Computer Networking > Summary > Summary The Bits and Bytes of Computer Networking. Weekly Quizzes 1-6 Complete Questions & Answers (All)

Summary The Bits and Bytes of Computer Networking. Weekly Quizzes 1-6 Complete Questions & Answers

Document Content and Description Below

The Bits and Bytes of Computer Networking. Weekly Quizzes 1-6 Complete Questions & Answers-The Bits and Bytes of Computer Networking. Week 1: Networking Basics, Q&As Which of the following is an examp... le of a network layer (layer 3) protocol? IP, TCP, UDP, Ethernet - IP, or Internet Protocol, is the most common network layer protocol. What's the difference between a client and a server? - A client requests data, and a server responds to that request. Which of the following are examples of layers of our five-layer network model? Check all that apply. The physical layer The transport layer, The presentation layer The application layer - The physical layer The transport layer, The application layer Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. - A hub causes larger collision domains/ a hub is a physical layer device, and a switch is a data link layer device/ a switch remembers which devices are connected on each interface, while a hub does not. What does LAN stand for? - Local area network What's a router? - a device that knows how to forward data between independent networks. What is the type of modulation used by twisted pair cable computer networks known as? - Line coding What's the difference between full and half duplex? - Full duplex allows communications in two directions at the same time; half duplex means that only one side can communicate at a time. How many octets are there in a MAC address? - 6; A MAC address is a 48-bit number consisting of 6 octets. What address is used for Ethernet broadcasts? - FF::FF:FF::FF::FF:FF What is a cyclical redundancy check? - A mathematical calculation used to ensure that all data arrived intact.; A cyclical redundancy check ensures that there was no data corruption. A device that knows how to forward traffic between independent networks is known as a _____. - router MAC address stands for ____ address. - media access control Something that requests data from a server is known as a ____. - client; A client requests data, and a server [Show More]

Last updated: 2 years ago

Preview 1 out of 29 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$12.50

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

80
0

Document information


Connected school, study & course


About the document


Uploaded On

Mar 08, 2023

Number of pages

29

Written in

Seller


seller-icon
LAVIE

Member since 4 years

9 Documents Sold

Additional information

This document has been written for:

Uploaded

Mar 08, 2023

Downloads

 0

Views

 80

Document Keyword Tags

Recommended For You

Get more on Summary »

$12.50
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·