Which of the following communications lines is best suited to interactive processing applications?
Which of the following communications lines is best suited to interactive processing applications?
Which of the following items is not used in Local Area Networks (LANs)?
Which of the following items is not used in Local Area Networks (LANs)?
Which of the following is considered a broadband communications channel?
Which of the following is considered a broadband communications channel?
What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?
What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?
Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so?
Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so?
Error control is needed at the transport layer because of potential errors occurring _____.
Error control is needed at the transport layer because of potential errors occurring _____.
Typewriter terminals can print computer-generated data at a rate of
Typewriter terminals can print computer-generated data at a rate of
Communication between computers is almost always
Communication between computers is almost always
The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are
The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are
Which of the following summation operation is performed on the bits to check an error-detecting code?
Which of the following summation operation is performed on the bits to check an error-detecting code?
CSMA (Carrier Sense Multiple Access) is
CSMA (Carrier Sense Multiple Access) is
In a synchronous modem, the receive equalizer is known as
In a synchronous modem, the receive equalizer is known as
You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?
You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?
Bulletin board system
Bulletin board system
Which IP address class has few hosts per network?
Which IP address class has few hosts per network?
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
On a class C network with a subnet mask of 192, how many subnets are available?
On a class C network with a subnet mask of 192, how many subnets are available?
A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as
A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as
What operates in the Data Link and the Network layer?
What operates in the Data Link and the Network layer?
On a class B network, how many subnets are available with a subnet mask of 248?
On a class B network, how many subnets are available with a subnet mask of 248?
Which of the following file retrieval methods use hypermedia?
Which of the following file retrieval methods use hypermedia?
Packet Switch Stream (PSS) was introduced in
Packet Switch Stream (PSS) was introduced in
Microprogramming is
Microprogramming is
Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.
Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.
How can you see the address of the DHCP server from which a client received its IP address?
How can you see the address of the DHCP server from which a client received its IP address?
The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.
The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.
Which of the following performs modulation and demodulation?
Which of the following performs modulation and demodulation?
Which of the following characteristics is not true of NetBEUI?
Which of the following characteristics is not true of NetBEUI?
What is the port number for POP3?
What is the port number for POP3?
What is the first octet range for a class A IP address?
What is the first octet range for a class A IP address?
A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used.
A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used.
Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?
Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?
When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?
When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?
Which of the following network access standard is used for connecting stations to a circuit-switched network?
Which of the following network access standard is used for connecting stations to a circuit-switched network?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
The size or magnitude of a voltage or current waveform is
The size or magnitude of a voltage or current waveform is
Which of the following network access standard is used for connecting stations to a packet-switched network?
Which of the following network access standard is used for connecting stations to a packet-switched network?
Data communications monitors available on the software market include
Data communications monitors available on the software market include
The physical layer of a network
The physical layer of a network
You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?
You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?
You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?
You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?
In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.
In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.
What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?
What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?
The area of coverage of a satellite radio beam is known as
The area of coverage of a satellite radio beam is known as
Which of the following statements is incorrect?
Which of the following statements is incorrect?
A subdivision of main storage created by operational software is referred to as a:
A subdivision of main storage created by operational software is referred to as a:
Which of the following is not a standard synchronous communication protocol?
Which of the following is not a standard synchronous communication protocol?
When UPC is used, the price of the item is located
When UPC is used, the price of the item is located
A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as
A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as
A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:
A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:
Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
The term "remote job entry" relates to
The term "remote job entry" relates to
Which of the following statement is correct?
Which of the following statement is correct?
End-to-end connectivity is provided from host-to-host in:
End-to-end connectivity is provided from host-to-host in:
The data communication support should include, but is not restricted to
The data communication support should include, but is not restricted to
What is the default subnet mask for a class A network?
What is the default subnet mask for a class A network?
In OSI model, which of the following layer provides error-free delivery of data?
In OSI model, which of the following layer provides error-free delivery of data?
Which of the following digits are known as the area code of the Network User Address (NUA)?
Which of the following digits are known as the area code of the Network User Address (NUA)?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets?
The main difference between TCP and UDP is
The main difference between TCP and UDP is
Which of the following specifies the network address and host address of the computer?
Which of the following specifies the network address and host address of the computer?
Error detection at the data link level is achieved by?
Error detection at the data link level is achieved by?
The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:
The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:
To avoid transmission errors, a check figure is calculated by the
To avoid transmission errors, a check figure is calculated by the
Which of the following is not a transmission medium?
Which of the following is not a transmission medium?
After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?
After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?
Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?
Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?
In OSI network architecture, the routing is performed by
In OSI network architecture, the routing is performed by
To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing
To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing
An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as
An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as
The _____ layer is the layer closest to the transmission medium.
The _____ layer is the layer closest to the transmission medium.
Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose?
Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose?
Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:
Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:
For connecting modem, a computer must be equipped with a port that conforms to the RS-232 standard of the Electronic Industries Association of America. What do the letters 'RS' stand for?
For connecting modem, a computer must be equipped with a port that conforms to the RS-232 standard of the Electronic Industries Association of America. What do the letters 'RS' stand for?
The difference between a multiplexer and a statistical multiplexer is
The difference between a multiplexer and a statistical multiplexer is
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
What is the first octet range for a class B IP address?
What is the first octet range for a class B IP address?
What is the name of the device that connects two computers by means of a telephone line?
What is the name of the device that connects two computers by means of a telephone line?
Which of the following allows devices on one network to communicate with devices on another network?
Which of the following allows devices on one network to communicate with devices on another network?
The transport layer protocol is connectionless.
The transport layer protocol is connectionless.
Which of the following medium access control technique is used for bus/tree?
Which of the following medium access control technique is used for bus/tree?
Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.
Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.
Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?
Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?
RS-449/442-A/423-A is
RS-449/442-A/423-A is
If communication software can be called the "traffic cop" of a micro communication system, then what should the modem be called?
If communication software can be called the "traffic cop" of a micro communication system, then what should the modem be called?
A batch processing terminal would not include a
A batch processing terminal would not include a
The network layer, in reference to the OSI model, provide
The network layer, in reference to the OSI model, provide
A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be
A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be
Which application allows a user to access and change remote files without actual transfer?
Which application allows a user to access and change remote files without actual transfer?
Devices on one network can communicate with devices on another network via a
Devices on one network can communicate with devices on another network via a
A network that requires human intervention of route signals is called a
A network that requires human intervention of route signals is called a
Which file transfer protocol uses UDP?
Which file transfer protocol uses UDP?
What is the main difference between DDCMP and SDLG?
What is the main difference between DDCMP and SDLG?
Which of the following statement is correct?
Which of the following statement is correct?
Parity bit is
Parity bit is
What is the minimum number of wires needed to send data over a serial communication link layer?
What is the minimum number of wires needed to send data over a serial communication link layer?