Top Banner
Follow this link for answers :: http://www.indiabix.com/computer- science/networking/ 1 . How many digits of the DNIC (Data Network Identification Code) identify the country? A . first three B . first four C . first five D . first six E . None of the above 2 . A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? A . hot potato routing B . flooding C . static routing D . delta routing E . None of the above 3 . The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power - 3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to A . 0.003 B . 0.009 C . 0.991 D . 0.999 E None of the above
143
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

1. How many digits of the DNIC (Data Network Identification Code) identify the country?A.first threeB.first fourC.first fiveD.first sixE.None of the above

2. A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used?A.hot potato routingB.floodingC.static routingD.delta routingE.None of the above

3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal toA.0.003B.0.009C.0.991D.0.999E.None of the above

4. Frames from one LAN can be transmitted to another LAN via the deviceA.Router B.BridgeC.Repeater D.Modem

5. Which of the following condition is used to transmit two packets over a medium at the same time?A.ContentionB.CollisionC.SynchronousD.Asynchronous

E.None of the above

6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign?A.255.240.0.0 B.255.248.0.0C.255.252.0.0 D.255.254.0.0E.255.255.255.255

7. What are the most commonly used transmission speeds in BPS used in data communication?A.300B.1200C.2400D.9600E.None of the above

Page 2: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

Discuss in Forum

8. What is the default subnet mask for a class C network?A.127.0.0.1B.255.0.0.0C.255.255.0.0D.255.255.255.0E.None of the above Discuss in Forum

9. Which of the following is used for modulation and demodulation?A.modemB.protocolsC.gatewayD.multiplexerE.None of the above Discuss in Forum

10. Which of the following is not a disadvantage of wireless LAN?A.

Slower data transmission

B.higher error rateC.interference of transmissions from different computersD.

All of the above

11. The Internet Control Message Protocol (ICMP)A.

allows gateways to send error a control messages to other gateways or hosts

B.provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another

C.s error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem

D.

All of the above

E.None of the above Discuss in Forum

12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.A.

Modem B.Cable

C.Hub D.Router Discuss in Forum

13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiverA cannot talk at once

Page 3: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.can receive and send data simultaneouslyC.can send or receive data one at a timeD.

can do one way data transmission only

E.None of the above Discuss in Forum

14. How many hosts are attached to each of the local area networks at your site?A.

128

B.254C.256D.

64

E.None of the above Discuss in Forum

15. Which of the following technique is used for fragment?A.

a technique used in best-effort delivery systems to avoid endlessly looping packets

B.a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

C.one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

D.

All of the above

E.None of the above16. Contention is

A.

One or more conductors that serve as a common connection for a related group of devices

B.a continuous frequency capable of being modulated or impressed with a second signalC.the condition when two or more stations attempt to use the same channel at the same timeD.

a collection of interconnected functional units that provides a data communications service among stations attached to the network

E.None of the above Discuss in Forum

17. Avalanche photodiode receivers can detect hits of transmitted data by receivingA.

100 photons

B.200 photonsC.300 photonsD.

400 photons

E.None of the above Discuss in Forum

18. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

Page 4: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

A.

the method of determining which device has access to the transmission medium at any time.

B.a medium access control technique for multiple access transmission media

C.a form of TDMA in which circuit switching is used to dynamically change the channel assignments

D.

All of the above

E.None of the above Discuss in Forum

19. When you ping the loopback address, a packet is sent where?A.

On the network

B.Down through the layers of the IP architecture and then up the layers againC.Across the wireD.

through the loopback dongle

E.None of the above Discuss in Forum

20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?A.

FTP

B.SNMPC.SMTPD.

RPC

E.None of the above21. Which of the following device is used to connect two systems, especially if the systems use

different protocols?A.

hub

B.bridgeC.gatewayD.

repeater

E.None of the above Discuss in Forum

22. The synchronous modems are more costly than the asynchronous modems becauseA.

they produce large volume of data

B.they contain clock recovery circuitsC.they transmit the data with stop and start bits.D.

they operate with a larger bandwidth

E.None of the above Discuss in Forum

Page 5: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

23. A distributed network configuration in which all data/information pass through a central computer isA.

bus network

B.star networkC.ring networkD.

Point-to-point network

E.None of the above Discuss in Forum

24. Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine?A.

UDP

B.VMTPC.X.25D.

SMTP

E.None of the above Discuss in Forum

25. A remote batch-processing operation in which data is solely input to a central computer would require a:A.

telegraph line

B.simplex linesC.mixedband channelD.

All the above

E.None of the above26. ICMP (Internet Control Message Protocol) is

A.

a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address

B.a TCP/IP high level protocol for transferring files from one machine to anotherC.a protocol used to monitor computersD.

a protocol that handles error and control messages

E.None of the above Discuss in Forum

27. If you get both local and remote echoes, every character you type will appear on the screenA.

once

B.twiceC.three timesD.

never

Page 6: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?A.

192

B.192.168.10C.0.0.0.5D.

51

E.None of the above Discuss in Forum

29. The slowest transmission speeds are those ofA.

twisted-pair wire

B.coaxial cableC.fiber-optic cableD.

microwaves

Discuss in Forum

30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?A.

3 Kbps

B.6 KbpsC.12 KbpsD.

24 Kbps.

31. Carrier isA.

One or more conductors that serve as a common connection for a related group of devices

B.a continuous frequency capable of being modulated or impressed with a second signalC.the condition when two or more sections attempt to use the same channel at the same timeD.

a collection of interconnected functional units that provides a data communications service among stations attached to the network

E.None of the above Discuss in Forum

32. What can greatly reduce TCP/IP configuration problems?A.

WINS Server

B.WINS ProxyC.DHCP ServerD.

PDC

E.None of the above Discuss in Forum

Page 7: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

33. In CRC there is no error if the remainder at the receiver is _____.A.

equal to the remainder at the sender

B.zeroC.nonzeroD.

the quotient at the sender

Discuss in Forum

34. Which of the following statements is correct for the use of packet switching?

A.

the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure

B.the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied

C.by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved.

D.

All of the above

E.None of the above Discuss in Forum

35. A front-end processor isA.

a user computer system

B.a processor in a large-scale computer that executes operating system instructions

C.a minicomputer that relieves main-frame computers at a computer centre of communications control functions

D.

preliminary processor of batch jobs.

E.None of the above36. What is the port number for NNTP?

A.

119 B.80

C.79 D.70 Discuss in Forum

37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?A.

7 slots

B.5 slotsC.10 slotsD.

14 slots

Discuss in Forum

Page 8: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS?A.

10

B.12C.120D.

1200

E.None of the above Discuss in Forum

39. To connect a computer with a device in the same room, you might be likely to useA.

a coaxial cable

B.a dedicated lineC.a ground stationD.

All of the above

E.None of the above Discuss in Forum

40. Internet-like networks within an enterprise.A.

Intranets

B.Switching alternatingC.Inter organizational networksD.

Extranets

41. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host?A.

16 - bits

B.32 - bitsC.48 - bitsD.

64 - bits

E.None of the above Discuss in Forum

42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts?A.

192 B.224

C.240 D.248E.252 Discuss in Forum

43. Which of the following types of channels moves data relatively slowly?A wideband channel

Page 9: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.voiceband channelC.narrowband channelD.

broadband channel

E.None of the above Discuss in Forum

44. Which of the following is required to communicate between two computers?A.

communications software

B.protocolC.communications hardwareD.

access to transmission medium

E.All of the above Discuss in Forum

45. Which of the following does not allow multiple users or devices to share one communications line?A.

doubleplexer

B.multipplexerC.concentratorD.

controller

E.None of the above46. The geostationary satellite used for communication systems

A.

rotates with the earth

B.remains stationary relative to the earthC.is positioned over equatorD.

All of the above

E.None of the above Discuss in Forum

47. Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer:A.

Bandwidth alternatives

B.Switching alternatingC.Inter organizational networksD.

Extranets

Discuss in Forum

48. The packets switching concept was first proposedA in the late 1980s for the Defense Ministry of US.

Page 10: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.in the early 1960s for military communication systems, mainly to handle speechC.in the late 1950s for Defense Ministry of USD.

All of the above

E.None of the above Discuss in Forum

49. The _____ houses the switches in token ring.A.

transceiver

B.nine-pin connectorC.MAUD.

NIC

E.None of the above Discuss in Forum

50. What device separates a single network into two segments but lets the two segments appear as one to higher protocols?A.

Switch B.Bridge

C.Gateway D.Router

1. Which of the following refers to the terms "residual error rate"?A.the number of bit errors per twenty four hours of continuous operation on an asynchronous

Page 11: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

line

B.The probability that one or more errors will be undetected when an error detection scheme is used

C.the probability that one or more errors will be detected when an error detection mechanism is used

D.signal to noise ratio divided by the ratio of energy per bit to noise per hertzE.None of the above Discuss in Forum

2. Which of the following summation operations is performed on the bits to check an error-detecting code?A.Codec B.Coder-decoderC.Checksum D.Attenuation Discuss in Forum

3. The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.

A.Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel

B.Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable

C.Baseband refers to local area networks, and broadband refers to wide area networks.

D.Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed

E.Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions

Discuss in Forum

4. An error-detecting code inserted as a field in a block of data to be transmitted is known asA.Frame check sequenceB.Error detecting codeC.ChecksumD.flow controlE.None of the above Discuss in Forum

5. The cheapest modems can transmitA.300 bits per secondB.1,200 bits per secondC.2,400 bits per secondD.4,800 bits per secondE.None of the above

6. Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device which permits digital to analog conversion at the start of a long distance transmission?A.InterfaceB.Modem

Page 12: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.AttenuationD.TeleprocessorE.None of the above Discuss in Forum

7. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers?A.16B.9C.8D.4E.None of the above Discuss in Forum

8. The receive equalizer reduces delay distortions using aA.tapped delay linesB.gearshiftC.descramblerD.difference engineE.None of the above Discuss in Forum

9. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.A.12 B.81C.48 D.729 Discuss in Forum

10. A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?A.

NBTSTAT

B.NETSTAT.EXEC.Performance MonitorD.

Network Monitor

E.ARP.EXE11. Sending a file from your personal computer's primary memory or disk to another computer is

calledA.

uploading

B.downloadingC.logging onD.

hang on

E.None of the above Discuss in Forum

Page 13: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

12. What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?A.

Memory resident package

B.Project management packageC.Data communication packageD.

Electronic mail package

E.None of the above Discuss in Forum

13. The communication mode that supports two-way traffic but only one direction at a time isA.

simplex

B.duplexC.half duplexD.

multiplex

E.None of the above Discuss in Forum

14. HMP (Host Monitoring Protocol) is:A.

a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address

B.a TCP/IP high level protocol for transferring files from one machine to another.C.a protocol used to monitor computersD.

a protocol that handles error and control messages

E.None of the above Discuss in Forum

15. Which of the following is a voiceband channel?A.

Telephone line

B.Telegraph lineC.Coaxial cableD.

Microwave systems

E.None of the above16. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame

(assume header bits are negligible) that can be sent on this ring?A.

8000 B frame

B.80,000 B frameC.8 x 105 bit frameD.

10,000 B frame

Discuss in Forum

Page 14: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

17. Data are sent over pin _____ of the EIA-232 interface.A.

2

B.3C.4D.

All of the above

Discuss in Forum

18. To connect a computer with a device in the same room, you might be likely to useA.

a coaxial cable

B.a dedicated lineC.a ground stationD.

All of the above

Discuss in Forum

19. Demodulation is a process ofA.

converting analog to digital signals

B.converting digital to analog signalsC.multiplexing various signals into one high speed line signalsD.

performing data description.

Discuss in Forum

20. Internet-like networks between a company and its business partners. Select the best fit for answer:A.

Bandwidth alternatives

B.Switching alternatingC.Inter organizational networksD.

Extranets

21. An example of an analog communication method isA.

laser beam

B.microwaveC.voice grade telephone lineD.

All of the above

E.None of the above Discuss in Forum

22. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

Page 15: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

A.

Layer 7 protocols

B.Layer 6 protocolsC.Layer 5 protocolsD.

Layer 4 protocols

E.None of the above Discuss in Forum

23. What frequency range is used for FM radio transmission?A.

Very Low Frequency : 3 kHz to 30. kHz

B.Low Frequency : 30 kHz to 300 kHzC.High Frequency : 3 MHz to 30 MHzD.

Very High Frequency : 30 MHz to 300 MHz

E.None of the above Discuss in Forum

24. Transmission of computerised data from one location to another is calledA.

data transfer

B.data flowC.data communicationD.

data management

E.None of the above Discuss in Forum

25. Compared to analog signals, digital signalsA.

allow faster transmission

B.are more accurateC.both (a) and (b)D.

All of the above

E.None of the above26. FDDI is a

A.

ring network

B.star networkC.mesh networkD.

bus based network

E.None of the above Discuss in Forum

27. An anticipated result from multiprogramming operations is:A reduced computer idle time

Page 16: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.the handling of more jobsC.better scheduling of workD.

All of the above

E.None of the above Discuss in Forum

28. A central computer surrounded by one or more satellite computers is called aA.

bus network

B.ring networkC.star networkD.

All of the above

E.None of the above Discuss in Forum

29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?A.

500 bps

B.1500 bpsC.5 bpsD.

1000 bps

Discuss in Forum

30. HOSTS file entries are limited to how many characters?A.

8

B.255C.500D.

Unlimited

E.None of the above31. Demodulation is the process of

A.

converting digital signals to analog signals

B.converting analog signals to digital signalsC.combining many low speed channels into one high speed channelD.

dividing the high-speed signals into frequency bands

E.None of the above Discuss in Forum

32. Which of the following statement is incorrect?A The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a

Page 17: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

. target host on the same physical network, given only the target IP address.

B.The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet.

C.ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine.

D.

All of the above

E.None of the above Discuss in Forum

33. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?A.

255.255.255.192 B.255.255.255.224

C.255.255.255.240 D.255.255.255.248E.255.255.255.252 Discuss in Forum

34. Which of the following best illustrates the default subnet mask for a class A,B, and C Network?A.

0.0.0.0, 0.0.0.1, 0.0.1.1

B.255.255.255.0, 255.255.0.0, 255.0.0.0C.255.0.0.0, 255.255.0.0, 255.255.255.0D.

255.255.0.0, 255.255.255.0, 255.255.255.255

E.None of the above Discuss in Forum

35. Modulation is the process ofA.

converting analog signals to digital signals

B.converting digital signals to analog signalsC.Multiplexing various signals into high speed line signalsD.

performing data encryption.

36. Devices interconnected by the LAN should includeA.

Computers and terminals

B.mass storage device, printers and plottersC.bridges and gatewaysD.

All of the above

E.None of the above Discuss in Forum

37. What are the data transmission channels available for carrying data from one location to another?

Page 18: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

A.

Narrowband

B.VoicebandC.BroadbandD.

All of the above

E.None of the above Discuss in Forum

38. On a class B network, how many hosts are available at each site with a subnet mask of 248?A.

16,382 B.8,190

C.4,094 D.2,046E.1,022 Discuss in Forum

39. Which of the following technique is used for encapsulation?A.

a technique used in best-effort delivery systems to avoid endlessly looping packets.

B.a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.

C.One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

D.

All of the above

E.None of the above Discuss in Forum

40. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?A.

255.255.252.0 B.225.255.254.0

C.255.255.255.240 D.255.255.255.25241. With an IP address set starting with 150, you currently have six offices that you are treating

as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?A.

192 B.224

C.240 D.248E.252 Discuss in Forum

42. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known asA.

Gateways

B.mail gatewayC.bridges

Page 19: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

D.

User Agent

E.None of the above Discuss in Forum

43. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate isA.

1200 bands

B.3200 bandsC.4800 bandsD.

9600 bands

E.None of the above Discuss in Forum

44. Error detection at a data link level is achieved byA.

bit stuffing

B.cyclic redundancy codesC.Hamming codesD.

equalization

Discuss in Forum

45. When the computer provides the manager with a multiple choice of possible answers, the prompting technique isA.

question and answer

B.form fillingC.open-ended questionD.

menu selection

E.None of the above46. Which network topology is considered passive?

A.

Cross B.Ring

C.Star D.MeshE.Bus Discuss in Forum

47. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)A.

POS terminal

B.data collection terminalC.batch processing terminalD.

intelligent terminal

Page 20: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

48. Which address is the loopback address?A.

0.0.0.1

B.127.0.0.0C.127.0.0.1D.

255.255.255.255

E.None of the above Discuss in Forum

49. Error rate isA.

an error-detecting code based on a summation operation performed on the bits to be checked.

B.a check bit appended to an array of binary digits to make the sum of all the binary digits.

C.a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.

D.

the ratio of the number of data units in error to the total number of data units

E.None of the above Discuss in Forum

50. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:A.

Network Server

B.Virtual Private NetworkC.Network operating systemD.

OSI

1. Modem is used in data transmission. When was it invented and in which country?A.1963, USAB.1965, GermanyC.1950, USA

Page 21: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

D.1950, JapanE.None of the above Discuss in Forum

2. Which of the following technique is used for Time-To-Line (TTL)?A.a technique used in best-effort delivery system to avoid endlessly looping packets.

B.a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

C.One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.

D.All of the aboveE.None of the above Discuss in Forum

3. Communication network isA.one or more conductors that serve as a common connection for a related group of devicesB.a continuous frequency capable of being modulated or impressed with a second signalC.the condition with two or more stations attempt to use the same channel at the same time

D.a collection of interconnected functional units that provides a data communications service among stations attached to the network

E.None of the above Discuss in Forum

4. Which of the following is an advantage to using fiber optics data transmission?A.resistance to data theftB.fast data transmission rateC.low noise levelD.few transmission errorsE.All of the above Discuss in Forum

5. Which of the following statement is incorrect?A.if a host moves from one network to another, its IP address must change

B.routing uses the network portion of the IP address, the path taken by packets travelling to a host with multiple IP addresses depends on the address used.

C.IP addresses encode both a network and a host on that network, they do not specify an individual machine, but a connection to a network.

D.All of the aboveE.None of the above

6. Bandlimited signal isA.transmission of signals without modulationB.a signal all of whose energy is contained within a finite frequency rangeC.simultaneous transmission of data to a number of stationsD.All of the aboveE.None of the above Discuss in Forum

7. Computers in a LAN can be interconnected by radio and infrared technologies.A.Wireless LANs

Page 22: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

B.Network TopologiesC.MultiplexerD.Modem Discuss in Forum

8. You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?A.255.255.224.0 B.255.255.240.0C.255.255.248.0 D.255.255.255.0E.255.255.255.255 Discuss in Forum

9. How many digits of the Network User Address are known as the DNIC (Data Network Identification Code)?A.first threeB.first fourC.first fiveD.first sevenE.None of the above Discuss in Forum

10. Which of the following is the address of the router?A.

The IP address

B.The TCP addressC.The subnet maskD.

The default gateway

E.None of the above11. Thorough planning must take place when setting up an 802.3 network. A maximum number

of segments can separate any two nodes on the network. What is the maximum number of segments allowed between two nodes?A.

Five B.Two

C.Four D.SixE.Three Discuss in Forum

12. A devices that links two homogeneous packet-broadcast local networks, isA.

hub

B.bridgeC.repeaterD.

gateway

E.None of the above Discuss in Forum

Page 23: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

13. Identify the odd term amongst the following group:A.

Coaxial cable

B.Optical fibreC.Twisted pair wireD.

Microwaves

E.None of the above Discuss in Forum

14. Which of the following divides the high speed signal into frequency bands?A.

t-switch

B.modemC.frequency-division multiplexerD.

time-division multiplexer

E.None of the above Discuss in Forum

15. What is the first octet range for a class C IP address?A.

192 - 255

B.192 - 223C.192 - 226D.

128 - 191

E.1 - 12616. Which utility is useful for finding the local host name?

A.

NBTSTAT

B.NetstatC.PINGD.

Hostname

E.None of the above Discuss in Forum

17. Which of the following conditions is used to transmit two packets over a medium at the same time?A.

Contention B.Collision

C.Synchronous D.Asynchronous Discuss in Forum

18. The slowest transmission speeds are those ofA.

twisted-pair wire

B.coaxial cable

Page 24: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.fiber-optic cableD.

microwaves

E.None of the above Discuss in Forum

19. Distributed Queue Dual Bus is a standard forA.

LAN

B.MANC.WAND.

Wireless LAN.

E.LAN and MAN Discuss in Forum

20. A teleprocessing system may consist ofA.

user systems

B.communications systemsC.computer center systemsD.

All of the above

E.None of the above21. If the ASCII character G is sent and the character D is received, what type of error is this?

A.

single-bit B.multiple-bit

C.burst D.recoverable Discuss in Forum

22. Which layer of OSI determines the interface of the system with the user?A.

Network

B.ApplicationC.Data-linkD.

Session

E.None of the above Discuss in Forum

23. The transfer of data from a CPU to peripheral devices of a computer is achieved throughA.

modems

B.computer portsC.interfacesD.

buffer memory

E.None of the above Discuss in Forum

Page 25: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

24. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?A.

4

B.2C.6D.

3

E.None of the above Discuss in Forum

25. Many data communication networks have been established which provide a wealth of on-demand information services to people at home. What is the name of the system which provides an interactive, graphics-rich service that permits user to select what they want?A.

Teletex system

B.Fax systemC.Videotex systemD.

Microwave system

E.None of the above26. Which of the following statements is correct?

A.

Terminal section of a synchronous modem contains the scrambler

B.Receiver section of a synchronous modem contains the scramblerC.Transmission section of a synchronous modem contains the scramblerD.

Control section of a synchronous modem contains the scrambler

E.None of the above Discuss in Forum

27. Which of the following characteristic(s) is/are suited to the PSS applications?A.

bursty traffic and low communications intensity

B.widely dispersed terminals and access to international packets switched services

C.Multiple remote host or applications accessed by a single local access circuit terminal and circuit

D.

All of the above

E.None of the above Discuss in Forum

28. Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?A.

PING

B.TRACERTC.ARP

Page 26: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

D.

IPCONFIG

E.None of the above Discuss in Forum

29. Which of the following is separated by a subnet mask?A.

DHCP scopes

B.Network ID and host IDC.DomainsD.

Subnets

Discuss in Forum

30. The signal to noise ratio for a voice grade line is 30.1 dB (decibels) or a power ratio of 1023:1. The maximum achievable data rate on this line whose spectrum ranges from 300 Hz to 4300 Hz isA.

6200 bps

B.9600 bpsC.34000 bpsD.

31000 bps

E.None of the above31. TCP is:

A.

Operates at the Data Link layer

B.Connection orientated and unreliableC.Connection orientated and reliableD.

Connectionless and unreliable

Discuss in Forum

32. An encyclopedic databaseA.

is an information utility that specializes in storing and searching information

B.is generally freeC.is easy for beginners to useD.

All of the above

E.None of the above Discuss in Forum

33. Which of the following statements is correct?A.

Protocol converters are the same as multiplexers

B.Protocol converters are the same as TDMsC.Protocol converters are usually not operated in pairs.D Protocol converters are usually operated in

Page 27: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

34. The dialogue techniques for terminal use do not includeA.

questions and answers

B.open-ended questionsC.form fillingsD.

menu display

E.None of the above Discuss in Forum

35. You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?A.

255.255.255.192 B.255.255.255.224

C.255.255.255.240 D.255.255.255.248E.255.255.255.255

36. The encoding method specified in the EIA-232 standard is _____.A.

NRZ-I

B.NRZ-LC.ManchesterD.

Differential Manchester

Discuss in Forum

37. Examples are packet switching using frame relay, and cell switching using ATM technologies. Select the best fit for answer:A.

Bandwidth alternatives

B.Switching alternatingC.Inter organizational networksD.

Extranets

Discuss in Forum

38. The physical layer, in reference to the OSI model, definesA.

data link procedures that provide for the exchange of data via frames that can be sent and received

B.the interface between the X.25 network and packet mode deviceC.the virtual circuit interface to packet-switched serviceD.

All of the above

E.None of the above Discuss in Forum

Page 28: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

39. A required characteristic of an online real-time system is:A.

more than one CPU

B.offline batch processingC.no delay in processingD.

All of the above

E.None of the above Discuss in Forum

40. How many class A, B, and C network IDs can exist?A.

2,113,658

B.16,382C.126D.

128

E.None of the above41. The transmission signal coding method of TI carrier is called

A.

Bipolar

B.NRZC.ManchesterD.

Binary

E.None of the above Discuss in Forum

42. Which of the following statement is correct?A.

Buffering is the process of temporarily storing the data to allow for small variation in device speeds

B.Buffering is a method to reduce cross-talksC.Buffering is a method to reduce the routing overheadD.

Buffering is storage of data within the transmitting medium until the receiver is ready to receive

E.None of the above Discuss in Forum

43. You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?A.

255.255.255.192 B.255.255.255.224

C.255.255.255.240 D.255.255.255.248E.255.255.255.252 Discuss in Forum

44. Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable,

Page 29: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?A.

Paperless office

B.Electronic mailC.Global networkD.

Electronic newspaper

E.None of the above Discuss in Forum

45. HDLC (High-level Data Link Control) isA.

a method of determining which device has access to the transmission medium at any time

B.a method access control technique for multiple-access transmission mediaC.a very common bit-oriented data link protocol issued by ISO.D.

network access standard for connecting stations to a circuit-switched network

E.None of the above46. You are working with a network that has the network ID 192.168.10.0. What subnet should

you use that supports four subnets and a maximum number of hosts?A.

255.255.255.192 B.255.255.255.224

C.255.255.255.240 D.255.255.255.248E.255.255.255.252 Discuss in Forum

47. Establishing a virtual connection is functionally equivalent toA.

Connecting as virtual memory

B.Physically connecting a DTE and DCEC.Placing a telephone call prior to a conversationD.

Placing a modem prior to a conversation

E.None of the above Discuss in Forum

48. The first step in troubleshooting many problems is to verify which of the following?A.

The subnet mask is valid

B.TCP/IP is installed correctly on the clientC.The WINS server is runningD.

The BDC is operable

E.None of the above Discuss in Forum

49. You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask

Page 30: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

should you use?A.

255.255.192.0 B.255.255.224.0

C.255.255.240.0 D.255.255.248.0E.255.255.255.0 Discuss in Forum

50. Which of the following files is used for NetBIOS name resolution?A.

HOSTS

B.LMHOSTSC.ARPD.

FQDN

E.None of the above

1. What protocol is used between E-Mail servers?A.FTP B.SMTPC.SNMP D.POP3 Discuss in Forum

Page 31: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

2. If you configure the TCP/IP address and other TCP/IP parameters manually, you can always verify the configuration through which of the following? Select the best answer.A.Network Properties dialog boxB.Server Services dialog boxC.DHCPINFO command-line utilityD.Advanced Properties tab of TCP/ IP Info.E.None of the above Discuss in Forum

3. In a PC to telephone hookup for long distance communication, modem is connected between the telephone line andA.PCB.synchronous portC.crossover cableD.asynchronous portE.None of the above Discuss in Forum

4. Which of the following communications service provides message preparation and transmission facilities?A.TeletexB.TeletextC.x400D.FaxE.None of the above Discuss in Forum

5. Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?A.4B.8C.15D.16E.None of the above

6. A hard copy would be prepared on aA.typewriter terminalB.line printerC.plotterD.All of the aboveE.None of the above Discuss in Forum

7. Which of the following device copies electrical signals from one Ethernet to another?A.bridgeB.repeaterC.hubD.passive hubE.None of the above

Page 32: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

Discuss in Forum

8. Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?A.Peer-to-peerB.Master domainC.Server-basedD.WANE.Share-level Discuss in Forum

9. When UPC is used, the price of the item is locatedA.on the itemB.on the item and on the shelfC.in computer storageD.on the shelf and in computer storageE.None of the above Discuss in Forum

10. Error control is needed at the transport layer because of potential errors occurring _____.A.

from transmission line noise

B.in routersC.from out-of-sequence deliveryD.

from packet losses.

11. The transport layer protocol is connectionless.A.

NVT

B.FTPC.TCPD.

UDP

E.None of the above Discuss in Forum

12. The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/areA.

universal accessibility for private network Data Terminal Equipment (DTE)

B.adequate cost control mechanisms for administration of the private networksC.to assign address to private network DTEsD.

a and b both

E.None of the above Discuss in Forum

Page 33: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

13. Communication between computers is almost alwaysA.

serial

B.parallelC.series parallelD.

direct

E.None of the above Discuss in Forum

14. Which of the following is considered a broadband communications channel?A.

coaxial cable

B.fiber optic cableC.microwave circuitsD.

satellites systems

E.All of the above Discuss in Forum

15. Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost.A.

P I (K + 1)

B.KIK (1 + F)C.1/ (1 - F)D.

K I (K - P)

E.None of the above16. Which of the following characteristics is not true of NetBEUI?

A.

Highly-customizable

B.RoutableC.Little configuration requiredD.

Fast for small networks to Self-tuning

Discuss in Forum

17. The difference between a multiplexer and a statistical multiplexer isA.

Statistical multiplexers need buffers while multiplexers do not need buffers

B.Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol

C.Multiplexers often waste the output link capacity while statistical multiplexers optimize its use

D.

Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)

E.None of the above Discuss in Forum

Page 34: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

18. You are trying to decide which type of network you will use at your office, and you want the type that will provide communication and avoid collisions on the cable. Which of the following is the best choice?A.

Token-Ring B.CSMA/CD

C.Ethernet D.CSMA/CAE.ARCnet Discuss in Forum

19. Which of the following network access standard is used for connecting stations to a packet-switched network?A.

X.3

B.X.21C.X.25D.

X.75

E.None of the above Discuss in Forum

20. Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:A.

TCP/IP

B.ProtocolC.Open SystemsD.

Internetwork processor

21. A decrease in magnitude of current, voltage, a power of a signal in transmission between points, is known asA.

Attenuation

B.AmplitudeC.AlohaD.

Carrier

E.None of the above Discuss in Forum

22. The term "remote job entry" relates toA.

batch processing

B.realtime processingC.transaction processingD.

distributed processing

E.None of the above Discuss in Forum

Page 35: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

23. Which of the following performs modulation and demodulation?A.

fiber optic

B.satelliteC.coaxial cableD.

modem

E.None of the above Discuss in Forum

24. Data communications monitors available on the software market includeA.

ENVIRON/1

B.TOTALC.BPLD.

Telenet

E.None of the above Discuss in Forum

25. Which of the following statement is correct?

A.

A spin stabilized satellite used solar cells mounted on a cylinder body that continuously rotates so that 40 a time and it also uses gyroscopic action of a spinning satellite to maintain its orientation towards the earth and the sun.

B.A spin stabilized satellite uses solar panels whose cells are continually oriented toward the sun

C.Satellite transponders use lower frequency reception of radiation from earth stations and higher frequency for transmission to earth stations.

D.

satellite transponders use a single frequency for reception and transmission from one point on earth to another

E.None of the above26. What is the default subnet mask for a class A network?

A.

127.0.0.1

B.255.0.0.0C.255.255.255.0.0D.

255.255.255.0

E.None of the above Discuss in Forum

27. When using the loopback address, if TCP/IP is installed correctly, when should you receive a response?A.

Immediately

B.Only if the address failsC.After the next host comes onlineD Within two minutes

Page 36: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

28. Which of the following statement is correct?A.

Satellite transponders contain a receiver and transmitter designed to relay microwave transmissions from one point on earth to another.

B.Satellite transponders contain a device that echos the radiation without change from one point on earth to another.

C.Satellite transponder contains devices that transform the message sent from one location on earth to a different code for transmission to another location.

D.

Satellite transponders use lower frequency reception of radiation from earth stations and higher frequency for transmission to earth stations

E.None of the above Discuss in Forum

29. The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer:A.

Internetworked enterprise

B.Information super highwayC.Business applications of telecommunicationsD.

Client/Server networks

E.None of the above Discuss in Forum

30. The data communication support should include, but is not restricted toA.

file transfer and transaction processing

B.file and database accessC.terminal support, electronic mail and voice grams.D.

All of the above

31. MAC isA.

a method of determining which device has access to the transmission medium at any time

B.a method access control technique or multiple-access transmission mediaC.a very common bit-oriented data link protocol issued to ISO.D.

network access standard for connecting stations to a circuit-switched network

E.None of the above Discuss in Forum

32. What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?A.

Teleport

B.Modem

Page 37: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.MultiplexerD.

Concentrator

E.None of the above Discuss in Forum

33. You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?A.

255.255.192.0 B.255.255.224.0

C.255.255.240.0 D.255,255.248.0E.255.255.252.0 Discuss in Forum

34. Which application allows a user to access and change remote files without actual transfer?A.

TELNET

B.NFSC.FTPD.

DNS

E.None of the above Discuss in Forum

35. Parity bit isA.

an error-detecting code based on a summation operation performed on the bits to be checked.

B.a check bit appended to an array of binary digits to make the sum of all the binary digits.

C.a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors in detected

D.

the ratio of the number of data units in error to the total number of data units

E.None of the above36. Which of the following file retrieval methods use hypermedia?

A.

HTTP

B.WAISC.VeronicaD.

Archie

E.None of the above Discuss in Forum

37. Which IP address class has few hosts per network?A.

D

Page 38: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

B.CC.BD.

A

E.None of the above Discuss in Forum

38. Microprogramming isA.

assembly language programming

B.programming of minicomputersC.control unit programmingD.

macro programming of microcomputers

E.None of the above Discuss in Forum

39. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 12 hosts and a maximum number of subnets?A.

255.255.255.192

B.255.255.255.224C.255.255.255. 240D.

255.255.255.248

E.255.255.255.252 Discuss in Forum

40. Which of the following statements is incorrect?A.

Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line.

B.HDLC is a standard synchronous communication protocol.

C.RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCE indicates that it is ready to accept data.

D.

RTS/CTS is the way the terminal indicates ringing

E.None of the above41. If communication software can be called the "traffic cop" of a micro communication system,

then what should the modem be called?A.

Park

B.BridgeC.InterfaceD.

Link

E.None of the above Discuss in Forum

42. Which of the following specifies the network address and host address of the computer?

Page 39: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

A.

The IP address

B.The TCP addressC.The subnet maskD.

The default gateway

E.None of the above Discuss in Forum

43. For connecting modem, a computer must be equipped with a port that conforms to the RS-232 standard of the Electronic Industries Association of America. What do the letters 'RS' stand for?A.

Recognised standard

B.Random sequenceC.Recommended standardD.

Registered source

E.None of the above Discuss in Forum

44. A network that requires human intervention of route signals is called aA.

bus network

B.ring networkC.star networkD.

T-switched network

E.None of the above Discuss in Forum

45. What is the port number for POP3?A.

110 B.90

C.80 D.4946. Which of the following provides a storage mechanism for incoming mail but does not allow a

user to download messages selectively?A.

SMTP B.DHCP

C.IMAP D.POP3 Discuss in Forum

47. On a class C network with a subnet mask of 192, how many subnets are available?A.

254 B.62

C.30 D.14E.2 Discuss in Forum

Page 40: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

48. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.A.

Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

B.Ethernet, because it is cabled using fiber-optic cableC.Token-Ring, because it uses a MAUD.

Ethernet, because it can be set up with most topologies and can use multiple transfer speeds

E.Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies

Discuss in Forum

49. A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is used.A.

500 Kbps

B.32 KbpsC.8 KbpsD.

64 Kbps.

Discuss in Forum

50. How can you see the address of the DHCP server from which a client received its IP address?A.

By using Advanced Properties of TCP/IP

B.By using IPCONFIG/ALLC.By using DHCPINFOD.

By pinging DHCP

E.None of the above

1. In a synchronous modem, the receive equalizer is known asA.adaptive equalizerB.impairment equalizerC.statistical equalizerD.compromise equalizerE.None of the above Discuss in Forum

2. Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so?A.Server-based B.Token-RingC.Ethernet D.Star

Page 41: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.Peer-to-peer Discuss in Forum

3. Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose?A.KeyboardB.ModemC.ScannerD.FaxE.None of the above Discuss in Forum

4. To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developingA.communication systemsB.multiprogramming systemsC.virtual storage systemsD.All of the aboveE.None of the above Discuss in Forum

5. Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?A.Unique to that subnet onlyB.For different subnetsC.For no more than two subnetsD.For no subnetsE.None of the above

Exercise

Section 1 Section 2 Section 3 Section 4 Section 5 Section 6 Section 7 Section 8 Section 9

"Everything you can imagine is real."- Pablo Picasso6. The main difference between TCP and UDP is

A.UDP is connection oriented where as TCP is datagram serviceB.TCP is an Internet protocol where as UDP is an ATM protocol

Page 42: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.UDP is a datagram where as TCP is a connection oriented serviceD.All of the above Discuss in Forum

7. What operates in the Data Link and the Network layer?A.NICB.BridgeC.BrouterD.RouterE.None of the above Discuss in Forum

8. What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoingions?A.E-mailB.Bulletin board system (BBS)C.TeleconferencingD.VideoconferencingE.None of the above Discuss in Forum

9. Which of the following statement is incorrect?

A.The CCITT Recommendation X.25 specifies three layers of communication: physical, link and network.

B.The second layer of communication is the data-link layerC.Errors in the physical layer can be detected by the data link layerD.The fourth layer, in reference to the OSI model, is the session layerE.None of the above Discuss in Forum

10. Devices on one network can communicate with devices on another network via aA.file serverB.utility serverC.printer serverD.gatewayE.None of the above

11.  After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?A.

Telex

B.Word processorC.FacsimileD.

Electronic mail

Page 43: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above

12. Which file transfer protocol uses UDP?A.

NFS

B.TELNETC.TFTPD.

FTP

E.None of the above

13. You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?A.

255.255.255.0 B.255.255.255.224

C.255.255.255.240 D.255.255.255.248E.255.255.255.252 Discuss in Forum

14. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would beA.

5

B.10C.20D.

32

E.None of the above

15. Which of the following medium access control technique is used for bus/tree?A.

token ring

B.token busC.CSMAD.

MAC

E.None of the above

6. A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:A.ring networkB.spider networkC.hierarchical networkD.data control networkE.None of the above Discuss in Forum

Page 44: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

17. The size or magnitude of a voltage or current waveform isA.

Amplitude

B.AlohaC.Angle ModulationD.

Attenuation

E.None of the above Discuss in Forum

18. Which of the following network access standard is used for connecting stations to a circuit-switched network?A.

X.3

B.X.21C.X.25D.

X.75

E.None of the above Discuss in Forum

19. Which of the following is not a transmission medium?A.

telephone lines

B.coaxial cableC.modemD.

microwave systems

E.satellite systems Discuss in Forum

20. Which of the following statement is incorrect?A.

Gateways are assumed to know correct routes; hosts begin with minimal routing information and learn new routes from gateways.

B.Layered protocols are designed so that layer n at the destination receives exactly the same object sent by layer n at the source.

C.Application programs as well as all protocol software from the Internet layer upward use only IP addresses; the network interface layer handles physical addresses.

D.

All of the above

E.None of the above

21. A batch processing terminal would not include aA.

CPU

Page 45: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

B.card readerC.card punchD.

line printer

E.None of the above Discuss in Forum

22. Packet Switch Stream (PSS) was introduced inA.

the US in 1961 (6) the UK in 1981

B.the UK in 1971C.the US in 1961D.

None of the above

Discuss in Forum

23. The physical layer of a networkA.

defines the electrical characteristics of signals passed between the computer and communication devices

B.controls error detection and correctionC.constructs packets of data and sends them across the networkD.

All of the above

E.None of the above Discuss in Forum

24. Which of the following allows devices on one network to communicate with devices on another network?A.

multiplexer

B.gatewayC.t-switchD.

modern

E.None of the above Discuss in Forum

25. An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known asA.

Cyclic redundancy check

B.ChecksumC.Error detecting codeD.

Error rate

E.None of the above26. Bulletin board system

A.

is a public access message system

Page 46: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

B.is a modem capable of accepting commandsC.converts analog signals to digital signalsD.

converts digital signals to analog signals

E.None of the above Discuss in Forum

27. In OSI model, which of the following layer provides error-free delivery of data?A.

Data link

B.NetworkC.transportD.

Session

E.None of the above Discuss in Forum

28. Error detection at the data link level is achieved by?A.

Bit stuffing

B.Hamming codesC.Cyclic Redundancy codesD.

Equalization

E.None of the above Discuss in Forum

29. The area of coverage of a satellite radio beam is known asA.

Footprint

B.Circular polarizationC.Beam widthD.

Identity

E.None of the above Discuss in Forum

30. Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?A.

Hardwiring

B.MicrowaveC.SatelliteD.

Laser

E.None of the above1.  What is the minimum number of wires needed to send data over a serial communication link

layer?A 1

Page 47: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.2C.4D.

6

E.none of the above Discuss in Forum

32. The _____ layer is the layer closest to the transmission medium.A.

transport

B.networkC.data linkD.

physical

E.None of the above Discuss in Forum

33. What is the name of the device that connects two computers by means of a telephone line?A.

Tape

B.modemC.busD.

cable

E.None of the above Discuss in Forum

34. What is the main difference between DDCMP and SDLG?A.

DDCMP does not need special hardware to final the beginning of a message.

B.DDCMP has a message headerC.SDLC has a IP addressD.

SDLC does not use CRC

E.None of the above Discuss in Forum

35. On a class B network, how many subnets are available with a subnet mask of 248?A.

2 B.6

C.30 D.62E.126

36. Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.A.

Network collisions occur

B.Repeaters cannot increase the signal strength sufficiently

Page 48: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.Cable terminators do not reflect the signal properlyD.

Cable terminators do not absorb the signal properly

E."Line echo" occurs due to the impedance of the cable Discuss in Forum

37. In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.A.

ring

B.busC.starD.

mesh

E.None of the above Discuss in Forum

38. Typewriter terminals can print computer-generated data at a rate ofA.

10 characters per second

B.120 characters per secondC.120 characters per minuteD.

1200 characters per minute

E.None of the above Discuss in Forum

39. To avoid transmission errors, a check figure is calculated by theA.

transmitting computer

B.receiving computerC.both (a) and (b)D.

Start and stop bit

E.None of the above Discuss in Forum

40. What is the first octet range for a class A IP address?A.

1 - 126

B.192 - 255C.192 - 223D.

1 - 127

E.

128 – 19141. Which of the following is not a standard synchronous communication protocol?

A.

SDLC

B.SMTP

Page 49: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.SLIPD.

PAS

E.None of the above Discuss in Forum

42. The network layer, in reference to the OSI model, provideA.

data link procedures that provide for the exchange of data via frames that can be sent and received

B.the interface between the X.25 network and packet mode deviceC.the virtual circuit interface to packet-switched serviceD.

All of the above

E.None of the above Discuss in Forum

43. In OSI network architecture, the routing is performed byA.

network layer

B.data link layerC.transport layerD.

session layer

E.None of the above Discuss in Forum

44. Which of the following communications lines is best suited to interactive processing applications?A.

narrowband channels

B.simplex linesC.full-duplex linesD.

mixed band channels

E.None of the above Discuss in Forum

45. What is the first octet range for a class B IP address?A.

128 - 255

B.1 - 127C.192 - 223D.

128 - 191

E.127 - 19146. The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in

dotted decimal notation asA.

148.20.2.30

Page 50: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

B.164.100.9.61C.210.20.2.64D.

128.10.2.30

E.None of the above Discuss in Forum

47. Which of the following items is not used in Local Area Networks (LANs)?A.

Computer

B.ModemC.PrinterD.

Cable

E.None of the above Discuss in Forum

48. Error detection at a data link level is achieved byA.

bit stuffing

B.cyclic redundancy codesC.Hamming codesD.

equalization

E.None of the above Discuss in Forum

49. RS-232-GA.

is an interface between two data circuit terminating equipment as examplified by a local and remote modem

B.is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment

C.specifies only the mechanical characteristics of an interface by providing a 25-pin connector

D.

requires only 7 pin out of 25 in order to transmit digital data over public telephone lines

E.None of the above Discuss in Forum

50. A subdivision of main storage created by operational software is referred to as a:A.

compartment

B.time-shared programC.divided coreD.

partition

E.None of the above

Page 51: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

1. RS-449/442-A/423-A isA.a set of physical layer standards developed by EIA and intended to replace RS-232-C.B.a check bit appended to an array of binary digits to make the sum of the all the binary digits

C.a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected

D.the ratio of the number of data units in error to the total number of data unitsE.None of the above Discuss in Forum

2. Which of the following digits are known as the area code of the Network User Address (NUA)?A.5-7B.1-4

Page 52: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.8-12D.13-14E.None of the above Discuss in Forum

3. End-to-end connectivity is provided from host-to-host in:A.Network layerB.Session layerC.Data link layerD.Transport layerE.None of the above Discuss in Forum

4. A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known asA.AlohaB.Angle modulationC.Amplitude modulationD.modemE.None of the above Discuss in Forum

5. CSMA (Carrier Sense Multiple Access) isA.a method of determining which device has access to the transmission medium at any timeB.a method access control technique for multiple-access transmission media.C.a very common bit-oriented data link protocol issued by ISO.D.network access standard for connecting stations to a circuit-switched networkE.None of the above

6. Which of the following summation operation is performed on the bits to check an error-detecting code?A.CodecB.Coder-decoderC.ChecksumD.AttenuationE.None of the above Discuss in Forum

7. The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.A.TCP/IPB.ProtocolC.Open SystemsD.Internetwork processor Discuss in Forum

8. Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?A.Linear busB.Modified star

Page 53: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.Modified ringD.RingE.Hybrid hub Discuss in Forum

9. A communications device that combines transmissions from several 1/ O devices into one line is a:A.concentratorB.modifierC.multiplexerD.full-duplex lineE.None of the above Discuss in Forum

10. The main difference between synchronous and asynchronous transmission isA.

the clocking is derived from the data in synchronous transmission

B.the clocking is mixed with the data in asynchronous transmissionC.the pulse height is different.D.

the bandwidth required is different

E.None of the above11. ARP (Address Resolution Protocol) is

A.

a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address

B.a TCP/IP high level protocol for transferring files from one machine to anotherC.a protocol used to monitor computersD.

a protocol that handles error and control messages

E.None of the above Discuss in Forum

12. Which of the following uses network address translation?A.

Routers

B.Network adapter driversC.HubsD.

Windows 95

Discuss in Forum

13. The X.25 standard specifies aA.

technique for start-stop data

B.technique for dial accessC.DTE/DCE interfaceD.

data bit rate

E.None of the above

Page 54: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

Discuss in Forum

14. The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer.A.

Duplicate addresses

B.Duplicate poolsC.Duplicate subnetsD.

Duplicate default gateways

E.None of the above Discuss in Forum

15. When a group of computers is connected together in a small area without the help of telephone lines, it is calledA.

Remote communication network (RCN)

B.Local area network(LAN)C.Wide area network (WAN)D.

Value added network (VAN)

E.None of the above16. The 802.5 standard implements a way for preventing collisions on the network. How are

collisions prevented when using this standard?A.

CSMA/CD

B.Token passingC.Collision detectionD.

Time sharing

E.Switched repeaters Discuss in Forum

17. A communication network which is used by large organizations over regional, national or global area is calledA.

LAN

B.WANC.MAND.

Intranet

E.None of the above Discuss in Forum

18. Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer:A.

TCP/IP

Page 55: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

B.ProtocolC.Open SystemsD.

Internetwork processor

Discuss in Forum

19. Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?A.

RARP

B.FTPC.TFTPD.

TELNET

E.None of the above Discuss in Forum

20. Terminals are required forA.

realtime, batch processing, and timesharing

B.realtime, timesharing, and distributed processingC.realtime, distributed processing, and manager inquiryD.

realtime, timesharing, and message switching

E.None of the above21. Sending a file from your personal computer's primary memory or disk to another computer is

calledA.

uploading

B.downloadingC.logging onD.

hang on

Discuss in Forum

22. Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?A.

Telemeeting

B.TelemailingC.TeleconferencingD.

Teletalking

E.None of the above Discuss in Forum

23. What frequency range is used for microwave communications, satellite and radar?A Low Frequency : 30 kHz to 300 kHz

Page 56: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.Medium Frequency : 300 kHz to 3 MHzC.Super High Frequency : 3000 MHz to 30000 MHzD.

Extremely High Frequency :30,000 MHz

E.None of the above Discuss in Forum

24. Which of the following statements is incorrect?A.

The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission

B.Half-duplex line is a communication line in which data can move in two directions, but not at the same time.

C.Teleprocessing combines telecommunications and DP techniques in online activities.D.

Batch processing is the preferred processing mode for telecommunication operations

E.None of the above Discuss in Forum

25. If the ASCII character H is sent and the character I is received, what type of error is this?A.

single-bit B.multiple-bit

C.burst D.recoverable26. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital

signals. If Delta modulation is selected, then how many bits per second are actually sent?A.

32 kbps

B.8 kbpsC.128 kbpsD.

64 kbps.

Discuss in Forum

27. UDP is:A.

Not a part of the TCP/IP suite

B.Connection oriented and unreliableC.Connection orientated and reliableD.

Connectionless and unreliable

Discuss in Forum

28. The interactive transmission of data within a time sharing system may be best suited toA.

simplex lines

B.half-duplex linesC.full-duplex linesD.

biflex-line

Page 57: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

29. What OSI layer handles logical address to logical name resolution?A.

Transport

B.PhysicalC.PresentationD.

Data Link

Discuss in Forum

30. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?A.

A logical address that identifies the workstation

B.A physical address that is randomly assigned each time the computer is startedC.A physical address that is assigned by the manufacturerD.

The logical domain address for the workstation

E.An alias for the computer name31. Which of the following is an example of a client-server model?

A.

TELNET

B.FTPC.DNSD.

All of the above

E.None of the above Discuss in Forum

32. In CRC there is no error if the remainder at the receiver is _____.A.

the quotient at the sender

B.nonzeroC.zeroD.

equal to the remainder at the sender

E.None of the above. Discuss in Forum

33. A WATS arrangementA.

is always less expensive than flat-rate service

B.is less expensive than flat-rate service only when the number of calls is large and the duration of each is short

C.is less expensive than flat-rate service only when the number of calls is small and the duration of each is long

D is never less expensive than flat-rate service

Page 58: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

34. A T-switch is used toA.

control how messages are passed between computers

B.echo every character that is receivedC.transmit characters one at a timeD.

rearrange the connections between computing equipment

E.None of the above Discuss in Forum

35. A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:A.

Internet works

B.The InternetC.Internet revolutionD.

Internet technologies

E.None of the above36. Alice is setting up a small network in her home so that she can study for her MCSE exams.

She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?A.

Star B.Right

C.Token-Ring D.EthernetE.Bus Discuss in Forum

37. The CCITT Recommendation X.25 specifies three layers of communications:A.

application, presentation and session

B.Session, transport and networkC.physical datalink and networkD.

datalink, network and transport

Discuss in Forum

38. Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?A.

Amplitude modulation

B.Frequency-division multiple accessC.Frequency modulationD Frequency-shift keying

Page 59: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

39. The amount of uncertainty in a system of symbol is calledA.

Bandwidth

B.EntropyC.lossD.

Quantum

E.None of the above Discuss in Forum

40. Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?A.

IMAP B.DHCP

C.SMTP D.FTPE.POP3

41. What does 192 translate to in binary?A.

11000000

B.00111110C.00001111D.

00000011

E.None of the above Discuss in Forum

42. An information utility can offer a userA.

instant bonds and stock quotations

B.news stories from wire servicesC.complete airline schedules for all domestic flightsD.

All of the above

E.None of the above Discuss in Forum

43. An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer:A.

Network Server

B.Virtual Private NetworkC.Network operating systemD.

OSI

Discuss in Forum

Page 60: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

44. Many large organizations with their offices in different countries of the world connect their computers through telecommunication satellites and telephone lines. Such a communication network is calledA.

LAN

B.WANC.ECONETD.

EITHERNET

E.None of the above Discuss in Forum

45. A network which is used for sharing data, software and hardware among several users owning microcomputers is calledA.

WAN

B.MANC.LAND.

VAN

E.None of the above46. In geosynchronous orbit, satellite

A.

remains in a fixed position so that as earth rotates, it can fully cover the earth

B.remains in a fixed position related to points on earthC.moves faster than the earth's rotation so that it can cover larger portion of earth.D.

moves simultaneously

E.None of the above Discuss in Forum

47. A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:A.

Internetworked enterprise

B.Information super highwayC.Business applications of telecommunicationsD.

Client/Server networks

Discuss in Forum

48. What does 240 translate to in binary?A.

11110000

B.00011110C.00001111D 11100000

Page 61: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

49. You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?A.

255.224.0.0 B.255.240.0.0

C.255.248.0.0 D.255.252.0.0E.255.254.0.0 Discuss in Forum

50. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.A.

2 (m - 2)

B.2 (2m - 1)C.m - 1D.

(2m - l)/mJ

1. Most networks are connected to other local area or wide area networks. Select the best fit for answer:A.Internet worksB.The InternetC.Internet revolutionD.Internet technologies Discuss in Forum

2. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per

Page 62: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

subnet. What subnet mask should you use?A.255.255.192.0 B.255.255.224.0C.255.255.240.0 D.255.255.248.0E.255.255.252.0 Discuss in Forum

3. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the maximum possible transmission rate?A.1.5 Mbaud/secB.6 Mband/secC.12 Mbaud/secD.24 Mbaud/secE.None of the above Discuss in Forum

4. Which of the following digits are known as the sub-address digits (for use by the user) of the Network User Address (NUA)?A.5-7B.1-4C.8-12D.13-14E.None of the above Discuss in Forum

5. Error detecting code is

A.an error-detecting code based on a summation operation performed on the bits to be checked

B.a check bit appended to an array of binary digits to make the sum of all the binary digits.

C.a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the error is detected.

D.the ratio of the data units in error to the total number of data unitsE.None of the above

6. A modulator converts a _____ signal to a(n) _____ signal.A.FSK; PSKB.PSK; FSKC.analog; digitalD.digital; analogE.None of the above Discuss in Forum

7. The birthplace of the World Wide Web is considered to beA.the Department of DefenseB.CERNC.ARPAD.NetscapeE.None of the above Discuss in Forum

Page 63: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

8. You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?A.Fast SCSI WideB.Token-RingC.ArcServeD.EthernetE.None of the above Discuss in Forum

9. What is the loopback address?A.127.0.0.1B.255.0.0.0C.255.255.0.0D.255.255.255.255.0E.None of the above Discuss in Forum

10. An ROP would be attached to aA.

simplex channel

B.duplex channelC.half duplex channelD.

full duplex channel

E.None of the above11. Who originally designed TCP/IP?

A.

The Department of Defense

B.NovellC.IBMD.

Xerox

Discuss in Forum

12. The systematic access of small computers in a distributed data processing system is referred to as:A.

dialed service

B.multiplexingC.pollingD.

conversational mode

E.None of the above Discuss in Forum

13. The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as:A modulation

Page 64: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.demodulationC.synchronizingD.

synchronizing

E.None of the above Discuss in Forum

14. An example of digital, rather than analog, communication isA.

DDD

B.DDSC.WATSD.

DDT

E.None of the above Discuss in Forum

15. How many OSI layers are covered in the X.25 standard?A.

two

B.threeC.sevenD.

six

E.None of the above16. A band is always equivalent to

A.

a byte

B.a bitC.100 bitsD.

16 bits

E.None of the above Discuss in Forum

17. What is the port number for HTTP?A.

99 B.86

C.80 D.23 Discuss in Forum

18. The most flexibility in how devices are wired together is provided byA.

bus networks

B.ring networksC.star networksD.

T-switched networks

Page 65: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

19. Which of the following statement is incorrect?A.

The transport layer provides for any format, translationer code conversion necessary to put the data into an intelligible format.

B.The presentation layer transforms information from machine format to the understandable format.

C.The data link layer handles the transfer of data between the ends of a physical link.D.

All of the above

E.None of the above Discuss in Forum

20. When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?A.

Security procedure

B.Safeguard procedureC.Identification procedureD.

Log-on procedure

E.None of the above21. Bus is

A.

one or more conductors that some as a common connection for a related group of devices

B.a continuous frequency capable of being modulated or impressed with a second signalC.the condition when two or more stations attempt to use the same channel at the same timeD.

a collection of interconnected functional units that provides a data communications service among stations attached to the network

E.None of the above Discuss in Forum

22. Which of the following medium is used for broadband local networks?A.

Coaxial cable

B.optic fiberC.CATVD.

UTP

E.None of the above Discuss in Forum

23. In cyclic redundancy checking what is the CRC?A.

the divisor

B.the quotientC.the dividend

Page 66: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

D.

the remainder

Discuss in Forum

24. What is the maximum number of entries in the HOSTS file?A.

8

B.255C.500D.

Unlimited

E.None of the above Discuss in Forum

25. The communication mode that supports data in both directions at the same time isA.

simplex

B.half-duplexC.full-duplexD.

multiplex

E.None of the above26. Which of the following program is used to copy files to or from another UNIX timesharing

system over a single link?A.

VMTP

B.TFTPC.UUCPD.

UART

E.None of the above Discuss in Forum

27. One important characteristic of the hub architecture of ARC-net isA.

directionalized transmission

B.access control and addressingC.multiple virtual networksD.

alternative routing

E.None of the above Discuss in Forum

28. The basic Ethernet design does not provideA.

access control

B.addressingC.automatic retransmission of a messageD multiple virtual networks

Page 67: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

29. Phase shift keying (psk) method is used to modulate digital signals at 9600 bps using 16 levels. Find the line signaling speed (i.e., modulation rate)A.

2400 bands

B.1200 bandsC.4800 bandsD.

9600 bands.

Discuss in Forum

30. You are in the process of analyzing a problem that requires you to collect and store TCP/IP Packets. Which of the following utilities is best suited for this purpose?A.

NBTSTAT

B.Performance MonitorC.NETSTATD.

Network Monitor

E.DHCP Management Console31. A software that allows a personal computer to pretend it as a terminal is

A.

auto-dialing

B.bulletin boardC.modemD.

terminal emulation

E.None of the above Discuss in Forum

32. What is the name of the network topology in which there are bi-directional links between each possible node?A.

Ring

B.StarC.TreeD.

Mesh

E.None of the above Discuss in Forum

33. What is the main purpose of a data link content monitor?A.

to detect problems in protocols

B.to determine the type of transmission used in a data linkC.to determine the type of switching used in a data link.

Page 68: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

D.

to determine the flow of data

Discuss in Forum

34. Synchronous protocolsA.

transmit characters one at a time

B.allow faster transmission than asynchronous protocols doC.are generally used by personal computersD.

are more reliable

E.None of the above Discuss in Forum

35. To set up a bulletin board system you needA.

a smart modem with auto-answer capabilities

B.a telephone lineC.a personal computerD.

All of the above

E.None of the above36. Videotex is a combination of

A.

television

B.communicationC.computer technologyD.

All of the above

E.None of the above Discuss in Forum

37. Which of the following frequency ranges is used for AM radio transmission?A.

Very Low Frequency : 3 kHz to 30 kHz

B.Medium Frequency : 300 kHz to 3 MHzC.High Frequency : 3 MHz to 30 MHzD.

Very High Frequency : 30 MHz to 300 MHz

E.None of the above Discuss in Forum

38. Baseband isA.

transmission of signals without modulation

B.a signal all of whose energy is contained within a finite frequency rangeC.the simultaneous transmission of data to a number of stationsD.

All of the above

Page 69: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

39. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent?A.

32 Kbps

B.64 KbpsC.8 KbpsD.

128 Kbps.

Discuss in Forum

40. X.21 isA.

a method of determining which device has access to the transmission medium at any time

B.a method access control technique for multiple-access transmission mediaC.a very common bit-oriented data link protocol issued by ISOD.

network access standard for connecting stations to a circuit-switched network

E.None of the above41. What is the minimum number of wires required for sending data over a serial

communications links?A.

2

B.1C.4D.

3

E.None of the above Discuss in Forum

42. In cyclic redundancy checking, the divisor is _____ the CRC.A.

the same size as

B.one bit less thanC.one bit more thanD.

two bits more

Discuss in Forum

43. Which command-line tool is included with every Microsoft TCP/IP client?A.

DHCP

B.WINSC.PINGD.

WINIPCFG

Page 70: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

44. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.A.

even B.odd

C.indeterminate D.42 Discuss in Forum

45. An error-detecting code inserted as a field in a block of data to be transmitted is known asA.

Frame check sequence

B.Error detecting codeC.ChecksumD.

flow control

46. Number of bits per symbol used in Baudot code isA.

1

B.5C.8D.

9

E.None of the above Discuss in Forum

47. Working of the WAN generally involvesA.

telephone lines

B.microwavesC.satellitesD.

All of the above

E.None of the above Discuss in Forum

48. What does the acronym ISDN stand for?A.

Indian Standard Digital Network

B.Integrated Services Digital NetworkC.Intelligent Services Digital NetworkD.

Integrated Services Data Network

E.None of the above Discuss in Forum

49. Which of the following services dynamically resolves NetBIOS-to-IP resolution?A DNS

Page 71: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.B.DHCPC.WINSD.

LMHOSTS

E.None of the above Discuss in Forum

50. An example of a medium-speed, switched communications service isA.

Series 1000

B.Dataphone 50C.DDDD.

All of the above

E.

None of the above

1.  A devices that links two homogeneous packet-broadcast local networks, isA.

gateway

B.repeaterC.bridgeD.

hub

E.None of the aboveAnswer & Explanation

Answer: Option C

2. A computer that handles resource sharing and network management in a local area network. Select the best fit for answer:A.Network ServerB.Virtual Private NetworkC.Network operating systemD.OSI Discuss in Forum

3. Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used?A.Five B.TwoC.Four D.SixE.Three Discuss in Forum

Page 72: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

4. How much power (roughly) a light-emitting diode can couple into an optical fiber?A.100 microwattsB.440 microwattsC.100 picowattsD.10 milliwattsE.None of the above Discuss in Forum

5. A modem that is attached to the telephone system by jamming the phone's handset into two flexible receptacles in the coupler?A.gatewayB.bridgeC.acoustic couplerD.time-division multiplexerE.None of the above

6. With telecommunications and a personal computer you canA."download" free public domain programsB.send letters to be printed and delivered by the post officeC.order goods at a substantial discountD.All of the aboveE.None of the above Discuss in Forum

7. Which of the following statement is correct?A.Teleprinters are used for printing at remote locations, not for input.B.Teleprinters are same as teletypesC.Teleprinters are same as x400D.Teleprinters have a printer for output and keyboard for inputE.None of the above Discuss in Forum

8. What does 224 translate to in binary?A.11110000B.00011110C.00001111D.11100000E.None of the above Discuss in Forum

9. What can cause a problem with communication with a client by name but not by IP address?A.The IP addressB.Static files such as an LMHOSTS file or a DNS database

Page 73: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.Subnet maskD.The default gatewayE.None of the above Discuss in Forum

10. Layer one of the OSI model isA.

physical layer

B.link layerC.transport layerD.

network layer

E.None of the above11. What is the term used to describe addresses available on a DHCP server?

A.

Pools

B.ScopesC.RangesD.

Notes

E.None of the above Discuss in Forum

12. Which of the following signals is not standard RS - 232-C signal?A.

VDR

B.RTSC.CTSD.

DSR

E.None of the above Discuss in Forum

13. What is the default subnet mask for a class B network?A.

127.0.01

B.255.0.0.0C.255.255.0.0D.

255.255.255.0

E.None of the above Discuss in Forum

14. Which of the following files is used for NetBIOS name resolution?A.

HOSTS

B.LMHOSTSC.ARPD FQDN

Page 74: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

15. In CRC the quotient at the senderA.

becomes the dividend at the receiver

B.becomes the divisor at the receiverC.is discardedD.

is the remainder

16. How many pairs of stations can simultaneously communicate on Ethernet LAN?A.

1

B.2C.3D.

multiple

E.None of the above Discuss in Forum

17. The OCR reading unit attached to a POS terminal is called aA.

light pen

B.wandC.cursorD.

All of the above

E.None of the above Discuss in Forum

18. A protocol is a set of rules governing a time sequence of events that must take placeA.

between peers

B.between modemsC.between an interfaceD.

across an interface

E.None of the above Discuss in Forum

19. The coming together of three technologies i.e. microelectronics, computing and communications has ushered inA.

information explosion

B.information technologyC.business revolutionD.

educational upgradation

Page 75: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

20. Terminals are used toA.

collect data from the physical system

B.provide information for the managerC.communicate management decisions to the physical systemD.

All of the above

E.None of the above21. Sales persons and other employees of the company who spend much of their time away from

their offices but keep in touch with their company's microcomputers or main frame computers over telephone lines are calledA.

field workers

B.telecommutersC.teleprocessorsD.

company directors

E.None of the above Discuss in Forum

22. What is the standard protocol for network management features?A.

SNA B.FTP

C.SNMP D.SMS Discuss in Forum

23. The application layer of a networkA.

establishes, maintains, and terminates virtual circuits

B.defines the user's port into the networkC.consists of software being run on the computer connected to the networkD.

All of the above

E.None of the above Discuss in Forum

24. Brad is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is excellent. Which network(s) would be the best to set up?A.

Peer-to-peer

B.Master domainC.Server-basedD.

Ethernet

Page 76: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.Share-level Discuss in Forum

25. The simultaneous transmission of data to a number of stations is known asA.

broadcast

B.Band widthC.AlohaD.

Analog transmission

E.None of the above26. Most data communications involving telegraph lines use:

A.

simplex lines

B.wideband channelsC.narrowband channelsD.

dialed service

E.None of the above Discuss in Forum

27. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?A.

255.255.224.0 B.255.255.240.0

C.255.255.248.0 D.255.255.252.0E.255.255.255.255 Discuss in Forum

28. Modulation is the process ofA.

sending a file from one computer to another computer

B.converting digital signals to analog signalsC.converting analog signals to digital signalsD.

echoing every character that is received

E.None of the above Discuss in Forum

29. Which multiplexing technique shifts each signal to a different carrier frequency?A.

FDM

B.synchronous TDMC.asynchronous TDMD.

All of the above

Discuss in Forum

30. Which of the following protocol is connection-oriented?

Page 77: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

A.

IPX B.UDP

C.NetBEUI D.TCP31. The loss in signal power as light travels down the fiber is called

A.

attenuation

B.propagationC.scatteringD.

interruption

E.None of the above Discuss in Forum

32. Operating system functions may includeA.

input/output control

B.virtual storageC.multiprogrammingD.

All of the above

E.None of the above Discuss in Forum

33. Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?A.

physical layer

B.data link layerC.transport layerD.

network layer

E.None of the above Discuss in Forum

34. Which of the following might be used by a company to satisfy its growing communications needs?A.

front-end processor

B.multiplexerC.controllerD.

concentrator

E.All of the above Discuss in Forum

35. Different computers are connected to a LAN by a cable and a/anA.

modem

B.interface card

Page 78: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.special wiresD.

telephone lines

E.None of the above36. The Token-Ring architecture was developed for a more efficient way to determine who

should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answerA.

An additional token is added for every 1,000 nodes

B.The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500

C.The network becomes less efficientD.

After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device

E.The network becomes more efficient Discuss in Forum

37. A characteristic of a multiprogramming system is:A.

simultaneous execution of program instructions from two applications

B.concurrent processing of two or more programsC.multiple CPUsD.

All the above

E.None of the above Discuss in Forum

38. When a host knows its physical address but not its IP address, it can use _____.A.

RARP

B.ARPC.IGMPD.

ICMP

E.None of the above Discuss in Forum

39. What is the name given to the exchange of control signals which is necessary for establishing a connection between a modem and a computer at one end of a line and another modem and computer at the other end?A.

Handshaking

B.Modem optionsC.ProtocolD.

Duplexing

E.None of the above

Page 79: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

Discuss in Forum

40. A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer:A.

Fiber optic cables

B.Cellular phone systemsC.Telecommunications processorsD.

Telecommunications software

41. After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration?A.

Ping the broadcast address

B.Ping the Microsoft Web siteC.Ping a distant router.D.

Ping the address of the local host

E.None of the above Discuss in Forum

42. Which utility is useful for troubleshooting NetBIOS name resolution problems?A.

NBTSTAT

B.NetstatC.PINGD.

Hostname

E.None of the above Discuss in Forum

43. The EIA-232 interface has _____ pins.A.

20 B.24

C.25 D.30 Discuss in Forum

44. In OSI model, which of the following layer transforms information from machine format into that understandable by userA.

application

B.presentationC.sessionD.

physical

E.None of the above Discuss in Forum

45. The channel in the data communication model can be

Page 80: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

A.

postal mail service

B.telephone linesC.radio signalsD.

All of the above

E.None of the above46. Which of the following is an important characteristic of LAN?

A.

application independent interfaces

B.unlimited expansionC.low cost access for low bandwidth channelsD.

parallel transmission

E.None of the above Discuss in Forum

47. Which of the following is a wrong example of network layer:A.

Internet Protocol (IP) ARPANET

B.X. 25 Packet Level Protocol (PLP) - ISOC.Source routing and Domain naming - UsenetD.

X.25 level 2 - ISO

E.None of the above Discuss in Forum

48. A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell how long will it take?A.

2 seconds

B.20 secondsC.120 secondsD.

12 seconds

E.None of the above

1. Telecommunications networks come in a wide range of speed and capacity capabilities. Select the best fit for answer:A.Bandwidth alternativesB.Switching alternating

Page 81: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.Inter organizational networksD.Extranets Discuss in Forum

2. Which of the following statements is correct?A.characteristic of the hub architecture of ARC-net is alternative routing.B.characteristic of LAN is unlimited expansionC.characteristic of LAN is low cost access for low bandwidth channelsD.characteristic of the hub architecture of ARC-net is directionalized transmissionE.None of the above Discuss in Forum

3. A modem is connected in between a telephone line and aA.networkB.computerC.communication adapterD.serial portE.None of the above Discuss in Forum

4. What frequency range is used for TV transmission and low power microwave applications?A.Very Low Frequency : 3 kHz to 30 kHzB.Medium Frequency : 300 kHz to 3 MHzC.Ultra High Frequency : 300 MHz to 3000 MHzD.Super High Frequency : 3000 MHz to 30000 MHzE.None of the above Discuss in Forum

5. Which of the following statement is correct?

A.Satellite transponders use a higher frequency for reception of radiation from earth stations and lower frequency for transmission to earth stations.

B.Satellite transponders contain a device that echos the radiation without change from one point on earth to another

C.Satellite transponder contain devices that transform the message sent from one location on earth to a different code for transmission to another location

D.satellite transponders us lower frequency reception of radiation from earth stations and higher frequency for transmission to earth stations

E.None of the above6. We can receive data either through our television aerial or down our telephone lines and

display this data on our television screen. What is the general name given to this process?A.ViewdataB.TeletextC.TelesoftwareD.VideotexE.None of the above Discuss in Forum

7. ASK, PSK, FSK, and QAM are examples of _____ encoding.A.digital-to-digital B.digital-to-analog

Page 82: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.analog-to-analog D.analog-to-digital Discuss in Forum

8. The data-link layer, in reference to the OSI model, specifies

A.data link procedures that provide for the exchange of data via frames that can be sent and received

B.the interface between the X.25 network and packet mode deviceC.the virtual circuit interface to packet-switched serviceD.All of the aboveE.None of the above Discuss in Forum

9. What function does a serial interface perform in data communication?A.Converts serial data into audio signalsB.Converts analog signals into digital signalsC.Converts parallel data into a stream of bitsD.Decodes incoming signals into computer dataE.None of the above Discuss in Forum

10. You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use?A.

NBTSTAT B.NETSTAT

C.IPCONFIG D.WINIPCFGE.PING

11. Eight stations are competing for the use of the shared channel using the modified Adaptive free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention?A.

1 slots

B.5 slotsC.10 slotsD.

14 slots

Discuss in Forum

12. When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection?A.

80

B.100C.30D.

150

E.None of the above Discuss in Forum

Page 83: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

13. Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known asA.

Amplitude-shift keying

B.AmplitudeC.Amplitude modulationD.

Aloha

E.None of the above Discuss in Forum

14. You have been contracted to install a windows NT network in an office that is located in a strip mall. The office is located next to the power plant of the building, so a UPS (uninterruptible power supply) has already been installed. What type of cable should you use for the network cabling? Choose the best answer.A.

TI B.UTP

C.Fiber-optic D.PSTNE.STP Discuss in Forum

15. Communication circuits that transmit data in both directions but not at the same time are operating inA.

a simplex mode

B.a half-duplex modeC.a full-duplex modeD.

an asynchronous mode

E.None of the above16. In a synchronous modem, the digital-to-analog converter transmits signal to the

A.

equalizer

B.modulatorC.demodulatorD.

terminal

E.None of the above Discuss in Forum

17. If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?A.

The IP address

B.The subnet addressC.That the client is receiving its address from DHCPD.

The default gateway

Page 84: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

18. An internetworking protocol that provides virtual circuit service across multiple X.25 protocol, isA.

X.75

B.X.25C.X.400D.

X.21

E.None of the above Discuss in Forum

19. Which of the following TCP/IP protocol is used for transferring files from one machine to another?A.

RARP

B.ARPC.TCPD.

FTP

E.None of the above Discuss in Forum

20. Which of the following is an example of bounded medium?A.

Coaxial cable

B.Wave guideC.Fiber optic cable {d) All of the aboveD.

None of the above

21. Which transmission mode is used for data communication along telephone lines?A.

Parallel

B.SerialC.SynchronousD.

Asynchronous

E.None of the above Discuss in Forum

22. Who invented the modem?A.

Wang Laboratories Ltd.

B.AT & T Information Systems, USAC.Apple Computers Inc.D.

Digital Equipment Corpn.

Page 85: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

23. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?A.

192 B.224

C.240 D.248E.252 Discuss in Forum

24. Which of the following communications modes support two-way traffic but in only one direction of a time?A.

simplex

B.half-duplexC.three-quarters duplexD.

full-of the above

E.None of the above Discuss in Forum

25. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP address from a server?A.

RDP

B.RARPC.RIPD.

X.25

E.None of the above26. In OSI network architecture, the dialogue control and token management are responsibilities

ofA.

session layer

B.network layerC.transport layerD.

data link layer

E.None of the above Discuss in Forum

27. Which of the following transmission systems provides the highest data rate to an individual deviceA.

Computer bus

B.Telephone linesC.Voice band modemD leased lines

Page 86: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

28. Which of the following connectivity devices is used to extend a network on a purely mechanical basis?A.

Gateway

B.SwitchC.RouterD.

Active hub

Discuss in Forum

29. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet?A.

802.2 B.802.3

C.802.4 D.802.5E.802.6 Discuss in Forum

30. Which of the following digits are known as the terminal number of the Network User Address (NUA)?A.

5-7

B.1-4C.8-12D.

13-14

E.None of the above31. Which of the following device is used with an X.25 network to provide service to

asynchronous terminalsA.

repeater

B.bridgesC.gatewayD.

Packet assembler/disassemble

E.None of the above Discuss in Forum

32. A medium access control technique for multiple access transmission media isA.

Aloha

B.AmplitudeC.Angle modulationD Attenuation

Page 87: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

.E.None of the above Discuss in Forum

33. The core diameter of a single-mode fibers is aboutA.

10 times the wavelength of the light carried in the fiber

B.10 times the fiber radiusC.7 times the light carried in the fiberD.

3 times the wavelength of the light carried in the fiber

E.None of the above Discuss in Forum

34. Which of the following TCP/IP protocol is used for remote terminal connection service?A.

TELNET

B.FTPC.RARPD.

UDP

E.None of the above Discuss in Forum

35. Networks where end user workstations are tied to LAN servers to share resources and application processing.A.

Internetworked enterprise

B.Information super highwayC.Business applications of telecommunicationsD.

Client/Server networks

36. The frequency range : 300 kHz to 3 MHz is used forA.

AM radio transmission

B.FM radio transmissionC.TV transmissionD.

microwave communications, satellite and radar

E.None of the above Discuss in Forum

37. With an IP address of 201.142.23.12, what is your default subnet mask?A.

0.0.0.0

B.255.0.0.0C.255.255.0.0D.

255.255.255.0

Page 88: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

E.None of the above Discuss in Forum

38. A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?A.

Communications software

B.Error detecting protocolsC.Link access procedure (LAP)D.

Telecommunications

E.None of the above Discuss in Forum

39. IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____ sublayer.A.

HDLC, PDU

B.PDU, HDLCC.MAC, LLCD.

LLC, MAC

E.None of the above Discuss in Forum

40. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?A.

one bit or any odd number of bits inverted in a block of data during transmission

B.two bits or any even number of bits inverted in a block during transmissionC.one bit or any odd number of bits inverted in a byte during transmissionD.

two bits or any even number of bits inverted in a byte during transmission

E.None of the above41. Which utility is an all-purpose tool for troubleshooting TCP/IP problems?

A.

NBTSTAT

B.NetstatC.PINGD.

Hostname

E.None of the above Discuss in Forum

42. In communication satellite, multiple repeaters are known asA.

detector

B.modulator

Page 89: Computer Networks Apt It u Ides

Follow this link for answers :: http://www.indiabix.com/computer-science/networking/

C.stationsD.

transponders

E.None of the above