You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
An encyclopedic database
An encyclopedic database
Which layer of OSI determines the interface of the system with the user?
Which layer of OSI determines the interface of the system with the user?
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
What is the first octet range for a class C IP address?
What is the first octet range for a class C IP address?
Transmission of computerised data from one location to another is called
Transmission of computerised data from one location to another is called
Which of the following communications service provides message preparation and transmission facilities?
Which of the following communications service provides message preparation and transmission facilities?
Demodulation is a process of
Demodulation is a process of
Error rate is
Error rate is
If the ASCII character G is sent and the character D is received, what type of error is this?
If the ASCII character G is sent and the character D is received, what type of error is this?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
HOSTS file entries are limited to how many characters?
HOSTS file entries are limited to how many characters?
What frequency range is used for FM radio transmission?
What frequency range is used for FM radio transmission?
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
Which of the following technique is used for encapsulation?
Which of the following technique is used for encapsulation?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Demodulation is the process of
Demodulation is the process of
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
The first step in troubleshooting many problems is to verify which of the following?
The first step in troubleshooting many problems is to verify which of the following?
Communication network is
Communication network is
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
The encoding method specified in the EIA-232 standard is _____.
The encoding method specified in the EIA-232 standard is _____.
Which of the following technique is used for Time-To-Line (TTL)?
Which of the following technique is used for Time-To-Line (TTL)?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following statements is correct?
Which of the following statements is correct?
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
What protocol is used between E-Mail servers?
What protocol is used between E-Mail servers?
The transmission signal coding method of TI carrier is called
The transmission signal coding method of TI carrier is called
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
An anticipated result from multiprogramming operations is:
An anticipated result from multiprogramming operations is:
Which of the following is an advantage to using fiber optics data transmission?
Which of the following is an advantage to using fiber optics data transmission?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A central computer surrounded by one or more satellite computers is called a
A central computer surrounded by one or more satellite computers is called a
Modem is used in data transmission. When was it invented and in which country?
Modem is used in data transmission. When was it invented and in which country?
Which of the following is a voiceband channel?
Which of the following is a voiceband channel?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
The communication mode that supports two-way traffic but only one direction at a time is
The communication mode that supports two-way traffic but only one direction at a time is
A hard copy would be prepared on a
A hard copy would be prepared on a
Data are sent over pin _____ of the EIA-232 interface.
Data are sent over pin _____ of the EIA-232 interface.
Devices interconnected by the LAN should include
Devices interconnected by the LAN should include
The physical layer, in reference to the OSI model, defines
The physical layer, in reference to the OSI model, defines
Distributed Queue Dual Bus is a standard for
Distributed Queue Dual Bus is a standard for
Identify the odd term amongst the following group:
Identify the odd term amongst the following group:
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
HDLC (High-level Data Link Control) is
HDLC (High-level Data Link Control) is
Which of the following divides the high speed signal into frequency bands?
Which of the following divides the high speed signal into frequency bands?
A teleprocessing system may consist of
A teleprocessing system may consist of
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Which of the following is the address of the router?
Which of the following is the address of the router?
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following device copies electrical signals from one Ethernet to another?
The slowest transmission speeds are those of
The slowest transmission speeds are those of
A required characteristic of an online real-time system is:
A required characteristic of an online real-time system is:
A devices that links two homogeneous packet-broadcast local networks, is
A devices that links two homogeneous packet-broadcast local networks, is
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
The dialogue techniques for terminal use do not include
The dialogue techniques for terminal use do not include
On a class B network, how many hosts are available at each site with a subnet mask of 248?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
Bandlimited signal is
Bandlimited signal is
An example of an analog communication method is
An example of an analog communication method is
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
Which utility is useful for finding the local host name?
Which utility is useful for finding the local host name?
Sending a file from your personal computer's primary memory or disk to another computer is called
Sending a file from your personal computer's primary memory or disk to another computer is called
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
Which of the following characteristic(s) is/are suited to the PSS applications?
Which of the following characteristic(s) is/are suited to the PSS applications?
Compared to analog signals, digital signals
Compared to analog signals, digital signals
The transfer of data from a CPU to peripheral devices of a computer is achieved through
The transfer of data from a CPU to peripheral devices of a computer is achieved through
Internet-like networks between a company and its business partners. Select the best fit for answer:
Internet-like networks between a company and its business partners. Select the best fit for answer:
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Which network topology is considered passive?
Which network topology is considered passive?
Modulation is the process of
Modulation is the process of
What are the data transmission channels available for carrying data from one location to another?
What are the data transmission channels available for carrying data from one location to another?
Computers in a LAN can be interconnected by radio and infrared technologies.
Computers in a LAN can be interconnected by radio and infrared technologies.
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
Establishing a virtual connection is functionally equivalent to
Establishing a virtual connection is functionally equivalent to
How many class A, B, and C network IDs can exist?
How many class A, B, and C network IDs can exist?
To connect a computer with a device in the same room, you might be likely to use
To connect a computer with a device in the same room, you might be likely to use
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
Which of the following statement is correct?
Which of the following statement is correct?
Which of the following is separated by a subnet mask?
Which of the following is separated by a subnet mask?
HMP (Host Monitoring Protocol) is:
HMP (Host Monitoring Protocol) is:
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Which of the following statements is correct?
Which of the following statements is correct?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
Which of the following files is used for NetBIOS name resolution?
Which of the following files is used for NetBIOS name resolution?
Which address is the loopback address?
Which address is the loopback address?