Semester 1 : Chapter 15

Question 1:
Which of the following is a network application?

A.   web browser / WWW
B.   network director
C.   Hypertext Markup Language
D.   ASCII

Question 2:
Which layer of the OSI model is closest to the user and determines whether sufficient resources exist for communication between systems?
A.   transport
B.   session
C.   presentation
D.   application

Question 3:
If you want to save a word processor file on a network server, what network protocol enables the word processing application to become a network client?
A.   redirector
B.   file locator
C.   StorFil
D.   SNMP

Question 4:
What type of server is used to translate a domain name into the associated IP address?
A.   FTP
B.   DNS
C.   TFTP
D.   DHCP

Question 5:
Which of the following allows for routing that is based on classes of address, rather than individual addresses?
A.   DNS address
B.   MAC address
C.   WINs address
D.   IP address

Question 6:
What is an example of an application that requires both a client and server component in order to function?
A.   web browser
B.   Microsoft Word
C.   ASCII
D.   PICT

Question 7:
Which connection is made to a server and maintained until the user terminates the connection?
A.   printing a file from a web page
B.   an FTP connection
C.   downloading a web page
D.   processing a web transaction

Question 8:
What device on a network manages domain names and responds to requests from clients to translate a domain name into the associated IP address?
A.   Hypertext Markup Language
B.   domain name server
C.   Uniform Resource Locator
D.   network redirector

Question 9:
What enables data to be sent to a device that is not directly connected to a computer?
A.   Telnet
B.   network redirector
C.   presentation managers
D.   EBCDIC

Question 10:
Which of the following is a protocol that works with computer operating systems and network clients instead of specific application programs?
A.   extender
B.   TCP
C.   redirector
D.   Uniform Resource Locator

Question 11:
Which protocol is designed to download or upload files on the Internet?
A.   SNMP
B.   Telnet
C.   FTP
D.   HTTP

Question 12:
E-mail addresses consist of which two parts?
A.   recipient's username and postoffice address
B.   InterNIC name and postoffice address
C.   server ID and router ID
D.   Electronic portfolio and IP address

Question 13:
Which application layer protocol supports e-mail programs?
A.   SNMP
B.   POP3
C.   TFTP
D.   Telnet

Question 14:
For security, when message recipients click to get their e-mail, they are usually prompted for what?
A.   e-mail address
B.   server IP
C.   domain name
D.   e-mail password

Question 15:
In the URL http://www.cisco.com, the "cisco.com" part identifies what?
A.   the domain
B.   the protocol to be used
C.   the type of resource to contact
D.   the folder
Question 16:
What is the language used to create web pages?
A.   HTTP
B.   HTML
C.   GIF
D.   ASCII

Question 17:
What is the correct term for a string of characters and/or numbers that represents the numeric address of a group of computers at an Internet site?
A.   domain name
B.   Uniform Resource Locator
C.   network redirector
D.   Hypertext Markup Language

Question 18:
Which OSI layer does not provide support for any other OSI layer?
A.   application
B.   session
C.   network
D.   physical

Question 19:
Which of the following best defines an object on a web page that, when clicked, transfers you to a new web page?
A.   network redirector
B.   hyperlink
C.   web browser
D.   ASCII

Question 20:
The Telnet application works mainly at which layers of the OSI model?
A.   application and presentation
B.   application, presentation, and session
C.   presentation and session
D.   presentation, session, and transport

Question 21:
Which connection to the remote server will be maintained only long enough to process the transaction?
A.   an FTP connection
B.   a telnet session
C.   downloading a web page
D.   starting a computer

Question 22:
What are most applications that work in a networked environment classified as?
A.   file storage applications
B.   network redirector applications
C.   client-server applications
D.   dialogue control applications