Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:

  2. A.

     Internetworked enterprise

    B.

     Information super highway

    C.

     Business applications of telecommunications

    D.

     Client/Server networks

    E.

     None of the above


  3. The data communication support should include, but is not restricted to

  4. A.

     file transfer and transaction processing

    B.

     file and database access

    C.

     terminal support, electronic mail and voice grams.

    D.

     All of the above


  5. MAC is

  6. A.

     a method of determining which device has access to the transmission medium at any time

    B.

     a method access control technique or multiple-access transmission media

    C.

     a very common bit-oriented data link protocol issued to ISO.

    D.

     network access standard for connecting stations to a circuit-switched network

    E.

     None of the above


  7. What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?

  8. A.

     Teleport

    B.

     Modem

    C.

     Multiplexer

    D.

     Concentrator

    E.

     None of the above


  9. You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?

  10. A.

     255.255.192.0

    B.

     255.255.224.0

    C.

     255.255.240.0

    D.

     255,255.248.0

    E.

     255.255.252.0


  11. Which application allows a user to access and change remote files without actual transfer?

  12. A.

     TELNET

    B.

     NFS

    C.

     FTP

    D.

     DNS

    E.

     None of the above


  13. Parity bit is

  14. A.

     an error-detecting code based on a summation operation performed on the bits to be checked.

    B.

     a check bit appended to an array of binary digits to make the sum of all the binary digits.

    C.

     a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and

    D.

     the ratio of the number of data units in error to the total number of data units

    E.

     None of the above


  15. Which of the following file retrieval methods use hypermedia?

  16. A.

     HTTP

    B.

     WAIS

    C.

     Veronica

    D.

     Archie

    E.

     None of the above


  17. Which IP address class has few hosts per network?

  18. A.

     D

    B.

     C

    C.

     B

    D.

     A

    E.

     None of the above


  19. Microprogramming is

  20. A.

     assembly language programming

    B.

     programming of minicomputers

    C.

     control unit programming

    D.

     macro programming of microcomputers

    E.

     None of the above