Home / CSE / Networking :: Section 2

CSE :: Networking

  1. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

  2. A.
    192
    B.
    224
    C.
    240
    D.
    248
    E.
    252

  3. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as

  4. A.
    Gateways
    B.
    mail gateway
    C.
    bridges
    D.
    User Agent
    E.
    None of the above

  5. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is

  6. A.
    1200 bands
    B.
    3200 bands
    C.
    4800 bands
    D.
    9600 bands
    E.
    None of the above

  7. Error detection at a data link level is achieved by

  8. A.
    bit stuffing
    B.
    cyclic redundancy codes
    C.
    Hamming codes
    D.
    equalization

  9. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is

  10. A.
    question and answer
    B.
    form filling
    C.
    open-ended question
    D.
    menu selection
    E.
    None of the above

  11. Which network topology is considered passive?

  12. A.
    Cross
    B.
    Ring
    C.
    Star
    D.
    Mesh
    E.
    Bus

  13. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)

  14. A.
    POS terminal
    B.
    data collection terminal
    C.
    batch processing terminal
    D.
    intelligent terminal
    E.
    None of the above

  15. Which address is the loopback address?

  16. A.
    0.0.0.1
    B.
    127.0.0.0
    C.
    127.0.0.1
    D.
    255.255.255.255
    E.
    None of the above

  17. Error rate is

  18. A.
    an error-detecting code based on a summation operation performed on the bits to be checked.
    B.
    a check bit appended to an array of binary digits to make the sum of all the binary digits.
    C.
    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.
    D.
    the ratio of the number of data units in error to the total number of data units
    E.
    None of the above

  19. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

  20. A.
    Network Server
    B.
    Virtual Private Network
    C.
    Network operating system
    D.
    OSI