You are on page 1of 11

Final Exam CNET324 Fall2010 Multiple Choice Identify the choice that best completes the statement or answers

the question. 1. The term ____ is often used to describe all types of devices and technologies that are not connected by a wire. d. wireless 2. ____ telephones carry digitized voice over the Internet. a. Voice over Internet Protocol (VoIP) 3. ____ tags are small chips containing radio transponders that can be used to track inventory. b. RFID 4. Bluetooth and ____ are wireless standards designed for very short rangestypically only a few inches or feet. c. Ultra Wide Band (UWB) 5. A ____ consists of two or more Bluetooth devices that are exchanging data with each other. b. piconet 6. 3G sends data at rates of up to ____ Mbps when stationary. a. 2 7. A ____ is an extension of a wired LAN, connecting to it through a device called a wireless access point. c. WLAN 8. In a WLAN, the ____ relays data signals between all of the devices in the network, including file servers, printers, and even other access points (and the wireless devices connected to them). d. access point (AP) 9. Each computer on the WLAN has a ____. This card performs the same basic functions and looks similar to a traditional NIC except that it does not have a cable that connects it to a network jack in the wall. d. wireless network interface card 10. Depending on the standard used,WLANs can transmit at speeds anywhere from 11 Mbps up to 54 Mbps and at distances of up to ____ feet. c. 375 11. Integrated Services Digital Networks (ISDN) lines transmit at ____ Kbps over regular phone lines. c. 128 12. The maximum transmission speed that can be achieved with cable modem and DSL is only about ____ Mbps. a. 2 13. IEEE 802.16 wireless devices can be as far as ____ away. b. 35 miles (56 kilometers) 14. A ____ is a miniaturized version of a Web browser program that is based on version 2.0 of the Wireless Application Protocol (WAP). a. microbrowser 15. ____ provides a standard way to transmit, format, and display Internet data for small wireless devices such as cell phones. b. WA WAP2

16. When a Web server sends a Web page back to a PC, it is sending ____ code and any files (such as graphics) required to assemble the page. a. HTML

17. Two competing software programming languagesBREW (Binary Run-Time Environment for Wireless) and ____are designed and optimized to display text, graphics, and even animations on the small screen of a cellular phone. d. J2ME (Java 2 Micro Edition)

? 18 . SWAP devices could be as far as 150 feet (45 meters) apart and could send and receive data up to ____ Mbps. a. 2 c. 6 b. 4 d. 10 19. In industrial control, remote sensors called ____ can connect to a WLAN, then collect data and transmit it to a central location. c. motes 20. In a binary number system, the digits 0 and 1 are known as ____. d. bits 21. There are two basic types of waves by which wireless data are sent and received: ____ light and radio waves. a. infrared 22. In an infrared wireless system, a(n) ____ is usually a laser diode or a light emitting diode (LED). c. emitter 23. An infrared ____ transmission requires that the emitter and detector be directly aimed at one another. b. directed 24. An infrared ____ transmission relies on reflected light. a. diffused

25. Diffused infrared can send data at only up to __8__ Mbps.

26. A(n) _analog___ signal is one in which the intensity (voltage or amplitude) varies and is broadcast continuously, in other words, the signal has no breaks in it.

27. A(n) ____ signal consists of discrete or separate pulses. d. digital 28. The number of times a cycle occurs within one second equals the ____ of a wave. b. frequency 29. A(n) ____ is a continuous wave (CW) of constant amplitude (also called voltage) and frequency. d. carrier signal

30. A(n) ____ is a length of copper wire, or similar material, with one end free and the other end connected to a receiver or transmitter. a. antenna 31. A ____ is a change in the signal, and every time the signal changes, in amplitude, frequency, phase, or a combination of these, it defines the boundary of a signal unit. b. baud

32. When a signal unit can represent three bits, it is called a __tribit__.

33. ____ modulation is the representation of analog information by an analog signal. d. Analog 34. In ____, the height of the carrier wave is changed in accordance with the height of another analog signal, called the modulating signal. a. amplitude modulation (AM) 35. In ____ the number of waves that occur in one second change based on the amplitude of the modulating signal, while the amplitude and phase of the carrier remain constant. d. frequency modulation (FM) 36. ____ modulation is the method of encoding a digital signal onto an analog wave for transmission over a medium that does not support digital signals. a. Digital 37. With ____, the voltage signal remains positive, or high, for the entire length of the bit period. b. non-return-to-zero

?38. ____ transmissions means that each signal transmits on one radio frequency or a very narrow range of frequencies. a. Frequency hopping spread spectrum c. Narrow-band b. Spread spectrum d. Direct sequence spread spectrum 39. A ____ code (or chipping code) is a particular sequence of 1s and 0s that has properties that make it ideal for modulating radio waves, as well as for being detected correctly by the receiver. a. Barker

40. A(n) __filter__ removes all the RF signals that are not wanted.

41. A ____ filter sets a minimum frequency threshold level. All signals that are above the minimum threshold are allowed to pass through, while those below the minimum threshold are blocked. b. high-pass

42. The purpose of a(n) ____ is to combine two radio frequency inputs to create a single output. a. mixer 43. The __amplifier__ essentially increases the amplitude of an RF signal.

44. ____ transmissions allow data to flow in both directions simultaneously. d. Full-Duplex 45. ____ transmission sends data in both directions, but only one way at a time. c. Half-Duplex 46. ____ divides the transmission time into several slots .Each user is assigned the entire frequency for the transmission for a fraction of time on a fixed, rotating basis. a. TDMA 47. ____ involves moving the signal from one wire or frequency to another. c. Switching 48. Instead of using circuit switching, data networks use ____ switching. a. packet 49. _SNR___ compares the signal strength with the background noise. 50. A(n) ____ antenna radiates the electromagnetic waves in one direction only and can help reduce or eliminate the effect of multipath distortion if there is a clear line of sight between the two antennas. b. directional

51. The worlds first telecommunications standard was published by the ____ in 1885. a. International Telegraph Union (ITU)

52.____ standards are those that are controlled by an organization or body that has been entrusted with that task. b. De jure 53. The ____ functions largely as a clearinghouse for all kinds of standards development in the United States.

d.

American National Standards Institute (ANSI)

54. The ____ is responsible for defining the overall architecture of the Internet and also serves as the technology advisory group to the Internet Society (ISOC). c. Internet Architecture Board (IAB)

55. The ____ develops telecommunications standards for use throughout Europe.

d.

European Telecommunications Standards Institute (ETSI)

56. The ____ is an agency of the United Nations that is responsible for telecommunications. a. International Telecommunications Union (ITU)

57. In the United States, the _FCC___ serves as the primary regulatory agency for telecommunications.

58. The ____ is the entire range of all radio frequencies that exist. b. radio frequency spectrum 59. The radio frequency spectrum is divided into 450 different sections, or ____. a. bands 60. An amplifier boosts the power of a signal; when this happens, the effect is called a(n) _gain___. 61. Cables and connectors offer a resistance to the flow of electricity and therefore they tend to decrease the power of a signal. This decrease is called a(n) ____. b. loss 62. ____ is a relative way to indicate an absolute power level in the linear Watt scale. a. dBm 63. A(n) ____ is a theoretical perfect sphere that radiates power equally in all directions. d. isotropic radiator 64. The gain of antennas is usually expressed in ____. a. dB 65. For microwave and higher frequency antennas, the gain is usually expressed in ____. b. dB isotropic (dBi) 66. __Passive__ antennas are the most common type and are constructed of a piece of metal, wire, or similar conductive material.

67. ____ antennas are used to transmit and receive signals from all directions with relatively equal intensity. a. Omnidirectional ____ 68. In ____, RF waves tend to spread away from the source of the signal (the antenna). a. patch antennas c. wavelength b. omnidirectional antennas d. free space loss 69. The length of a single RF sine wave, or the ____, is what determines the size of an antenna. c. wavelength 70. The ____ indicates the direction, width, and shape of the RF signal beam coming from the antenna. a. antenna pattern 71. The orientation of the wave leaving the antenna is called ____. b. antenna polarization

72. ____ antennas are basically a length of wire or metal. c. One-dimensional 73. Antennas organized in a two-dimensional pattern, with both height and width, are known as ____ antennas. d. two-dimensional 74. A(n) ____ antenna resembles a large horn with the wide end bent to one side. b. horn

75. ____ antennas know where the mobile receiver is, and can track it and focus the RF energy in that particular direction to avoid wasting energy and to prevent interference with other antennas. a. Smart

76. Most antennas are connected to the transmitter or receiver using ____ cable. b. coaxial

77. Impedance is measured in ____. c. ohms

78. ____ is the combination of resistance, inductance, and capacitance of the circuit. a. Impedance

79. In most wireless communications applications, one transmitter communicates with several mobile clients. This is called a ____ wireless link. d. point-to-multipoint

80. The space between two antennas would be more accurately represented by something similar to an ellipse. This elliptical region is called the ____. a. Fresnel zone

81. The ____ layer is responsible for establishing and maintaining connectivity to the local network. c. Logical Link Control (LLC)

82. The ____ is responsible for hardware addressing and error detection and correction. b. Media Access Control (MAC) 83. The most common infrared connection today is based on the ____ specifications.

d. IrDA 84. FIR uses a modulation scheme called ____ in which information is conveyed by the position of a pulse within a time slot. a. 4-PPM 85. The Bluetooth ____ layer defines how the basic hardware that controls the radio transmissions functions. d. RF 86. At the heart of the Bluetooth RF layer is a single radio transmitter/receiver (transceiver). This single tiny chip is called a Bluetooth ____. c. radio module 87. The Bluetooth ____ layer manages physical channels and links, handles packets, and does paging and inquiry to locate other Bluetooth devices in the area. a. Baseband 88. Bluetooth divides the 2.4 GHz frequency into 79 different frequencies, called ____, spaced 1 MHz apart. d. channels 89. Bluetooth version 1.2 adds a feature called ____ that further improves compatibility with 802.11b. c. adaptive frequency hopping (AFH) 90. A(n) ____ link is a symmetric point-to-point link between a master and a single slave in the piconet.

d. synchronous connection-oriented (SCO) 91. ____ uses two carrier waves that are exactly 90 degrees out of phase and therefore do not interfere with each other. b. Offset quadrature phase shift keying (O-QPSK)

92. The ____ layer in 802.15.4 handles all access from the upper layers to the physical radio channel. a. MAC 93. ____ are reserved periods for critical devices to transmit priority data between two beacons. b. Guaranteed time slots (GTS)

94. A ____ signals the beginning of a superframe and contains information about the type and number of time slots contained in the superframe. c. beacon 95. In a ZigBee network, devices query other devices to identify the location and number of devices that are connected to the network in a process called ____. a. device discovery 96. A ____ is a unique security code, or key, provided by a certificate authority. a. public key infrastructure (PKI) 97. A ____ is a private company that verifies the authenticity of each user to avoid the possibility of fraud. b. certificate authority 98. ____ in a Bluetooth piconet is based on identifying the device itself, and not who is using the device. d. Authentication 99. ____ is the process of encoding communications and ensures that the transmissions cannot be easily intercepted and decoded. c. Encryption 100. Frame integrity is a technique that uses a(n) ____, a sequence of bits based on a subset of the data itself, the length field, and the symmetric key. d. message integrity code (MIC) 101. The IEEE ____ standard defines the specifications for HR WPANs supporting speeds of 11, 22, 33, and up to 55 Mbps in the 2.4 GHz ISM band. b. 802.15.3

102. ____ capabilities allow devices to request more channel access time in order to prioritize high-volume, time-sensitive traffic, such as voice stream. a. Quality-of-service (QOS) 103. ____ encodes the digital signal in such a way that single bit errors can be detected and corrected. d. Trellis code modulation (TCM) 104. ____ piconets are separate piconets, with their own unique ID, in which the child PNC is a member of the original or parent piconet. c. Child 105. ____ piconets are separate piconets that have their own PNC but that depend on the original piconets PNC to allocate a private block of time when their devices are allowed to transmit. a. Neighbor 106.____ time, which means a time-dependent or synchronous transmission that must be made every frame or every so many frames to maintain the quality of the connection. c. Isochronous 107. The ____ is the superframe designated by the PNC in which devices that are in power save mode wake up and listen for frames addressed to them. b. wake superframe 108. ____ modulation means that the amplitude, the polarity, or the position of an analog pulse represents either a 1 or a 0. c. Impulse 109. ____ modulation uses a half-cycle positive analog pulse to represent a 1 and a half-cycle negative analog pulse to represent a 0. a. Biphase 110. ____ takes advantage of the fact that one of the effects of transmitting pulses that are a nanosecond longor even shorteris that the signal naturally spreads over a very wide frequency band, without using any spreading codes. d. Direct-sequence UWB (DS-UWB) 111. ____ is an set of protocol implementation rules that will enable wireless FireWire at 400 Mbps based on an 802.15.3a/WiMedia platform. b. Protocol Adaptation Layer (PAL) 112. In ____, hackers exploit a Bluetooth devices ability to discover nearby devices and send unsolicited messages. d. Bluejacking 113. ____ uses a Bluetooth devices ability to discover nearby devices to access contact lists and other information without the users knowledge, provided that the user has enabled the server functions on their device. a. Bluesnarfing 114. ____ attacks flood a Bluetooth device with so many frames that it is unable to communicate. b. Denial-of-service (DoS) 115. ____ is a symmetric key encryption mechanism introduced by the National Institute of Standards and Technology (NIST) in the United States. c. AES 116. In 802.15.3AES uses a ____-bit key. b. 128 117. ____ adds certain encrypted random data to each communications session so that the receiver can verify that the message has not been tampered with during transit. c. Message integrity 118. ____ is the ability of a device to move from one master or PNC to another without getting disconnected from the network in a network that extends beyond the communications range of each device that controls the communications. a. Hand-off 119. ____ is the potential for technologies using the same frequency bands to interfere with each other to the extent that they sometimes perform poorly when used within close range of each other. d. Spectrum conflict 120. Bluetooth uses the ISM ____ GHz band for its transmissions. a. 2.4 121. A ____ is a device that combines a router, Ethernet switch, and wireless access point. b. wireless residential gateway 122. Smaller devices, such as PDAs, have two options for wireless NICs. Some offer an optional ____, which includes a Type II PC Card slot and an additional battery. d. sled 123. CF or ____ cards consist of a small circuit board that contains a dedicated controller chip and a very small antenna.

a. SD 124. In ____ mode, wireless clients communicate directly among themselves without using an AP. c. ad hoc 125. A(n) ____ is simply two or more BSS wireless networks installed within the same area, providing users with uninterrupted mobile access to the network. b. Extended Service Set (ESS) 126. Sometimes it is difficult to manage one large network. Because of this, network managers usually subdivide large networks into units known as ____ that contain fewer computers. a. subnets 127. The ____ standard defines a local area network that provides cable-free data access for clients that are either mobile or in a fixed location at a rate of either 1 or 2 Mbps using either diffused infrared or RF transmission. c. 802.11 128. Even though it contains data, an 802.11 frames size is not measured in bits but in ____. a. time slots 129. The ____ translates the binary 1s and 0s of the frame into light pulses that are used for transmission. b. PMD 130. The 802.11b PLCP frame preamble and header are always transmitted at ____ Mbps to allow for communication between slower and faster devices. a. 1 131. The entire family of 802.11 standards uses an access method known as the ____ to avoid collisions. c. distributed coordination function (DCF) 132. ____ involves dividing the data to be transmitted from one large frame into several smaller ones. d. Fragmentation 133. The 802.11b standard provides for an optional polling function known as ____. b. point coordination function (PCF) 134. When using PCF, if a client has nothing to send, then that client returns a ____ to the point coordinator. a. null data frame 135. ____ scanning involves a client listening to each available channel for a set period of time (usually 10 seconds). The client listens for a beacon frame transmitted from all available APs. a. Passive 136. 802.11b standard ____ allows the mobile clients NIC to be off as much as possible to conserve battery life but still not miss out on data transmissions. b. power management 137. After association and authentication between the clients and the APs are established, the ____ frames provide assistance in delivering the frames that contain the data. d. control 138. ____ MAC frames carry the information to be transmitted to the destination client. c. Data 139. 802.11 ____ are designed to handle the contention for the medium among several devices attempting to communicate. d. interframe spaces 140. IEEE 802.11 a has a maximum rated standard speed of ___54_ Mbps. 141. The 802.11b standard uses one part of the unlicensed ____ band for its transmissions. a. ISM 142. The 802.11a standard uses the ____ band for its transmissions. b. U-NII 143. With 802.11b the available frequency spectrum (2.412 to 2.484 GHz) is divided into ____ channels in the United States. c. 11 144. In 802.11a, ____ frequency channels operate simultaneously in the Low Band (5.15 to 5.25 GHz) and Middle Band (5.25 to 5.35 GHz). b. 8 145. In 802.11a, transmitting at 24 Mbps requires a ____ technique. c. 16-level quadrature amplitude modulation (16-QAM)

146. In 802.11a, data rates of 54 Mbps are achieved by using ____. d. 64-level quadrature amplitude modulation (64-QAM) 147. The IEEE 802.11g standard specifies that it operates in the same frequency band as ____. a. 802.11b 148. When both 802.11b and 802.11g devices share the same network, the 802.11g standard defines how the frame header is transmitted at 1 or 2 Mbps using ____. d. DSSS 149. PBCC uses a ____ state code (the spreading code) to send 8 bits per transmission symbol. b. 256 150. IEEE ____ defines enhancements to the MAC layer of 802.11 to expand support for LAN applications that require Quality of Service (QoS). a. 802.11e 151.____ is a proposed standard aimed at providing data rates higher than 100 Mbps using the 2.4 GHz ISM band. c. 802.11n 152. ____ technology uses multiple antennas and also uses the reflected signals (multipath) to extend the range of the WLAN. a. Multiple-in, multiple-out (MIMO)

153. ____ offers high-speed wireless connectivity with up to 54 Mbps and seamless connectivity with other types of communications systems, such as cellular telephone systems and FireWire networks. c. HiperLAN/2 154. A ____ allows you to use an existing wireless or wired network to stream music and video files from your computer or from the Internet directly to your TV or stereo system. b. wireless media gateway 155. ____ is a process that verifies that the client device has permission to access the network. d. Authentication 156. ____ standards attempt to ensure that transmissions are not read by unauthorized users, even if those transmissions fall into the wrong hands. a. Privacy 157. The 802.11 standard provides an optional ____ specification for data encryption between wireless devices to prevent eavesdropping. b. WEP 158. WPA uses a 128-bit ____, which is also called personal mode. c. pre-shared key (PSK) 159. 802.1X uses the ____ for relaying access requests between a wireless device, the AP, and the RADIUS server. a. Extensible Authentication Protocol (EAP) 160. For long-distance connections between cities and states, copper-based digital communications lines, such as T1, require the signal to be regenerated every ____. b. 6,000 feet (1.8 kilometers) 161. The term ____ refers to telephone, cable TV, and other communications providers who own the wires and transmission towers that carry voice and data traffic. a. carrier 162. Microwave towers are installed roughly ____ miles apart from each other.

c.

35

163. A ____ connection is a companys internal infrastructure connection. d. backhaul 164. A ____ transmission sends multiple signals at different frequencies. a. broadband 165. A ____ transmission treats the entire transmission medium as if it were only one channel. b. baseband 166. In ____, the transmitted beam is purposely allowed to spread, or diverge, so that by the time it arrives at the receiving device it forms a fairly large optical cone. a. active tracking c. scintillation b. spatial diversity d. beam divergence 167. LMDS can transmit from 51 to ____ Mbps downstream. c. 155 168. A(n) ____ connects to other services, such as a local area network or telephone system. d. network interface unit (NIU) 169. IEEE ____ is the standard for wireless broadband metropolitan area networks. c. 802.16 170. In 802.16, a ____ can be either a laptop computer or device that attaches to a LAN. b. subscriber station (SS) 171. The term ____ stands for worldwide interoperability for microwave access. a. WiMAX 172. ____ are the devices that are installed in a customers office or home. c. Customer premises equipment (CPE) 173. ____ is a transmission convergence that support TV (video), telephone (voice), and data on the same network. d. Triple-play 174. A data transmission to or from a single device is called a ____ in the 802.16 standard. a. burst 175. WiMAX allows the use of two different frequency channels, in which case one is used for downlink and another for uplink. This mechanism is called ____. b. frequency division duplexing (FDD) 176. The 802.16 standard defines several transmission ____, which are sets of predefined connection parameters. a. Profiles 177. A WiMAX ____ is a combination of the basic profile and one of the transmission profiles and is preset on the equipment before it is shipped to an end-user site. d. system profile 178. A(n) ____ can transmit multiple simultaneous signals in different directions to stations that fall within the range of each of the antennas. b. advanced antenna system (AAS) 179. ____ is the maximum delay variation between two consecutive packets over a period of time. c. Jitter 180. ____ are messages digitally signed by a certification authority. d. Digital certificates

You might also like