How can we help?

You can also find more resources in our Help Center.

119 terms

IT Infrastructure Exam 3

STUDY
PLAY
network node
A(n) _____ is a device such as a computer system, printer, or router attached to a network that can send or receive messages.

a. datagram
b. Ethernet
c. token
d. network node
store and forward
Most large scale delivery services, including modern computer networks use a(n) ____ system to connect source and destination nodes.

a. point-to-point
b. store and forward
c. high-capacity
d. media access
star
A network using a physical _____ topology connects all nodes to a central point (e.g., a hub or wiring concentrator).

a. star
b. ring
c. bus
d. logical
cluster
Which of the following is NOT a physical topology commonly employed in local or wide area networks?

a. bus
b. cluster
c. ring
d. star
Logical
_____ topology refers to the path that messages traverse as they travel from node to node.

a. Physical
b. Star
c. Logical
d. Ring
star
Which physical topology type connects all end nodes to a central node such as a hub or router?

a. bus
b. cluster
c. ring
d. star
bus
Which physical topology type connects all end nodes to a common (shared) transmission medium?

a. bus
b. cluster
c. ring
d. star
ring
Which physical topology type connects each end node to two other end nodes?

a. bus
b. cluster
c. ring
d. star
ring
In a network using the ____ topology, messages are passed from one node to the next until they reach their destination.

a. ring
b. bus
c. star
d. logical
routing table
A central node connected to multiple networks or network segments maintains an internal ____ that tells it which network addresses correspond to which physical networks or network segments.

a. logical topology
b. transport layer
c. routing table
d. gateway
media access control
What type of protocol defines the methods by which a network node may access a shared transmission medium?

a. routing
b. collision
c. data link
d. media access control
collision
When multiple nodes attempt to transmit across the same medium at the same time a(n) ____ is said to have occurred.

a. connection
b. collision
c. load balance
d. transparent access
bus
Which of the following logical network topologies is most commonly in use when the CSMA/CD media access strategy is employed?

a. ring
b. bus
c. star
d. physical
token
A(n) ____ is a special purpose packet, representing the right to originate network message.

a. control packet
b. ticket
c. token
d. switch
Token passing
____ avoids the potential inefficiencies of CSMA/CD because not transmission capacity is wasted on collisions and retransmissions.

a. Bus topology
b. NIC
c. Token passing
d. CSMA/CD
switch
A physical connection between two networks or network segments is implemented using a(n) ____.

a. socket
b. WAN
c. switch
d. MAC
bridge
A(n) ____ scans packets on each network for destination addresses of nodes on another network and copies those packets onto the other network.

a. hub
b. token
c. bridge
d. socket
cap
A physical connection between two different networks can be implemented using any of the following except a _____.

a. bridge
b. router
c. cap
d. switch
switch
A(n) ____ creates a new virtual LAN for each packet and destroys the virtual LAN as soon as the packet has reached its destination.

a. bridge
b. hub
c. router
d. switch
connection decisions are made by hardware based only on the destination address
A switch dramatically improves network performance because ____.

a. connection decisions are made by hardware based only on the destination address
b. each virtual LAN has many sending and one receiving nodes
c. both A and B
d. neither A nor B
Open Systems Interconnection
The ____ model defines a generic set of software and hardware layers for networks and distributed systems.

a. Media Access Control
b. Routing Information
c. Asynchronous Transfer
d. Open Systems Interconnection
application layer
Which of the following contains programs that generate requests for network services?

a. presentation layer
b. session layer
c. network layer
d. application layer
session
The _____ layer of the OSI model monitors communication to detect and deal with any problems that arise.

a. data link
b. network
c. session
d. transport
presentation
The ____ layer is primarily used by applications that format data for user display.

a. application
b. network
c. data link
d. presentation
data link
The ____ layer is the interface between network software and hardware.

a. network
b. data link
c. application
d. transport
network
The ____ layer routes packets to their proper destination.

a. data link
b. network
c. session
d. transport
datagram
TCP uses a(n) ____ as the basic unit of data transfer.

a. frame
b. socket
c. token
d. datagram
IP but not TCP
A gateway implements the ____ protocol layer(s).

a. TCP but not IP
b. IP but not TCP
c. TCP and IP
d. ICMP
RIP
Routing information in a TCP/IP network is exchanged according to the ____.

a. CSMA/CD
b. MAC
c. RIP
d. NIC
gateway
A(n) ____ might be physically implemented as a workstation, server, hub, bridge, router, or switch.

a. socket
b. token
c. gateway
d. datagram
port 21
Which of the following is the default TCP connection for FTP?

a. port 21
b. port 23
c. port 53
d. port 139
connectionless
Packet loss cannot always be detected by a receiver if a(n) ____ protocol is in use.

a. connection-oriented
b. connectionless
c. routing information
d. transport control
combination of an IP address and a service port number
A socket is a(n) ____.

a. combination of an IP address and a service port number.
b. standard network cable connector
c. node that connects two or more networks or network segments
d. TCP connection with a unique integer number
H.323
What is the oldest and most widely deployed VoIP protocol suite?

a. CSMA/CD
b. H.323
c. ICMP
d. X.500
latency and jitter
Which of the following problems affect VoIP telephone conversations?

a. token loss and latency
b. store and forward
c. latency and jitter
d. none of the above
802
The IEEE ____ standards define many parameters of network design and implementation.

a. 208
b. 802
c. 820
d. 288
data link
The 802.1 and 802.2 standards roughly correspond to the ____ layer of the OSI model.

a. data link
b. network
c. presentation
d. session
Ethernet
Which network type is based on the IEEE 802.3 standard?

a. Ethernet
b. SMDS
c. TCP/IP
d. Token Ring
Ethernet
The original ____ standard transmits data at 10 Mbps.

a. Ethernet
b. CSMA/CD
c. ATM
d. ICMP
Third generation
_____ programming languages do not usually provide a programmer with the ability to manipulate databases and graphical user interfaces.

a. Third generation
b. Fourth generation
c. Fifth generation
d. Object-oriented
4GL
Which of the following has the highest degree of instruction explosion?

a. machine language
b. assembly language
c. 3GL
d. 4GL
machine languages
Binary CPU instructions, called ____, are the earliest programming languages.

a. assembly languages
b. 3GLs
c. 4GLs
d. machine languages
assembler
What translates assembly language programs into binary CPU instructions?

a. compiler
b. assembler
c. command layer
d. service layer
FORTRAN
Which of the following is an example of a third generation language?

a. LISP
b. Java
c. FORTRAN
d. VBScript
graphical user interface
Which of the following types of functions are generally supported in a 4GL but not in a 3GL?

a. floating point computations
b. indexed file I/O
c. control structures
d. graphical user interface
fourth generation language (4GL)
Which term best describes a programming language that incorporates database and advanced user interface capabilities?

a. high-level language
b. fourth generation language (4GL)
c. command language
d. assembly language
SQL
Which of the following is considered a nonprocedural programming language?

a. COBOL
b. SQL
c. FORTRAN
d. Pascal
5GL
A(n) ___ is a nonprocedural language suitable for developing software that mimics human intelligence.

a. 1GL
b. 2GL
c. 3GL
d. 5GL
object
A(n) ____ is a system component that combines a set of related data and the methods that manipulate that data.

a. process
b. class
c. subroutine
d. object
SmallTalk
Which of the following was the first commercial OOP language?

a. C++
b. Java
c. VisualBasic
d. SmallTalk
message
A(n) ____ is a request to execute a specific method and return a response.

a. method
b. object
c. message
d. link editor
executable code
What must source code be translated into before it can be run by the CPU?

a. assembly language
b. operation code
c. executable code
d. command language
compiler
What software component translates a high level programming language into machine instructions?

a. compiler
b. operating system
c. debugger
d. kernel
compiler
A(n) ____ translates some source code instructions directly into executable code and other source code instructions into library calls.

a. compiler
b. interpreter
c. link editor
d. assembler
data declaration
A compiler allocates storage space and makes an entry in the symbol table when a(n) ____ is encountered in source code.

a. data declaration
b. data operation
c. control structure
d. I/O operation
data operation
A(n) ____ is any instruction that updates or computes a data value.

a. data declaration
b. data operation
c. control structure
d. symbol table
Control structures
____ in source code program are translated into machine instructions to evaluate conditions and/or transfer control from one program module to another.

a. Control structures
b. Data declarations
c. Data operations
d. Symbol tables
MOV, PUSH, JMP
Which machine instruction sequence below implements a function call passing one parameter?

a. MOV, ADD, JMP
b. MOV, POP
c. MOV, ADD, POP
d. MOV, PUSH, JMP
unresolved references
A link editor searches object code files for ____.

a. file I/O operations
b. device I/O operations
c. unresolved references
d. compiler libraries
smaller
Dynamically linked executable files are ____ than statically linked executable files.

a. smaller
b. larger
c. more machine dependent
d. less machine dependent
they automatically incorporate updated operating system service routines
Which of the following statements about dynamically linked executable programs is true.

a. they are more reliable than statically linked executable programs
b. they automatically incorporate updated operating system service routines
c. they are larger than statically linked executable programs
d. they execute more quickly than statically linked executable programs
interpreter
A(n) ____ interleaves source code translation, link editing, and execution.

a. compiler
b. interpreter
c. link editor
d. external function
JVM
Java programs are compiled into object code for a hypothetical hardware and system software environment called the ____.

a. sandbox
b. JVM
c. rapid prototyping machine
d. 2GL
sandbox
A Java applet runs within the ____ of a Web browser.

a. interpreter
b. compiler
c. debugging version
d. sandbox
link editor
A(n) ____ produces a memory map to show the location of object code modules and library routines within executable code.

a. link editor
b. compiler
c. interpreter
d. dynamic link library
symbolic debugger
A(n) ____ uses the symbol table, memory map, and source codefiles to trace memory addresses to specific source code statements and variables.

a. compiler
b. link editor
c. symbolic debugger
d. external function
debugging version
An executable program that contains symbol table entries and debugging checkpoints is sometimes called a(n) ____.

a. product version
b. distribution version
c. symbolic version
d. debugging version
programmer's workbench
The term that describes an integrated set of program development tools (e.g., compiler, program editor, and debugger) is _____.

a. front-end CASE tool
b. back-end CASE tool
c. programmer's workbench
d. JVM
programmer's workbench
Which of the following terms best describes Oracle JDeveloper?

a. compiler
b. interpreter
c. programmer's workbench
d. symbolic debugger
CASE tool
Which software component supports a broad range of system development activities with particular emphasis on model development?

a. CASE tool
b. compiler
c. assembler
d. fourth generation language (4GL)
back-end CASE tool
A tool suite that primarily supports program development based on specific analysis and design models is called a(n) ____.

a. front-end CASE tool
b. back-end CASE tool
c. class library
d. compiler library
front-end CASE tool
A tool suite that primarily supports model development is sometimes called a(n) ____.

a. front-end CASE tool
b. back-end CASE tool
c. class library
d. symbolic debugger
Database management
Which of the following is not an operating system function?

a. CPU management
b. Memory management
c. Process management
d. Database management
machine layer
Which of the following is not an operating system layer?

a. command layer
b. application layer
c. machine layer
d. service layer
Java
Which of the following is not an example of a command language?

a. MS-DOS
b. IBM MVS JCL
c. Java
d. UNIX Bourne Shell
service call
A request to execute a service layer function is called a(n) ____.

a. service layer
b. command layer
c. service call
d. shell
service
The ____ layer of the operating system contains a set of functions that are executed by application programs and the command layer.

a. command
b. service
c. application
d. kernel
kernel
What software component contains device drivers?

a. command layer
b. service layer
c. kernel
d. application layer
kernel
The ____ is the portion of the operating system that manages resources and directly interacts with computer hardware.

a. service layer
b. hardware layer
c. command layer
d. kernel
kernel
Which software component directly interacts with storage and I/O devices?

a. application layer
b. command layer
c. service layer
d. kernel
service layer
Which operating system layer is responsible for balancing the competing demands of processes for access to hardware resources?

a. application layer
b. command layer
c. service layer
d. kernel
system resources
Most service calls are actually indirect requests for ____.

a. a page swap
b. process spawning
c. system resources
d. process queue
real resources
A computer systems physical devices and associated system software are called ____.

a. virtual resources
b. system overhead
c. real resources
d. spawns
system overhead
The hardware resources consumed by the resource allocation functions of the kernel are sometimes referred to as _____.

a. real resources
b. system overhead
c. virtual resources
d. supervisor resources
virtual
A(n) ____ resource is apparent to a process or user, although it may not physically exist.

a. virtual
b. explicit
c. contiguous
d. multithreaded memory
process control block
Information about a single processes' execution state (e.g., register values, status, etc.) is held in a(n) ____ for use by the scheduler.

a. run queue
b. process control block
c. page table
d. scheduler
process queue
Process control blocks are normally organized into a linked list called the ____.

a. scheduler
b. process queue
c. sibling process
d. page tables
process family
A group of processes descended from a common ancestor, including the common ancestor itself, is called a(n) ____.

a. spawn
b. process group
c. process family
d. parent process
thread control block
The operating system keeps track of thread-specific information in a(n) ____.

a. thread control block
b. thread list
c. process control block
d. process queue
thread
A(n) ____ is an executable subunit of a process that is scheduled independently but shares memory and I/O resources with its parent.

a. page
b. thread
c. shell
d. victim
multitasking
An operating system that supports ____ allows multiple programs to execute concurrently.

a. multitasking
b. multithreading
c. virtual memory management
d. page tables
multithreading
An operating system that supports ____ allows a single program to be divided into components that can execute concurrently.

a. multitasking
b. multithreading
c. virtual memory management
d. interleaved execution
ready
A thread in the ____ state requires only access to the CPU to continue execution.

a. blocked
b. running
c. ready
d. virtual
ready, running
Dispatching a thread moves it from the ____ state to the ____ state.

a. ready, running
b. running, blocked
c. blocked, ready
d. running, ready
dispatching
The act of giving control of a CPU to a ready thread is called ____.

a. scheduling
b. interprocess synchronization
c. threading
d. dispatching
blocked
When a thread makes an I/O service request, it is placed in the ____ state until processing of the request is completed.

a. virtual
b. running
c. ready
d. blocked
scheduler
The ____ determines which thread to move to the running state.

a. scheduler
b. supervisor
c. task manager
d. service layer
interrupt
CPU control is lost whenever a(n) ____ is received and the CPU pushes the current thread onto the stack and transfers control to the operating system.

a. error
b. page fault
c. service call
d. interrupt
timer interrupt
The CPU periodically generates a(n) ____ to guarantee the scheduler and opportunity to allocate the CPU to another ready process.

a. page fault
b. timer interrupt
c. preemptive thread
d. explicit signal
shortest time remaining
Under the ____ scheduling method, threads requiring the least CPU time to complete execution are dispatched first.

a. first come first served
b. real time
c. shortest time remaining
d. highest priority
first come first served
In the ____ scheduling method, processes are dispatched in the order of their arrival.

a. real time
b. last in first out
c. multithreaded
d. first come first served
Real time
____ scheduling guarantees that a process will receive sufficient resources to complete one program cycle within a state time interval.

a. Real time
b. Last in first out
c. Multithreaded
d. First come first served
contiguous
Under ____ memory allocation, all portions of a process must be loaded into sequential physical memory locations.

a. partitioned memory
b. non-contiguous
c. contiguous
d. paged
address mapping
The process of converting an address operand into a physical address within a memory partition or page frame is called ____.

a. multitasking
b. address mapping
c. real-time scheduling
d. preemptive scheduling
wasted memory
A significant problem with contiguous memory allocation using fixed size memory partitions is ____.

a. wasted memory
b. compaction
c. system overhead
d. page fault
non-contiguous
Under ____ memory allocation, portions of a single process can be allocated to free partitions anywhere in memory.

a. contiguous
b. interleaved
c. fragmented
d. non-contiguous
compaction
Periodic ____ is required to combine unallocated partitions when contiguous memory allocation is used.

a. fragmentation
b. compaction
c. page swapping
d. page faults
swap space
Under virtual memory management, pages not held in primary storage are held in the ____ of a secondary storage device.

a. swap space
b. page table
c. page frame
d. run queue
memory reference
A(n) ____ to a page held in the swap space results in that page being loaded into a page frame in memory.

a. service call
b. child process
c. memory reference
d. system overhead
virtual memory
Under ____ management, the location of a memory page is determined by searching a page table.

a. partitioned memory
b. relocatable memory
c. virtual memory
d. multithreaded memory
page fault
A reference to a page held in secondary storage is called a(n) ____.

a. page hit
b. swap space
c. page fault
d. page table
storage I/O control
The ____ layer manages the movement of data between storage devices and memory.

a. logical file access
b. file control
c. storage I/O control
d. file management
file control
The ____ layer provides a set of service functions for manipulating files and directories.

a. logical file access
b. file control
c. storage I/O control
d. file management
Storage I/O control
Which of the following file management system layers correspond to the kernel layer of the operating system?

a. Command
b. Storage device
c. Storage I/O control
d. Storage device
Interrupt handlers
Software modules within the storage I/O control layer include which of the following?

a. Interrupt handlers
b. Interpreters
c. Code generators
d. Link editors
executable programs
Most file management systems support ____.

a. all predefined file types
b. a handful of predefined file types with a mechanism for adding new type definitions
c. executable programs
d. text file types only
restrictions on its name
In most file management or operating systems, a file's type determines ____.

a. data encoding method
b. data access method
c. restrictions on its name
d. physical storage allocation
data access methods
A file's directory entry normally does not contain information about its ____.

a. owner
b. access controls
c. physical location
d. data access methods
fully qualified reference
A(n) ____ consists of a master (root directory), one or more subdirectories, and a file name.

a. block
b. fully qualified reference
c. logical record
d. relative path