Which of the following statements is correct?
Which of the following statements is correct?
The transmission signal coding method of TI carrier is called
The transmission signal coding method of TI carrier is called
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Which of the following is the address of the router?
Which of the following is the address of the router?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
Which of the following files is used for NetBIOS name resolution?
Which of the following files is used for NetBIOS name resolution?
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Establishing a virtual connection is functionally equivalent to
Establishing a virtual connection is functionally equivalent to
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
The dialogue techniques for terminal use do not include
The dialogue techniques for terminal use do not include
Which network topology is considered passive?
Which network topology is considered passive?
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
Error rate is
Error rate is
HOSTS file entries are limited to how many characters?
HOSTS file entries are limited to how many characters?
If the ASCII character G is sent and the character D is received, what type of error is this?
If the ASCII character G is sent and the character D is received, what type of error is this?
Modulation is the process of
Modulation is the process of
A devices that links two homogeneous packet-broadcast local networks, is
A devices that links two homogeneous packet-broadcast local networks, is
Compared to analog signals, digital signals
Compared to analog signals, digital signals
What are the data transmission channels available for carrying data from one location to another?
What are the data transmission channels available for carrying data from one location to another?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
A required characteristic of an online real-time system is:
A required characteristic of an online real-time system is:
Sending a file from your personal computer's primary memory or disk to another computer is called
Sending a file from your personal computer's primary memory or disk to another computer is called
Which layer of OSI determines the interface of the system with the user?
Which layer of OSI determines the interface of the system with the user?
Which of the following is a voiceband channel?
Which of the following is a voiceband channel?
A teleprocessing system may consist of
A teleprocessing system may consist of
What protocol is used between E-Mail servers?
What protocol is used between E-Mail servers?
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
An example of an analog communication method is
An example of an analog communication method is
The encoding method specified in the EIA-232 standard is _____.
The encoding method specified in the EIA-232 standard is _____.
An anticipated result from multiprogramming operations is:
An anticipated result from multiprogramming operations is:
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Devices interconnected by the LAN should include
Devices interconnected by the LAN should include
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
Distributed Queue Dual Bus is a standard for
Distributed Queue Dual Bus is a standard for
Demodulation is the process of
Demodulation is the process of
The communication mode that supports two-way traffic but only one direction at a time is
The communication mode that supports two-way traffic but only one direction at a time is
Which of the following is separated by a subnet mask?
Which of the following is separated by a subnet mask?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following statements is correct?
Which of the following statements is correct?
What is the first octet range for a class C IP address?
What is the first octet range for a class C IP address?
Which of the following communications service provides message preparation and transmission facilities?
Which of the following communications service provides message preparation and transmission facilities?
Which address is the loopback address?
Which address is the loopback address?
HMP (Host Monitoring Protocol) is:
HMP (Host Monitoring Protocol) is:
Modem is used in data transmission. When was it invented and in which country?
Modem is used in data transmission. When was it invented and in which country?
A hard copy would be prepared on a
A hard copy would be prepared on a
The physical layer, in reference to the OSI model, defines
The physical layer, in reference to the OSI model, defines
A central computer surrounded by one or more satellite computers is called a
A central computer surrounded by one or more satellite computers is called a
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Internet-like networks between a company and its business partners. Select the best fit for answer:
Internet-like networks between a company and its business partners. Select the best fit for answer:
HDLC (High-level Data Link Control) is
HDLC (High-level Data Link Control) is
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
The slowest transmission speeds are those of
The slowest transmission speeds are those of
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
What frequency range is used for FM radio transmission?
What frequency range is used for FM radio transmission?
Transmission of computerised data from one location to another is called
Transmission of computerised data from one location to another is called
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Which of the following characteristic(s) is/are suited to the PSS applications?
Which of the following characteristic(s) is/are suited to the PSS applications?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
Which of the following technique is used for encapsulation?
Which of the following technique is used for encapsulation?
An encyclopedic database
An encyclopedic database
Data are sent over pin _____ of the EIA-232 interface.
Data are sent over pin _____ of the EIA-232 interface.
Which of the following technique is used for Time-To-Line (TTL)?
Which of the following technique is used for Time-To-Line (TTL)?
The transfer of data from a CPU to peripheral devices of a computer is achieved through
The transfer of data from a CPU to peripheral devices of a computer is achieved through
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
Which of the following is an advantage to using fiber optics data transmission?
Which of the following is an advantage to using fiber optics data transmission?
Demodulation is a process of
Demodulation is a process of
How many class A, B, and C network IDs can exist?
How many class A, B, and C network IDs can exist?
To connect a computer with a device in the same room, you might be likely to use
To connect a computer with a device in the same room, you might be likely to use
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Which of the following divides the high speed signal into frequency bands?
Which of the following divides the high speed signal into frequency bands?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
Which utility is useful for finding the local host name?
Which utility is useful for finding the local host name?
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Bandlimited signal is
Bandlimited signal is
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
Computers in a LAN can be interconnected by radio and infrared technologies.
Computers in a LAN can be interconnected by radio and infrared technologies.
Identify the odd term amongst the following group:
Identify the odd term amongst the following group:
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
Which of the following statement is correct?
Which of the following statement is correct?
The first step in troubleshooting many problems is to verify which of the following?
The first step in troubleshooting many problems is to verify which of the following?
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
Communication network is
Communication network is
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and