You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?
You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?
Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so?
Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so?
Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.
Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.
What is the minimum number of wires needed to send data over a serial communication link layer?
What is the minimum number of wires needed to send data over a serial communication link layer?
Which file transfer protocol uses UDP?
Which file transfer protocol uses UDP?
Which of the following network access standard is used for connecting stations to a circuit-switched network?
Which of the following network access standard is used for connecting stations to a circuit-switched network?
Which of the following specifies the network address and host address of the computer?
Which of the following specifies the network address and host address of the computer?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
On a class B network, how many subnets are available with a subnet mask of 248?
On a class B network, how many subnets are available with a subnet mask of 248?
In OSI model, which of the following layer provides error-free delivery of data?
In OSI model, which of the following layer provides error-free delivery of data?
Which of the following network access standard is used for connecting stations to a packet-switched network?
Which of the following network access standard is used for connecting stations to a packet-switched network?
Which of the following summation operation is performed on the bits to check an error-detecting code?
Which of the following summation operation is performed on the bits to check an error-detecting code?
In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.
In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.
The size or magnitude of a voltage or current waveform is
The size or magnitude of a voltage or current waveform is
RS-449/442-A/423-A is
RS-449/442-A/423-A is
Packet Switch Stream (PSS) was introduced in
Packet Switch Stream (PSS) was introduced in
The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are
The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are
Typewriter terminals can print computer-generated data at a rate of
Typewriter terminals can print computer-generated data at a rate of
For connecting modem, a computer must be equipped with a port that conforms to the RS-232 standard of the Electronic Industries Association of America. What do the letters 'RS' stand for?
For connecting modem, a computer must be equipped with a port that conforms to the RS-232 standard of the Electronic Industries Association of America. What do the letters 'RS' stand for?
Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:
Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:
When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?
When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?
Which of the following statement is correct?
Which of the following statement is correct?
Data communications monitors available on the software market include
Data communications monitors available on the software market include
Which of the following items is not used in Local Area Networks (LANs)?
Which of the following items is not used in Local Area Networks (LANs)?
Which of the following digits are known as the area code of the Network User Address (NUA)?
Which of the following digits are known as the area code of the Network User Address (NUA)?
What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?
What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?
To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing
To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing
Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?
Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?
The difference between a multiplexer and a statistical multiplexer is
The difference between a multiplexer and a statistical multiplexer is
What is the name of the device that connects two computers by means of a telephone line?
What is the name of the device that connects two computers by means of a telephone line?
What is the first octet range for a class A IP address?
What is the first octet range for a class A IP address?
After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?
After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?
Which of the following statements is incorrect?
Which of the following statements is incorrect?
What is the default subnet mask for a class A network?
What is the default subnet mask for a class A network?
Error detection at a data link level is achieved by
Error detection at a data link level is achieved by
To avoid transmission errors, a check figure is calculated by the
To avoid transmission errors, a check figure is calculated by the
The transport layer protocol is connectionless.
The transport layer protocol is connectionless.
You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?
You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?
A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as
A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known as
If communication software can be called the "traffic cop" of a micro communication system, then what should the modem be called?
If communication software can be called the "traffic cop" of a micro communication system, then what should the modem be called?
Which IP address class has few hosts per network?
Which IP address class has few hosts per network?
The area of coverage of a satellite radio beam is known as
The area of coverage of a satellite radio beam is known as
Parity bit is
Parity bit is
Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.
Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.
A network that requires human intervention of route signals is called a
A network that requires human intervention of route signals is called a
A subdivision of main storage created by operational software is referred to as a:
A subdivision of main storage created by operational software is referred to as a:
The _____ layer is the layer closest to the transmission medium.
The _____ layer is the layer closest to the transmission medium.
Which application allows a user to access and change remote files without actual transfer?
Which application allows a user to access and change remote files without actual transfer?
Which of the following is not a standard synchronous communication protocol?
Which of the following is not a standard synchronous communication protocol?
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?
Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?
Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
Which of the following provides a storage mechanism for incoming mail but does not allow a user to download messages selectively?
Devices on one network can communicate with devices on another network via a
Devices on one network can communicate with devices on another network via a
Bulletin board system
Bulletin board system
Error control is needed at the transport layer because of potential errors occurring _____.
Error control is needed at the transport layer because of potential errors occurring _____.
In OSI network architecture, the routing is performed by
In OSI network architecture, the routing is performed by
A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be
A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be
The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
The term "remote job entry" relates to
The term "remote job entry" relates to
Which of the following performs modulation and demodulation?
Which of the following performs modulation and demodulation?
Which of the following allows devices on one network to communicate with devices on another network?
Which of the following allows devices on one network to communicate with devices on another network?
A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as
A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as
When UPC is used, the price of the item is located
When UPC is used, the price of the item is located
On a class C network with a subnet mask of 192, how many subnets are available?
On a class C network with a subnet mask of 192, how many subnets are available?
The network layer, in reference to the OSI model, provide
The network layer, in reference to the OSI model, provide
Communication between computers is almost always
Communication between computers is almost always
End-to-end connectivity is provided from host-to-host in:
End-to-end connectivity is provided from host-to-host in:
The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:
The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:
The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.
The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.
Which of the following medium access control technique is used for bus/tree?
Which of the following medium access control technique is used for bus/tree?
A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used.
A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used.
The data communication support should include, but is not restricted to
The data communication support should include, but is not restricted to
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets?
You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets?
Which of the following file retrieval methods use hypermedia?
Which of the following file retrieval methods use hypermedia?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
Which of the following is considered a broadband communications channel?
Which of the following is considered a broadband communications channel?
Microprogramming is
Microprogramming is
You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?
You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?
In a synchronous modem, the receive equalizer is known as
In a synchronous modem, the receive equalizer is known as
Which of the following statement is correct?
Which of the following statement is correct?
A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:
A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:
An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as
An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as
What is the first octet range for a class B IP address?
What is the first octet range for a class B IP address?
Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose?
Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose?
Which of the following characteristics is not true of NetBEUI?
Which of the following characteristics is not true of NetBEUI?
A batch processing terminal would not include a
A batch processing terminal would not include a
The main difference between TCP and UDP is
The main difference between TCP and UDP is
Which of the following communications lines is best suited to interactive processing applications?
Which of the following communications lines is best suited to interactive processing applications?
Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?
Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?
What operates in the Data Link and the Network layer?
What operates in the Data Link and the Network layer?
Error detection at the data link level is achieved by?
Error detection at the data link level is achieved by?
CSMA (Carrier Sense Multiple Access) is
CSMA (Carrier Sense Multiple Access) is
What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?
What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?
How can you see the address of the DHCP server from which a client received its IP address?
How can you see the address of the DHCP server from which a client received its IP address?
The physical layer of a network
The physical layer of a network
What is the port number for POP3?
What is the port number for POP3?
What is the main difference between DDCMP and SDLG?
What is the main difference between DDCMP and SDLG?
Which of the following is not a transmission medium?
Which of the following is not a transmission medium?