??Match each correct item with the statement below. ?
A. ?A WAN technology functioning primarily at Layer 2 (although its protocols can also reach Layers 1 and 3) that was originally conceived in the early 1980s at Bell Labs and standardized by the ITU in the mid-1990s.
B. ?A variety of ISDN that uses two 64-Kbps bearer channels and one 16-Kbps data channel, as summarized by the notation 2B+D.
C. ?The guaranteed minimum amount of bandwidth selected when leasing a frame relay circuit. Frame relay costs are partially based on this.
D. ?A connectivity device located at a telecommunications carrier's office that aggregates multiple DSL subscriber lines and connects them to a larger carrier or to the Internet backbone.
E. ?A special case of geosynchronous orbit in which the satellite stays directly above the equator and appears stationary from Earth. These satellites are the type used to provide satellite Internet access.
F. ?A 4G cellular network technology that, in its latest version, achieves downlink data rates of up to 3 Gbps and uplink rates of up to 1.5 Gbps.
G. ?A WAN technology that sends Ethernet traffic across MAN connections.
H. ?A type of WAN in which each site is connected to two other sites so that the entire WAN forms a circle pattern.
I. ?An intelligent type of NIU located at the customer's demarc that can provide diagnostic information about the interface.
J. ?The equipment on a satellite that receives an uplinked signal from Earth, amplifies the signal, modifies its frequency, then retransmits it (in a downlink) to an antenna on Earth.
A. ATM (Asynchronous Transfer Mode)
B. ?BRI (Basic Rate Interface)
C. ?CIR (committed information rate)
D. ?DSLAM (DSL access multiplexer)
E. ?geostationary orbit
F. ?LTE (Long Term Evolution)
G. ?Metro Ethernet
H. ring topology WAN?
I. ?smart jack
J. transponder
You might also like to view...
_________ do not contain content, but often are employed to send directives to browsers regarding how a page should be rendered.
A. Elements B. Empty elements C. Nested elements D. One-sided elements
A Case structure is used most often when conditions are treated separately.
Answer the following statement true (T) or false (F)
Which of the following physical security methods provides the ability to secure a company's assets and document any individuals physical time of entry?
A. rotary locks B. combination locks C. card access D. deadbolt locks
A(n) ____________________ column is a column that does not exist in the database but can be computed using data in the existing columns.
Fill in the blank(s) with the appropriate word(s).