The interactive transmission of data within a time sharing system may be best suited to
The interactive transmission of data within a time sharing system may be best suited to
Many large organizations with their offices in different countries of the world connect their computers through telecommunication satellites and telephone lines. Such a communication network is called
Many large organizations with their offices in different countries of the world connect their computers through telecommunication satellites and telephone lines. Such a communication network is called
The amount of uncertainty in a system of symbol is called
The amount of uncertainty in a system of symbol is called
Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)?
Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)?
Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?
Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?
A modulator converts a _____ signal to a(n) _____ signal.
A modulator converts a _____ signal to a(n) _____ signal.
You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?
You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?
What is the minimum number of wires required for sending data over a serial communications links?
What is the minimum number of wires required for sending data over a serial communications links?
A network which is used for sharing data, software and hardware among several users owning microcomputers is called
A network which is used for sharing data, software and hardware among several users owning microcomputers is called
Which of the following uses network address translation?
Which of the following uses network address translation?
What does 192 translate to in binary?
What does 192 translate to in binary?
The communication mode that supports data in both directions at the same time is
The communication mode that supports data in both directions at the same time is
What is the loopback address?
What is the loopback address?
To set up a bulletin board system you need
To set up a bulletin board system you need
With telecommunications and a personal computer you can
With telecommunications and a personal computer you can
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?
A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:
A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:
A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. If Delta modulation is selected, then how many bits per second are actually sent?
A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. If Delta modulation is selected, then how many bits per second are actually sent?
Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate)
Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate)
What does 240 translate to in binary?
What does 240 translate to in binary?
Which of the following statement is incorrect?
Which of the following statement is incorrect?
A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the maximum possible transmission rate?
A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the maximum possible transmission rate?
Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?
Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?
What frequency range is used for microwave communications, satellite and radar?
What frequency range is used for microwave communications, satellite and radar?
An ROP would be attached to a
An ROP would be attached to a
You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose?
You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose?
If the ASCII character H is sent and the character I is received, what type of error is this?
If the ASCII character H is sent and the character I is received, what type of error is this?
What does the acronym ISDN stand for?
What does the acronym ISDN stand for?
A T-switch is used to
A T-switch is used to
A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent?
A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent?
Which of the following services dynamically resolves NetBIOS-to-IP resolution?
Which of the following services dynamically resolves NetBIOS-to-IP resolution?
What is the port number for HTTP?
What is the port number for HTTP?
A band is always equivalent to
A band is always equivalent to
You are working with a network that is 172.16.0.0 and would like to support 600 hosts per subnet. What subnet mask should you use?
You are working with a network that is 172.16.0.0 and would like to support 600 hosts per subnet. What subnet mask should you use?
Which of the following frequency ranges is used for AM radio transmission?
Which of the following frequency ranges is used for AM radio transmission?
Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer:
Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer:
The main difference between synchronous and asynchronous transmission is
The main difference between synchronous and asynchronous transmission is
Working of the WAN generally involves
Working of the WAN generally involves
In geosynchronous orbit, satellite
In geosynchronous orbit, satellite
The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?
The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?
Which of the following statements is incorrect?
Which of the following statements is incorrect?
In cyclic redundancy checking, the divisor is _____ the CRC.
In cyclic redundancy checking, the divisor is _____ the CRC.
The birthplace of the World Wide Web is considered to be
The birthplace of the World Wide Web is considered to be
Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used?
Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used?
In cyclic redundancy checking what is the CRC?
In cyclic redundancy checking what is the CRC?
A computer that handles resource sharing and network management in a local area network. Select the best fit for answer:
A computer that handles resource sharing and network management in a local area network. Select the best fit for answer:
Which of the following statement is correct?
Which of the following statement is correct?
The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer.
The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer.
A modem that is attached to the telephone system by jamming the phone's handset into two flexible receptacles in the coupler?
A modem that is attached to the telephone system by jamming the phone's handset into two flexible receptacles in the coupler?
A communications device that combines transmissions from several I/O devices into one line is a:
A communications device that combines transmissions from several I/O devices into one line is a:
In CRC there is no error if the remainder at the receiver is _____.
In CRC there is no error if the remainder at the receiver is _____.
Sending a file from your personal computer's primary memory or disk to another computer is called
Sending a file from your personal computer's primary memory or disk to another computer is called
Most networks are connected to other local area or wide area networks. Select the best fit for answer:
Most networks are connected to other local area or wide area networks. Select the best fit for answer:
Terminals are required for
Terminals are required for
The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as:
The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as:
The X.25 standard specifies a
The X.25 standard specifies a
What is the main purpose of a data link content monitor?
What is the main purpose of a data link content monitor?
The basic Ethernet design does not provide
The basic Ethernet design does not provide
ARP (Address Resolution Protocol) is
ARP (Address Resolution Protocol) is
The most flexibility in how devices are wired together is provided by
The most flexibility in how devices are wired together is provided by
Error detecting code is
Error detecting code is
An error-detecting code inserted as a field in a block of data to be transmitted is known as
An error-detecting code inserted as a field in a block of data to be transmitted is known as
Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?
Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?
Which of the following program is used to copy files to or from another UNIX timesharing system over a single link?
Which of the following program is used to copy files to or from another UNIX timesharing system over a single link?
A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:
A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:
What OSI layer handles logical address to logical name resolution?
What OSI layer handles logical address to logical name resolution?
An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer:
An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer:
What is the maximum number of entries in the HOSTS file?
What is the maximum number of entries in the HOSTS file?
A communication network which is used by large organizations over regional, national or global area is called
A communication network which is used by large organizations over regional, national or global area is called
Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
Who originally designed TCP/IP?
Who originally designed TCP/IP?
A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.
A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.
How much power (roughly) a light-emitting diode can couple into an optical fiber?
How much power (roughly) a light-emitting diode can couple into an optical fiber?
A software that allows a personal computer to pretend it as a terminal is
A software that allows a personal computer to pretend it as a terminal is
A WATS arrangement
A WATS arrangement
When a group of computers is connected together in a small area without the help of telephone lines, it is called
When a group of computers is connected together in a small area without the help of telephone lines, it is called
The CCITT Recommendation X.25 specifies three layers of communications:
The CCITT Recommendation X.25 specifies three layers of communications:
What does 224 translate to in binary?
What does 224 translate to in binary?
An example of a medium-speed, switched communications service is
An example of a medium-speed, switched communications service is
How many OSI layers are covered in the X.25 standard?
How many OSI layers are covered in the X.25 standard?
An information utility can offer a user
An information utility can offer a user
Which command-line tool is included with every Microsoft TCP/IP client?
Which command-line tool is included with every Microsoft TCP/IP client?
If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.
If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.
Which of the following medium is used for broadband local networks?
Which of the following medium is used for broadband local networks?
Number of bits per symbol used in Baudot code is
Number of bits per symbol used in Baudot code is
You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?
You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?
An example of digital, rather than analog, communication is
An example of digital, rather than analog, communication is
One important characteristic of the hub architecture of ARC-net is
One important characteristic of the hub architecture of ARC-net is
Which of the following is an example of a client-server model?
Which of the following is an example of a client-server model?
The systematic access of small computers in a distributed data processing system is referred to as:
The systematic access of small computers in a distributed data processing system is referred to as:
Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?
Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?
A devices that links two homogeneous packet-broadcast local networks, is
A devices that links two homogeneous packet-broadcast local networks, is
What is the name of the network topology in which there are bi-directional links between each possible node?
What is the name of the network topology in which there are bi-directional links between each possible node?
Synchronous protocols
Synchronous protocols
Videotex is a combination of
Videotex is a combination of