In OSI network architecture, the dialogue control and token management are responsibilities of
In OSI network architecture, the dialogue control and token management are responsibilities of
Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as
Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as
What can cause a problem with communication with a client by name but not by IP address?
What can cause a problem with communication with a client by name but not by IP address?
Which of the following is a wrong example of network layer:
Which of the following is a wrong example of network layer:
Different computers are connected to a LAN by a cable and a/an
Different computers are connected to a LAN by a cable and a/an
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer
The core diameter of a single-mode fibers is about
The core diameter of a single-mode fibers is about
Which of the following might be used by a company to satisfy its growing communications needs?
Which of the following might be used by a company to satisfy its growing communications needs?
Which of the following statements is correct?
Which of the following statements is correct?
You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer.
You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer.
If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?
If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?
A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer:
A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer:
A characteristic of a multiprogramming system is:
A characteristic of a multiprogramming system is:
With an IP address of 201.142.23.12, what is your default subnet mask?
With an IP address of 201.142.23.12, what is your default subnet mask?
What frequency range is used for TV transmission and low power microwave applications?
What frequency range is used for TV transmission and low power microwave applications?
You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?
You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?
Which of the following statement is correct?
Which of the following statement is correct?
The data-link layer, in reference to the OSI model, specifies
The data-link layer, in reference to the OSI model, specifies
Telecommunications networks come in a wide range of speed and capacity capabilities. Select the best fit for answer:
Telecommunications networks come in a wide range of speed and capacity capabilities. Select the best fit for answer:
Which utility is useful for troubleshooting NetBIOS name resolution problems?
Which utility is useful for troubleshooting NetBIOS name resolution problems?
Which of the following protocol is connection-oriented?
Which of the following protocol is connection-oriented?
Which multiplexing technique shifts each signal to a different carrier frequency?
Which multiplexing technique shifts each signal to a different carrier frequency?
Who invented the modem?
Who invented the modem?
Layer one of the OSI model is
Layer one of the OSI model is
Which of the following is an example of bounded medium?
Which of the following is an example of bounded medium?
Which of the following connectivity devices is used to extend a network on a purely mechanical basis?
Which of the following connectivity devices is used to extend a network on a purely mechanical basis?
When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection?
When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection?
Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?
Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?
In a synchronous modem, the digital-to-analog converter transmits signal to the
In a synchronous modem, the digital-to-analog converter transmits signal to the
In OSI model, which of the following layer transforms information from machine format into that understandable by user
In OSI model, which of the following layer transforms information from machine format into that understandable by user
In CRC the quotient at the sender
In CRC the quotient at the sender
Modulation is the process of
Modulation is the process of
Which utility is an all-purpose tool for troubleshooting TCP/IP problems?
Which utility is an all-purpose tool for troubleshooting TCP/IP problems?
The EIA-232 interface has _____ pins.
The EIA-232 interface has _____ pins.
We can receive data either through our television aerial or down our telephone lines and display this data on our television screen. What is the general name given to this process?
We can receive data either through our television aerial or down our telephone lines and display this data on our television screen. What is the general name given to this process?
The loss in signal power as light travels down the fiber is called
The loss in signal power as light travels down the fiber is called
With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?
With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?
The channel in the data communication model can be
The channel in the data communication model can be
Which of the following is an important characteristic of LAN?
Which of the following is an important characteristic of LAN?
The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet?
The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet?
Communication circuits that transmit data in both directions but not at the same time are operating in
Communication circuits that transmit data in both directions but not at the same time are operating in
What is the standard protocol for network management features?
What is the standard protocol for network management features?
An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is
An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, is
What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?
The coming together of three technologies i.e. microelectronics, computing and communications has ushered in
The coming together of three technologies i.e. microelectronics, computing and communications has ushered in
Which of the following files is used for NetBIOS name resolution?
Which of the following files is used for NetBIOS name resolution?
Which of the following TCP/IP protocol is used for transferring files from one machine to another?
Which of the following TCP/IP protocol is used for transferring files from one machine to another?
When a host knows its physical address but not its IP address, it can use _____.
When a host knows its physical address but not its IP address, it can use _____.
Which transmission mode is used for data communication along telephone lines?
Which transmission mode is used for data communication along telephone lines?
Operating system functions may include
Operating system functions may include
Which of the following communications modes support two-way traffic but in only one direction of a time?
Which of the following communications modes support two-way traffic but in only one direction of a time?
Which of the following transmission systems provides the highest data rate to an individual device
Which of the following transmission systems provides the highest data rate to an individual device
A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take?
A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take?
The frequency range : 300 kHz to 3 MHz is used for
The frequency range : 300 kHz to 3 MHz is used for
You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use?
You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use?
The simultaneous transmission of data to a number of stations is known as
The simultaneous transmission of data to a number of stations is known as
Which of the following digits are known as the terminal number of the Network User Address (NUA)?
Which of the following digits are known as the terminal number of the Network User Address (NUA)?
ASK, PSK, FSK, and QAM are examples of _____ encoding.
ASK, PSK, FSK, and QAM are examples of _____ encoding.
The OCR reading unit attached to a POS terminal is called a
The OCR reading unit attached to a POS terminal is called a
Networks where end user workstations are tied to LAN servers to share resources and application processing.
Networks where end user workstations are tied to LAN servers to share resources and application processing.
Terminals are used to
Terminals are used to
A protocol is a set of rules governing a time sequence of events that must take place
A protocol is a set of rules governing a time sequence of events that must take place
IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____ sublayer.
IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____ sublayer.
Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server?
Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server?
A medium access control technique for multiple access transmission media is
A medium access control technique for multiple access transmission media is
Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?
Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?
In communication satellite, multiple repeaters are known as
In communication satellite, multiple repeaters are known as
What function does a serial interface perform in data communication?
What function does a serial interface perform in data communication?
Most data communications involving telegraph lines use:
Most data communications involving telegraph lines use:
A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?
A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?
Eight stations are competing for the use of the shared channel using the modified Adaptive free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?
Eight stations are competing for the use of the shared channel using the modified Adaptive free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?
Brad is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is excellent. Which network(s) would be the best to set up?
Brad is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is excellent. Which network(s) would be the best to set up?
What is the default subnet mask for a class B network?
What is the default subnet mask for a class B network?
A modem is connected in between a telephone line and a
A modem is connected in between a telephone line and a
The application layer of a network
The application layer of a network
After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration?
After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration?
Which of the following signals is not standard RS - 232-C signal?
Which of the following signals is not standard RS - 232-C signal?
How many pairs of stations can simultaneously communicate on Ethernet LAN?
How many pairs of stations can simultaneously communicate on Ethernet LAN?
Sales persons and other employees of the company who spend much of their time away from their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are called
Sales persons and other employees of the company who spend much of their time away from their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are called
What is the term used to describe addresses available on a DHCP server?
What is the term used to describe addresses available on a DHCP server?
Which of the following device is used with an X.25 network to provide service to asynchronous terminals
Which of the following device is used with an X.25 network to provide service to asynchronous terminals
Which of the following TCP/IP protocol is used for remote terminal connection service?
Which of the following TCP/IP protocol is used for remote terminal connection service?