Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?

  2. A.

     255.224.0.0

    B.

     255.240.0.0

    C.

     255.248.0.0

    D.

     255.252.0.0

    E.

     255.254.0.0


  3. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.

  4. A.

     2 (m - 2)

    B.

     2 (2m - 1)

    C.

     m - 1

    D.

     (2m - l)/mJ


  5. Most networks are connected to other local area or wide area networks. Select the best fit for answer:

  6. A.

     Internet works

    B.

     The Internet

    C.

     Internet revolution

    D.

     Internet technologies

    E.

     255.255.252.0


  7. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per subnet. What subnet mask should you use?

  8. A.

     255.255.192.0

    B.

     255.255.224.0

    C.

     255.255.240.0

    D.

     255.255.248.0

    E.

     255.255.252.0


  9. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the maximum possible transmission rate?

  10. A.

     1.5 Mbaud/sec

    B.

     6 Mband/sec

    C.

     12 Mbaud/sec

    D.

     24 Mbaud/sec

    E.

     None of the above


  11. Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)?

  12. A.

     05-Jul

    B.

     01-Apr

    C.

     08-Dec

    D.

     13-14

    E.

     None of the above


  13. Error detecting code is

  14. A.

     an error-detecting code based on a summation operation performed on the bits to be checked

    B.

     a check bit appended to an array of binary digits to make the sum of all the binary digits.

    C.

     a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and

    D.

     the ratio of the data units in error to the total number of data units

    E.

     None of the above


  15. A modulator converts a _____ signal to a(n) _____ signal.

  16. A.

     FSK; PSK

    B.

     PSK; FSK

    C.

     analog; digital

    D.

     digital; analog

    E.

     None of the above


  17. The birthplace of the World Wide Web is considered to be

  18. A.

     the Department of Defense

    B.

     CERN

    C.

     ARPA

    D.

     Netscape

    E.

     None of the above


  19. You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?

  20. A.

     Fast SCSI Wide

    B.

     Token-Ring

    C.

     ArcServe

    D.

     Ethernet

    E.

     None of the above