Nt1210 Review Questions

In: Computers and Technology

Submitted By cynt1966
Words 451
Pages 2
NT1210
Cynthia Allen
Unit 7
Chapter Review Questions

Key Terms
1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished.
2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point.
3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits.
4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point.
5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message.
6. Time –division- multiplexing –A type of logic used by some networking devices including switches in the Telco, in which the switch devices a faster speed line into time channel. The TDZ logic takes the bits of the slower speed lines and forward those bits inside channel in high speed line (multiplexing) and receiving bits on higher – speed lines, finds the bits in each time channel and spits those back out to the slower speed lines called DE multiplexing.
7. T-Carrier System – The…...

Similar Documents

Review Question -Mgmt404

...Review Questions Name _________________ Answer the following questions (you may use MS Project Help): 1) What are the three base calendars included in MS Project and what are the default values of each? The three base calendars are Standard, Night Shift, and 24 Hours. Standard default values is all week days from 8 AM to 12 PM then 1 PM to 5 PM. Night Shift is All week days from 12 AM to 3 AM, 4 AM to 8 AM, and 11 PM to 12 AM. Plus Saturday from 12 AM to 3 AM, and 4 AM to 8 PM. 24 Hours is every day from 12 AM to 12 AM. 2) What is the difference between a base calendar and a resource calendar? A bade calendar is for everyone to use while a resource calendar is only for that resource that was assigned to. 3) Why schedule one project meeting after completion of the last task, Test System? Since we were working out the work days in the schedule, it lower the finish date on the project. But since the last project meeting was set to this date it could not be changed. So when we delete it, the project days lower down. 4) Give an example of when you would assign a 24-hour calendar to a resource. When we need that resource to work every day in the given time we need them to. For example a securities guard. 5) If you were doing a senior project, what would be the base calendar you would use for students working on the project and what adjustments would you make to it? If I was working on a senior project there is no set time on when......

Words: 320 - Pages: 2

Review Question

...STRATEGIC MARKETING FOR HOSPITALITY AND TOURISM (HTM 705) Review question chapter 4 & 5 Zeiti binti Muhamud@tan Review question chapter 4 : strategic customer relationship management Question 3. What is involved in estimating customer lifetime value (CLV) ? Customer lifetime value is used to indicate the potential achievement of a business in the future. It is used to examine and analysis customer purchase behaviour which is from before, during and past purchase of the product or service offered. It is a tools that helps business able to predict the future spending that will be made. This CLV also estimate the lifetime of the relationship between customer and the business. The customer feedback about the service and product offered also show level of thier interest to continue or discontinue purchase in the future. The business can take precaution and implement strategy to retain the customer to achieve long term purchase or repetitive purchase intention. To estimate the lifetime value, the business can analyze the pattern of customer purchase on thier product. This consist of several factor such as amount of purchase made. The higher amount of purchase show that the customer is satisfied and enjoy the service or product of the business, and the decrease of amount purchase made show that the business must take action to overcome from losing customer. Next factor that involve in estimating customer lifetime value is frequency of customer purchase of...

Words: 739 - Pages: 3

Question for Review

... 1. What is personality * Personality can be defined as the sum of ways in which an individuals reacts and interacts with other. * Personality can be defined to as organized set of characteristics possessed by a person that determine ones persona. * A dynamic concept describing the growth and development of a person’s whole psychological system. Personality looks at some aggregate whole that is greater than the sum of the parts. Personality is the dynamic organization within the individual of those psychophysical systems that determine his unique adjustments to his environment. Personality is the sum total of ways in which an individual reacts to and interacts with others. It is most often described in terms of measurable traits that a person exhibits. 2. What is the Myber-Briggs Type Indicator (MBTI)? The Myers-Briggs Type Indicator is one of the most widely used personality frameworks—Myers-Briggs Type Indicator (MBTI). A 100-question personality test that asks people how they usually feel or act in particular situations. Individuals are classified as * Extroverted or introverted (E or I). * Sensing or intuitive (S or N). * Thinking or feeling (T or F). * Perceiving or judging (P or J). These classifications are then combined into sixteen personality types. There is no hard evidence that the MBTI is a valid measure of personality. a) Extraversion (E) - Introversion (I) The extraversion-introversion dichotomy was first explored...

Words: 2824 - Pages: 12

Review Question

...CHAPTER 5 EXERCISES (Review Questions) 1. Describe data and process modeling and name the main data and process modeling techniques. During data and process modeling, a system analyst develops graphical models to show how the system transforms data into useful information. The end product of the data and process modeling is a logical model that will support business operations and hopefully meets user needs. Data and process modeling involves three main tools: data flow diagrams, a data dictionary, and process descriptions. Many analysts use a four-model approach, which involves physical model of the current system, a logical model of the current system, a logical model of the new system and a physical model of the new system. * Sequence: One or many of the steps might represent a sub process that contains additional logical structures. * Selection: The completion of one of two or more process steps based on the results of a test or condition. * Iteration: The completion of a process step that is repeated until a specific condition changes. * An example of iteration is a process that continues to print paychecks until it reaches the end of the payroll file. Iteration also is called looping. 2. Describe Gane and Sarson symbols used for processes, data flows, data stores, and entities. Give four examples of typical names for processes, data flows, data stores, and entities. The Gane and Sarson symbol set is used for...

Words: 1337 - Pages: 6

Chapter 1 Review Question

...Robert Jones Chapter 1 Review 1. Which of the following is true about 1 bit? 2. Which of the following terms means approximately 106 bytes 3. Which answer list the correct number of bits associated with each term 4. Which of the following answer are true about random-access memory (RAM) as it normally used inside a personal computer (Chose two answers) 5. This Chapter describes the concepts how a CPU reads the contents from RAM. Which of the following is true about the process off read data, as described in the chapter? 6. A user has opened up a word processor, typed the numbers 123456789, and stored the document as a file called report1. Which of the following determines, in part, what bits the computer stores the file to represent the text typed into the report? 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problems using this number. Which of the following determines, in part, what bits the computer stores in RAM to represents the number 123456789? 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of...

Words: 645 - Pages: 3

Nt1210 All Chapter Review Questions

... of binary codes. The word processor stores the binary code for each text character. Answers to the “Answer These Questions” Sections602 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? a. Keyboard map b. Pixel grid c. Character set d. The binary equivalent of decimal 123456789 Answer: D. Unsigned integers—numbers from 0 and above—can be repre- sented as their binary equivalent values. 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? a. An actuator arm b. A directory c. A file d. A place to keep directory information on the hard disk Answer: A. A computer file system includes that OS’s definition of files, the directory structure to organize the files, and a place to maintain file and direc- tory information on each long-term storage device. Hard disk drives do have actuator arms, but this physical component is a part of the hard disk drive and not a part of the file system. 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor...

Words: 27621 - Pages: 111

Nt1210 Computer Basics Chapter Review

...Chapter Review Activities 1. C: Represents one binary digit 2. D: Kilobyte 3. C: 64 bits per quadruple word 4. A: Used for short-term memory C: Used to process data 5. A: The CPU tells the RAM which address holds the data that the CPU wants to read. 6. C: Character set 7. D: The binary equivalent of decimal 123456789 8. A: An actuator arm 9. B: Provides a convenient way to name a set of data for easier operations like copying and moving C: Name give users an easy way to reference the data D: Gives the CPU an easy way to identify the data it wants to read from RAM 10. C: By reading the files and auto generating directory structure for the files, for use on your classmate’s local computer 11. C: Changing the disk’s surface so that later the light will reflect differently for 0 or 1 12. B: Used for long-term memory D: Connects to the CPU over a bus using a cable 13. A: Actuator arm C: Platters 14. A: RAM D:USB flash drive 15. D: The binary equivalent of decimal 123456789 16. D: By closing an electrical circuit connected to the key when the key is pressed 17. B: Two dimensions: movement as two numbers: one in the direction of the X axis of an X,Y graph and the other on the y axis. 18. C: Input of commands that control the computer 19. A: 1280 is the number of items top to bottom in a grid on the screen. D: 1024 is the number of items top to bottom in a grid on the screen. 20. A...

Words: 647 - Pages: 3

Nt1210 Review Questions

...NT1210 Cynthia Allen Unit 7 Chapter Review Questions Key Terms 1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished. 2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point. 3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits. 4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point. 5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message. 6. Time –division- multiplexing –A type of logic used by some networking devices including...

Words: 451 - Pages: 2

Nt1210 Chapter Review Unit 2

...Chapter review unit 2 – Nate Bell 1. Which of the following terms is the closest synonym to the term computer networking? c. Datacom 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server 3. According to this chapter, which of the following concepts happens in a modern-day, end-to- end voice call between two business telephones sitting in the same office building in the United States? (Choose two answers.) b. The call uses only digital electrical signals. d.The call represents short sounds as a unique set of bits. 4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.) c. The call uses both analog and digital electrical signals. d. The call represents short sounds as a unique set of bits. 5. A student makes a video recording of a professor teaching a class. The student posts the video to a website. The answers list information that the student used or chose on the computer on which he was processing the video. Which of the following answers is the least likely to impact the size of the video file? a. A character set 6...

Words: 1002 - Pages: 5

Chapter 2 Review Question

...Gunther Documet 9/14/2015 Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal......

Words: 334 - Pages: 2

Nt1210 - Ch.2 Review

...NT1210 – Chapter 2 Review Activities Multiple Choice 1. C. – Datacom 2. B. – Bob's incoming email server 3. B. – The call uses only digital electrical signals. D. – The call represents short sounds as a unique set of bits. 4. C. – The call uses both analog and digital electrical signals. D. – The call represents short sounds as a unique set of bits. 5. A. – Character set. 6. D. – Compress the video. 7. B. – www.certskills.com 8. C. – The web server sees the request for the web address, dynamically creates a single graphical image of the entire web page, and sends that one graphical image to the web browser. 9. A. – A website typically contains many web objects. C. – A web page typically contains many web object. D. – A website typically contains many web pages. 10. C. – The Operating System. D. – The PC’s NIC 11. A. – 16 HTTP GET request messages with 16 matching HTTP GET reply messages. 12. C. – Web Servers. D. – The GET request. 13. B. – www.certskills.com 14. C. – Node 15. A. – Router. D. – Switch. 16. D. – SMB Network 17. D. – Switch. 18. D. – The Internet 19. A. – Internet Service Provider 20. B. – Any ISP’s Network. List the Acronyms A/D – Active Directory DC – Domain Control FPS – Frames per Second GBps – Gigabytes per Second gbps – Gigabits per Second HTTP – Hypertext Transfer Protocol KBps – Kilobytes per second kbps – Kilobits per second LAN – Local Area Network MBps – Megabytes per second Mbps – Megabits per second NIC – Network......

Words: 265 - Pages: 2

Ch. 1 Review Question

...Ch. 1 Review Questions 1. Redundancy is the duplication of data or storing of the same data in more than one place. Redundancy wastes space and can lead to inconsistencies in information. 2. Nondatabases are time consuming and have a definitive amount of entries that can be made. 3. Entity is a person, place, object, event, or idea in which you want to store data; attribute is a characteristic or property of an entity. 4. Relationship is an association between entities. One to many relationships is when one entity associates with many other entities but many entities associate with just one. 5. Database is a structure that can store information about multiple types of entities the attributes of those entities, and the relationship between the entities. 6. Using common columns in the two tables creates it. 7. Visual way to represent a database. 8. Program, collection of programs through which users interacts with a database. 9. Determine the structure of the required database. 10. Screen objects used to maintain, view, and print data from a database. 11. The DBMS ask questions about desired content and appearance of each report and then creates the report automatically based on the answer. 12. Data of various users can be combined and shared among authorized users, allowing all users to access greater pool of data. 13. A person or group to be in charge of the database. 14. With the database approach, changing a...

Words: 426 - Pages: 2

Solutions to Review Question

...: 1. Examine employee time cards and personnel records to determine if sufficient information is available to maximize the effective use of personnel. 2. Review the processing of sales invoices to determine if it could be done more efficiently. 3. Review the acquisitions of goods, including costs, to determine if they are being purchased at the lowest possible cost considering the quality needed. 4. Review and evaluate the efficiency of the manufacturing process. 5. Review the processing of cash receipts to determine if they are deposited as quickly as possible. 1-10 When using a strategic systems auditing approach in an audit of historical financial statements, an auditor must have a thorough understanding of the client and its environment. This knowledge should include the client’s regulatory and operating environment, business strategies and processes, and measurement indicators. The strategic systems approach is also useful in other assurance or consulting engagements. For example, an auditor who is performing an assurance service on information technology would need to understand the client’s business strategies and processes related to information technology, including such things as purchases and sales via the Internet. Similarly, a practitioner performing a consulting engagement to evaluate the efficiency and effectiveness of a client’s manufacturing process would likely start with an analysis of various measurement indicators, including ratio analysis and...

Words: 34360 - Pages: 138

Unit 1 Review Question

...UNIT 1 REVIEW QUESTIONS Richard H. Hendrix Jr. Post University Author Note Programming Fundamentals CIS 200 taught by Mohamed Ben Haj Frej Chapter 1 Review Questions 3. Describe the role of each of the five main areas of the Alice interface: the World window, the Object tree, the Details area, the Editor area, and the Events area.  The World Window – Contains a view of the virtual Alice world. The set of blue arrows below the window controls the Alice camera, which provides you with the view in the window.  The Object Tree – The object tree appears to the left of the World window. It shows the objects in the current Alice world organized as a tree of tiles, with a tile for each object. The plus sign next to an object shows that it has sub parts, which may be seen by clicking the plus sign.  The Details Area – The Details area of the Alice interface is located below the Object tree. It has tabs to show properties, methods, and functions for the currently selected Alice object. Properties contain information about an object, such as its color and position in the world. Methods are programs that manipulate an object. A function is a method that returns a value, such as the distance between two objects.  The Editor Area – The largest area of the Alice interface is the Editor area, which appears to the right of the Details area. Here, you assemble and edit methods by clicking and dragging tiles from other parts of the interface. The bottom of the Editor area has a...

Words: 641 - Pages: 3

Bus 314 Review Question

...Review Questions for Midterm # 2, Bus, 314, Spring 2016 Add these: General: How do you find the price of any financial asset, at any time, in any universe? “The value of any Financial Asset is equal to the Present Value of all future Cash Flows from that asset.” +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ What is the definition of "A Business" from Bus 314? "A combination of Assets, that when Operated, should generate net Cash." Interest rates: +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ What are the 4 components of the formula for interest rates? r = r* + h + mp + dp where r= nominal interest rate r* = real interest rate h = expected inflation mp = maturity premium dp = default premium. +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ If the real interest rate drops from +1% to -1%, what would you expect would happen to nominal interest rates? They would fall by 2% +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ If expected inflation, currently around 1.5%, suddenly rose to 7%, what would you expect would happen to nominal interest rates? They would rise by (7%-1.5%) = 5.5% +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Would you normally expect to pay a higher rate of interest on a 20 year mortgage or a 30 year mortgage? Name the concept that comes into play. Higher rates on the 30 year. The concept is the “maturity premium”, the idea that the...

Words: 2305 - Pages: 10