Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. Which of the following technique is used for encapsulation?

  2. A.

     a technique used in best-effort delivery systems to avoid endlessly looping packets.

    B.

     a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.

    C.

     One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

    D.

     All of the above

    E.

     None of the above


  3. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

  4. A.

     255.255.252.0

    B.

     225.255.254.0

    C.

     255.255.255.240

    D.

     255.255.255.252


  5. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

  6. A.

     192

    B.

     224

    C.

     240

    D.

     248

    E.

     252


  7. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as

  8. A.

     Gateways

    B.

     mail gateway

    C.

     bridges

    D.

     User Agent

    E.

     None of the above


  9. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is

  10. A.

     1200 bands

    B.

     3200 bands

    C.

     4800 bands

    D.

     9600 bands

    E.

     None of the above


  11. Error detection at a data link level is achieved by

  12. A.

     bit stuffing

    B.

     cyclic redundancy codes

    C.

     Hamming codes

    D.

     equalization

    E.

     None of the above


  13. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is

  14. A.

     question and answer

    B.

     form filling

    C.

     open-ended question

    D.

     menu selection

    E.

     None of the above


  15. Which network topology is considered passive?

  16. A.

     Cross

    B.

     Ring

    C.

     Star

    D.

     Mesh

    E.

     Bus


  17. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)

  18. A.

     POS terminal

    B.

     data collection terminal

    C.

     batch processing terminal

    D.

     intelligent terminal

    E.

     None of the above


  19. Which address is the loopback address?

  20. A.

     0.0.0.1

    B.

     127.0.0.0

    C.

     127.0.0.1

    D.

     255.255.255.255

    E.

     None of the above