You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
HDLC (High-level Data Link Control) is
HDLC (High-level Data Link Control) is
Compared to analog signals, digital signals
Compared to analog signals, digital signals
Bandlimited signal is
Bandlimited signal is
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
Sending a file from your personal computer's primary memory or disk to another computer is called
Sending a file from your personal computer's primary memory or disk to another computer is called
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Which of the following is an advantage to using fiber optics data transmission?
Which of the following is an advantage to using fiber optics data transmission?
Which of the following is the address of the router?
Which of the following is the address of the router?
Which of the following is separated by a subnet mask?
Which of the following is separated by a subnet mask?
Which of the following communications service provides message preparation and transmission facilities?
Which of the following communications service provides message preparation and transmission facilities?
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
An anticipated result from multiprogramming operations is:
An anticipated result from multiprogramming operations is:
Devices interconnected by the LAN should include
Devices interconnected by the LAN should include
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
Transmission of computerised data from one location to another is called
Transmission of computerised data from one location to another is called
The slowest transmission speeds are those of
The slowest transmission speeds are those of
An encyclopedic database
An encyclopedic database
Error rate is
Error rate is
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
Which of the following is a voiceband channel?
Which of the following is a voiceband channel?
A teleprocessing system may consist of
A teleprocessing system may consist of
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Internet-like networks between a company and its business partners. Select the best fit for answer:
Internet-like networks between a company and its business partners. Select the best fit for answer:
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
Computers in a LAN can be interconnected by radio and infrared technologies.
Computers in a LAN can be interconnected by radio and infrared technologies.
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Which of the following technique is used for Time-To-Line (TTL)?
Which of the following technique is used for Time-To-Line (TTL)?
Which address is the loopback address?
Which address is the loopback address?
If the ASCII character G is sent and the character D is received, what type of error is this?
If the ASCII character G is sent and the character D is received, what type of error is this?
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
What protocol is used between E-Mail servers?
What protocol is used between E-Mail servers?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
The dialogue techniques for terminal use do not include
The dialogue techniques for terminal use do not include
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
Which of the following statement is correct?
Which of the following statement is correct?
To connect a computer with a device in the same room, you might be likely to use
To connect a computer with a device in the same room, you might be likely to use
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
Which of the following statements is correct?
Which of the following statements is correct?
Modulation is the process of
Modulation is the process of
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
Which utility is useful for finding the local host name?
Which utility is useful for finding the local host name?
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
Which of the following files is used for NetBIOS name resolution?
Which of the following files is used for NetBIOS name resolution?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
Which of the following characteristic(s) is/are suited to the PSS applications?
Which of the following characteristic(s) is/are suited to the PSS applications?
The encoding method specified in the EIA-232 standard is _____.
The encoding method specified in the EIA-232 standard is _____.
Data are sent over pin _____ of the EIA-232 interface.
Data are sent over pin _____ of the EIA-232 interface.
What is the first octet range for a class C IP address?
What is the first octet range for a class C IP address?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
Demodulation is a process of
Demodulation is a process of
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
A required characteristic of an online real-time system is:
A required characteristic of an online real-time system is:
Demodulation is the process of
Demodulation is the process of
A hard copy would be prepared on a
A hard copy would be prepared on a
The physical layer, in reference to the OSI model, defines
The physical layer, in reference to the OSI model, defines
Communication network is
Communication network is
What are the data transmission channels available for carrying data from one location to another?
What are the data transmission channels available for carrying data from one location to another?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
A devices that links two homogeneous packet-broadcast local networks, is
A devices that links two homogeneous packet-broadcast local networks, is
The first step in troubleshooting many problems is to verify which of the following?
The first step in troubleshooting many problems is to verify which of the following?
Modem is used in data transmission. When was it invented and in which country?
Modem is used in data transmission. When was it invented and in which country?
Which of the following divides the high speed signal into frequency bands?
Which of the following divides the high speed signal into frequency bands?
What frequency range is used for FM radio transmission?
What frequency range is used for FM radio transmission?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
The communication mode that supports two-way traffic but only one direction at a time is
The communication mode that supports two-way traffic but only one direction at a time is
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following statements is correct?
Which of the following statements is correct?
Which layer of OSI determines the interface of the system with the user?
Which layer of OSI determines the interface of the system with the user?
Which of the following technique is used for encapsulation?
Which of the following technique is used for encapsulation?
A central computer surrounded by one or more satellite computers is called a
A central computer surrounded by one or more satellite computers is called a
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
The transmission signal coding method of TI carrier is called
The transmission signal coding method of TI carrier is called
Which of the following statement is incorrect?
Which of the following statement is incorrect?
HMP (Host Monitoring Protocol) is:
HMP (Host Monitoring Protocol) is:
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
How many class A, B, and C network IDs can exist?
How many class A, B, and C network IDs can exist?
The transfer of data from a CPU to peripheral devices of a computer is achieved through
The transfer of data from a CPU to peripheral devices of a computer is achieved through
Identify the odd term amongst the following group:
Identify the odd term amongst the following group:
An example of an analog communication method is
An example of an analog communication method is
Which network topology is considered passive?
Which network topology is considered passive?
Establishing a virtual connection is functionally equivalent to
Establishing a virtual connection is functionally equivalent to
Distributed Queue Dual Bus is a standard for
Distributed Queue Dual Bus is a standard for
HOSTS file entries are limited to how many characters?
HOSTS file entries are limited to how many characters?