1 / 40

iClicker Questions

iClicker Questions. CNIT 201E. Last revised 1-21-10. After 1.3. When rumors go from one person to another, the final message is different than the starting one. Which communication rule is being violated?. Identify sender and receiver Method Language Speed and timing of delivery

bob
Download Presentation

iClicker Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. iClicker Questions CNIT 201E Last revised 1-21-10

  2. After 1.3

  3. When rumors go from one person to another, the final message is different than the starting one. Which communication rule is being violated? • Identify sender and receiver • Method • Language • Speed and timing of delivery • Confirmation 1 of 5

  4. What protocol is used to obtain Web pages from a server? • HTTP • SMTP • POP • XMPP • SIP 2 of 5

  5. What protocol is used for VoIP phone calls? • HTTP • SMTP • POP • XMPP • SIP 3 of 5

  6. What device is this? • LAN Switch • LAN Media • Wireless Media • WAN Media • Cloud 4 of 5

  7. What device is this? • LAN Switch • Firewall • Router • Wireless Router • Cloud 5 of 5

  8. After 1.44

  9. Which characteristic of network architecture depends on redundant links? • Fault tolerance • Scalability • Quality of service • Security • All of the above 1 of 5

  10. Which characteristic of network architecture depends on a hierarchical layered design? • Fault tolerance • Scalability • Quality of service • Security • All of the above 2 of 5

  11. Which terms best describe the modern Internet architecture? • Packet switched connectionless • Packet switched connection-oriented • Circuit switched connectionless • Circuit switched connection-oriented • None of the above 3 of 5

  12. Which feature of network architecture enables manufacturers to build new devices with confidence that they will work properly with the existing infrastructure? • Hierarchical layered structure • Peering • Standards • Distributed services • None of the above 4 of 5

  13. Which traffic type requires the lowest quality of service priority? • Phone calls • Streaming video • Stock purchases • Email • SCADA signals to control power plant machinery 5 of 5

  14. After 1.6

  15. Which of these features are provided in a secure network? • Confidentiality • Integrity • Availability • All of the above • None of the above 1 of 4

  16. Which of these features are provided by using checksums? • Confidentiality • Integrity • Availability • All of the above • None of the above 2 of 4

  17. Which of these features are provided by a firewall? • Confidentiality • Integrity • Availability • All of the above • None of the above 3 of 4

  18. Which of these features are provided by antivirus software? • Confidentiality • Integrity • Availability • All of the above • None of the above 4 of 4

  19. Binary Lesson 1Nybbles

  20. Base Ten • Normal Numbers • Each place has one of these values: • 0 1 2 3 4 5 6 7 8 9 • 147 = 1*100 + 4*10 + 7 • Or 1*10^2 + 4*10^1 + 7*10^0

  21. Base Ten 147 Hundreds placeNumber of hundreds 10^2 Ones placeNumber of ones 10^0 Tens placeNumber of tens 10^1

  22. Base Two • Binary Numbers • Each place has one of these values: • 0 1 • 11 = 1 * 2 + 1 = 3 • Or 1*2^1 + 2^0

  23. Base Two 101 Fours placeNumber of fours 2^2 Ones placeNumber of ones 2^0 Twos placeNumber of twos 2^1

  24. Counting to 7 Base Two Base Ten 0 0 1 1 10 2 11 3 100 4 101 5 110 6 111 7

  25. Four Bits Make a Nybble 4s 2s 1s 8s 1001

  26. Counting to 15 Base Two Base Ten Base Two Base Ten 0 0 1000 8 1 1 1001 9 10 2 1010 10 11 3 1011 11 100 4 1100 12 101 5 1101 13 110 6 1110 14 111 7 1111 15

  27. Binary Lesson 1Nybbles

  28. Base Ten Normal Numbers Each place has one of these values: 0 1 2 3 4 5 6 7 8 9 147 = 1*100 + 4*10 + 7 Or 1*10^2 + 4*10^1 + 7*10^0

  29. Base Ten 147 Hundreds placeNumber of hundreds 10^2 Ones placeNumber of ones 10^0 Tens placeNumber of tens 10^1

  30. Base Two Binary Numbers Each place has one of these values: 0 1 11 = 1 * 2 + 1 = 3 Or 1*2^1 + 2^0

  31. Base Two 101 Fours placeNumber of fours 2^2 Ones placeNumber of ones 2^0 Twos placeNumber of twos 2^1

  32. Counting to 7 Base Two Base Ten 0 0 1 1 10 2 11 3 100 4 101 5 110 6 111 7

  33. Four Bits Make a Nybble 4s 2s 1s 8s 1001

  34. Counting to 15 Base Two Base Ten Base Two Base Ten 0 0 1000 8 1 1 1001 9 10 2 1010 10 11 3 1011 11 100 4 1100 12 101 5 1101 13 110 6 1110 14 111 7 1111 15

  35. iClicker Questions Nybbles

  36. What is 7 in binary? • 10 • 100 • 1000 • 1101 • 0111 1 of 5

  37. What is 101 in decimal? • 1 • 2 • 5 • 6 • 7 2 of 5

  38. Convert the decimal value 10 to binary: • 1 • 10 • 2 • 1000 • 1010 3 of 5

  39. Convert the binary value 10 to decimal: • 1 • 10 • 2 • 1000 • 1010 4 of 5

  40. Convert the binary value 1011 to decimal: • 1 • 10 • 11 • 13 • 14 5 of 5

More Related