each is important for sending and receiving data throughout the network. Lab 3.2 The OSI reference model is a networking model that serves as communication between a client and server. This is a 7 layer process. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from one client to another. The fifth layer sets up which software should run the data. The sixth layer determines how the data is presented. The seventh layer opens the application that the data is displayed on. Lab 3.3 The TCP model is exactly the same thing as the OSI model except for the fact that the last 3 layers are shown as 1. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from sender to receiver. The fifth layer sets up which software should run the data, determines how its presented and loads the proper......

Words: 343 - Pages: 2

Nt1210 Unit 3

... NT1210 Lab 3 Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The costs of wireless devices could skyrocket if they were not governed by the Wi-Fi alliance. Each vendor would be able to set its own standards and charge its own fees if they were not restricted to certain regulations Plus nothing would be compatible with each other you would happen to go in a Café to use their wireless WIFI if your laptop was not the same brand it would not work. Reference models provide more than just a means of standardization. They also provide a way to visualize and describe communication, even if we cannot physically see or observe the connection itself. Exercise 3.1.2 Give another example of a model that is used to visualize something that is difficult to observe or perceive. Laptop Wireless Connection and a Linksys Wireless Router How does the model make it easier to understand? The easiest model to understand is the Laptop and Wireless router model because we use them every day. Modeling Communication Exercise 3.1.3 Based on what you already know about networks, what are the different layers you think would be necessary for communication to be mapped to a model? Consider direct connections between host devices and connections that require other routing equipment, such as a hub, switch, or router. Direct...

Words: 1469 - Pages: 6

Nt1210 Unit 3

... NT1210 Lab 3 Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The costs of wireless devices could skyrocket if they were not governed by the Wi-Fi alliance. Each vendor would be able to set its own standards and charge its own fees if they were not restricted to certain regulations Plus nothing would be compatible with each other you would happen to go in a Café to use their wireless WIFI if your laptop was not the same brand it would not work. Reference models provide more than just a means of standardization. They also provide a way to visualize and describe communication, even if we cannot physically see or observe the connection itself. Exercise 3.1.2 Give another example of a model that is used to visualize something that is difficult to observe or perceive. Laptop Wireless Connection and a Linksys Wireless Router How does the model make it easier to understand? The easiest model to understand is the Laptop and Wireless router model because we use them every day. Modeling Communication Exercise 3.1.3 Based on what you already know about networks, what are the different layers you think would be necessary for communication to be mapped to a model? Consider direct connections between host devices and connections that require other routing equipment, such as a hub, switch, or......

Words: 1469 - Pages: 6

Nt1210 Review Questions

...NT1210 Cynthia Allen Unit 7 Chapter Review Questions Key Terms 1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished. 2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point. 3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits. 4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point. 5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message. 6. Time –division- multiplexing –A type of logic used by some networking devices including......

Words: 451 - Pages: 2

Nt1210 Chapter 3 Review

...Chapter 3 Review 1. Which of the following is true about a TCP/IP network? * b. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. Which of the following terms is NOT a common synonym for TCP/IP model? (Choose two answers.) * c. Ethernet * d. TCP/IP mapping 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) * a. It exists as a written document. * c. it has been passed through some form of review and approval or certification process. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) * b. International standard documents have been reviewed more thoroughly. * d. International standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) * b. The data link layer sits lower in the model than the transport layer. * c. The physical layer sits just below the data link layer. * d. The network layer sits in the middle of the five layers. 6. The TCP/IP model refers to standards other than those the IETF defines in RFC’s. Which of these standards groups is typically the source of external......

Words: 1157 - Pages: 5

Nt1210 Midterm Review

...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of......

Words: 11596 - Pages: 47

Guide to Unix Ch. 3 Review

...1. You are using vi to edit a file and have just entered 12 new lines. You need to replicate the same 12 lines right after you enter them. What command-mode command can you type to replicate the lines? (Choose all that apply.) A. a period (.) 2. Which of the following enables you to move the cursor to the left while you are in command mode in the vi editor? (Choose all that apply.) B. Press the left arrow key. C. Press H 3. When you started the vi editor, you forgot to specify the name for the new file you are creating. To save steps next time, how can you specify the name of a new file when you first start vi? C. Enter vi and the filename, such as vi myfile 4. Your colleague has written a line of text in vi and now wants to delete the line, but save its contents in a buffer in case he decides to bring back the line he deletes. What do you recommend? C. While in command mode, move the cursor to the first character in the line and press dd. 5. You are in the vi editor and it’s now noon. Everyday at noon you run a program called update, which updates a database. How can you run the program without closing your vi session? D. From command mode, type :!update and press Enter. 6. While you are working on a report in vi, you decide to insert information from another text file in your home directory called summary_data. Which of the following commands (from command mode) enables you to add the contents of summary_data? A. :r summary_data 7. You’re editing a...

Words: 1014 - Pages: 5

Nt1210 Ch.3 Homework

...Multiple-Choice Even Numbers 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) a. TCP/IP architecture b. TCP/IP c. Ethernet d. TCP/IP mapping" 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) a. De facto standard documents have been reviewed more thoroughly. b. International standard documents have been reviewed more thoroughly. c. De facto standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. d. International standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 6. The TCP/IP model refers to standards other than those the IETF defines in RFCs. Which of these standards groups is typically the source of external LAN standards? (Choose two answers.) a. ITU b. IEEE c. Vendor groups d. ANSI 8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI terms. Which of the following is a correctly phrased statement for how to use OSI terminology? a. HTTP is a Layer 5 protocol. b. IP is a network layer protocol. c. TCP is a Layer 2 protocol. d. Leased lines are Layer 7......

Words: 955 - Pages: 4

Nt1210 - Ch.2 Review

...NT1210 – Chapter 2 Review Activities Multiple Choice 1. C. – Datacom 2. B. – Bob's incoming email server 3. B. – The call uses only digital electrical signals. D. – The call represents short sounds as a unique set of bits. 4. C. – The call uses both analog and digital electrical signals. D. – The call represents short sounds as a unique set of bits. 5. A. – Character set. 6. D. – Compress the video. 7. B. – www.certskills.com 8. C. – The web server sees the request for the web address, dynamically creates a single graphical image of the entire web page, and sends that one graphical image to the web browser. 9. A. – A website typically contains many web objects. C. – A web page typically contains many web object. D. – A website typically contains many web pages. 10. C. – The Operating System. D. – The PC’s NIC 11. A. – 16 HTTP GET request messages with 16 matching HTTP GET reply messages. 12. C. – Web Servers. D. – The GET request. 13. B. – www.certskills.com 14. C. – Node 15. A. – Router. D. – Switch. 16. D. – SMB Network 17. D. – Switch. 18. D. – The Internet 19. A. – Internet Service Provider 20. B. – Any ISP’s Network. List the Acronyms A/D – Active Directory DC – Domain Control FPS – Frames per Second GBps – Gigabytes per Second gbps – Gigabits per Second HTTP – Hypertext Transfer Protocol KBps – Kilobytes per second kbps – Kilobits per second LAN – Local Area Network MBps – Megabytes per second Mbps – Megabits per second NIC – Network...

Words: 265 - Pages: 2

Ch. 1 Review Question

...Ch. 1 Review Questions 1. Redundancy is the duplication of data or storing of the same data in more than one place. Redundancy wastes space and can lead to inconsistencies in information. 2. Nondatabases are time consuming and have a definitive amount of entries that can be made. 3. Entity is a person, place, object, event, or idea in which you want to store data; attribute is a characteristic or property of an entity. 4. Relationship is an association between entities. One to many relationships is when one entity associates with many other entities but many entities associate with just one. 5. Database is a structure that can store information about multiple types of entities the attributes of those entities, and the relationship between the entities. 6. Using common columns in the two tables creates it. 7. Visual way to represent a database. 8. Program, collection of programs through which users interacts with a database. 9. Determine the structure of the required database. 10. Screen objects used to maintain, view, and print data from a database. 11. The DBMS ask questions about desired content and appearance of each report and then creates the report automatically based on the answer. 12. Data of various users can be combined and shared among authorized users, allowing all users to access greater pool of data. 13. A person or group to be in charge of the database. 14. With the database approach, changing a......

Words: 426 - Pages: 2