What is the first octet range for a class C IP address?
What is the first octet range for a class C IP address?
Internet-like networks between a company and its business partners. Select the best fit for answer:
Internet-like networks between a company and its business partners. Select the best fit for answer:
Bandlimited signal is
Bandlimited signal is
Sending a file from your personal computer's primary memory or disk to another computer is called
Sending a file from your personal computer's primary memory or disk to another computer is called
A required characteristic of an online real-time system is:
A required characteristic of an online real-time system is:
Which of the following divides the high speed signal into frequency bands?
Which of the following divides the high speed signal into frequency bands?
The dialogue techniques for terminal use do not include
The dialogue techniques for terminal use do not include
Devices interconnected by the LAN should include
Devices interconnected by the LAN should include
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
Which of the following communications service provides message preparation and transmission facilities?
Which of the following communications service provides message preparation and transmission facilities?
Which of the following technique is used for Time-To-Line (TTL)?
Which of the following technique is used for Time-To-Line (TTL)?
Communication network is
Communication network is
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?
Which of the following technique is used for encapsulation?
Which of the following technique is used for encapsulation?
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz is
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and
The physical layer, in reference to the OSI model, defines
The physical layer, in reference to the OSI model, defines
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
Demodulation is a process of
Demodulation is a process of
Distributed Queue Dual Bus is a standard for
Distributed Queue Dual Bus is a standard for
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.
Which address is the loopback address?
Which address is the loopback address?
HMP (Host Monitoring Protocol) is:
HMP (Host Monitoring Protocol) is:
Which of the following is an advantage to using fiber optics data transmission?
Which of the following is an advantage to using fiber optics data transmission?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?
Computers in a LAN can be interconnected by radio and infrared technologies.
Computers in a LAN can be interconnected by radio and infrared technologies.
Which layer of OSI determines the interface of the system with the user?
Which layer of OSI determines the interface of the system with the user?
Which of the following is separated by a subnet mask?
Which of the following is separated by a subnet mask?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?
The communication mode that supports two-way traffic but only one direction at a time is
The communication mode that supports two-way traffic but only one direction at a time is
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Modulation is the process of
Modulation is the process of
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?
Which of the following is a voiceband channel?
Which of the following is a voiceband channel?
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
What are the data transmission channels available for carrying data from one location to another?
What are the data transmission channels available for carrying data from one location to another?
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?
Which of the following is the address of the router?
Which of the following is the address of the router?
Identify the odd term amongst the following group:
Identify the odd term amongst the following group:
The first step in troubleshooting many problems is to verify which of the following?
The first step in troubleshooting many problems is to verify which of the following?
Modem is used in data transmission. When was it invented and in which country?
Modem is used in data transmission. When was it invented and in which country?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following conditions is used to transmit two packets over a medium at the same time?
Which of the following statement is correct?
Which of the following statement is correct?
HOSTS file entries are limited to how many characters?
HOSTS file entries are limited to how many characters?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A central computer surrounded by one or more satellite computers is called a
A central computer surrounded by one or more satellite computers is called a
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
Which of the following statements is correct?
Which of the following statements is correct?
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:
Which of the following statements is correct?
Which of the following statements is correct?
What frequency range is used for FM radio transmission?
What frequency range is used for FM radio transmission?
To connect a computer with a device in the same room, you might be likely to use
To connect a computer with a device in the same room, you might be likely to use
An encyclopedic database
An encyclopedic database
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
An anticipated result from multiprogramming operations is:
An anticipated result from multiprogramming operations is:
What protocol is used between E-Mail servers?
What protocol is used between E-Mail servers?
Which of the following files is used for NetBIOS name resolution?
Which of the following files is used for NetBIOS name resolution?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
On a class B network, how many hosts are available at each site with a subnet mask of 248?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?
A devices that links two homogeneous packet-broadcast local networks, is
A devices that links two homogeneous packet-broadcast local networks, is
A teleprocessing system may consist of
A teleprocessing system may consist of
An example of an analog communication method is
An example of an analog communication method is
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
Which of the following device copies electrical signals from one Ethernet to another?
Which of the following device copies electrical signals from one Ethernet to another?
The slowest transmission speeds are those of
The slowest transmission speeds are those of
A hard copy would be prepared on a
A hard copy would be prepared on a
Which of the following characteristic(s) is/are suited to the PSS applications?
Which of the following characteristic(s) is/are suited to the PSS applications?
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
The transmission signal coding method of TI carrier is called
The transmission signal coding method of TI carrier is called
How many class A, B, and C network IDs can exist?
How many class A, B, and C network IDs can exist?
Compared to analog signals, digital signals
Compared to analog signals, digital signals
Error rate is
Error rate is
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
The transfer of data from a CPU to peripheral devices of a computer is achieved through
The transfer of data from a CPU to peripheral devices of a computer is achieved through
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
HDLC (High-level Data Link Control) is
HDLC (High-level Data Link Control) is
If the ASCII character G is sent and the character D is received, what type of error is this?
If the ASCII character G is sent and the character D is received, what type of error is this?
Which network topology is considered passive?
Which network topology is considered passive?
The encoding method specified in the EIA-232 standard is _____.
The encoding method specified in the EIA-232 standard is _____.
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
Transmission of computerised data from one location to another is called
Transmission of computerised data from one location to another is called
Which utility is useful for finding the local host name?
Which utility is useful for finding the local host name?
Data are sent over pin _____ of the EIA-232 interface.
Data are sent over pin _____ of the EIA-232 interface.
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
Thorough planning must take place when setting up an 802.3 network. A maximum number of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
Establishing a virtual connection is functionally equivalent to
Establishing a virtual connection is functionally equivalent to
Demodulation is the process of
Demodulation is the process of
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?