Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. Which of the following device is used with an X.25 network to provide service to asynchronous terminals

  2. A.

     repeater

    B.

     bridges

    C.

     gateway

    D.

     Packet assembler/disassemble

    E.

     None of the above


  3. A medium access control technique for multiple access transmission media is

  4. A.

     Aloha

    B.

     Amplitude

    C.

     Angle modulation

    D.

     Attenuation

    E.

     None of the above


  5. The core diameter of a single-mode fibers is about

  6. A.

     10 times the wavelength of the light carried in the fiber

    B.

     10 times the fiber radius

    C.

     7 times the light carried in the fiber

    D.

     3 times the wavelength of the light carried in the fiber

    E.

     None of the above


  7. Which of the following TCP/IP protocol is used for remote terminal connection service?

  8. A.

     TELNET

    B.

     FTP

    C.

     RARP

    D.

     UDP

    E.

     None of the above


  9. Networks where end user workstations are tied to LAN servers to share resources and application processing.

  10. A.

     Internetworked enterprise

    B.

     Information super highway

    C.

     Business applications of telecommunications

    D.

     Client/Server networks


  11. The frequency range : 300 kHz to 3 MHz is used for

  12. A.

     AM radio transmission

    B.

     FM radio transmission

    C.

     TV transmission

    D.

     microwave communications, satellite and radar

    E.

     None of the above


  13. With an IP address of 201.142.23.12, what is your default subnet mask?

  14. A.

     0.0.0.0

    B.

     255.0.0.0

    C.

     255.255.0.0

    D.

     255.255.255.0

    E.

     None of the above


  15. A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?

  16. A.

     Communications software

    B.

     Error detecting protocols

    C.

     Link access procedure (LAP)

    D.

     Telecommunications

    E.

     None of the above


  17. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____ sublayer.

  18. A.

     HDLC, PDU

    B.

     PDU, HDLC

    C.

     MAC, LLC

    D.

     LLC, MAC

    E.

     None of the above


  19. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

  20. A.

     one bit or any odd number of bits inverted in a block of data during transmission

    B.

     two bits or any even number of bits inverted in a block during transmission

    C.

     one bit or any odd number of bits inverted in a byte during transmission

    D.

     two bits or any even number of bits inverted in a byte during transmission

    E.

     None of the above