Nt1210 Review Questions

In: Computers and Technology

Submitted By cynt1966
Words 451
Pages 2
Cynthia Allen
Unit 7
Chapter Review Questions

Key Terms
1. Switched Circuits – A circuit created by the phone company in reaction to signaling ( the user tapping telephone keys or modem sending the same digits w/ the Telco tearing down the circuit when the user is finished.
2. Dedicated circuit – A electrical circuit created by a telco CO. on behalf of a customer, with circuits staying up all the time, dedicated for use by the customer that ordered the circuit, also known as leased lines, leased circuit and point to point.
3. Circuit switching - The overall process by which a series of Telco devices called circuit switches connect a circuit from one customer to another, with the device taking bits on one segment in the link and forwards those bits out the matching outgoing segment without storing the bits.
4. Leased line – A physical link between two locations provided by Telco, that allows two way communications between sites. Because the customer does not own the physical line between the sites, but rather pays a monthly fee for service called a leased line “AKA” dedicated circuit, leased circuit, and point-to-point.
5. Packet switching – The process of forwarding customers data in a WAN by looking at the header of the header of the message sent into the WAN by the customer and making a peer message (per-packet) decision as to where to forward each message.
6. Time –division- multiplexing –A type of logic used by some networking devices including switches in the Telco, in which the switch devices a faster speed line into time channel. The TDZ logic takes the bits of the slower speed lines and forward those bits inside channel in high speed line (multiplexing) and receiving bits on higher – speed lines, finds the bits in each time channel and spits those back out to the slower speed lines called DE multiplexing.
7. T-Carrier System – The…...

Similar Documents

Review Questions

...Review Questions Name Patrick Garcia Answer the following questions (use MS Project help if necessary): 1) Define effort-driven? Effort-driven impacts: Manually scheduled tasks cannot be set to effort-driven. The duration of a manually scheduled task will not change as resources are assigned to it. 2) Under what circumstances would you turn off effort driven scheduling? Complex tasks: You may have a task that is very complex or requires highly-skilled resources. Adding more resources may slow the team down if task activities need additional coordinating or if people need instruction before they can perform. Uncertain/undetermined amount of work: If you're not sure how much work there will be for a task, turning off effort-driven scheduling can let the assignment of resources and duration determines work accordingly. 3) Use a real-world example of when you would make a task as a Fixed Duration type task? An example of the basic scheduling behavior that you'll see when you change the Resource Units on a Fixed-duration task: Your painter is assigned full-time (100%) to paint a room in 4 days. The work is 32 hours. Then you assign the same painter another room to paint. Unfortunately the painter is committed elsewhere in 4 days and cannot work on the task beyond that. The painter can only work part-time (50%) painting the additional room. When you enter 50%, Project keeps the duration fixed at 4 days, and recalculates work to be 16 hours. ...

Words: 304 - Pages: 2

Review Question

...STRATEGIC MARKETING FOR HOSPITALITY AND TOURISM (HTM 705) Review question chapter 4 & 5 Zeiti binti Muhamud@tan Review question chapter 4 : strategic customer relationship management Question 3. What is involved in estimating customer lifetime value (CLV) ? Customer lifetime value is used to indicate the potential achievement of a business in the future. It is used to examine and analysis customer purchase behaviour which is from before, during and past purchase of the product or service offered. It is a tools that helps business able to predict the future spending that will be made. This CLV also estimate the lifetime of the relationship between customer and the business. The customer feedback about the service and product offered also show level of thier interest to continue or discontinue purchase in the future. The business can take precaution and implement strategy to retain the customer to achieve long term purchase or repetitive purchase intention. To estimate the lifetime value, the business can analyze the pattern of customer purchase on thier product. This consist of several factor such as amount of purchase made. The higher amount of purchase show that the customer is satisfied and enjoy the service or product of the business, and the decrease of amount purchase made show that the business must take action to overcome from losing customer. Next factor that involve in estimating customer lifetime value is frequency of customer purchase of......

Words: 739 - Pages: 3

Review Questions

...Database Systems questions. DATABASE SOLUTIONS (2nd Edition) THOMAS M CONNOLLY & CAROLYN E BEGG SOLUTIONS TO REVIEW QUESTIONS Chapter 1 Introduction- Review questions 1.1 List four examples of database systems other than those listed in Section 1.1. Some examples could be: • A system that maintains component part details for a car manufacturer; • An advertising company keeping details of all clients and adverts placed with them; • A training company keeping course information and participants’ details; • An organization maintaining all sales order information. 1.2 Discuss the meaning of each of the following terms: (a) data For end users, this constitutes all the different values connected with the various objects/entities that are of concern to them. (b) database A shared collection of logically related data (and a description of this data), designed to meet the information needs of an organization. (c) database management system A software system that: enables users to define, create, and maintain the database and provides controlled access to this database. (d) application program A computer program that interacts with the database by issuing an appropriate request (typically an SQL statement) to the DBMS. (e) data independence This is essentially the separation of underlying file structures from the programs that operate on......

Words: 20352 - Pages: 82

Nt1210 Lab 1 Reviews

...NT1210 INTRODUCTION TO COMPUTER DATA LAB 1.1: READING BINARY Exercise: 1.1.1 Create a mapping for decimal number 2931. 10^3 | 10^2 | 10^1 | 10^0 | 1000 | 100 | 10 | 1 | 2 | 9 | 3 | 1 | x | x | x | = 2931 = 2931 x | 2000 + | 900 + | 30 + | 1 | Exercise: 1.1.2 Create a mapping for binary number 110 subscript 2. 2^2 | 2^1 | 2^0 | 4 | 2 | 1 | x | x | x | 1 | 1 | = 6 = 6 0 | 4 + | 2 + | 0 | Exercise: 1.1.3 Create a mapping for binary number 11 subscript 2. 2^1 | 2^0 | 2 | 1 | x | x | 1 | = 3 = 3 1 | 2 + | 1 + | Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the binary number 11100010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 1 | 1 | 1 | 0 | 0 | 0 | 1 | = 226 = 226 0 | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.6: Create a binary conversion for the decimal value 156. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | = 10011100 = 10011100 x | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 128+ | 0+ |......

Words: 800 - Pages: 4

Nt1210 All Chapter Review Questions

...of binary codes. The word processor stores the binary code for each text character. Answers to the “Answer These Questions” Sections602 7. A user has opened a calculator application, typed the numbers 123456789, and then done some math problem using this number. Which of the following determines, in part, what bits the computer stores in RAM to represent the number 123456789? a. Keyboard map b. Pixel grid c. Character set d. The binary equivalent of decimal 123456789 Answer: D. Unsigned integers—numbers from 0 and above—can be repre- sented as their binary equivalent values. 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? a. An actuator arm b. A directory c. A file d. A place to keep directory information on the hard disk Answer: A. A computer file system includes that OS’s definition of files, the directory structure to organize the files, and a place to maintain file and direc- tory information on each long-term storage device. Hard disk drives do have actuator arms, but this physical component is a part of the hard disk drive and not a part of the file system. 9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor.......

Words: 27621 - Pages: 111

Nt1210 Chapter 1 Review Questions

...Chapter 1 Review Questions 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represent one binary digit d. Represent four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits per word c. 64 bits per quadruple word d. 4 bits per byte 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory b. Used for long-term memory c. Used to Process data d. Connects to the CPU over a bus using a cable e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. d. The CPU must first find the file in the file system......

Words: 1374 - Pages: 6

Review Questions

...Review Questions Name: Giovanni Acosta Answer the following questions (use MS Project Help, if necessary): 1. What is the difference between a main summary task and a summary task? Main summary tasks include a larger grouping of events like in this case, the entire project. The summary tasks are the little sub-projects that hold only a few events. There is really no difference in these. 2. On the View Tab, what does the Outline button with plus and minus signs do? The + expands the data and subtasks under the task names and the – contracts the same information. 3. What is a milestone? Milestones mark major project goals and phases. It visibly stands out to track progress in the project and is marked my indicators like the diamond. 4. What predefined report can you not make changes to the header and footer? The Project Summary report is the report you cannot change, per instructions in Lab1 part A- Select Page Setup for this report. The header and footer tabs are grayed out. For some reason, only known to Microsoft, this is the only report that you cannot change the header and footer. To that end, it is imperative that you enter all appropriate project information and project properties as discussed in the lab! 5. Give a real-world example of a) A successor task requiring lead time Installing equipment would require the successor task of purchasing it first, and installing the power would require a lead time for the......

Words: 319 - Pages: 2

Nt1210 Networking Thought Questions

...THOUGHT QUESTIONS 1. Which Web site had most of the media listed above? I honestly used Amazon and Ebay for them, and cross referenced price. On both you could find new and used routers. Depending on shipping, your cost might go up. Unless you are an Amazon Prime member then you only pay the annual cost for that and get upgrades in shipping included in your membership. 2. Were there a variety of Cisco routers/switches for you to choose from? Why? There was a variety. There were still g routers out there and to be honest, I don’t know why. They are old tech and n routers are the way to right now. Maybe older systems can’t see n routers? Either way, there are tons of n routers out there to choose from. Why Cisco? In my experience as technician for Comcast I have seen the frailties of other companies’ hardware. Rarely do I have to trouble shoot the customers router, they are that good and stable. 3. Do hardware purchases or salaries for IT workers demand a greater share of the total cost of ownership for an IT infrastructure at a typical medium-sized company? Why? I believe the answer should be yes. As technology grows, as it’s done exponentially in the past 2 decades, having proper IT service can make or break a company doing business that involves any sort of communication via a network. When problems arise, or new equipment is added, it has to be setup and running in a way that benefits the company and workers ASAP. 4. Is it less expensive for companies...

Words: 349 - Pages: 2

Nt1210 Chapter 4 Review

...Chapter 4 Review Multiple Choice 1. B & C 2. A & C 3. C & D 4. A & D 5. B 6. B 7. A & B 8. A 9. A 10. C 11. C 12. D 13. A & C 14. B 15. B 16. A & D 17. D 18. A & D 19. C 20. B, C & D Define Key Terms 1. Electrical Circuit - A complete loop of material that conducts electricity. 2. Frequency - When describing energy that acts like waves, the number of times that the entire waveform repeats per second. 3. Amplitude - When describing energy that acts like waves, when graphing the waveform centered on the X axis, and graphing some kind of power (for example, voltage) on the Y axis, the amplitude is the maximum height of the curve over the X axis. 4. Phase - When describing energy that acts like waves, in a sine wave, the specific point or place in the repeating continuous wave. 5. Bit Time - In an encoding scheme, the time period during which the encoding scheme sends an energy signal to represent 1 bit. 6. encoding scheme - A set of rules that define how to change the pattern of the waveforms of energy to represent binary 0s and 1s. 7. unshielded twisted-pair(UTP) - A type of cabling that uses pairs of copper wires, twisted together, with no additional shielding from the effects of EMI. 8. Core - In a fiber-optic cable, the glass fiber in the center of the cable over which light can pass. 9. Cladding - In a fiber-optic cable, the material around the core that helps direct light back into the core. 10. radio waves - Electromagnetic energy in a...

Words: 412 - Pages: 2

Review Questions

...Chapter 5 review questions 1. List all decisions a network administrator need to make prior to Oracle database installation. A: Before an installation of an Oracle database server, administrators need to verify the hardware, software, and network compatibility on which the Oracle Server will be running. 2. Of the additional options and features available for Oracle, identify the security-specific applications. A: Advanced security option, an application that offers encryptions and authentication tools to keep data confidential and secure both inside the database and while in transit. Label Security, a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored. Oracle Active Data Guard, improves performance and ensures data recovery by maintaining a replica of a main database to act as a secondary database for workload sharing and failsafe. 3. Explain the advantages and disadvantages of offering an unrestricted, freely downloadable full version of Oracle Database to learners and developers. A: Oracle offers a free download of all editions of the Oracle Database for purposes of education, testing, or development. Personal info or a license key is not required. Disadvantages to this may include granting crackers or cyber threats the ability to freely download versions of Oracle Database for the purpose of understanding how to damage it......

Words: 382 - Pages: 2

Nt1210 Chapter 3 Review

...Chapter 3 Review 1. Which of the following is true about a TCP/IP network? * b. The network uses standards defined in TCP/IP RFCs, plus other standards. 2. Which of the following terms is NOT a common synonym for TCP/IP model? (Choose two answers.) * c. Ethernet * d. TCP/IP mapping 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) * a. It exists as a written document. * c. it has been passed through some form of review and approval or certification process. 4. Contrast an international standard as compared to a de facto standard. (Choose two answers.) * b. International standard documents have been reviewed more thoroughly. * d. International standards typically mean that the standards group has been authorized by many countries to create standards that apply to multiple countries. 5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) * b. The data link layer sits lower in the model than the transport layer. * c. The physical layer sits just below the data link layer. * d. The network layer sits in the middle of the five layers. 6. The TCP/IP model refers to standards other than those the IETF defines in RFC’s. Which of these standards groups is typically the source of external......

Words: 1157 - Pages: 5

Nt1210 Ch 3 Review

...NT1210 Chapter 3 Review 1. B 2. C, D 3. C 4. A, D 5. C, D 6. A 7. D 8. B 9. B 10. D 11. C 12. C 13. C 14. D 15. B 16. A, D 17. A, C 18. B, C 19. B 20. B, C, D Key Terms TCP/IP Networking – Computer network that uses the standards defined by the TCP/IP model. Networking standard – Document that details information about technology related to networking. TCP/IP model – Collection of standards related to all parts of networking. Open networking model – Model whose standards can be read and used to create products. Open Systems Interconnection (OSI) Model – Open networking model developed by ISO. Encoding – Process of varying the energy signal on a link so that bits can communicate over a link. Header – Bytes of data, defined by some standard or protocol. Trailer – Used almost exclusively by data link layer protocols. Leased line – A physical line between two locations, provided by a telco. Internet Protocol (IP) – The main TCP/IP network layer protocol. IP address – A 32 bit binary number, often written in the DDN format. IP routing – Forwarding an IP packet from end to end through a TCP/IP network. Frame – Refers to the data link header and trailer plus data encapsulated in between Packet – Refers to the network layer header plus any headers that follow through the user data. Acronyms TCP/IP – Transmission Control Protocol/Internet Protocol TCP – Transmission Control Protocol HTTP – Hypertext Transfer Protocol LAN – Local......

Words: 286 - Pages: 2

Nt1210 Midterm Review

...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of......

Words: 11596 - Pages: 47

Nt1210 - Ch.2 Review

...NT1210 – Chapter 2 Review Activities Multiple Choice 1. C. – Datacom 2. B. – Bob's incoming email server 3. B. – The call uses only digital electrical signals. D. – The call represents short sounds as a unique set of bits. 4. C. – The call uses both analog and digital electrical signals. D. – The call represents short sounds as a unique set of bits. 5. A. – Character set. 6. D. – Compress the video. 7. B. – www.certskills.com 8. C. – The web server sees the request for the web address, dynamically creates a single graphical image of the entire web page, and sends that one graphical image to the web browser. 9. A. – A website typically contains many web objects. C. – A web page typically contains many web object. D. – A website typically contains many web pages. 10. C. – The Operating System. D. – The PC’s NIC 11. A. – 16 HTTP GET request messages with 16 matching HTTP GET reply messages. 12. C. – Web Servers. D. – The GET request. 13. B. – www.certskills.com 14. C. – Node 15. A. – Router. D. – Switch. 16. D. – SMB Network 17. D. – Switch. 18. D. – The Internet 19. A. – Internet Service Provider 20. B. – Any ISP’s Network. List the Acronyms A/D – Active Directory DC – Domain Control FPS – Frames per Second GBps – Gigabytes per Second gbps – Gigabits per Second HTTP – Hypertext Transfer Protocol KBps – Kilobytes per second kbps – Kilobits per second LAN – Local Area Network MBps – Megabytes per second Mbps – Megabits per second NIC – Network...

Words: 265 - Pages: 2

Review Questions

...Review Questions 1. What are diagnostics? How is this related to the health sciences? A diagnostic is to identify something. This relates to health science by you have to know what you are working on and how to do you need to identify it first. 2. What is trepanation? Why was this used? A trepanation is where a surge drills a hole in the patient head to release pressure. This is used to help people who are suffering with migraines or other head related injuries. 3. Describe three ways that healthcare is funded. Three ways that health care is funded is by taxation, social insurance, and private health insurance. 4. What are private healthcare sites? What are their characteristics? Private healthcare sites are where the office or hospital are ran by a for-profit company. The patient or insurance company pays for the bill. The characteristics for these is that they can give you more advance testing or having more staff and equipment since they cost more to go to them. 5. What is patient-centered care? Patient- centered care is to focus more on the patients and not just their illness. Critical Thinking Questions 1. Private health insurance is a common form of healthcare payment in the United States. What are some of the advantages and disadvantages of private health insurance? Some advantages of private health insurance is more staff members, specialized services, and more equipment. But some disadvantages to this is how much it cost.......

Words: 553 - Pages: 3