?Match each item with a statement below.

A. a remote access protocol that supports many protocols and is used to carry data over a variety of network connections
B. a point-to-point permanent virtual circuit (PVC) technology that offers WAN communications over a fast, reliable, digital packet-switching network
C. a guaranteed minimum transmission rate offered by the service provider
D. a device computers use to convert digital signals to analog signals
E. the device that sends data to (and receives data from) the local loop, usually a CSU/DSU or modem
F. a logical sequence of connections with bandwidth allocated for a specific transmission pathway
G. the device that passes data from the customer LAN to the DCE, usually a router.
H. a high-speed, baseband digital networking standard that specifies incrementally increasing data rates across fiber-optic links.
I. a type of connector for terminating a T1 line that provides diagnostic testing for troubleshooting the connection
J. a category of cloud computing in which a customer pays for the use of applications that run on a service provider's network


A. point-to-point protocol
B. frame relay
C. Committed Information Rate (CIR)
D. modem
E. Data Circuit-terminating Equipment (DCE)
F. virtual circuit
G. Data Terminal Equipment (DTE)
H. Synchronous Optical Network (SONET)
I. smart jack
J. SaaS

Computer Science & Information Technology

You might also like to view...

Variables of type Integer and Double can have any of millions of (numeric) values.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Photoshop has ____ of preset patterns that can be loaded and used in any document.

a. matrices b. indices c. libraries d. glossaries

Computer Science & Information Technology

If an algorithm is more time efficient and less space efficient, what is this called?

What will be an ideal response?

Computer Science & Information Technology

A stream cipher takes one character and replaces it with another character. This output is known as the ____.

A. initialization vector B. integrity check value C. cyclic redundancy check D. keystream

Computer Science & Information Technology