Sample2(1)

.docx

School

George Mason University *

*We aren’t endorsed by this school

Course

105

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by ChiefRiver7339 on coursehero.com

1. How many layers are there in the TCP/IP protocol suite? a. 2 b. 3 c. 4 d. 5 e. 6 2. IPv6 addresses are how many bits long? a. 32 b. 64 c. 100 d. 128 e. 256 3. UDP provides sequencing, error control and flow control just like TCP a. True b. False 4. Which of the following are standard twisted pair cables? a. CAT 2 b. CAT 3 c. CAT 5 d. All of the above e. None of the above 5. Which technology uses software and hardware to automatically collect and analyze data about a device's surroundings, to present relevant, actionable information to the end user? a. Edge Computing b. Workplace Hub c. Contextual Computing d. 5G Wireless 6. Which technology serves as a centralized IT ecosystem that automates IT processes and unifies all of user’s existing technologies (including hardware, software, and services) into a one stop connected platform? a. Edge Computing b. Workplace Hub c. Contextual Computing
d. 5G Wireless 7. Which are simulation types for implementing of virtual reality technology? a. Non-Immersive b. Semi-Immersive c. Fully-Immersive d. All of the above e. None of the above 8. Which of the following are Deep Learning Algorithms? a. Convolutional Neural Network (CNN) b. Deep Neural Network (DNN) c. Long Short-Term Memory (LSTM) d. All of the Above e. None of the Above 9. Which of the following is the process of examining large and varied data sets to uncover hidden patterns, correlations, and information to help make business decisions? a. Internet of Everything (IOE) b. Big Data Analytics c. Contextual Computing d. Mobile Payments 10. Which of the following networks is a subnet? a. 128.5.0.0 b. 10.0.0.0 c. 192.168.1.0 d. 172.16.64.0 11. In terms of classful IPv4 addressing, what class is the following IPv4 address 75.0.0.7? a. Class A b. Class B c. Class C d. Class D e. Class E 12. Decryption is the process of converting plaintext into ciphertext a. True b. False
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help