Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. Error rate is

  2. A.

     an error-detecting code based on a summation operation performed on the bits to be checked.

    B.

     a check bit appended to an array of binary digits to make the sum of all the binary digits.

    C.

     a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and

    D.

     the ratio of the number of data units in error to the total number of data units

    E.

     None of the above


  3. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

  4. A.

     Network Server

    B.

     Virtual Private Network

    C.

     Network operating system

    D.

     OSI


  5. Modem is used in data transmission. When was it invented and in which country?

  6. A.

     1963, USA

    B.

     1965, Germany

    C.

     1950, USA

    D.

     1950, Japan

    E.

     None of the above


  7. Which of the following technique is used for Time-To-Line (TTL)?

  8. A.

     a technique used in best-effort delivery system to avoid endlessly looping packets.

    B.

     a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

    C.

     One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.

    D.

     All of the above

    E.

     None of the above


  9. Communication network is

  10. A.

     one or more conductors that serve as a common connection for a related group of devices

    B.

     a continuous frequency capable of being modulated or impressed with a second signal

    C.

     the condition with two or more stations attempt to use the same channel at the same time

    D.

     a collection of interconnected functional units that provides a data communications service among stations attached to the network

    E.

     None of the above


  11. Which of the following is an advantage to using fiber optics data transmission?

  12. A.

     resistance to data theft

    B.

     fast data transmission rate

    C.

     low noise level

    D.

     few transmission errors

    E.

     All of the above


  13. Which of the following statement is incorrect?

  14. A.

     if a host moves from one network to another, its IP address must change

    B.

     routing uses the network portion of the IP address, the path taken by packets travelling to a host with multiple IP addresses depends on the address used.

    C.

     IP addresses encode both a network and a host on that network, they do not specify an individual machine, but a connection to a network.

    D.

     All of the above

    E.

     None of the above


  15. Bandlimited signal is

  16. A.

     transmission of signals without modulation

    B.

     a signal all of whose energy is contained within a finite frequency range

    C.

     simultaneous transmission of data to a number of stations

    D.

     All of the above

    E.

     None of the above


  17. Computers in a LAN can be interconnected by radio and infrared technologies.

  18. A.

     Wireless LANs

    B.

     Network Topologies

    C.

     Multiplexer

    D.

     Modem

    E.

     255.255.255.255


  19. You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?

  20. A.

     255.255.224.0

    B.

     255.255.240.0

    C.

     255.255.248.0

    D.

     255.255.255.0

    E.

     255.255.255.255