If the ASCII character G is sent and the character D is received, what type of error is this?
If the ASCII character G is sent and the character D is received, what type of error is this?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Which of the following communications service provides message preparation and transmission facilities?
Which of the following communications service provides message preparation and transmission facilities?
Distributed Queue Dual Bus is a standard for
Distributed Queue Dual Bus is a standard for
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Which network topology is considered passive?
Which network topology is considered passive?
Which of the following technique is used for encapsulation?
Which of the following technique is used for encapsulation?
What frequency range is used for FM radio transmission?
What frequency range is used for FM radio transmission?
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
To connect a computer with a device in the same room, you might be likely to use
To connect a computer with a device in the same room, you might be likely to use
Modulation is the process of
Modulation is the process of
An example of an analog communication method is
An example of an analog communication method is
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
Which address is the loopback address?
Which address is the loopback address?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Which of the following is a voiceband channel?
Which of the following is a voiceband channel?
A hard copy would be prepared on a
A hard copy would be prepared on a
Demodulation is the process of
Demodulation is the process of
On a class B network, how many hosts are available at each site with a subnet mask of 248?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
The transmission signal coding method of TI carrier is called
The transmission signal coding method of TI carrier is called
A devices that links two homogeneous packet-broadcast local networks, is
A devices that links two homogeneous packet-broadcast local networks, is
HMP (Host Monitoring Protocol) is:
HMP (Host Monitoring Protocol) is:
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
Which of the following is separated by a subnet mask?
Which of the following is separated by a subnet mask?
Which of the following characteristic(s) is/are suited to the PSS applications?
Which of the following characteristic(s) is/are suited to the PSS applications?
Devices interconnected by the LAN should include
Devices interconnected by the LAN should include
Communication network is
Communication network is
Identify the odd term amongst the following group:
Identify the odd term amongst the following group:
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
A required characteristic of an online real-time system is:
A required characteristic of an online real-time system is:
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
Data are sent over pin _____ of the EIA-232 interface.
Data are sent over pin _____ of the EIA-232 interface.
An anticipated result from multiprogramming operations is:
An anticipated result from multiprogramming operations is:
Compared to analog signals, digital signals
Compared to analog signals, digital signals
What protocol is used between E-Mail servers?
What protocol is used between E-Mail servers?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
The dialogue techniques for terminal use do not include
The dialogue techniques for terminal use do not include
Sending a file from your personal computer's primary memory or disk to another computer is called
Sending a file from your personal computer's primary memory or disk to another computer is called
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Demodulation is a process of
Demodulation is a process of
The first step in troubleshooting many problems is to verify which of the following?
The first step in troubleshooting many problems is to verify which of the following?
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
Which of the following files is used for NetBIOS name resolution?
Which of the following files is used for NetBIOS name resolution?
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Which layer of OSI determines the interface of the system with the user?
Which layer of OSI determines the interface of the system with the user?
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
Which of the following statements is correct?
Which of the following statements is correct?
The transfer of data from a CPU to peripheral devices of a computer is achieved through
The transfer of data from a CPU to peripheral devices of a computer is achieved through
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
What is the first octet range for a class C IP address?
What is the first octet range for a class C IP address?
Error rate is
Error rate is
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Which of the following statement is correct?
Which of the following statement is correct?
HDLC (High-level Data Link Control) is
HDLC (High-level Data Link Control) is
Modem is used in data transmission. When was it invented and in which country?
Modem is used in data transmission. When was it invented and in which country?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
The communication mode that supports two-way traffic but only one direction at a time is
The communication mode that supports two-way traffic but only one direction at a time is
Which of the following divides the high speed signal into frequency bands?
Which of the following divides the high speed signal into frequency bands?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
A central computer surrounded by one or more satellite computers is called a
A central computer surrounded by one or more satellite computers is called a
Computers in a LAN can be interconnected by radio and infrared technologies.
Computers in a LAN can be interconnected by radio and infrared technologies.
The encoding method specified in the EIA-232 standard is _____.
The encoding method specified in the EIA-232 standard is _____.
Transmission of computerised data from one location to another is called
Transmission of computerised data from one location to another is called
Establishing a virtual connection is functionally equivalent to
Establishing a virtual connection is functionally equivalent to
Which utility is useful for finding the local host name?
Which utility is useful for finding the local host name?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
Bandlimited signal is
Bandlimited signal is
An encyclopedic database
An encyclopedic database
Which of the following is an advantage to using fiber optics data transmission?
Which of the following is an advantage to using fiber optics data transmission?
The slowest transmission speeds are those of
The slowest transmission speeds are those of
How many class A, B, and C network IDs can exist?
How many class A, B, and C network IDs can exist?
A teleprocessing system may consist of
A teleprocessing system may consist of
Which of the following technique is used for Time-To-Line (TTL)?
Which of the following technique is used for Time-To-Line (TTL)?
Which of the following is the address of the router?
Which of the following is the address of the router?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
Internet-like networks between a company and its business partners. Select the best fit for answer:
Internet-like networks between a company and its business partners. Select the best fit for answer:
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
HOSTS file entries are limited to how many characters?
HOSTS file entries are limited to how many characters?
Which of the following statements is correct?
Which of the following statements is correct?
The physical layer, in reference to the OSI model, defines
The physical layer, in reference to the OSI model, defines
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following device copies electrical signals from one Ethernet to another?
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
What are the data transmission channels available for carrying data from one location to another?
What are the data transmission channels available for carrying data from one location to another?