Advertisement Upgrade to remove ads

network node

A(n) _____ is a device such as a computer system, printer, or router attached to a network that can send or receive messages.

a. datagram
b. Ethernet
c. token
d. network node

store and forward

Most large scale delivery services, including modern computer networks use a(n) ____ system to connect source and destination nodes.

a. point-to-point
b. store and forward
c. high-capacity
d. media access

star

A network using a physical _____ topology connects all nodes to a central point (e.g., a hub or wiring concentrator).

a. star
b. ring
c. bus
d. logical

cluster

Which of the following is NOT a physical topology commonly employed in local or wide area networks?

a. bus
b. cluster
c. ring
d. star

Logical

_____ topology refers to the path that messages traverse as they travel from node to node.

a. Physical
b. Star
c. Logical
d. Ring

star

Which physical topology type connects all end nodes to a central node such as a hub or router?

a. bus
b. cluster
c. ring
d. star

bus

Which physical topology type connects all end nodes to a common (shared) transmission medium?

a. bus
b. cluster
c. ring
d. star

ring

Which physical topology type connects each end node to two other end nodes?

a. bus
b. cluster
c. ring
d. star

ring

In a network using the ____ topology, messages are passed from one node to the next until they reach their destination.

a. ring
b. bus
c. star
d. logical

routing table

A central node connected to multiple networks or network segments maintains an internal ____ that tells it which network addresses correspond to which physical networks or network segments.

a. logical topology
b. transport layer
c. routing table
d. gateway

media access control

What type of protocol defines the methods by which a network node may access a shared transmission medium?

a. routing
b. collision
c. data link
d. media access control

collision

When multiple nodes attempt to transmit across the same medium at the same time a(n) ____ is said to have occurred.

a. connection
b. collision
c. load balance
d. transparent access

bus

Which of the following logical network topologies is most commonly in use when the CSMA/CD media access strategy is employed?

a. ring
b. bus
c. star
d. physical

token

A(n) ____ is a special purpose packet, representing the right to originate network message.

a. control packet
b. ticket
c. token
d. switch

Token passing

____ avoids the potential inefficiencies of CSMA/CD because not transmission capacity is wasted on collisions and retransmissions.

a. Bus topology
b. NIC
c. Token passing
d. CSMA/CD

switch

A physical connection between two networks or network segments is implemented using a(n) ____.

a. socket
b. WAN
c. switch
d. MAC

bridge

A(n) ____ scans packets on each network for destination addresses of nodes on another network and copies those packets onto the other network.

a. hub
b. token
c. bridge
d. socket

cap

A physical connection between two different networks can be implemented using any of the following except a _____.

a. bridge
b. router
c. cap
d. switch

switch

A(n) ____ creates a new virtual LAN for each packet and destroys the virtual LAN as soon as the packet has reached its destination.

a. bridge
b. hub
c. router
d. switch

connection decisions are made by hardware based only on the destination address

A switch dramatically improves network performance because ____.

a. connection decisions are made by hardware based only on the destination address
b. each virtual LAN has many sending and one receiving nodes
c. both A and B
d. neither A nor B

Open Systems Interconnection

The ____ model defines a generic set of software and hardware layers for networks and distributed systems.

a. Media Access Control
b. Routing Information
c. Asynchronous Transfer
d. Open Systems Interconnection

application layer

Which of the following contains programs that generate requests for network services?

a. presentation layer
b. session layer
c. network layer
d. application layer

session

The _____ layer of the OSI model monitors communication to detect and deal with any problems that arise.

a. data link
b. network
c. session
d. transport

presentation

The ____ layer is primarily used by applications that format data for user display.

a. application
b. network
c. data link
d. presentation

data link

The ____ layer is the interface between network software and hardware.

a. network
b. data link
c. application
d. transport

network

The ____ layer routes packets to their proper destination.

a. data link
b. network
c. session
d. transport

datagram

TCP uses a(n) ____ as the basic unit of data transfer.

a. frame
b. socket
c. token
d. datagram

IP but not TCP

A gateway implements the ____ protocol layer(s).

a. TCP but not IP
b. IP but not TCP
c. TCP and IP
d. ICMP

RIP

Routing information in a TCP/IP network is exchanged according to the ____.

a. CSMA/CD
b. MAC
c. RIP
d. NIC

gateway

A(n) ____ might be physically implemented as a workstation, server, hub, bridge, router, or switch.

a. socket
b. token
c. gateway
d. datagram

port 21

Which of the following is the default TCP connection for FTP?

a. port 21
b. port 23
c. port 53
d. port 139

connectionless

Packet loss cannot always be detected by a receiver if a(n) ____ protocol is in use.

a. connection-oriented
b. connectionless
c. routing information
d. transport control

combination of an IP address and a service port number

A socket is a(n) ____.

a. combination of an IP address and a service port number.
b. standard network cable connector
c. node that connects two or more networks or network segments
d. TCP connection with a unique integer number

H.323

What is the oldest and most widely deployed VoIP protocol suite?

a. CSMA/CD
b. H.323
c. ICMP
d. X.500

latency and jitter

Which of the following problems affect VoIP telephone conversations?

a. token loss and latency
b. store and forward
c. latency and jitter
d. none of the above

802

The IEEE ____ standards define many parameters of network design and implementation.

a. 208
b. 802
c. 820
d. 288

data link

The 802.1 and 802.2 standards roughly correspond to the ____ layer of the OSI model.

a. data link
b. network
c. presentation
d. session

Ethernet

Which network type is based on the IEEE 802.3 standard?

a. Ethernet
b. SMDS
c. TCP/IP
d. Token Ring

Ethernet

The original ____ standard transmits data at 10 Mbps.

a. Ethernet
b. CSMA/CD
c. ATM
d. ICMP

Third generation

_____ programming languages do not usually provide a programmer with the ability to manipulate databases and graphical user interfaces.

a. Third generation
b. Fourth generation
c. Fifth generation
d. Object-oriented

4GL

Which of the following has the highest degree of instruction explosion?

a. machine language
b. assembly language
c. 3GL
d. 4GL

machine languages

Binary CPU instructions, called ____, are the earliest programming languages.

a. assembly languages
b. 3GLs
c. 4GLs
d. machine languages

assembler

What translates assembly language programs into binary CPU instructions?

a. compiler
b. assembler
c. command layer
d. service layer

FORTRAN

Which of the following is an example of a third generation language?

a. LISP
b. Java
c. FORTRAN
d. VBScript

graphical user interface

Which of the following types of functions are generally supported in a 4GL but not in a 3GL?

a. floating point computations
b. indexed file I/O
c. control structures
d. graphical user interface

fourth generation language (4GL)

Which term best describes a programming language that incorporates database and advanced user interface capabilities?

a. high-level language
b. fourth generation language (4GL)
c. command language
d. assembly language

SQL

Which of the following is considered a nonprocedural programming language?

a. COBOL
b. SQL
c. FORTRAN
d. Pascal

5GL

A(n) ___ is a nonprocedural language suitable for developing software that mimics human intelligence.

a. 1GL
b. 2GL
c. 3GL
d. 5GL

object

A(n) ____ is a system component that combines a set of related data and the methods that manipulate that data.

a. process
b. class
c. subroutine
d. object

SmallTalk

Which of the following was the first commercial OOP language?

a. C++
b. Java
c. VisualBasic
d. SmallTalk

message

A(n) ____ is a request to execute a specific method and return a response.

a. method
b. object
c. message
d. link editor

executable code

What must source code be translated into before it can be run by the CPU?

a. assembly language
b. operation code
c. executable code
d. command language

compiler

What software component translates a high level programming language into machine instructions?

a. compiler
b. operating system
c. debugger
d. kernel

compiler

A(n) ____ translates some source code instructions directly into executable code and other source code instructions into library calls.

a. compiler
b. interpreter
c. link editor
d. assembler

data declaration

A compiler allocates storage space and makes an entry in the symbol table when a(n) ____ is encountered in source code.

a. data declaration
b. data operation
c. control structure
d. I/O operation

data operation

A(n) ____ is any instruction that updates or computes a data value.

a. data declaration
b. data operation
c. control structure
d. symbol table

Control structures

____ in source code program are translated into machine instructions to evaluate conditions and/or transfer control from one program module to another.

a. Control structures
b. Data declarations
c. Data operations
d. Symbol tables

MOV, PUSH, JMP

Which machine instruction sequence below implements a function call passing one parameter?

a. MOV, ADD, JMP
b. MOV, POP
c. MOV, ADD, POP
d. MOV, PUSH, JMP

unresolved references

A link editor searches object code files for ____.

a. file I/O operations
b. device I/O operations
c. unresolved references
d. compiler libraries

smaller

Dynamically linked executable files are ____ than statically linked executable files.

a. smaller
b. larger
c. more machine dependent
d. less machine dependent

they automatically incorporate updated operating system service routines

Which of the following statements about dynamically linked executable programs is true.

a. they are more reliable than statically linked executable programs
b. they automatically incorporate updated operating system service routines
c. they are larger than statically linked executable programs
d. they execute more quickly than statically linked executable programs

interpreter

A(n) ____ interleaves source code translation, link editing, and execution.

a. compiler
b. interpreter
c. link editor
d. external function

JVM

Java programs are compiled into object code for a hypothetical hardware and system software environment called the ____.

a. sandbox
b. JVM
c. rapid prototyping machine
d. 2GL

sandbox

A Java applet runs within the ____ of a Web browser.

a. interpreter
b. compiler
c. debugging version
d. sandbox

link editor

A(n) ____ produces a memory map to show the location of object code modules and library routines within executable code.

a. link editor
b. compiler
c. interpreter
d. dynamic link library

symbolic debugger

A(n) ____ uses the symbol table, memory map, and source codefiles to trace memory addresses to specific source code statements and variables.

a. compiler
b. link editor
c. symbolic debugger
d. external function

debugging version

An executable program that contains symbol table entries and debugging checkpoints is sometimes called a(n) ____.

a. product version
b. distribution version
c. symbolic version
d. debugging version

programmer's workbench

The term that describes an integrated set of program development tools (e.g., compiler, program editor, and debugger) is _____.

a. front-end CASE tool
b. back-end CASE tool
c. programmer's workbench
d. JVM

programmer's workbench

Which of the following terms best describes Oracle JDeveloper?

a. compiler
b. interpreter
c. programmer's workbench
d. symbolic debugger

CASE tool

Which software component supports a broad range of system development activities with particular emphasis on model development?

a. CASE tool
b. compiler
c. assembler
d. fourth generation language (4GL)

back-end CASE tool

A tool suite that primarily supports program development based on specific analysis and design models is called a(n) ____.

a. front-end CASE tool
b. back-end CASE tool
c. class library
d. compiler library

front-end CASE tool

A tool suite that primarily supports model development is sometimes called a(n) ____.

a. front-end CASE tool
b. back-end CASE tool
c. class library
d. symbolic debugger

Database management

Which of the following is not an operating system function?

a. CPU management
b. Memory management
c. Process management
d. Database management

machine layer

Which of the following is not an operating system layer?

a. command layer
b. application layer
c. machine layer
d. service layer

Java

Which of the following is not an example of a command language?

a. MS-DOS
b. IBM MVS JCL
c. Java
d. UNIX Bourne Shell

service call

A request to execute a service layer function is called a(n) ____.

a. service layer
b. command layer
c. service call
d. shell

service

The ____ layer of the operating system contains a set of functions that are executed by application programs and the command layer.

a. command
b. service
c. application
d. kernel

kernel

What software component contains device drivers?

a. command layer
b. service layer
c. kernel
d. application layer

kernel

The ____ is the portion of the operating system that manages resources and directly interacts with computer hardware.

a. service layer
b. hardware layer
c. command layer
d. kernel

kernel

Which software component directly interacts with storage and I/O devices?

a. application layer
b. command layer
c. service layer
d. kernel

service layer

Which operating system layer is responsible for balancing the competing demands of processes for access to hardware resources?

a. application layer
b. command layer
c. service layer
d. kernel

system resources

Most service calls are actually indirect requests for ____.

a. a page swap
b. process spawning
c. system resources
d. process queue

real resources

A computer systems physical devices and associated system software are called ____.

a. virtual resources
b. system overhead
c. real resources
d. spawns

system overhead

The hardware resources consumed by the resource allocation functions of the kernel are sometimes referred to as _____.

a. real resources
b. system overhead
c. virtual resources
d. supervisor resources

virtual

A(n) ____ resource is apparent to a process or user, although it may not physically exist.

a. virtual
b. explicit
c. contiguous
d. multithreaded memory

process control block

Information about a single processes' execution state (e.g., register values, status, etc.) is held in a(n) ____ for use by the scheduler.

a. run queue
b. process control block
c. page table
d. scheduler

process queue

Process control blocks are normally organized into a linked list called the ____.

a. scheduler
b. process queue
c. sibling process
d. page tables

process family

A group of processes descended from a common ancestor, including the common ancestor itself, is called a(n) ____.

a. spawn
b. process group
c. process family
d. parent process

thread control block

The operating system keeps track of thread-specific information in a(n) ____.

a. thread control block
b. thread list
c. process control block
d. process queue

thread

A(n) ____ is an executable subunit of a process that is scheduled independently but shares memory and I/O resources with its parent.

a. page
b. thread
c. shell
d. victim

multitasking

An operating system that supports ____ allows multiple programs to execute concurrently.

a. multitasking
b. multithreading
c. virtual memory management
d. page tables

multithreading

An operating system that supports ____ allows a single program to be divided into components that can execute concurrently.

a. multitasking
b. multithreading
c. virtual memory management
d. interleaved execution

ready

A thread in the ____ state requires only access to the CPU to continue execution.

a. blocked
b. running
c. ready
d. virtual

ready, running

Dispatching a thread moves it from the ____ state to the ____ state.

a. ready, running
b. running, blocked
c. blocked, ready
d. running, ready

dispatching

The act of giving control of a CPU to a ready thread is called ____.

a. scheduling
b. interprocess synchronization
c. threading
d. dispatching

blocked

When a thread makes an I/O service request, it is placed in the ____ state until processing of the request is completed.

a. virtual
b. running
c. ready
d. blocked

scheduler

The ____ determines which thread to move to the running state.

a. scheduler
b. supervisor
c. task manager
d. service layer

interrupt

CPU control is lost whenever a(n) ____ is received and the CPU pushes the current thread onto the stack and transfers control to the operating system.

a. error
b. page fault
c. service call
d. interrupt

timer interrupt

The CPU periodically generates a(n) ____ to guarantee the scheduler and opportunity to allocate the CPU to another ready process.

a. page fault
b. timer interrupt
c. preemptive thread
d. explicit signal

shortest time remaining

Under the ____ scheduling method, threads requiring the least CPU time to complete execution are dispatched first.

a. first come first served
b. real time
c. shortest time remaining
d. highest priority

first come first served

In the ____ scheduling method, processes are dispatched in the order of their arrival.

a. real time
b. last in first out
c. multithreaded
d. first come first served

Real time

____ scheduling guarantees that a process will receive sufficient resources to complete one program cycle within a state time interval.

a. Real time
b. Last in first out
c. Multithreaded
d. First come first served

contiguous

Under ____ memory allocation, all portions of a process must be loaded into sequential physical memory locations.

a. partitioned memory
b. non-contiguous
c. contiguous
d. paged

address mapping

The process of converting an address operand into a physical address within a memory partition or page frame is called ____.

a. multitasking
b. address mapping
c. real-time scheduling
d. preemptive scheduling

wasted memory

A significant problem with contiguous memory allocation using fixed size memory partitions is ____.

a. wasted memory
b. compaction
c. system overhead
d. page fault

non-contiguous

Under ____ memory allocation, portions of a single process can be allocated to free partitions anywhere in memory.

a. contiguous
b. interleaved
c. fragmented
d. non-contiguous

compaction

Periodic ____ is required to combine unallocated partitions when contiguous memory allocation is used.

a. fragmentation
b. compaction
c. page swapping
d. page faults

swap space

Under virtual memory management, pages not held in primary storage are held in the ____ of a secondary storage device.

a. swap space
b. page table
c. page frame
d. run queue

memory reference

A(n) ____ to a page held in the swap space results in that page being loaded into a page frame in memory.

a. service call
b. child process
c. memory reference
d. system overhead

virtual memory

Under ____ management, the location of a memory page is determined by searching a page table.

a. partitioned memory
b. relocatable memory
c. virtual memory
d. multithreaded memory

page fault

A reference to a page held in secondary storage is called a(n) ____.

a. page hit
b. swap space
c. page fault
d. page table

storage I/O control

The ____ layer manages the movement of data between storage devices and memory.

a. logical file access
b. file control
c. storage I/O control
d. file management

file control

The ____ layer provides a set of service functions for manipulating files and directories.

a. logical file access
b. file control
c. storage I/O control
d. file management

Storage I/O control

Which of the following file management system layers correspond to the kernel layer of the operating system?

a. Command
b. Storage device
c. Storage I/O control
d. Storage device

Interrupt handlers

Software modules within the storage I/O control layer include which of the following?

a. Interrupt handlers
b. Interpreters
c. Code generators
d. Link editors

executable programs

Most file management systems support ____.

a. all predefined file types
b. a handful of predefined file types with a mechanism for adding new type definitions
c. executable programs
d. text file types only

restrictions on its name

In most file management or operating systems, a file's type determines ____.

a. data encoding method
b. data access method
c. restrictions on its name
d. physical storage allocation

data access methods

A file's directory entry normally does not contain information about its ____.

a. owner
b. access controls
c. physical location
d. data access methods

fully qualified reference

A(n) ____ consists of a master (root directory), one or more subdirectories, and a file name.

a. block
b. fully qualified reference
c. logical record
d. relative path

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set