Chatpet 4: Probabilitymr. Mac's Page
Pre-Algebra Book PDF
|
Chapter 4: Probabilitymr. Mac's Page Book
CCNA 4 Chapter 4 Exam Answers v5.0 v5.0.2 v5.0.3 v5.1 v6.0 Questions Answers 2019 2020 100% Update 2017 - 2018 Latest version Connecting Networks.PDF Free Download.
Last Updated on January 30, 2019 by
- Page Contents iii List of figures and tables iv Preface v Acknowledgements vii Executive summary ix Chapter 1 Introduction 1 Chapter 2 Analysing the NCRS 7 Chapter 3 The national picture 15 Chapter 4 Concluding remarks 23 References 25. National Crime Recording Standard – Part One iv List of figures Page. Mac Head, and Neil Moran, for.
- Chapter 4 Proportions, Algebra, and Geometry Student Edition (lesson number and title) Florida Sunshine State Standards, Grade 8 (standard) FCAT Practice and Sample Test Workbook, Grade 8 (page) Study Guide and Intervention, CRM (page) Parent and Student Study Guide Workbook (page) Math Skills Maintenance (skill) MathPASS: Tutorial Plus (lesson.
CCNA 1 v6.0 ITN Chapter 4 Exam Answers 2019
Cisco CCNA 1 ITN v6.0 chapter 4 Exam Answers Routing and Switching (R&S) Introduction to Networks (ITN) (Version 6.00) collection year 2018 and 2019 Full 100%. CCNA 1 has been know as ITN. The following are the questions exam answers. Guarantee Passed. CCNA 1 v6.0 chapter 4 exam answers has no new update from the old version 5.1. You can review all chapter 4 Exam Answers. You will get passed scored 100% with this version 6.0. Good Luck for ITN v6.0 Exam!
Chapter 4: Probabilitymr. Mac's Page Number
What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)
- to reduce the number of collisions on the media
- to distinguish data from control information
- to provide better media error correction
- to identify where the frame starts and ends
- to increase the media throughput
Explanation:
An encoding technique converts a stream of data bits in a predefined code that can be recognized by both the transmitter and the receiver. Using predefined patterns helps to differentiate data bits from control bits and provide better media error detection.
What is indicated by the term throughput?
- the guaranteed data transfer rate offered by an ISP
- the capacity of a particular medium to carry data
- the measure of the usable data transferred across the media
- the measure of the bits transferred across the media over a given period of time
- the time it takes for a message to get from sender to receiver
Explanation:
Throughput is the measure of the transfer of bits across the media over a given period of time. Throughput is affected by a number of factors such as, EMI and latency, so it rarely matches the specified bandwidth for a network medium. The throughput measurement includes user data bits and other data bits, such as overhead, acknowledging, and encapsulation. The measure of the usable data transferred across the media is called goodput.
What is the definition of bandwidth?
- the measure of the transfer of bits across the media over a given period of time
- the speed at which bits travel on the network
- the amount of data that can flow from one place to another in a given amount of time
- the measure of usable data transferred over a given period of time
Explanation:
Bandwidth is the measure of the capacity of a network medium to carry data. It is the amount of data that can move between two points on the network over a specific period of time, typically one second.
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
- EMI
- crosstalk
- RFI
- signal attenuation
- extended length of cabling
Explanation:
EMI and RFI signals can distort and corrupt data signals that are carried by copper media. These distortions usually come from radio waves and electromagnetic devices such as motors and florescent lights. Crosstalk is a disturbance that is caused by adjacent wires bundled too close together with the magnetic field of one wire affecting another. Signal attenuation is caused when an electrical signal begins to deteriorate over the length of a copper cable.
Which characteristic describes crosstalk?
- the distortion of the network signal from fluorescent lighting
- the distortion of the transmitted messages from signals carried in adjacent wires
- the weakening of the network signal over long cable lengths
- the loss of wireless signal over excessive distance from the access point
Explanation:
EMI and RFI can distort network signals because of interference from fluorescent lights or electric motors. Attenuation results in deterioration of the network signal as it travels along copper cabling. Wireless devices can experience loss of signals because of excessive distances from a access point, but this is not crosstalk. Crosstalk is the disturbance caused by the electric or magnetic fields of the signal carried on an adjacent wire within the same cable.
What technique is used with UTP cable to help protect against signal interference from crosstalk?
- twisting the wires together into pairs
- wrapping a foil shield around the wire pairs
- encasing the cables within a flexible plastic sheath
- terminating the cable with special grounded connectors
Explanation:
To help prevent the effects of crosstalk, UTP cable wires are twisted together into pairs. Twisting the wires together causes the magnetic fields of each wire to cancel each other out.
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?
- 1 – rollover, 2 – crossover, 3 – straight-through
- 1 – rollover, 2 – straight-through, 3 – crossover
- 1 – crossover, 2 – straight-through, 3 – rollover
- 1 – crossover, 2 – rollover, 3 – straight-through
Explanation:
A straight-through cable is commonly used to interconnect a host to a switch and a switch to a router. A crossover cable is used to interconnect similar devices together like switch to a switch, a host to a host, or a router to a router. If a switch has the MDIX capability, a crossover could be used to connect the switch to the router; however, that option is not available. A rollover cable is used to connect to a router or switch console port.
Refer to the exhibit. What is wrong with the displayed termination?
ITN Chapter 4 Exam Answers 002
- The woven copper braid should not have been removed.
- The wrong type of connector is being used.
- The untwisted length of each wire is too long.
- The wires are too thick for the connector that is used.
Explanation:
When a cable to an RJ-45 connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.
Which type of connector does a network interface card use?
- DIN
- PS-2
- RJ-11
- RJ-45
What is one advantage of using fiber optic cabling rather than copper cabling?
- It is usually cheaper than copper cabling.
- It is able to be installed around sharp bends.
- It is easier to terminate and install than copper cabling.
- It is able to carry signals much farther than copper cabling.
Explanation:
Copper cabling is usually cheaper and easier to install than fiber optic cabling. However, fiber cables generally have a much greater signaling range than copper.
Why are two strands of fiber used for a single fiber optic connection?
- The two strands allow the data to travel for longer distances without degrading.
- They prevent crosstalk from causing interference on the connection.
- They increase the speed at which the data can travel.
- They allow for full-duplex connectivity.
Explanation:
Light can only travel in one direction down a single strand of fiber. In order to allow for full-duplex communication two strands of fiber must be connected between each device.
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
- mobility options
- security
- interference
- coverage area
- extensive cabling
- packet collision
Explanation:
The three areas of concern for wireless networks focus on the size of the coverage area, any nearby interference, and providing network security. Extensive cabling is not a concern for wireless networks, as a wireless network will require minimal cabling for providing wireless access to hosts. Mobility options are not a component of the areas of concern for wireless networks.
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
- application
- transport
- data link
- physical
Explanation:
Encapsulation is a function of the data link layer. Different media types require different data link layer encapsulation.
What is a role of the Logical Link Control sublayer?
- to provide access to various Layer 1 network technologies
- to provide data link layer addressing
- to define the media access processes performed by network hardware
- to mark frames to identify the network layer protocol being carried
Explanation:
There are two data link sublayers, MAC and LLC. The LLC sublayer is responsible for communicating with the network layer and for tagging frames to identify what Layer 3 protocol is encapsulated.
What are two services performed by the data link layer of the OSI model? (Choose two.)
- It encrypts data packets.
- It determines the path to forward packets.
- It accepts Layer 3 packets and encapsulates them into frames.
- It provides media access control and performs error detection.
- It monitors the Layer 2 communication by building a MAC address table.
Explanation: The data link layer is responsible for the exchange of frames between nodes over a physical network media. Specifically the data link layer performs two basic services:
- It accepts Layer 3 packets and encapsulates them into frames.
- It provides media access control and performs error detection.
Path determination is a service provided at Layer 3. A Layer 2 switch builds a MAC address table as part of its operation, but path determination is not the service that is provided by the data link layer.
What is true concerning physical and logical topologies?
- The logical topology is always the same as the physical topology.
- Physical topologies are concerned with how a network transfers frames.
- Physical topologies display the IP addressing scheme of each network.
- Logical topologies refer to how a network transfers data between devices.
Explanation:
Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.
What are two examples of hybrid topologies? (Choose two.)
- partial mesh
- extended star
- hub and spoke
- point-to-point
- full mesh
Explanation:
A hybrid topology is one that is a variation or a combination of other topologies. Both partial mesh and the extended star are examples of hybrid topologies.
Which method of data transfer allows information to be sent and received at the same time?
- full duplex
- half duplex
- multiplex
- simplex
Which statement describes an extended star topology?
- End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
- End devices are connected together by a bus and each bus connects to a central intermediate device.
- Each end system is connected to its respective neighbor via an intermediate device.
- All end and intermediate devices are connected in a chain to each other.
Explanation:
In an extended star topology, central intermediate devices interconnect other star topologies.
What is contained in the trailer of a>Explanation:
The trailer in a>Explanation:
When data travels on the media, it is converted into a stream of 1s and 0s. The framing process inserts into the frame start and stop indicator flags so that the destination can detect the beginning and end of the frame.What is the function of the CRC value that is found in the FCS field of a frame?
- to verify the integrity of the received frame
- to verify the physical address in the frame
- to verify the logical address in the frame
- to compute the checksum header for the data field in the frame
Explanation:
The CRC value in the FCS field of the received frame is compared to the computed CRC value of that frame, in order to verify the integrity of the frame. If the two values do not match, then the frame is discarded.
Match the characteristics to the correct type of fiber. (Not all options are used.)
Explanation:
Single-mode fiber uses a laser as the light source. Its small core produces a single straight path for light and it is commonly used with campus backbones. Multimode fiber uses LEDs as the light source. Its larger core allows for multiple paths for the light. It is commonly used with LANs.