SlideShare une entreprise Scribd logo
1  sur  138
Computer Networking
Multiple Choice
By
Abhishek Jaguessar
(Bsc Computer Networking)
1. Frames from one LAN can be transmitted to
another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
2. Which of the following condition is used to
transmit two packets over a medium at the
same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
3. You have a class A network address 10.0.0.0
with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow
for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
4. What is the default subnet mask for a class C
network?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
5. Which of the following is used for
modulation and demodulation?
A. modem
B. protocols
C. gateway
D. multiplexer
E. None of the above
6. Which of the following is not a disadvantage
of wireless LAN?
A. Slower data transmission
B. higher error rate
C. interference of transmissions from different
computers
D. All of the above
7. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to
other gateways or hosts
B. provides communication between the Internet Protocol
Software on one machine and the Internet Protocol
Software on another
C. reports error conditions to the original source, the
source must relate errors to individual application
programs and take action to correct the problem
D. All of the above
E. None of the above
8. Your company has a LAN in its downtown office
and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to
share data and resources between the two
LANs, what type of device(s) are needed to
connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
9. The term 'duplex' refers to the ability of the
data receiving stations to echo back a
confirming message to the sender. In full
duplex data transmission, both the sender
and the receiver
A. cannot talk at once
B. can receive and send data simultaneously
C. can send or receive data one at a time
D. can do one way data transmission only
E. None of the above
10.Which of the following technique is used for
fragment?
A. a technique used in best-effort delivery systems to
avoid endlessly looping packets
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol
and places it in the data portion of the low level frame
C. one of the pieces that results when an IP gateway
divides an IP datagram into smaller pieces for
transmission across a network that cannot handle the
original datagram size
D. All of the above
E. None of the above
11.Contention is
A. One or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition when two or more stations attempt to use the
same channel at the same time
D. collection of interconnected functional units that provides a
data communications service among stations attached to the
network
E. None of the above
12.When you ping the loopback address, a
packet is sent where?
A. On the network
B. Down through the layers of the IP architecture and then up
the layers again
C. Across the wire
D. through the loopback dongle
E. None of the above
13.Which of the following TCP/IP protocol is
used for transferring electronic mail
messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
14.Which of the following device is used to
connect two systems, especially if the
systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
E. None of the above
15.The synchronous modems are more costly
than the asynchronous modems because
A. they produce large volume of data
B. they contain clock recovery circuits
C. they transmit the data with stop and start bits.
D. they operate with a larger bandwidth
E. None of the above
16.A distributed network configuration in which
all data/information pass through a central
computer is
A. bus network
B. star network
C. ring network
D. Point-to-point network
E. None of the above
17.Which of the following TCP/IP protocol allows
an application program on one machine to
send a datagram to an application program
on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
E. None of the above
18. A remote batch-processing operation in
which data is solely input to a central
computer would require a:
A. telegraph line
B. simplex lines
C. mixedband channel
D. All the above
E. None of the above
19.What part of 192.168.10.51 is the Network
ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
E. None of the above
20.The slowest transmission speeds are those of
A. twisted-pair wire
B. coaxial cable
C. fiber-optic cable
D. microwaves
21.A noiseless 3 KHz Channel transmits bits with
binary level signals. What is the maximum
data rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
22.Carrier is
A. One or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition when two or more sections attempt to use the
same channel at the same time
D. a collection of interconnected functional units that provides
a data communications service among stations attached to
the network
E. None of the above
23.What can greatly reduce TCP/IP configuration
problems?
A. WINS Server
B. WINS Proxy
C. DHCP Server
D. PDC
E. None of the above
24. Which of the following statements is correct for the
use of packet switching?
A. the subdivision of information into individually addressed
packets in conjunction with alternative routing
arrangement enabled the transmission path to be altered
in the event of congestion or individual link failure
B. the employment of additional intelligence within the
network enabled more sophisticated error control and link
control procedures to be applied
C. by employing wide bandwidth circuits for the trunk
networks substantial economies through extensive
sharing of capacity could be achieved.
D. All of the above
E. None of the above
25. A front-end processor is
A. a user computer system
B. a processor in a large-scale computer that executes
operating system instructions
C. a minicomputer that relieves main-frame
computers at a computer centre of communications
control functions
D. preliminary processor of batch jobs.
E. None of the above
26.To connect a computer with a device in the
same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
E. None of the above
27.Internet-like networks within an enterprise.
A. Intranets
B. Switching alternating
C. Inter organizational networks
D. Extranets
28.With an IP address of 100, you currently have
80 subnets. What subnet mask should you
use to maximize the number of available
hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
29.Which of the following types of channels
moves data relatively slowly?
A. wideband channel
B. voiceband channel
C. narrowband channel
D. broadband channel
E. None of the above
30.Which of the following is required to
communicate between two computers?
A. communications software
B. protocol
C. communications hardware
D. access to transmission medium
E. All of the above
31.Which of the following does not allow
multiple users or devices to share one
communications line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
E. None of the above
32.The geostationary satellite used for
communication systems
A. rotates with the earth
B. remains stationary relative to the earth
C. is positioned over equator
D. All of the above
E. None of the above
33.Telecommunication networks frequently
interconnect an organization with its
customers and suppliers. Select the best fit
for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
34.The _____ houses the switches in token ring.
A. transceiver
B. nine-pin connector
C. MAU
D. NIC
E. None of the above
35.What device separates a single network into
two segments but lets the two segments
appear as one to higher protocols?
A. Switch
B. Bridge
C. Gateway
D. Router
36. Which of the following refers to the terms
"residual error rate"?
A. the number of bit errors per twenty four hours of
continuous operation on an asynchronous line
B. The probability that one or more errors will be undetected
when an error detection scheme is used
C. the probability that one or more errors will be detected
when an error detection mechanism is used
D. signal to noise ratio divided by the ratio of energy per bit to
noise per hertz
E. None of the above
37. The research and development department at your office
has been experimenting with different technologies to
help improve the performance of the network. One group
has been examining the use of a broadband network
versus a based band network. Select the correct
statement about broadband and baseband.
A. Broadband networks carry several channels on a single cable, whereas in
a baseband network several cables carry one channel
B. Baseband networks carry a single channel on a single cable, whereas
broadband networks carry several channels on a single cable
C. Baseband refers to local area networks, and broadband refers to wide
area networks.
D. Baseband operates at a standard bit rate, whereas broadband may
operate at different rates as needed
E. Broadband and baseband refer to the different frequencies at which
infrared operates then transmitting signals in certain conditions
38.An error-detecting code inserted as a field in
a block of data to be transmitted is known as
A. Frame check sequence
B. Error detecting code
C. Checksum
D. flow control
E. None of the above
39. The cheapest modems can transmit
A. 300 bits per second
B. 1,200 bits per second
C. 2,400 bits per second
D. 4,800 bits per second
E. None of the above
40. Computers cannot communicate with each other
directly over telephone lines because they use
digital pulses whereas telephone lines use analog
sound frequencies. What is the name of the device
which permits digital to analog conversion at the
start of a long distance transmission?
A. Interface
B. Modem
C. Attenuation
D. Teleprocessor
E. None of the above
41. Four routers have to be interconnected in a point-
to-point Network. Each pair of root us may
connected by a high-speed line, a medium speed
line or a low speed line. Find the total number of
topologies.
A. 12
B. 81
C. 48
D. 729
42.Sending a file from your personal computer's
primary memory or disk to another computer
is called
A. uploading
B. downloading
C. logging on
D. hang on
E. None of the above
43. HMP (Host Monitoring Protocol) is:
A. a TCP/IP protocol used to dynamically bind a high level IP
Address to a low-level physical hardware address
B. a TCP/IP high level protocol for transferring files from one
machine to another.
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
E. None of the above
44.Which of the following is a voiceband
channel?
A. Telephone line
B. Telegraph line
C. Coaxial cable
D. Microwave systems
E. None of the above
45.Demodulation is a process of
A. converting analog to digital signals
B. converting digital to analog signals
C. multiplexing various signals into one high speed line signals
D. performing data description.
46.Internet-like networks between a company
and its business partners. Select the best fit
for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
47.An example of an analog communication
method is
A. laser beam
B. microwave
C. voice grade telephone line
D. All of the above
E. None of the above
48.Which of the following layer protocols are
responsible for user and the application
programme support such as passwords,
resource sharing, file transfer and network
management?
A. Layer 7 protocols
B. Layer 6 protocols
C. Layer 5 protocols
D. Layer 4 protocols
E. None of the above
49.What frequency range is used for FM radio
transmission?
A. Very Low Frequency : 3 kHz to 30. kHz
B. Low Frequency : 30 kHz to 300 kHz
C. High Frequency : 3 MHz to 30 MHz
D. Very High Frequency : 30 MHz to 300 MHz
E. None of the above
50.Transmission of computerised data from one
location to another is called
A. data transfer
B. data flow
C. data communication
D. data management
E. None of the above
51.Compared to analog signals, digital signals
A. allow faster transmission
B. are more accurate
C. both (a) and (b)
D. All of the above
E. None of the above
52.FDDI is a
A. ring network
B. star network
C. mesh network
D. bus based network
E. None of the above
53.A central computer surrounded by one or
more satellite computers is called a
A. bus network
B. ring network
C. star network
D. All of the above
E. None of the above
54. If delays are recorded as 10 bit numbers in a 50
router network, and delay vectors are exchanged
twice a second, how much bandwidth per fill duplex
line is occupied by the distributed routing
algorithm?
A. 500 bps
B. 1500 bps
C. 5 bps
D. 1000 bps
55.HOSTS file entries are limited to how many
characters?
A. 8
B. 255
C. 500
D. Unlimited
E. None of the above
56. Which of the following statement is incorrect?
A. The Addresses Resolution Protocol, ARP, allows a host to find
the physical address of a target host on the same physical
network, given only the target IP address.
B. The sender's IP - to- physical address binding is included in
every ARP broadcast; receivers update the IP-to-Physical
address binding information in their cache before processing
an ARP packet.
C. ARP is a low-level protocol that hides the underlying
network physical addressing, permitting us to assign IP-
addresses of our choice to every machine.
D. All of the above
E. None of the above
57.Which of the following best illustrates the
default subnet mask for a class A,B, and C
Network?
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
E. None of the above
58. Modulation is the process of
A. converting analog signals to digital signals
B. converting digital signals to analog signals
C. Multiplexing various signals into high speed line signals
D. performing data encryption.
59.Devices interconnected by the LAN should
include
A. Computers and terminals
B. mass storage device, printers and plotters
C. bridges and gateways
D. All of the above
E. None of the above
60.On a class B network, how many hosts are
available at each site with a subnet mask of
248?
A. 16,382
B. 8,190
C. 4,094
D. 2,046
E. 1,022
61.Which of the following technique is used for
encapsulation?
A. a technique used in best-effort delivery systems to avoid
endlessly looping packets.
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol
and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides
an IP datagram into smaller pieces for transmission across
a network that cannot handle the original datagram size
D. All of the above
E. None of the above
62.You are working with three networks that
have the network IDs 192.168.5.0,
192.168.6.0, and 192.168.7.0. What subnet
mask can you use to combine these
addresses into one?
A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
63.With an IP address set starting with 150, you
currently have six offices that you are treating as
subnets. Plans are in place to open 10 more
offices before the end of the year. What subnet
mask should you use to satisfy the needed
number of subnets and maximize the number of
hosts available at each site?
A. 192
B. 224
C. 240
D. 248
E. 252
64.A machine that connects to two or more
electronic mail systems and transfers mail
messages among them is known as
A. Gateways
B. mail gateway
C. bridges
D. User Agent
E. None of the above
65.Error detection at a data link level is achieved
by
A. bit stuffing
B. cyclic redundancy codes
C. Hamming codes
D. equalization
66.When the computer provides the manager
with a multiple choice of possible answers,
the prompting technique is
A. question and answer
B. form filling
C. open-ended question
D. menu selection
E. None of the above
67.Which network topology is considered
passive?
A. Cross
B. Ring
C. Star
D. Mesh
E. Bus
68.Which address is the loopback address?
A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
E. None of the above
69.Intranets and extranets can use their network
fire walls and other security features to
establish secure Internet links within an
enterprise or with its trading partners. Select
the best fit for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
70.Which of the following is an advantage to
using fiber optics data transmission?
A. resistance to data theft
B. fast data transmission rate
C. low noise level
D. few transmission errors
E. All of the above
71.Communication network is
A. one or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition with two or more stations attempt to use the
same channel at the same time
D. a collection of interconnected functional units that provides
a data communications service among stations attached to
the network
E. None of the above
72.Which of the following technique is used for
Time-To-Line (TTL)?
A. a technique used in best-effort delivery system to avoid
endlessly looping packets.
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol and
places it in the data portion of the low level frame
C. One of the pieces that results when an IP gateway divides an
IP datagram into smaller pieces for transmission across a
network that cannot handle the original datagram size.
D. All of the above
E. None of the above
73. Which of the following statement is incorrect?
A. if a host moves from one network to another, its IP address
must change
B. routing uses the network portion of the IP address, the path
taken by packets travelling to a host with multiple IP
addresses depends on the address used.
C. IP addresses encode both a network and a host on that
network, they do not specify an individual machine, but a
connection to a network.
D. All of the above
E. None of the above
74.Bandlimited signal is
A. transmission of signals without modulation
B. a signal all of whose energy is contained within a
finite frequency range
C. simultaneous transmission of data to a number of
stations
D. All of the above
E. None of the above
75.Computers in a LAN can be interconnected by
radio and infrared technologies.
A. Wireless LANs
B. Network Topologies
C. Multiplexer
D. Modem
76.How many digits of the Network User
Address are known as the DNIC (Data
Network Identification Code)?
A. first three
B. first four
C. first five
D. first seven
E. None of the above
77.Which of the following is the address of the
router?
A. The IP address
B. The TCP address
C. The subnet mask
D. The default gateway
E. None of the above
78.A devices that links two homogeneous
packet-broadcast local networks, is
A. hub
B. bridge
C. repeater
D. gateway
E. None of the above
79.Identify the odd term amongst the following
group:
A. Coaxial cable
B. Optical fibre
C. Twisted pair wire
D. Microwaves
E. None of the above
80.Which of the following divides the high speed
signal into frequency bands?
A. t-switch
B. modem
C. frequency-division multiplexer
D. time-division multiplexer
E. None of the above
81.What is the first octet range for a class C IP
address?
A. 192 - 255
B. 192 - 223
C. 192 - 226
D. 128 - 191
E. 1 - 126
82.Which of the following conditions is used to
transmit two packets over a medium at the
same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
83. Distributed Queue Dual Bus is a standard for
A. LAN
B. MAN
C. WAN
D. Wireless LAN.
E. LAN and MAN
84. A teleprocessing system may consist of
A. user systems
B. communications systems
C. computer center systems
D. All of the above
E. None of the above
85.If the ASCII character G is sent and the
character D is received, what type of error is
this?
A. single-bit
B. multiple-bit
C. burst
D. recoverable
86.Which layer of OSI determines the interface
of the system with the user?
A. Network
B. Application
C. Data-link
D. Session
E. None of the above
87.The transfer of data from a CPU to peripheral
devices of a computer is achieved through
A. modems
B. computer ports
C. interfaces
D. buffer memory
E. None of the above
88.What is the number of separate protocol
layers at the serial interface gateway
specified by the X.25 standard?
A. 4
B. 2
C. 6
D. 3
E. None of the above
89.Many data communication networks have been
established which provide a wealth of on-
demand information services to people at
home. What is the name of the system which
provides an interactive, graphics-rich service
that permits user to select what they want?
A. Teletex system
B. Fax system
C. Videotex system
D. Microwave system
E. None of the above
90.Which of the following statements is correct?
A. Terminal section of a synchronous modem contains the
scrambler
B. Receiver section of a synchronous modem contains the
scrambler
C. Transmission section of a synchronous modem contains the
scrambler
D. Control section of a synchronous modem contains the
scrambler
E. None of the above
91.Because the configuration information for a
DHCP client is received dynamically, you must
use which utility to read the current
configuration to verify the settings?
A. PING
B. TRACERT
C. ARP
D. IPCONFIG
E. None of the above
92.Which of the following characteristic(s) is/are
suited to the PSS applications?
A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international
packets switched services
C. Multiple remote host or applications accessed by a single
local access circuit terminal and circuit
D. All of the above
E. None of the above
93.Which of the following is separated by a
subnet mask?
A. DHCP scopes
B. Network ID and host ID
C. Domains
D. Subnets
94.The signal to noise ratio for a voice grade line
is 30.1 dB (decibels) or a power ratio of
1023:1. The maximum achievable data rate
on this line whose spectrum ranges from 300
Hz to 4300 Hz is
A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
E. None of the above
95. TCP is:
A. Operates at the Data Link layer
B. Connection orientated and unreliable
C. Connection orientated and reliable
D. Connectionless and unreliable
96. An encyclopedic database
A. is an information utility that specializes in storing
and searching information
B. is generally free
C. is easy for beginners to use
D. All of the above
E. None of the above
97.Which of the following statements is correct?
A. Protocol converters are the same as multiplexers
B. Protocol converters are the same as TDMs
C. Protocol converters are usually not operated in pairs.
D. Protocol converters are usually operated in
E. None of the above
98.Examples are packet switching using frame
relay, and cell switching using ATM
technologies. Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
99.The physical layer, in reference to the OSI
model, defines
A. data link procedures that provide for the exchange of data
via frames that can be sent and received
B. the interface between the X.25 network and packet mode
device
C. the virtual circuit interface to packet-switched service
D. All of the above
E. None of the above
100.A required characteristic of an online real-
time system is:
A. more than one CPU
B. offline batch processing
C. no delay in processing
D. All of the above
E. None of the above
101.How many class A, B, and C network IDs can
exist?
A. 2,113,658
B. 16,382
C. 126
D. 128
E. None of the above
102.Messages from one computer terminal can be
sent to another by using data networks. The
message to be sent is converted to an electronic
digital signal, transmitted via a cable, telephone
or satellite and then converted back again at the
receiving end. What is this system of sending
messages called?
A. Paperless office
B. Electronic mail
C. Global network
D. Electronic newspaper
E. None of the above
103. HDLC (High-level Data Link Control) is
A. a method of determining which device has access to the
transmission medium at any time
B. a method access control technique for multiple-access
transmission media
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-
switched network
E. None of the above
104.The first step in troubleshooting many
problems is to verify which of the following?
A. The subnet mask is valid
B. TCP/IP is installed correctly on the client
C. The WINS server is running
D. The BDC is operable
E. None of the above
105.What protocol is used between E-Mail
servers?
A. FTP
B. SMTP
C. SNMP
D. POP3
106.If you configure the TCP/IP address and other
TCP/IP parameters manually, you can always verify
the configuration through which of the following?
Select the best answer.
A. Network Properties dialog box
B. Server Services dialog box
C. DHCPINFO command-line utility
D. Advanced Properties tab of TCP/ IP Info.
E. None of the above
107.In a PC to telephone hookup for long
distance communication, modem is
connected between the telephone line and
A. PC
B. synchronous port
C. crossover cable
D. asynchronous port
E. None of the above
108.A hard copy would be prepared on a
A. typewriter terminal
B. line printer
C. plotter
D. All of the above
E. None of the above
109.Arzeenah is in charge of a small network and wants to
make it simple but secure. The users want to have full
control over their data and still be able to share data
with the rest of the office. The networking knowledge
of the office staff is basic. Which network(s) would be
the best for Arzeenah to set up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. WAN
E. Share-level
110.When UPC is used, the price of the item is
located
A. on the item
B. on the item and on the shelf
C. in computer storage
D. on the shelf and in computer storage
E. None of the above
111. Error control is needed at the transport
layer because of potential errors occurring
A. from transmission line noise
B. in routers
C. from out-of-sequence delivery
D. from packet losses.
112.The transport layer protocol is connectionless.
A. NVT
B. FTP
C. TCP
D. UDP
E. None of the above
113.The fundamental requirements of private-
to-public network interconnection methods
which need to be provided in gateways is/are
A. universal accessibility for private network Data Terminal
Equipment (DTE)
B. adequate cost control mechanisms for administration of the
private networks
C. to assign address to private network DTEs
D. a and b both
E. None of the above
114.Communication between computers is
almost always
A. serial
B. parallel
C. series parallel
D. direct
E. None of the above
115.The difference between a multiplexer and a
statistical multiplexer is
A. Statistical multiplexers need buffers while multiplexers do
not need buffers
B. Multiplexer use X.25 protocol, while statistical multiplexers
use the Aloha protocol
C. Multiplexers often waste the output link capacity while
statistical multiplexers optimize its use
D. Multiplexers use Time Division Multiplexing (TDM) while
statistical multiplexers use Frequency Division Multiplexing
(FDM)
E. None of the above
116.You are trying to decide which type of network you
will use at your office, and you want the type that
will provide communication and avoid collisions on
the cable. Which of the following is the best choice?
A. Token-Ring
B. CSMA/CD
C. Ethernet
D. CSMA/CA
E. ARCnet
117.A decrease in magnitude of current, voltage,
a power of a signal in transmission between
points, is known as
A. Attenuation
B. Amplitude
C. Aloha
D. Carrier
E. None of the above
118.The term "remote job entry" relates to
A. batch processing
B. realtime processing
C. transaction processing
D. distributed processing
E. None of the above
119.The modern enterprise is interconnected
internally and externally by the Internet,
intranets, and other networks. Select the
best fit for answer:
A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
E. None of the above
120.When using the loopback address, if TCP/IP
is installed correctly, when should you
receive a response?
A. Immediately
B. Only if the address fails
C. After the next host comes online
D. Within two minutes
E. None of the above
121. MAC is
A. a method of determining which device has access to the
transmission medium at any time
B. a method access control technique or multiple-access
transmission media
C. a very common bit-oriented data link protocol issued to ISO.
D. network access standard for connecting stations to a circuit-
switched network
E. None of the above
122. Parity bit is
A. an error-detecting code based on a summation operation
performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the
sum of all the binary digits.
C. a code in which each expression conforms to specific rules of
construction, so that if certain errors occur in an expression,
the resulting expression will not conform to the rules of
construction and thus the presence of the errors in detected
D. the ratio of the number of data units in error to the total
number of data units
E. None of the above
123.Which of the following file retrieval
methods use hypermedia?
A. HTTP
B. WAIS
C. Veronica
D. Archie
E. None of the above
124.Which IP address class has few hosts per
network?
A. D
B. C
C. B
D. A
E. None of the above
125. What is the port number for POP3?
A. 110
B. 90
C. 80
D. 49
126.Which of the following provides a storage
mechanism for incoming mail but does not
allow a user to download messages
selectively?
A. SMTP
B. DHCP
C. IMAP
D. POP3
127.Ethernet and Token-Ring are the two most
commonly used network architectures in the world.
Jim has heard of the different topologies for
networks and wants to choose the architecture that
will provide him with the most options. Which of
the following would that be? Choose the most
correct answer.
A. Token-Ring because it currently can run at both 4Mbps and
16Mbps. This means that it can be used in any topology
B. Ethernet, because it is cabled using fiber-optic cable
C. Token-Ring, because it uses a MAU
D. Ethernet, because it can be set up with most topologies and can
use multiple transfer speeds
E. Neither Token-Ring nor Ethernet is the proper choice. Only
ARCnet can be used in all topologies
128.Two devices are in network if
A. a process in one device is able to exchange information with
a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
129.When collection of various computers
seems a single coherent system to its client,
then it is called
A. computer network
B. distributed system
C. both (a) and (b)
D. none of the mentioned
130.Which one of the following computer
network is built on the top of another
network?
A. prior network
B. chief network
C. prime network
D. overlay network
131.In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
132.Communication channel is shared by all the
machines on the network in
A. broadcast network
B. unicast network
C. multicast network
D. none of the mentioned
133. Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. none of the mentioned
134.A list of protocols used by a system, one
protocol per layer, is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
135.Which one of the following extends a
private network across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
136. The IETF standards documents are called
A. RFC
B. RCF
C. ID
D. None of the mentioned
END
THANK YOU
ABHISHEK JAGUESSAR

Contenu connexe

Tendances

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniquesBibhu Prasad
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsShusil Baral
 
Data link layer
Data link layerData link layer
Data link layerst2112
 
Analog Transmissions
Analog TransmissionsAnalog Transmissions
Analog TransmissionsTechiNerd
 
Cell-Free architectures for 5G
Cell-Free architectures for 5GCell-Free architectures for 5G
Cell-Free architectures for 5GStefano Buzzi
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple accessmangal das
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationasadkhan1327
 

Tendances (20)

Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Radio propagation
Radio propagationRadio propagation
Radio propagation
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
FDMA
FDMAFDMA
FDMA
 
TDMA
TDMATDMA
TDMA
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
Data link layer
Data link layerData link layer
Data link layer
 
Analog Transmissions
Analog TransmissionsAnalog Transmissions
Analog Transmissions
 
Ethernet
EthernetEthernet
Ethernet
 
Cell-Free architectures for 5G
Cell-Free architectures for 5GCell-Free architectures for 5G
Cell-Free architectures for 5G
 
Code division multiple access
Code division multiple accessCode division multiple access
Code division multiple access
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Chap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communicationChap 1&2(history and intro) wireless communication
Chap 1&2(history and intro) wireless communication
 

Similaire à Computer Networking Multiple Choice Questions

Ccn aquestions sep_2017
Ccn aquestions sep_2017Ccn aquestions sep_2017
Ccn aquestions sep_2017Trang Nguyen
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)welcometofacebook
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2raghad mejeed
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
Computer Networks Mcqs.pdf
Computer Networks Mcqs.pdfComputer Networks Mcqs.pdf
Computer Networks Mcqs.pdfIT Eagers
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+ kappi98a
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)welcometofacebook
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdfwondimagegndesta
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxbunyansaturnina
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communicationsHarishKumar2054
 
Arabou.Lernall
Arabou.LernallArabou.Lernall
Arabou.Lernalllernall
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020tadeseguchi
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020tadeseguchi
 
EC8702 Adhoc and wireless sensor networks
EC8702 Adhoc and wireless sensor networksEC8702 Adhoc and wireless sensor networks
EC8702 Adhoc and wireless sensor networksThahsin Thahir
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2Anandpudur
 
Cis 513 week 11 final exam – strayer new
Cis 513 week 11 final exam – strayer newCis 513 week 11 final exam – strayer new
Cis 513 week 11 final exam – strayer newemmywatson2017
 

Similaire à Computer Networking Multiple Choice Questions (20)

Ccn aquestions sep_2017
Ccn aquestions sep_2017Ccn aquestions sep_2017
Ccn aquestions sep_2017
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Computer Networks Mcqs.pdf
Computer Networks Mcqs.pdfComputer Networks Mcqs.pdf
Computer Networks Mcqs.pdf
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
Test King Virtual Test--Network+
Test King Virtual Test--Network+ Test King Virtual Test--Network+
Test King Virtual Test--Network+
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
 
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf538565345-HNS-Level-III-COC-Knowledge-Test.pdf
538565345-HNS-Level-III-COC-Knowledge-Test.pdf
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Arabou.Lernall
Arabou.LernallArabou.Lernall
Arabou.Lernall
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
EC8702 Adhoc and wireless sensor networks
EC8702 Adhoc and wireless sensor networksEC8702 Adhoc and wireless sensor networks
EC8702 Adhoc and wireless sensor networks
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 
Cis 513 week 11 final exam – strayer new
Cis 513 week 11 final exam – strayer newCis 513 week 11 final exam – strayer new
Cis 513 week 11 final exam – strayer new
 

Plus de Abhishek Jaguessar

Advise to Girls/Women by Abhishek Jaguessar
Advise to Girls/Women by Abhishek JaguessarAdvise to Girls/Women by Abhishek Jaguessar
Advise to Girls/Women by Abhishek JaguessarAbhishek Jaguessar
 
Raving Fans - A Revolutionary Approach To Customer Service
Raving Fans - A Revolutionary Approach To Customer ServiceRaving Fans - A Revolutionary Approach To Customer Service
Raving Fans - A Revolutionary Approach To Customer ServiceAbhishek Jaguessar
 
Change management by Abhishek Jaguessar
Change management by Abhishek JaguessarChange management by Abhishek Jaguessar
Change management by Abhishek JaguessarAbhishek Jaguessar
 
The difference between China and Greek Mythology By Abhishek Jaguessar
The difference between China and Greek Mythology By Abhishek JaguessarThe difference between China and Greek Mythology By Abhishek Jaguessar
The difference between China and Greek Mythology By Abhishek JaguessarAbhishek Jaguessar
 
India and Pakistan since Independence
India and Pakistan since IndependenceIndia and Pakistan since Independence
India and Pakistan since IndependenceAbhishek Jaguessar
 
Last Minute Exam Preparation By Abhishek Jaguessar
Last Minute Exam Preparation By Abhishek JaguessarLast Minute Exam Preparation By Abhishek Jaguessar
Last Minute Exam Preparation By Abhishek JaguessarAbhishek Jaguessar
 
Sexual Arousal and Intercourse
Sexual Arousal and Intercourse Sexual Arousal and Intercourse
Sexual Arousal and Intercourse Abhishek Jaguessar
 
How to tell if someone is lying?
How to tell if someone is lying?How to tell if someone is lying?
How to tell if someone is lying?Abhishek Jaguessar
 
101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assaultAbhishek Jaguessar
 
Lord shiva and his worship by Abhishek Jaguessar
Lord shiva and his worship by Abhishek JaguessarLord shiva and his worship by Abhishek Jaguessar
Lord shiva and his worship by Abhishek JaguessarAbhishek Jaguessar
 
Babies market by Abhishek Jaguessar
Babies market by Abhishek JaguessarBabies market by Abhishek Jaguessar
Babies market by Abhishek JaguessarAbhishek Jaguessar
 
Dynastar Biology Figures and Structures By Abhishek Jaguessar
Dynastar Biology Figures and Structures By Abhishek JaguessarDynastar Biology Figures and Structures By Abhishek Jaguessar
Dynastar Biology Figures and Structures By Abhishek JaguessarAbhishek Jaguessar
 
Dynastar Mahavidyas By Abhishek Jaguessar
Dynastar Mahavidyas By Abhishek JaguessarDynastar Mahavidyas By Abhishek Jaguessar
Dynastar Mahavidyas By Abhishek JaguessarAbhishek Jaguessar
 

Plus de Abhishek Jaguessar (14)

Advise to Girls/Women by Abhishek Jaguessar
Advise to Girls/Women by Abhishek JaguessarAdvise to Girls/Women by Abhishek Jaguessar
Advise to Girls/Women by Abhishek Jaguessar
 
Raving Fans - A Revolutionary Approach To Customer Service
Raving Fans - A Revolutionary Approach To Customer ServiceRaving Fans - A Revolutionary Approach To Customer Service
Raving Fans - A Revolutionary Approach To Customer Service
 
Change management by Abhishek Jaguessar
Change management by Abhishek JaguessarChange management by Abhishek Jaguessar
Change management by Abhishek Jaguessar
 
The difference between China and Greek Mythology By Abhishek Jaguessar
The difference between China and Greek Mythology By Abhishek JaguessarThe difference between China and Greek Mythology By Abhishek Jaguessar
The difference between China and Greek Mythology By Abhishek Jaguessar
 
India and Pakistan since Independence
India and Pakistan since IndependenceIndia and Pakistan since Independence
India and Pakistan since Independence
 
Parenting Styles and Outcomes
Parenting Styles and OutcomesParenting Styles and Outcomes
Parenting Styles and Outcomes
 
Last Minute Exam Preparation By Abhishek Jaguessar
Last Minute Exam Preparation By Abhishek JaguessarLast Minute Exam Preparation By Abhishek Jaguessar
Last Minute Exam Preparation By Abhishek Jaguessar
 
Sexual Arousal and Intercourse
Sexual Arousal and Intercourse Sexual Arousal and Intercourse
Sexual Arousal and Intercourse
 
How to tell if someone is lying?
How to tell if someone is lying?How to tell if someone is lying?
How to tell if someone is lying?
 
101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault101 things you can do to prevent sexual assault
101 things you can do to prevent sexual assault
 
Lord shiva and his worship by Abhishek Jaguessar
Lord shiva and his worship by Abhishek JaguessarLord shiva and his worship by Abhishek Jaguessar
Lord shiva and his worship by Abhishek Jaguessar
 
Babies market by Abhishek Jaguessar
Babies market by Abhishek JaguessarBabies market by Abhishek Jaguessar
Babies market by Abhishek Jaguessar
 
Dynastar Biology Figures and Structures By Abhishek Jaguessar
Dynastar Biology Figures and Structures By Abhishek JaguessarDynastar Biology Figures and Structures By Abhishek Jaguessar
Dynastar Biology Figures and Structures By Abhishek Jaguessar
 
Dynastar Mahavidyas By Abhishek Jaguessar
Dynastar Mahavidyas By Abhishek JaguessarDynastar Mahavidyas By Abhishek Jaguessar
Dynastar Mahavidyas By Abhishek Jaguessar
 

Dernier

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Dernier (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Computer Networking Multiple Choice Questions

  • 1. Computer Networking Multiple Choice By Abhishek Jaguessar (Bsc Computer Networking)
  • 2. 1. Frames from one LAN can be transmitted to another LAN via the device A. Router B. Bridge C. Repeater D. Modem
  • 3. 2. Which of the following condition is used to transmit two packets over a medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous E. None of the above
  • 4. 3. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? A. 255.240.0.0 B. 255.248.0.0 C. 255.252.0.0 D. 255.254.0.0 E. 255.255.255.255
  • 5. 4. What is the default subnet mask for a class C network? A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0 D. 255.255.255.0 E. None of the above
  • 6. 5. Which of the following is used for modulation and demodulation? A. modem B. protocols C. gateway D. multiplexer E. None of the above
  • 7. 6. Which of the following is not a disadvantage of wireless LAN? A. Slower data transmission B. higher error rate C. interference of transmissions from different computers D. All of the above
  • 8. 7. The Internet Control Message Protocol (ICMP) A. allows gateways to send error a control messages to other gateways or hosts B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another C. reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem D. All of the above E. None of the above
  • 9. 8. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer. A. Modem B. Cable C. Hub D. Router
  • 10. 9. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver A. cannot talk at once B. can receive and send data simultaneously C. can send or receive data one at a time D. can do one way data transmission only E. None of the above
  • 11. 10.Which of the following technique is used for fragment? A. a technique used in best-effort delivery systems to avoid endlessly looping packets B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame C. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size D. All of the above E. None of the above
  • 12. 11.Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capable of being modulated or impressed with a second signal C. the condition when two or more stations attempt to use the same channel at the same time D. collection of interconnected functional units that provides a data communications service among stations attached to the network E. None of the above
  • 13. 12.When you ping the loopback address, a packet is sent where? A. On the network B. Down through the layers of the IP architecture and then up the layers again C. Across the wire D. through the loopback dongle E. None of the above
  • 14. 13.Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
  • 15. 14.Which of the following device is used to connect two systems, especially if the systems use different protocols? A. hub B. bridge C. gateway D. repeater E. None of the above
  • 16. 15.The synchronous modems are more costly than the asynchronous modems because A. they produce large volume of data B. they contain clock recovery circuits C. they transmit the data with stop and start bits. D. they operate with a larger bandwidth E. None of the above
  • 17. 16.A distributed network configuration in which all data/information pass through a central computer is A. bus network B. star network C. ring network D. Point-to-point network E. None of the above
  • 18. 17.Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? A. UDP B. VMTP C. X.25 D. SMTP E. None of the above
  • 19. 18. A remote batch-processing operation in which data is solely input to a central computer would require a: A. telegraph line B. simplex lines C. mixedband channel D. All the above E. None of the above
  • 20. 19.What part of 192.168.10.51 is the Network ID, assuming a default subnet mask? A. 192 B. 192.168.10 C. 0.0.0.5 D. 51 E. None of the above
  • 21. 20.The slowest transmission speeds are those of A. twisted-pair wire B. coaxial cable C. fiber-optic cable D. microwaves
  • 22. 21.A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate? A. 3 Kbps B. 6 Kbps C. 12 Kbps D. 24 Kbps.
  • 23. 22.Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capable of being modulated or impressed with a second signal C. the condition when two or more sections attempt to use the same channel at the same time D. a collection of interconnected functional units that provides a data communications service among stations attached to the network E. None of the above
  • 24. 23.What can greatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above
  • 25. 24. Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure B. the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied C. by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved. D. All of the above E. None of the above
  • 26. 25. A front-end processor is A. a user computer system B. a processor in a large-scale computer that executes operating system instructions C. a minicomputer that relieves main-frame computers at a computer centre of communications control functions D. preliminary processor of batch jobs. E. None of the above
  • 27. 26.To connect a computer with a device in the same room, you might be likely to use A. a coaxial cable B. a dedicated line C. a ground station D. All of the above E. None of the above
  • 28. 27.Internet-like networks within an enterprise. A. Intranets B. Switching alternating C. Inter organizational networks D. Extranets
  • 29. 28.With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 192 B. 224 C. 240 D. 248 E. 252
  • 30. 29.Which of the following types of channels moves data relatively slowly? A. wideband channel B. voiceband channel C. narrowband channel D. broadband channel E. None of the above
  • 31. 30.Which of the following is required to communicate between two computers? A. communications software B. protocol C. communications hardware D. access to transmission medium E. All of the above
  • 32. 31.Which of the following does not allow multiple users or devices to share one communications line? A. doubleplexer B. multipplexer C. concentrator D. controller E. None of the above
  • 33. 32.The geostationary satellite used for communication systems A. rotates with the earth B. remains stationary relative to the earth C. is positioned over equator D. All of the above E. None of the above
  • 34. 33.Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets
  • 35. 34.The _____ houses the switches in token ring. A. transceiver B. nine-pin connector C. MAU D. NIC E. None of the above
  • 36. 35.What device separates a single network into two segments but lets the two segments appear as one to higher protocols? A. Switch B. Bridge C. Gateway D. Router
  • 37. 36. Which of the following refers to the terms "residual error rate"? A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line B. The probability that one or more errors will be undetected when an error detection scheme is used C. the probability that one or more errors will be detected when an error detection mechanism is used D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz E. None of the above
  • 38. 37. The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband. A. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel B. Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable C. Baseband refers to local area networks, and broadband refers to wide area networks. D. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed E. Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions
  • 39. 38.An error-detecting code inserted as a field in a block of data to be transmitted is known as A. Frame check sequence B. Error detecting code C. Checksum D. flow control E. None of the above
  • 40. 39. The cheapest modems can transmit A. 300 bits per second B. 1,200 bits per second C. 2,400 bits per second D. 4,800 bits per second E. None of the above
  • 41. 40. Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device which permits digital to analog conversion at the start of a long distance transmission? A. Interface B. Modem C. Attenuation D. Teleprocessor E. None of the above
  • 42. 41. Four routers have to be interconnected in a point- to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729
  • 43. 42.Sending a file from your personal computer's primary memory or disk to another computer is called A. uploading B. downloading C. logging on D. hang on E. None of the above
  • 44. 43. HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address B. a TCP/IP high level protocol for transferring files from one machine to another. C. a protocol used to monitor computers D. a protocol that handles error and control messages E. None of the above
  • 45. 44.Which of the following is a voiceband channel? A. Telephone line B. Telegraph line C. Coaxial cable D. Microwave systems E. None of the above
  • 46. 45.Demodulation is a process of A. converting analog to digital signals B. converting digital to analog signals C. multiplexing various signals into one high speed line signals D. performing data description.
  • 47. 46.Internet-like networks between a company and its business partners. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets
  • 48. 47.An example of an analog communication method is A. laser beam B. microwave C. voice grade telephone line D. All of the above E. None of the above
  • 49. 48.Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
  • 50. 49.What frequency range is used for FM radio transmission? A. Very Low Frequency : 3 kHz to 30. kHz B. Low Frequency : 30 kHz to 300 kHz C. High Frequency : 3 MHz to 30 MHz D. Very High Frequency : 30 MHz to 300 MHz E. None of the above
  • 51. 50.Transmission of computerised data from one location to another is called A. data transfer B. data flow C. data communication D. data management E. None of the above
  • 52. 51.Compared to analog signals, digital signals A. allow faster transmission B. are more accurate C. both (a) and (b) D. All of the above E. None of the above
  • 53. 52.FDDI is a A. ring network B. star network C. mesh network D. bus based network E. None of the above
  • 54. 53.A central computer surrounded by one or more satellite computers is called a A. bus network B. ring network C. star network D. All of the above E. None of the above
  • 55. 54. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm? A. 500 bps B. 1500 bps C. 5 bps D. 1000 bps
  • 56. 55.HOSTS file entries are limited to how many characters? A. 8 B. 255 C. 500 D. Unlimited E. None of the above
  • 57. 56. Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address. B. The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet. C. ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP- addresses of our choice to every machine. D. All of the above E. None of the above
  • 58. 57.Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A. 0.0.0.0, 0.0.0.1, 0.0.1.1 B. 255.255.255.0, 255.255.0.0, 255.0.0.0 C. 255.0.0.0, 255.255.0.0, 255.255.255.0 D. 255.255.0.0, 255.255.255.0, 255.255.255.255 E. None of the above
  • 59. 58. Modulation is the process of A. converting analog signals to digital signals B. converting digital signals to analog signals C. Multiplexing various signals into high speed line signals D. performing data encryption.
  • 60. 59.Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of the above E. None of the above
  • 61. 60.On a class B network, how many hosts are available at each site with a subnet mask of 248? A. 16,382 B. 8,190 C. 4,094 D. 2,046 E. 1,022
  • 62. 61.Which of the following technique is used for encapsulation? A. a technique used in best-effort delivery systems to avoid endlessly looping packets. B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size D. All of the above E. None of the above
  • 63. 62.You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252
  • 64. 63.With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site? A. 192 B. 224 C. 240 D. 248 E. 252
  • 65. 64.A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above
  • 66. 65.Error detection at a data link level is achieved by A. bit stuffing B. cyclic redundancy codes C. Hamming codes D. equalization
  • 67. 66.When the computer provides the manager with a multiple choice of possible answers, the prompting technique is A. question and answer B. form filling C. open-ended question D. menu selection E. None of the above
  • 68. 67.Which network topology is considered passive? A. Cross B. Ring C. Star D. Mesh E. Bus
  • 69. 68.Which address is the loopback address? A. 0.0.0.1 B. 127.0.0.0 C. 127.0.0.1 D. 255.255.255.255 E. None of the above
  • 70. 69.Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Network operating system D. OSI
  • 71. 70.Which of the following is an advantage to using fiber optics data transmission? A. resistance to data theft B. fast data transmission rate C. low noise level D. few transmission errors E. All of the above
  • 72. 71.Communication network is A. one or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capable of being modulated or impressed with a second signal C. the condition with two or more stations attempt to use the same channel at the same time D. a collection of interconnected functional units that provides a data communications service among stations attached to the network E. None of the above
  • 73. 72.Which of the following technique is used for Time-To-Line (TTL)? A. a technique used in best-effort delivery system to avoid endlessly looping packets. B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size. D. All of the above E. None of the above
  • 74. 73. Which of the following statement is incorrect? A. if a host moves from one network to another, its IP address must change B. routing uses the network portion of the IP address, the path taken by packets travelling to a host with multiple IP addresses depends on the address used. C. IP addresses encode both a network and a host on that network, they do not specify an individual machine, but a connection to a network. D. All of the above E. None of the above
  • 75. 74.Bandlimited signal is A. transmission of signals without modulation B. a signal all of whose energy is contained within a finite frequency range C. simultaneous transmission of data to a number of stations D. All of the above E. None of the above
  • 76. 75.Computers in a LAN can be interconnected by radio and infrared technologies. A. Wireless LANs B. Network Topologies C. Multiplexer D. Modem
  • 77. 76.How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)? A. first three B. first four C. first five D. first seven E. None of the above
  • 78. 77.Which of the following is the address of the router? A. The IP address B. The TCP address C. The subnet mask D. The default gateway E. None of the above
  • 79. 78.A devices that links two homogeneous packet-broadcast local networks, is A. hub B. bridge C. repeater D. gateway E. None of the above
  • 80. 79.Identify the odd term amongst the following group: A. Coaxial cable B. Optical fibre C. Twisted pair wire D. Microwaves E. None of the above
  • 81. 80.Which of the following divides the high speed signal into frequency bands? A. t-switch B. modem C. frequency-division multiplexer D. time-division multiplexer E. None of the above
  • 82. 81.What is the first octet range for a class C IP address? A. 192 - 255 B. 192 - 223 C. 192 - 226 D. 128 - 191 E. 1 - 126
  • 83. 82.Which of the following conditions is used to transmit two packets over a medium at the same time? A. Contention B. Collision C. Synchronous D. Asynchronous
  • 84. 83. Distributed Queue Dual Bus is a standard for A. LAN B. MAN C. WAN D. Wireless LAN. E. LAN and MAN
  • 85. 84. A teleprocessing system may consist of A. user systems B. communications systems C. computer center systems D. All of the above E. None of the above
  • 86. 85.If the ASCII character G is sent and the character D is received, what type of error is this? A. single-bit B. multiple-bit C. burst D. recoverable
  • 87. 86.Which layer of OSI determines the interface of the system with the user? A. Network B. Application C. Data-link D. Session E. None of the above
  • 88. 87.The transfer of data from a CPU to peripheral devices of a computer is achieved through A. modems B. computer ports C. interfaces D. buffer memory E. None of the above
  • 89. 88.What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? A. 4 B. 2 C. 6 D. 3 E. None of the above
  • 90. 89.Many data communication networks have been established which provide a wealth of on- demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want? A. Teletex system B. Fax system C. Videotex system D. Microwave system E. None of the above
  • 91. 90.Which of the following statements is correct? A. Terminal section of a synchronous modem contains the scrambler B. Receiver section of a synchronous modem contains the scrambler C. Transmission section of a synchronous modem contains the scrambler D. Control section of a synchronous modem contains the scrambler E. None of the above
  • 92. 91.Because the configuration information for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings? A. PING B. TRACERT C. ARP D. IPCONFIG E. None of the above
  • 93. 92.Which of the following characteristic(s) is/are suited to the PSS applications? A. bursty traffic and low communications intensity B. widely dispersed terminals and access to international packets switched services C. Multiple remote host or applications accessed by a single local access circuit terminal and circuit D. All of the above E. None of the above
  • 94. 93.Which of the following is separated by a subnet mask? A. DHCP scopes B. Network ID and host ID C. Domains D. Subnets
  • 95. 94.The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is A. 6200 bps B. 9600 bps C. 34000 bps D. 31000 bps E. None of the above
  • 96. 95. TCP is: A. Operates at the Data Link layer B. Connection orientated and unreliable C. Connection orientated and reliable D. Connectionless and unreliable
  • 97. 96. An encyclopedic database A. is an information utility that specializes in storing and searching information B. is generally free C. is easy for beginners to use D. All of the above E. None of the above
  • 98. 97.Which of the following statements is correct? A. Protocol converters are the same as multiplexers B. Protocol converters are the same as TDMs C. Protocol converters are usually not operated in pairs. D. Protocol converters are usually operated in E. None of the above
  • 99. 98.Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer: A. Bandwidth alternatives B. Switching alternating C. Inter organizational networks D. Extranets
  • 100. 99.The physical layer, in reference to the OSI model, defines A. data link procedures that provide for the exchange of data via frames that can be sent and received B. the interface between the X.25 network and packet mode device C. the virtual circuit interface to packet-switched service D. All of the above E. None of the above
  • 101. 100.A required characteristic of an online real- time system is: A. more than one CPU B. offline batch processing C. no delay in processing D. All of the above E. None of the above
  • 102. 101.How many class A, B, and C network IDs can exist? A. 2,113,658 B. 16,382 C. 126 D. 128 E. None of the above
  • 103. 102.Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? A. Paperless office B. Electronic mail C. Global network D. Electronic newspaper E. None of the above
  • 104. 103. HDLC (High-level Data Link Control) is A. a method of determining which device has access to the transmission medium at any time B. a method access control technique for multiple-access transmission media C. a very common bit-oriented data link protocol issued by ISO. D. network access standard for connecting stations to a circuit- switched network E. None of the above
  • 105. 104.The first step in troubleshooting many problems is to verify which of the following? A. The subnet mask is valid B. TCP/IP is installed correctly on the client C. The WINS server is running D. The BDC is operable E. None of the above
  • 106. 105.What protocol is used between E-Mail servers? A. FTP B. SMTP C. SNMP D. POP3
  • 107. 106.If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer. A. Network Properties dialog box B. Server Services dialog box C. DHCPINFO command-line utility D. Advanced Properties tab of TCP/ IP Info. E. None of the above
  • 108. 107.In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and A. PC B. synchronous port C. crossover cable D. asynchronous port E. None of the above
  • 109. 108.A hard copy would be prepared on a A. typewriter terminal B. line printer C. plotter D. All of the above E. None of the above
  • 110. 109.Arzeenah is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Arzeenah to set up? A. Peer-to-peer B. Master domain C. Server-based D. WAN E. Share-level
  • 111. 110.When UPC is used, the price of the item is located A. on the item B. on the item and on the shelf C. in computer storage D. on the shelf and in computer storage E. None of the above
  • 112. 111. Error control is needed at the transport layer because of potential errors occurring A. from transmission line noise B. in routers C. from out-of-sequence delivery D. from packet losses.
  • 113. 112.The transport layer protocol is connectionless. A. NVT B. FTP C. TCP D. UDP E. None of the above
  • 114. 113.The fundamental requirements of private- to-public network interconnection methods which need to be provided in gateways is/are A. universal accessibility for private network Data Terminal Equipment (DTE) B. adequate cost control mechanisms for administration of the private networks C. to assign address to private network DTEs D. a and b both E. None of the above
  • 115. 114.Communication between computers is almost always A. serial B. parallel C. series parallel D. direct E. None of the above
  • 116. 115.The difference between a multiplexer and a statistical multiplexer is A. Statistical multiplexers need buffers while multiplexers do not need buffers B. Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol C. Multiplexers often waste the output link capacity while statistical multiplexers optimize its use D. Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) E. None of the above
  • 117. 116.You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice? A. Token-Ring B. CSMA/CD C. Ethernet D. CSMA/CA E. ARCnet
  • 118. 117.A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as A. Attenuation B. Amplitude C. Aloha D. Carrier E. None of the above
  • 119. 118.The term "remote job entry" relates to A. batch processing B. realtime processing C. transaction processing D. distributed processing E. None of the above
  • 120. 119.The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer: A. Internetworked enterprise B. Information super highway C. Business applications of telecommunications D. Client/Server networks E. None of the above
  • 121. 120.When using the loopback address, if TCP/IP is installed correctly, when should you receive a response? A. Immediately B. Only if the address fails C. After the next host comes online D. Within two minutes E. None of the above
  • 122. 121. MAC is A. a method of determining which device has access to the transmission medium at any time B. a method access control technique or multiple-access transmission media C. a very common bit-oriented data link protocol issued to ISO. D. network access standard for connecting stations to a circuit- switched network E. None of the above
  • 123. 122. Parity bit is A. an error-detecting code based on a summation operation performed on the bits to be checked. B. a check bit appended to an array of binary digits to make the sum of all the binary digits. C. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors in detected D. the ratio of the number of data units in error to the total number of data units E. None of the above
  • 124. 123.Which of the following file retrieval methods use hypermedia? A. HTTP B. WAIS C. Veronica D. Archie E. None of the above
  • 125. 124.Which IP address class has few hosts per network? A. D B. C C. B D. A E. None of the above
  • 126. 125. What is the port number for POP3? A. 110 B. 90 C. 80 D. 49
  • 127. 126.Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively? A. SMTP B. DHCP C. IMAP D. POP3
  • 128. 127.Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology B. Ethernet, because it is cabled using fiber-optic cable C. Token-Ring, because it uses a MAU D. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds E. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
  • 129. 128.Two devices are in network if A. a process in one device is able to exchange information with a process in another device B. a process is running on both devices C. PIDs of the processes running of different devices are same D. none of the mentioned
  • 130. 129.When collection of various computers seems a single coherent system to its client, then it is called A. computer network B. distributed system C. both (a) and (b) D. none of the mentioned
  • 131. 130.Which one of the following computer network is built on the top of another network? A. prior network B. chief network C. prime network D. overlay network
  • 132. 131.In computer network nodes are A. the computer that originates the data B. the computer that routes the data C. the computer that terminates the data D. all of the mentioned
  • 133. 132.Communication channel is shared by all the machines on the network in A. broadcast network B. unicast network C. multicast network D. none of the mentioned
  • 134. 133. Bluetooth is an example of A. personal area network B. local area network C. virtual private network D. none of the mentioned
  • 135. 134.A list of protocols used by a system, one protocol per layer, is called A. protocol architecture B. protocol stack C. protocol suit D. none of the mentioned
  • 136. 135.Which one of the following extends a private network across public networks? A. local area network B. virtual private network C. enterprise private network D. storage area network
  • 137. 136. The IETF standards documents are called A. RFC B. RCF C. ID D. None of the mentioned