Вы находитесь на странице: 1из 164

Special notes

Subnet a Class A network with ease

Class A subnetting is a form of network addressing typically reserved for the government and
larger institutions. It can have a large number of unique nodes, which can prove quite a
challenge. Here, Todd Lammle offers a simple approach to this addressing.

By Todd Lammle | March 28, 2002, 12:00 AM PST

 RSS

 Comments 6
 Facebook 6
 Linkedin
 Twitter
 More

The Class A networking address scheme is designed for the government and large institutions needing a
great deal of unique nodes. Although the Class A network has only 254 unique network addresses, it can
contain approximately 17 million unique nodes, which can make subnetting such a network a nightmare.

Getting up to speed with subnetting Class A addresses requires a little forethought, some basic
information, and a lot of practice. Here, I will explain Class A subnet masks and how to assign valid
subnets and host addresses to provide flexibility in configuring your network.

Info on Class B and Class C subnetting


If you need more information on subnetting other types of networks, take a look at Todd Lammle’s
other subnetting articles: "Subnetting a Class B network address," and "Subnetting a Class C network
address."
The mask
Class A subnet masks must start with 255.0.0.0 at a minimum, because the whole first octet of an IP
address (the IP address describes the specific location on the network) is used to define the network
portion (the network portion describes the “street” that IP addresses are located on). Routers use the
network portion to send packets through an internetwork. Routers aren't concerned about host
addresses. They need to know only the “street” on which hosts are located and that the MAC address is
used to find a host on a LAN. The last three octets of a Class A subnet mask are used to address hosts on
a LAN; the 24 bits you can manipulate however you wish.

If you wanted to create smaller networks (subnetworks) out of a Class A network ID, you’d borrow bits
from the host portion of the mask. The more bits you borrow, the more subnets you can have, but this
means fewer hosts per subnet. However, with a Class A mask, you have 24 bits to manipulate, so this
isn’t typically a problem.

Table A  lists all the available Class A subnet masks:

Table A

Mask Prefix Subnets Hosts

255.0.0.0 (/8) 1 network with 16,777,214 hosts

255.128.0.0 (/9) 2 subnets with 8,388,606 hosts each

255.192.0.0 (/10) 4 subnets with 4,194,302 hosts each

255.224.0.0 (/11) 8 subnets with 2,097,150 hosts each

255.240.0.0 (/12) 16 subnets with 1,048,574 hosts each

255.248.0.0 (/13) 32 subnets with 524,286 hosts each

255.252.0.0 (/14) 64 subnets with 262,142 hosts each

255.254.0.0 (/15) 128 subnets with 131,070 hosts each

255.255.0.0 (/16) 256 subnets with 65,534 hosts each

255.255.128.0 (/17) 512 subnets with 32,766 hosts each

255.255.192.0 (/18) 1,024 subnets with 16,384 hosts each

255.255.224.0 (/19) 2,048 subnets with 8,190 hosts each

255.255.240.0 (/20) 4,096 subnets with 4,094 hosts each


255.255.248.0 (/21) 8,192 subnets with 2,046 hosts each

255.255.252.0 (/22) 16,384 subnets with 1,022 hosts each

255.255.254.0 (/23) 32,768 subnets with 510 hosts each

255.255.255.0 (/24) 65,536 subnets with 254 hosts each

255.255.255.128 (/25) 131,072 subnets with 126 hosts each

255.255.255.192 (/26) 262,144 subnets with 62 hosts each

255.255.255.224 (/27) 524,288 subnets with 30 hosts each

255.255.255.240 (/28) 1,048,576 subnets with 14 hosts each

255.255.255.248 (/29) 2,097,152 subnets with 6 hosts each

255.255.255.252 (/30) 4,194,304 subnets with 2 hosts each

Available Class A subnet masks

Subnet zero
This chart assumes you can use subnet zero. If you’re not using subnet zero, subtract two from each
number in the Subnets column in Table A above.

Once you have an idea what your network will look like, write down the number of physical subnets you
have and the number of hosts needed for each subnet. For example, on a WAN point-to-point link, you
need only two IP addresses, so you can use a /30 mask.

/30
The slash (/) indicates the number of mask bits turned on. It saves you from typing, or pronouncing, the
whole mask. For example, /8 means 255.0.0.0, /16 is 255.255.0.0, and /24 is 255.255.255.0. You
pronounce it as "configure a slash 24 mask on that network." It's just an easier way of saying "configure
a 255.255.255.0 mask on that network."

Figure A is an example of assigning masks on a case-by-case basis or, in this instance, LAN by LAN. It
shows a network with eight LANs and two WANs connected to the corporate office, along with one
additional point-to-point, Fast Ethernet LAN connection to another building located next to the main
corporate office. This figure is an example of how I would draw out the network.

Figure A

Notice that I indicated the number of host addresses needed for each network connection.

Using this type of drawing, you can now look at the chart and assign a mask that fits each network. Just
remember to keep growth projections in mind.

Classless routing—the practice of assigning different size masks on your network—does not work unless
you run a routing protocol that supports prefix routing. RIP version 2, OSPF, and EIGRP are examples of
routing protocols that can support classless routing. Classful routing, on the other hand, means that all
hosts have the same size mask. RIP version 1 and IGRP are classful routing protocols, and neither will
work in a classless environment.

Classless routing
For more information on the protocols supporting classless routing, read these Todd Lammle articles:

 "Configure EIGRP with IP and IPX on Cisco routers"


 "Configuring OSPF with multiple areas"
Subnet addresses
Once you have the mask assigned to each network, you must assign the valid subnet addresses and host
ranges to each network. To determine the valid subnets and host addresses for each network, you need
to answer three easy questions:

1. What is the valid subnet address?


2. What is the broadcast address?
3. What is the valid host range?
4. Here are some tips for finding the answers:

 Valid subnet address: To figure out the valid subnet address, simply subtract the subnet mask
from 256. For example, if you had a Class A mask of 255.240.0.0, the equation would be 256-
240=16. The number 16 is the first subnet and also your block size. Keep adding the block size
(in this case 16) to itself until you reach the subnet mask value. The valid subnets in this example
are 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224. As another example, if you had
a Class A subnet mask of 255.255.240.0, you’d use the mask on the second and third octets
minus 256. The second octet would be 256-255=1, 2, 3, etc., all the way to 254; the third octet
would be 256-240=16, 32, 48, etc.
 Broadcast address: To determine the broadcast address of each subnet, just subtract 1 from the
next subnet value. For example, within the 16 subnet, the next subnet is 32, so the broadcast
address of the 16 subnet is 31. The broadcast address for the 32 subnet is 47, because the next
subnet is 48. The broadcast address for the 48 subnet is 63, because the next subnet is 64.
 Valid host range: The valid hosts are the numbers between the subnet address and the
broadcast address. For the 16 subnet, the valid host range you can assign on a network is 17-30
because the subnet number is 16 and the broadcast address is 31. For the 32 subnet, the valid
host range is 33 to 46 because the subnet number is 32 and the broadcast address is 47. You
can’t use the subnet number and broadcast addresses as valid host addresses.

Assigning valid host addresses


Using Figure A as an example, let’s assign networks and valid host ranges to each network. First, create
another table of usable block sizes. Figure B shows how to assign block sizes to your network on a
granular basis.

Figure B
In this example, the network ID used for the entire internetwork is 10.1.1.0.

You can build this network in many different ways, but I prefer to start with the WAN links (block size of
four) on the bottom and work my way up, while the largest LANs start at the top and work toward the
bottom. The network will work any way you construct it, as long as you configure your block sizes
correctly on the chart.

Now you have to assign the valid host ID to each LAN and WAN, and your network should be up and
running. It would be a good idea for you to use EIGRP as your routing protocol to help you get this up
and running quickly.

Assigning other Class A masks


Figure B is an example of variable length subnet masks and is typically the easiest way you’ll assign IP
addresses on an internetwork. However, let’s go through a few practice examples of subnetting Class A
masks, to make sure you really understand the process.
Practice Class A mask 255.240.0.0 (/12)
This mask provides you with only four subnet bits, or 16 subnets (14 if you’re not using subnet zero)
with 1,048,574 hosts each. The valid subnets are 256-240=16, 32, 48, 64, 80, etc., all the way to 224.
(Subnets 0 and 240 are available if you’re using subnet zero.)

The first subnet, assuming subnet zero, is:

 Subnet: 10.0.0.0
 Broadcast: 10.15.255.255
 Valid host range: 10.0.0.1 through 10.15.255.254

The last subnet, assuming subnet zero, is:

 Subnet: 10.240.0.0
 Broadcast: 10.255.255.255
 Valid host range: 10.240.0.1 through 10.255.255.254

Practice Class A mask 255.255.128.0


This mask provides you with nine bits of subnetting and 15 host bits (/17). This gives you 512 subnets
with 32,766 hosts each. The second octet is 256-255=1, 2, 3, etc., all the way to 255. Zero is available in
the second octet if you have either a subnet bit on in the third octet or are, of course, using subnet zero.

The first available subnet is:

 Subnet: 10.0.0.0
 Broadcast: 10.0.127.255
 Valid host range: 10.0.0.1 through 10.0.127.254

You must remember that the third octet is using only one subnet bit. This bit can be either off or on; if it
is off, the subnet is 0. If it is on, the subnet is 128.

Here’s an example of the 10.0.128.0 subnet:

 Subnet: 10.0.128.0
 Broadcast: 10.0.255.255
 Valid host range: 10.0.128.1 through 10.0.255.254

The last available subnet is:


 Subnet: 10.255.128.0
 Broadcast: 10.255.255.255
 Valid host range: 10.255.128.1 through 10.255.255.254

Practice Class A mask 255.255.255.252


This mask is the easiest to subnet. Even if it weren’t a Class A mask, and you used this mask with a Class
B or Class C mask, you’d always have only two available host IDs. The reason you would use this with a
Class A mask is because it can give you up to 4,194,304 subnets with two hosts each. This is a perfect
mask for a point-to-point link, so I suggest always saving a few block sizes of four (/30) masks for use on
WANs and point-to-point LAN connections.

If you use the 10.2.3.0 network, your subnets are always 2.3 in the second and third octets, respectively.
But the fourth octet is where it changes, as in 256-252=4, 8, 12, 16, 20, 24, 28, etc., all the way to 248. If
you use subnet zero, your first subnets are 0, and your last subnet is 255.

An example of the 10.2.3.0 subnet is:

 Subnet: 10.2.3.0
 Broadcast: 10.2.3.3
 Valid hosts: 10.2.3.1 and 10.2.3.2

An example of the 10.2.3.252 subnet is:

 Subnet: 10.2.3.252
 Broadcast: 10.2.3.255
 Valid hosts: 10.2.3.253 and 10.2.3.254

Using Class A network IDs


You should probably use Class A network IDs in most networks these days. Why? Because the 10.0.0.0
network ID cannot be routed on the Internet. These private IP address ranges allow you to create a
more secure network and use port address translation on your router to the Internet to do the
translation for you. I suggest 10.0.0.0 to address your network because it provides the most flexibility for
configuring networks.
OSI Reference model

This model has following seven layers.

Application Layer

Application layer provides platform to send and receive data over the network. All applications and
utilities that communicate with network fall in this layer. For examples

Browsers :- Mozilla Firefox, Internet Explorer, Google Chrome etc

Email clients: - Outlook Express, Mozilla Thunderbird etc.

FTP clients :- Filezilla, sFTP, vsFTP

Application layer protocols that we should know for exam are following:

SNMP (Simple Network Management Protocol) — Used to control the connected networking devices.

TFTP (Trivial File Transfer Protocol) — Used to transfer the files rapidly.

DNS (Domain Naming System) — Used to translate the name with IP address and vice versa.

DHCP (Dynamic Host Configuration Protocol) — Used to assign IP address and DNS information
automatically to hosts.

Telnet— used to connect remote devices.

HTTP (Hypertext Transfer Protocol) — Used to browse web pages.

FTP (File Transfer Protocol) — Used to reliably sends/retrieves files.

SMTP (Simple Mail Transfer Protocol) — Used to sends email.

POP3 (Post Office Protocol v.3) — Used to retrieves email.

NTP (Network Time Protocol) — Used to synchronizes clocks.

Presentation layer

Presentation layer prepares the data. It takes data from application layer and marks it with formatting code
such as .doc, .jpg, .txt, .avi etc. These file extensions make it easy to realize that particular file is
formatted with particular type of application. With formatting presentation layer also deals with
compression and encapsulation. It compresses (on sending computer) and decompresses (on receiving
computer) the data file. This layer can also encapsulate the data, but it’s uncommon as this can be done by
lower layers more effectively.

The Session Layer


Session layer deals with connections. It establishes, manages, and terminates sessions between two
communicating nodes. This layer provides its services to the presentation layer. Session layer also
synchronizes dialogue between the presentation layers of the two hosts and manages their data exchange.
For example, web servers may have many users communicating with server at a given time. Therefore,
keeping track of which user communicates on which path is important and session layer handle this
responsibility accurately.

Transport Layer

So far CCNA exam is concern; this is the most important layer to study. I suggest you to pay extra
attentions on this layer, as it is heavily tested in exam.

Transport layer provides following services: -

 It sets up and maintains the connection between two devices.


 It multiplexes connections that allow multiple applications to simultaneously send and receive
data.
 According to requirement data transmission method can be connection oriented or connection
less.
 For unreliable data delivery connection less method is used.
 Connection less method uses UDP protocol.
 For reliable data delivery connection oriented method is used.
 Connection oriented method uses TCP protocol.
 When Implemented a reliable connection, sequence numbers and acknowledgments (ACKs) are
used.
 Reliable connection controls flow through the uses of windowing or acknowledgements.

For exam purpose remember five main functions of transport layer.

1. Segmentation
2. Connection management
3. Reliable and unreliable data delivery
4. Flow control
5. Connection multiplexing

Let’s understand these functions in more depth

Segmentation

Segmentation is the process of breaking large data file into smaller files that can be accommodated by
network. To understand this process thinks about a 700 MB movie that you want to download from
internet. You have 2MBPS internet connection. How will you download a 700MB movie on 2MBPS
internet connection?

In this case segmentation process is used. On server transport layer breaks 700MB movie in smaller size
of segments (less than your internet connection speed). Assume that 700Mb movie is divided in 700
segments. Each segment has file size of 1Mb that your PC can easily download at current connection
speed. Now your PC will download 700 small files instead of one large file. So next time when you see
download progress bar in browser, think it about segment receiver progress bar. Once your browser
receives all segments from server, it will pop up a message indicating download is completed. Transport
layer at your PC will merge all segments back in a single 700Mb movie file. End user will never know
how a 700Mb movie makes its way through the 2Mbps connection line.

Connection management

Transport layer setup, maintain and tear down connections for session layer. Actual mechanic of
connection is controlled by transport layer. Transport layer use two protocols for connection management
UDP and TCP.

UDP

UDP is a connection less protocol. Connection-less transmission is said to be unreliable. Now, don't get
worried about the term "unreliable" this doesn't mean that the data isn't going to get its destination; its
only means that it isn't guaranteed to get its destination. Think of your options when you are sending a
postcard, put it in the mailbox, and chances are good that it will get where it's supposed to go but there is
no guarantee. There is always a chance of missing in the way. On the other hand, it's cheap.

TCP

TCP is a connection oriented protocol. Connection-oriented transmission is said to be reliable. Think TCP
as registry AD facility available in Indian post office. For this level of service, you have to buy extra
ticket and put a bunch of extra labels on it to track where it is going and where it has been. You get a
receipt when it is delivered. In this method you have a guaranteed delivery. All of this costs you more—
but it is reliable!

Reliability

Reliability means guaranteed data delivery. To insure delivery of each single segment, connection
oriented method is used. In this approach before sending any segments three way handshake process is
done.

Three way handshake process


1. PC1 sends a SYN single to PC2 indicating that it wants to establish a reliable session.
2. P2 replies with ACK/SYN signal where ACK is the acknowledgment of PC1’s SYN signal and
SYN indicates that PC2 is ready to establish a reliable session.
3. PC1 replies with ACK signal indicating that is has received SYN signal and session is now fully
established.

Once connection is established data transmission will be initiated. To provide maximum reliability it
includes following functions:-

 Detect lost packets and resend them


 Detect packets that arrived out of order and reorder them
 Recognize duplicate packets and drop extra packets
 Avoid congestion by implementing flow control

Flow control

The transport layer implements two flow control methods:

 Ready/not ready signals


 Windowing

Ready / not ready signals method

In this method sender sends data according to its buffer size. Receiver receives data in its buffer. When
receivers buffer get filled, it send a not ready signal to sender, so sender can stop transmitting more
segments. Receivers send ready signal when it becomes ready to receive next segments. This method has
two problems.
 First, the receiver may respond to the sender with a not ready signal only when its buffer fills up.
While this message is on its way to the sender, the sender is still sending segments to the receiver,
which the receiver will have to drop because its buffer space is full.
 The second problem with the uses of this method is that once the receiver is ready to receive
more segments, it must first send a ready signal to the sender, which must be received before
sender can send more segments.

Windowing

In windowing a window size is defined between sender and receiver. Sender host will wait for an
acknowledgement signal after sending the segments equal to the window size. If any packet lost in the
way, receiver will respond with acknowledgement for lost packet. Sender will send lost packet again.
Window size is automatically set during the three step handshake process. It can be adjust anytime
throughout the lifetime of connection.

Connection Multiplexing/Application Mapping

Connection multiplexing feature allows multiple applications to connect at a time. For example a server
performs a number of functions like email, FTP, DNS, Web service, file service, data service etc.
Suppose server has a single IP address, how will it perform all these different functions for all the hosts
that want to connect with it? To make this possible transport layer assigns a unique set of numbers for
each connection. These numbers are called port or socket numbers. These port numbers allow multiple
applications to send and receive data simultaneously.

Port numbers are divided into following ranges by the IANA

Port number Descriptions


0–1023 Well-Known—For common TCP/IP functions and applications
1024–49151 Registered—For applications built by companies
49152–65535 Dynamic/Private—For dynamic connections or unregistered applications

Common TCP and UDP Port Numbers

TCP UDP
FTP 20, 21 DNS 53
Telnet 23 DHCP 67,68
SMTP 25 TFTP 69
DNS 53 NTP 123
HTTP 80 SNMP 161
POP 110
NNTP 119
HTTPS 443

Network Layer

Network layer is responsible for providing logical address known as IP address. Router works on this
layer. Main functions of this layer are following:-
 Define IP address
 Find routes based on IP address to reach its destination
 Connect different data link type together like as Token Ring, Serial, FDDI, Ethernet etc.

IP address

IP address a 32 bit long software address which made from two components:

Network component: - Defines network segment of device.

Host component :- Defines the specific device on a particular network segment

Subnet mask is used to distinguish between network component and host component.

IP addresses are divided in five classes.

 Class A addresses range from 1-126.


 Class B addresses range from 128-191.
 Class C addresses range from 192-223.
 Class D addresses range from 224-239.
 Class E addresses range from 240-254.

Following addresses have special purpose: -

0 [Zero] is reserved and represents all IP addresses;

127 is a reserved address and it is used for testing, like a loop back on an interface:

255 is a reserved address and it is used for broadcasting purposes.

IP packet

Network layer receive segment from transport layer and wrap it with IP header that is known as datagram.

Datagram

Datagram is just another name of packet. Network layer use datagram to transfer information between
nodes.

Two types of packets are used at the Network layer: data and route updates.

Data packets

Data packets are used to transport the user data across the network. Protocols used by data packets are
known as routed protocol. For example IP and IPv6

Route update packets


These packets are used to update the route information within internetwork. Routers use these packets.
Protocols that send route update packets are called routing protocols; for example RIP, RIPv2, EIGRP,
and OSPF

Data link layer

Main functions of data link layer are

 Defining the Media Access Control (MAC) or hardware addresses


 Defining the physical or hardware topology for connections
 Defining how the network layer protocol is encapsulated in the data link layer frame
 Providing both connectionless and connection-oriented services
 Defines hardware (MAC) addresses as well as the communication process that occurs within a
media.

MAC Address

MAC address is a 48 bit long layer two address. It is also known as hardware address. This address is
burnt with device by manufacturing company.

The first six hexadecimal digits of a MAC address represent its manufacture company.

MAC addresses only need to be unique in a broadcast domain.

You can have the same MAC address in different broadcast domains.

Frame

Data link layer receive packet from network layer and wrap it with layer two Header that is known as
frame. There are two specifications of Ethernet frame.

1. Ethernet II
2. 802

Key points to remember:-

 Ethernet II does not have any sub layers, while IEEE 802.2/3 has two: LLC and MAC.
 Ethernet II has a type field instead of a length field (used in 802.3).
 802.2 use a SAP or SNAP field to differentiate between encapsulated layer-3 payloads.
 With a SNAP frame, the SAP fields are set to 0xAA and the type field is used to indicate the
layer-3 protocol.
 802.2 SAP frame is eight bits in length and only the first six bits are used for identifying upper-
layer protocols, which allows up to 64 protocols.
 802.2 SNAP frame supports up to 65,536 protocols.

Physical Layer

Physical layer deals with communication media. This layer receive frame from data link layer and convert
them in bits. It loads these bits on actual communication media. Depending on media type these bit values
are converted in single. Some use audio tones, while others utilize state transitions—changes in voltage
from high to low and low to high.

Protocol data unit

Piece of data passed between layers collectively known as PDU (protocol data unit). Layers have
different terms to describe it like (segment in transport layer, packet in network layer, frame at data link
layer, and signal at physical layer.)

PDU include data file and a consistent body of information attached onto data at each successive layer.
This information is called header and footer. It includes instructions on how to restore the file to its
original state when it receives to the target system.

As a PDU passes through the layers, a header (and footer only on data link layer) is added to the packet
with information to the peer layer on the destination system for reconstructing the data on its way back up
through the layers of the destination network.

Data Exchange Process

In data exchange process, participating computers work in reverse mode. Layers on receiving computer
perform the same task in reverse mode.

The receiving device takes delivery of, handles, and translates the data from the sending device at a
particular layer. For example on sending computer presentation layer compress the data, same
presentation layer on receiving computer decompress the data.

On sending computer

 Sending application access the application layer.


 Application provides data to the presentation layer.
 Presentation layer format the data as per network requirement and forward it's to session layer.
 Session layer initiate the connection and forward the data to the transport layer.
 Transport layer broke down the large data file in smaller segments and add a header with control
information, which are bits designated to describe how to determine whether the data is complete,
uncorrupted, in the correct sequence, and so forth.
 Segments are forwarded to the network layer. Network layer add its header, with logical address
and convert it in packet. Network layer forwards packet to data link layer.
 Data link layer attach its header and footer to the packet and convert it in frame.
 Frames are forwarded to the physical layers that convert them in signals. These signals are loaded
in media.

On receiving computer

 Physical layer receive signals from media and convert them in frames. Frames are forwarded to
the data link layer.
 Data link layer check the frame. All tampered frame are dropped here. If frame is correct, data
link layer strip down its header and footer from frame and hand over packet to network layer.
 Network layer check the packet with its own implementations. If it's found everything fine with
packet, it strips down its header from packet and hand over segment to transport layer.
 Transport layer again do the same job. It verifies the segments with its own protocol rules. Only
the verified segments are processed. Transport layer remove its header from verified segments
and reassemble the segments in data. Data is handed over the session layer.
 Session layer keep track of open connection and forwarded the receiving data to presentation
layer.
 Presentation form the data in such a way that application layer use it.
 Application layer on receiving computer find the appropriate application from the computer and
open data within particular application.

In nutshell

At the sending device, each layer breaks the data down into smaller packets and adds its own header.

At the receiving device, each layer strips off the header and builds the data packets into larger packets.

Each protocol layer is blind to the headers of any other protocol layer and cannot process them.

TCP/IP Reference Model

TCP/IP protocol model is another popular layer model that describes network standards. For CCNA exam
you should be aware about this model as well. This model has same names of layers as OSI reference
model has. Don't be confuse with same name, layers at both model have different functionality in each
model.

Let's see how TCP/IP model is different from OSI reference model

Application layer:

TCP/IP model combine the functionality of application layer, presentation layer and session layer from
OSI model in single application layer. In TCP/IP model application layer do all tasks those are performed
by upper layers in OSI model. Application layer deals with high level protocols, including data
presentation, compression and dialog control.

Transport layer:

In TCP/IP model transport layer provides quality of services. TCP protocol is used for reliable data
delivery. Flow control and error correction methods are used for guaranteed data delivery.

Internet layer:

In TCP/IP model Internet layer provide all the functionality that network layer provides in OSI model.
Internet layer is responsible for finding the correct path for datagram [packet].

Network access layer:

Name of this layer may confuse you as OSI model has a layer of same name. In TCP/IP model network
access layer deals with LAN and WAN protocols and all the functionality provided by physical and data
link layer in OSI model.
Cisco's three-layer hierarchical model

Cisco's three layer hierarchical model is a set of networking specification provided by Cisco. This model
describe which cisco device works on which layers.

Core Layer

High-speed layer-2 switching infrastructure works in this layer.

Distribution Layer

Distribution layer stands between access and core layers. Router and layer 3 switch works in this layer.

Access Layer

This layer provides user's initial access to the network via switches or hubs.

That’s all for this article. In next article I will explain another CCNA topic.

What units are used in network terminology? Where do we use them?

I know the following - but I'm not sure what their meaning is:

 Fragment
 Segment
 Packet
 Frame
 Datagram

Can they be assigned to a specific OSI-Layer? Is it more complex?

networking ip definition osi


asked Jul 24 '12 at 17:45

shareimprove this question

schmijos
2,14211329
add a comment

4 Answers
active oldest votes
Taking from Section 1.2 in TCP/IP Illustrated: Vol 1 by Richard Stevens et al.,
consider the 4 layered TCP/IP stack:

+-------------+-------------------------+
| Application | Telnet, FTP, etc |
+-------------+-------------------------+
| Transport | TCP, UDP |
+-------------+-------------------------+
| Network | IP, ICMP |
+-------------+-------------------------+
| Link | drivers, interface card |
+-------------+-------------------------+

Segment: If the transport protocol is TCP, the unit of data sent from TCP to
network layer is called Segment.

Datagram: This is used in 2 layers. If the network protocol is IP, the unit of data is
up vote 31 called Datagram. At transport layer, if protocol is UDP, we use datagram there as
down vote well. Hence, we differentiate them as UDP Datagram, IP Datagram.
accepted
Frame: Physical layer representation.

Packet: It is a more generic term used either transport layer or network layer. TCP
Packet, UDP Packet, IP Packet etc. I have not seen it to represent Physical layer
data units.

Fragment: My guess here is that when a unit of data is chopped up by a protocol to


fit the MTU size, the resultant unit of data is called Fragments. But I am guessing.

answered Jul 24 '12 at 18:28

shareimprove this answer edited Oct 8 '15 at 22:40

Bhaskar
8661716
Whilst it's not common, you do occasionally hear of "ethernet packets", eg on
1   the Wireshark wiki. "Frame" is certainly more standard at the physical layer.
– Tom Anderson Jul 24 '12 at 21:37
"Protocol data unit" is a generic, albeit achingly OSI-ish, term for all of these,
    
across the hierarchy. – Tom Anderson Jul 24 '12 at 21:38
I haven't read the book though I should.. but are you sure that's taken from
stevens book? 'cos that doesn't really look quite right from a technical
perspective.. e.g. I think in the TCP/IP reference model / architecture, it's
    
Internetwork Layer not Network layer. Network layer is ISO/OSI terminology.
And I think there's a "Link Layer" in the TCP/IP ref model that I don't see in
your answer. And in the ISO OSI ref model, layer 1(Physical) I have heard a
'packet' there is called a symbol, Layer 2 is a frame. – barlop Nov 19 '14 at
6:35
@barlop: Replace "Network" with "Internet" and replace "Physical" with
     "Network Access" in the above diagram, and it will match the TCP/IP model I
studied from O'Reilly. – Wildcard Oct 8 '15 at 8:06
@Wildcard The term datagram is used in the definition of UDP(the D in UDP),
and the RFC for IP(uses the term IP datagram), and the term is defined in RFC
1594 See that definition. It says it should be self contained n have sufficient
info to be routed from source to dest. UDP resembles the datagram definition

because it is connection-less, so it doesn't rely on earlier messages, so is self
contained in that sense.Packet resembles the datagram definition,'cos it has the
source n dest network address so "self contained" and "sufficient information
to be routed from source to dest") – barlop Oct 8 '15 at 10:02
show 8 more comments

The answer above is complete. Nevertheless, I think the term packet came from packet
switching if I remembered that correctly ..

There are 2 types :

Circuit switching is a methodology of implementing a telecommunications network in


which two network nodes establish a dedicated communications channel (circuit)
through the network before the nodes may communicate. The circuit guarantees the full
up vote bandwidth of the channel and remains connected for the duration of the communication
3 down session. The circuit functions as if the nodes were physically connected as with an
vote electrical circuit.(Wiki)

Packet switching is a digital networking communications method that groups all


transmitted data – regardless of content, type, or structure – into suitably sized blocks,
called packets.(Wiki)

I would have defined it myself, but just to be sure.

So here is the Packet Term. In regard of fragment I concur with Josua Schmid's answer.

1. How many digits of the DNIC (Data Network Identification Code) identify the country?
A
first three
.
B.first four
C.first five
D
first six
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. A station in a network forwards incoming packets by placing them on its shortest output
queue. What routing algorithm is being used?
A
hot potato routing
.
B.flooding
C.static routing
D
delta routing
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. The probability that a single bit will be in error on a typical public telephone line using 4800
bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error
rate for a communication line using 9-bit frames is approximately equal to
A
0.003
.
B.0.009
C.0.991
D
0.999
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. Frames from one LAN can be transmitted to another LAN via the device
A
Router B.Bridge
.
D
C.Repeater Modem
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. Which of the following condition is used to transmit two packets over a medium at the same
time?
A
Contention
.
B.Collision
C.Synchronous
D
Asynchronous
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A
255.240.0.0 B.255.248.0.0
.
D
C.255.252.0.0 255.254.0.0
.
E. 255.255.255.255
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. What are the most commonly used transmission speeds in BPS used in data communication?
A
300
.
B.1200
C.2400
D
9600
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. What is the default subnet mask for a class C network?


A
127.0.0.1
.
B.255.0.0.0
C.255.255.0.0
D
255.255.255.0
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. Which of the following is used for modulation and demodulation?


A
modem
.
B.protocols
C.gateway
D
multiplexer
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. Which of the following is not a disadvantage of wireless LAN?


A
Slower data transmission
.
B.higher error rate
C.interference of transmissions from different computers
D
All of the above
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


11. The Internet Control Message Protocol (ICMP)
A
allows gateways to send error a control messages to other gateways or hosts
.
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errors to individual
C.
application programs and take action to correct the problem
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. Your company has a LAN in its downtown office and has now set up a LAN in the
manufacturing plant in the suburbs. To enable everyone to share data and resources between
the two LANs, what type of device(s) are needed to connect them? Choose the most correct
answer.
A
Modem B.Cable
.
D
C.Hub Router
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A
cannot talk at once
.
B.can receive and send data simultaneously
C.can send or receive data one at a time
D
can do one way data transmission only
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. How many hosts are attached to each of the local area networks at your site?
A 128
.
B.254
C.256
D
64
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. Which of the following technique is used for fragment?


A
a technique used in best-effort delivery systems to avoid endlessly looping packets
.
a technique used by protocols in which a lower level protocol accepts a message from a
B.
higher level protocol and places it in the data portion of the low level frame
one of the pieces that results when an IP gateway divides an IP datagram into smaller
C.
pieces for transmission across a network that cannot handle the original datagram size
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


11. The Internet Control Message Protocol (ICMP)
A
allows gateways to send error a control messages to other gateways or hosts
.
provides communication between the Internet Protocol Software on one machine and the
B.
Internet Protocol Software on another
reports error conditions to the original source, the source must relate errors to individual
C.
application programs and take action to correct the problem
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. Your company has a LAN in its downtown office and has now set up a LAN in the
manufacturing plant in the suburbs. To enable everyone to share data and resources between
the two LANs, what type of device(s) are needed to connect them? Choose the most correct
answer.
A
Modem B.Cable
.
D
C.Hub Router
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A
cannot talk at once
.
B.can receive and send data simultaneously
C.can send or receive data one at a time
D
can do one way data transmission only
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


14. How many hosts are attached to each of the local area networks at your site?
A
128
.
B.254
C.256
D
64
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. Which of the following technique is used for fragment?


A
a technique used in best-effort delivery systems to avoid endlessly looping packets
.
a technique used by protocols in which a lower level protocol accepts a message from a
B.
higher level protocol and places it in the data portion of the low level frame
one of the pieces that results when an IP gateway divides an IP datagram into smaller
C.
pieces for transmission across a network that cannot handle the original datagram size
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

16. Contention is
A
One or more conductors that serve as a common connection for a related group of devices
.
B.a continuous frequency capable of being modulated or impressed with a second signal
C.the condition when two or more stations attempt to use the same channel at the same time
D a collection of interconnected functional units that provides a data communications service
. among stations attached to the network
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. Avalanche photodiode receivers can detect hits of transmitted data by receiving


A
100 photons
.
B.200 photons
C.300 photons
D
400 photons
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is


A the method of determining which device has access to the transmission medium at any
. time.
B.a medium access control technique for multiple access transmission media
a form of TDMA in which circuit switching is used to dynamically change the channel
C.
assignments
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


19. When you ping the loopback address, a packet is sent where?
A
On the network
.
B.Down through the layers of the IP architecture and then up the layers again
C.Across the wire
D
through the loopback dongle
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Which of the following TCP/IP protocol is used for transferring electronic mail messages
from one machine to another?
A
FTP
.
B.SNMP
C.SMTP
D
RPC
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

21. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A
hub
.
B.bridge
C.gateway
D
repeater
.
E. None of the above
Answer & Explanation
Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. The synchronous modems are more costly than the asynchronous modems because
A
they produce large volume of data
.
B.they contain clock recovery circuits
C.they transmit the data with stop and start bits.
D
they operate with a larger bandwidth
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. A distributed network configuration in which all data/information pass through a central
computer is
A
bus network
.
B.star network
C.ring network
D
Point-to-point network
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


24. Which of the following TCP/IP protocol allows an application program on one machine to
send a datagram to an application program on another machine?
A
UDP
.
B.VMTP
C.X.25
D
SMTP
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. A remote batch-processing operation in which data is solely input to a central computer
would require a:
A
telegraph line
.
B.simplex lines
C.mixedband channel
D
All the above
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

26. ICMP (Internet Control Message Protocol) is


A a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical
. hardware address
B.a TCP/IP high level protocol for transferring files from one machine to another
C.a protocol used to monitor computers
D
a protocol that handles error and control messages
.
E. None of the above
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. If you get both local and remote echoes, every character you type will appear on the screen
A
once
.
B.twice
C.three times
D
never
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
A
192
.
B.192.168.10
C.0.0.0.5
D
51
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. The slowest transmission speeds are those of


A
twisted-pair wire
.
B.coaxial cable
C.fiber-optic cable
D
microwaves
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum
data rate?
A
3 Kbps
.
B.6 Kbps
C.12 Kbps
D
24 Kbps.
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

31. Carrier is
A
One or more conductors that serve as a common connection for a related group of devices
.
B.a continuous frequency capable of being modulated or impressed with a second signal
C.the condition when two or more sections attempt to use the same channel at the same time
D a collection of interconnected functional units that provides a data communications service
. among stations attached to the network
E. None of the above
Answer & Explanation

Answer: Option B
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. What can greatly reduce TCP/IP configuration problems?


A
WINS Server
.
B.WINS Proxy
C.DHCP Server
D
PDC
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. In CRC there is no error if the remainder at the receiver is _____.


A
equal to the remainder at the sender
.
B.zero
C.nonzero
D
the quotient at the sender
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which of the following statements is correct for the use of packet switching?
the subdivision of information into individually addressed packets in conjunction with
A
alternative routing arrangement enabled the transmission path to be altered in the event of
.
congestion or individual link failure
the employment of additional intelligence within the network enabled more sophisticated
B.
error control and link control procedures to be applied
by employing wide bandwidth circuits for the trunk networks substantial economies
C.
through extensive sharing of capacity could be achieved.
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. A front-end processor is


A
a user computer system
.
B.a processor in a large-scale computer that executes operating system instructions
a minicomputer that relieves main-frame computers at a computer centre of
C.
communications control functions
D
preliminary processor of batch jobs.
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


36. What is the port number for NNTP?
A
119 B.80
.
D
C.79 70
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk
Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are
needed to resolve the contention?
A
7 slots
.
B.5 slots
C.10 slots
D
14 slots
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted
at a speed of 1200 BPS?
A
10
.
B.12
C.120
D
1200
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. To connect a computer with a device in the same room, you might be likely to use
A
a coaxial cable
.
B.a dedicated line
C.a ground station
D All of the above
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. Internet-like networks within an enterprise.


A
Intranets
.
B.Switching alternating
C.Inter organizational networks
D
Extranets
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


41. How many bits internet address is assigned to each host on a TCP/IP internet which is used
in all communications with the host?
A
16 - bits
.
B.32 - bits
C.48 - bits
D
64 - bits
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use
to maximize the number of available hosts?
A
192 B.224
.
D
C.240 248
.
E. 252
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. Which of the following types of channels moves data relatively slowly?


A
wideband channel
.
B.voiceband channel
C.narrowband channel
D
broadband channel
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. Which of the following is required to communicate between two computers?


A
communications software
.
B.protocol
C.communications hardware
D
access to transmission medium
.
E. All of the above
Answer & Explanation

Answer: Option E
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. Which of the following does not allow multiple users or devices to share one
communications line?
A
doubleplexer
.
B.multipplexer
C.concentrator
D
controller
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


46. The geostationary satellite used for communication systems
A
rotates with the earth
.
B.remains stationary relative to the earth
C.is positioned over equator
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. Telecommunication networks frequently interconnect an organization with its customers and


suppliers. Select the best fit for answer:
A
Bandwidth alternatives
.
B.Switching alternating
C.Inter organizational networks
D
Extranets
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. The packets switching concept was first proposed


A
in the late 1980s for the Defense Ministry of US.
.
B.in the early 1960s for military communication systems, mainly to handle speech
C.in the late 1950s for Defense Ministry of US
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

49. The _____ houses the switches in token ring.


A
transceiver
.
B.nine-pin connector
C.MAU
D
NIC
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

50. What device separates a single network into two segments but lets the two segments appear
as one to higher protocols?
A
Switch B.Bridge
.
D
C.Gateway Router
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


1.  Which of the following refers to the terms "residual error rate"?
A the number of bit errors per twenty four hours of continuous operation on an asynchronous
. line
The probability that one or more errors will be undetected when an error detection scheme
B.
is used
the probability that one or more errors will be detected when an error detection mechanism
C.
is used
D
signal to noise ratio divided by the ratio of energy per bit to noise per hertz
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. Which of the following summation operations is performed on the bits to check an error-
detecting code?
A
Codec B.Coder-decoder
.
D
C.Checksum Attenuation
.
Answer & Explanation
Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. The research and development department at your office has been experimenting with
different technologies to help improve the performance of the network. One group has been
examining the use of a broadband network versus a based band network. Select the correct
statement about broadband and baseband.
A Broadband networks carry several channels on a single cable, whereas in a baseband
. network several cables carry one channel
Baseband networks carry a single channel on a single cable, whereas broadband networks
B.
carry several channels on a single cable
C.Baseband refers to local area networks, and broadband refers to wide area networks.
D Baseband operates at a standard bit rate, whereas broadband may operate at different rates
. as needed
Broadband and baseband refer to the different frequencies at which infrared operates then
E.
transmitting signals in certain conditions
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. An error-detecting code inserted as a field in a block of data to be transmitted is known as


A
Frame check sequence
.
B.Error detecting code
C.Checksum
D
flow control
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. The cheapest modems can transmit


A
300 bits per second
.
B.1,200 bits per second
C.2,400 bits per second
D
4,800 bits per second
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


6. Computers cannot communicate with each other directly over telephone lines because they use
digital pulses whereas telephone lines use analog sound frequencies. What is the name of the
device which permits digital to analog conversion at the start of a long distance transmission?
A
Interface
.
B.Modem
C.Attenuation
D
Teleprocessor
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. What is the usual number of bits transmitted simultaneously in parallel data transmission used
by microcomputers?
A
16
.
B.9
C.8
D
4
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. The receive equalizer reduces delay distortions using a


A
tapped delay lines
.
B.gearshift
C.descrambler
D
difference engine
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may
connected by a high-speed line, a medium speed line or a low speed line. Find the total
number of topologies.
A
12 B.81
.
D
C.48 729
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

10. A network consists of eight NT servers. You are planning to move servers to different
segments of your network, what utility should be used at each server to determine which
server generates the most traffic?
A
NBTSTAT
.
B.NETSTAT.EXE
C.Performance Monitor
D
Network Monitor
.
E. ARP.EXE
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


11. Sending a file from your personal computer's primary memory or disk to another computer is
called
A
uploading
.
B.downloading
C.logging on
D
hang on
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. What is the name of the software package that allows people to send electronic mail along a
network of computers and workstations?
A
Memory resident package
.
B.Project management package
C.Data communication package
D
Electronic mail package
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. The communication mode that supports two-way traffic but only one direction at a time is
A
simplex
.
B.duplex
C.half duplex
D
multiplex
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. HMP (Host Monitoring Protocol) is:


A a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical
. hardware address
B.a TCP/IP high level protocol for transferring files from one machine to another.
C.a protocol used to monitor computers
D
a protocol that handles error and control messages
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


15. Which of the following is a voiceband channel?
A
Telephone line
.
B.Telegraph line
C.Coaxial cable
D
Microwave systems
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


16. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame
(assume header bits are negligible) that can be sent on this ring?
A
8000 B frame
.
B.80,000 B frame
C.8 x 105 bit frame
D
10,000 B frame
.
Answer & Explanation

Answer: Option D

Explanation:

At 8 Mbps, a station can transmit 80,000 bits or 10,000 bytes in 10 msec. This is an upper
bound on frame length. From this amount, some overhead must be subtracted, giving a
slightly lower limit for the data portion. Therefore, 10,000 B frame is the correct answer.

View Answer Workspace Report Discuss in Forum

17. Data are sent over pin _____ of the EIA-232 interface.


A
2
.
B.3
C.4
D
All of the above
.
Answer & Explanation
Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. To connect a computer with a device in the same room, you might be likely to use
A
a coaxial cable
.
B.a dedicated line
C.a ground station
D
All of the above
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. Demodulation is a process of
A
converting analog to digital signals
.
B.converting digital to analog signals
C.multiplexing various signals into one high speed line signals
D
performing data description.
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Internet-like networks between a company and its business partners. Select the best fit for
answer:
A Bandwidth alternatives
.
B.Switching alternating
C.Inter organizational networks
D
Extranets
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


21. An example of an analog communication method is
A
laser beam
.
B.microwave
C.voice grade telephone line
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. Which of the following layer protocols are responsible for user and the application
programme support such as passwords, resource sharing, file transfer and network
management?
A
Layer 7 protocols
.
B.Layer 6 protocols
C.Layer 5 protocols
D
Layer 4 protocols
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. What frequency range is used for FM radio transmission?


A
Very Low Frequency : 3 kHz to 30. kHz
.
B.Low Frequency : 30 kHz to 300 kHz
C.High Frequency : 3 MHz to 30 MHz
D
Very High Frequency : 30 MHz to 300 MHz
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. Transmission of computerised data from one location to another is called


A
data transfer
.
B.data flow
C.data communication
D
data management
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. Compared to analog signals, digital signals


A
allow faster transmission
.
B.are more accurate
C.both (a) and (b)
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


21. An example of an analog communication method is
A
laser beam
.
B.microwave
C.voice grade telephone line
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. Which of the following layer protocols are responsible for user and the application
programme support such as passwords, resource sharing, file transfer and network
management?
A
Layer 7 protocols
.
B.Layer 6 protocols
C.Layer 5 protocols
D
Layer 4 protocols
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

23. What frequency range is used for FM radio transmission?


A
Very Low Frequency : 3 kHz to 30. kHz
.
B.Low Frequency : 30 kHz to 300 kHz
C.High Frequency : 3 MHz to 30 MHz
D
Very High Frequency : 30 MHz to 300 MHz
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. Transmission of computerised data from one location to another is called


A
data transfer
.
B.data flow
C.data communication
D
data management
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. Compared to analog signals, digital signals


A
allow faster transmission
.
B.are more accurate
C.both (a) and (b)
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


26. FDDI is a
A
ring network
.
B.star network
C.mesh network
D
bus based network
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. An anticipated result from multiprogramming operations is:


A
reduced computer idle time
.
B.the handling of more jobs
C.better scheduling of work
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. A central computer surrounded by one or more satellite computers is called a


A
bus network
.
B.ring network
C.star network
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are
exchanged twice a second, how much bandwidth per fill duplex line is occupied by the
distributed routing algorithm?
A
500 bps
.
B.1500 bps
C.5 bps
D
1000 bps
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. HOSTS file entries are limited to how many characters?


A
8
.
B.255
C.500
D
Unlimited
.
E. None of the above
Answer & Explanation

Answer: Option B
Explanation:

No answer description available for this question. Let us discuss.


26. FDDI is a
A
ring network
.
B.star network
C.mesh network
D
bus based network
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. An anticipated result from multiprogramming operations is:


A
reduced computer idle time
.
B.the handling of more jobs
C.better scheduling of work
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. A central computer surrounded by one or more satellite computers is called a


A
bus network
.
B.ring network
C.star network
D All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are
exchanged twice a second, how much bandwidth per fill duplex line is occupied by the
distributed routing algorithm?
A
500 bps
.
B.1500 bps
C.5 bps
D
1000 bps
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. HOSTS file entries are limited to how many characters?


A
8
.
B.255
C.500
D
Unlimited
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


31. Demodulation is the process of
A
converting digital signals to analog signals
.
B.converting analog signals to digital signals
C.combining many low speed channels into one high speed channel
D
dividing the high-speed signals into frequency bands
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. Which of the following statement is incorrect?


A The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a
. target host on the same physical network, given only the target IP address.
The sender's IP - to- physical address binding is included in every ARP broadcast;
B. receivers update the IP-to-Physical address binding information in their cache before
processing an ARP packet.
ARP is a low-level protocol that hides the underlying network physical addressing,
C.
permitting us to assign IP-addresses of our choice to every machine.
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. You are working with a network that has the network ID 192.168.10.0. What subnet should
you use that supports up to 25 hosts and a maximum number of subnets?
A
255.255.255.192 B.255.255.255.224
.
D
C.255.255.255.240 255.255.255.248
.
E. 255.255.255.252
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which of the following best illustrates the default subnet mask for a class A,B, and C
Network?
A
0.0.0.0, 0.0.0.1, 0.0.1.1
.
B.255.255.255.0, 255.255.0.0, 255.0.0.0
C.255.0.0.0, 255.255.0.0, 255.255.255.0
D
255.255.0.0, 255.255.255.0, 255.255.255.255
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

36. Devices interconnected by the LAN should include


A
Computers and terminals
.
B.mass storage device, printers and plotters
C.bridges and gateways
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. What are the data transmission channels available for carrying data from one location to
another?
A
Narrowband
.
B.Voiceband
C.Broadband
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. On a class B network, how many hosts are available at each site with a subnet mask of 248?
A
16,382 B.8,190
.
D
C.4,094 2,046
.
E. 1,022
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. Which of the following technique is used for encapsulation?


A
a technique used in best-effort delivery systems to avoid endlessly looping packets.
.
a technique used by protocols in which a lower level protocol accepts a message from a
B.
higher level protocol and places it in the data portion of the low level frame.
One of the pieces that results when an IP gateway divides an IP datagram into smaller
C.
pieces for transmission across a network that cannot handle the original datagram size
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0,
and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
A
255.255.252.0 B.225.255.254.0
.
D
C.255.255.255.240 255.255.255.252
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


41. With an IP address set starting with 150, you currently have six offices that you are treating
as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet
mask should you use to satisfy the needed number of subnets and maximize the number of
hosts available at each site?
A
192 B.224
.
D
C.240 248
.
E. 252
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. A machine that connects to two or more electronic mail systems and transfers mail messages
among them is known as
A Gateways
.
B.mail gateway
C.bridges
D
User Agent
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the
modulation rate is
A
1200 bands
.
B.3200 bands
C.4800 bands
D
9600 bands
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. Error detection at a data link level is achieved by


A
bit stuffing
.
B.cyclic redundancy codes
C.Hamming codes
D
equalization
.
Answer & Explanation

Answer: Option B
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. When the computer provides the manager with a multiple choice of possible answers, the
prompting technique is
A
question and answer
.
B.form filling
C.open-ended question
D
menu selection
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

46. Which network topology is considered passive?


A
Cross B.Ring
.
D
C.Star Mesh
.
E. Bus
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would
use a(n)
A
POS terminal
.
B.data collection terminal
C.batch processing terminal
D
intelligent terminal
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. Which address is the loopback address?


A
0.0.0.1
.
B.127.0.0.0
C.127.0.0.1
D
255.255.255.255
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

49. Error rate is
A an error-detecting code based on a summation operation performed on the bits to be
. checked.
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specific rules of construction, so that if
C. certain errors occur in an expression, the resulting expression will not conform to the rules
of construction and thus the presence of the errors is detected.
D
the ratio of the number of data units in error to the total number of data units
.
E. None of the above
Answer & Explanation

Answer: Option D
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

50. Intranets and extranets can use their network fire walls and other security features to establish
secure Internet links within an enterprise or with its trading partners. Select the best fit for
answer:
A
Network Server
.
B.Virtual Private Network
C.Network operating system
D
OSI
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

1. Telecommunications networks come in a wide range of speed and capacity capabilities. Select
the best fit for answer:
A
Bandwidth alternatives
.
B.Switching alternating
C.Inter organizational networks
D
Extranets
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. Which of the following statements is correct?


A
characteristic of the hub architecture of ARC-net is alternative routing.
.
B.characteristic of LAN is unlimited expansion
C.characteristic of LAN is low cost access for low bandwidth channels
D
characteristic of the hub architecture of ARC-net is directionalized transmission
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. A modem is connected in between a telephone line and a


A
network
.
B.computer
C.communication adapter
D
serial port
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. What frequency range is used for TV transmission and low power microwave applications?
A
Very Low Frequency : 3 kHz to 30 kHz
.
B.Medium Frequency : 300 kHz to 3 MHz
C.Ultra High Frequency : 300 MHz to 3000 MHz
D
Super High Frequency : 3000 MHz to 30000 MHz
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. Which of the following statement is correct?


A Satellite transponders use a higher frequency for reception of radiation from earth stations
. and lower frequency for transmission to earth stations.
Satellite transponders contain a device that echos the radiation without change from one
B.
point on earth to another
Satellite transponder contain devices that transform the message sent from one location on
C.
earth to a different code for transmission to another location
D satellite transponders us lower frequency reception of radiation from earth stations and
. higher frequency for transmission to earth stations
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


6. We can receive data either through our television aerial or down our telephone lines and
display this data on our television screen. What is the general name given to this process?
A
Viewdata
.
B.Teletext
C.Telesoftware
D
Videotex
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. ASK, PSK, FSK, and QAM are examples of _____ encoding.


A
digital-to-digital B.digital-to-analog
.
D
C.analog-to-analog analog-to-digital
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. The data-link layer, in reference to the OSI model, specifies


A data link procedures that provide for the exchange of data via frames that can be sent and
. received
B.the interface between the X.25 network and packet mode device
C.the virtual circuit interface to packet-switched service
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. What function does a serial interface perform in data communication?


A
Converts serial data into audio signals
.
B.Converts analog signals into digital signals
C.Converts parallel data into a stream of bits
D
Decodes incoming signals into computer data
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


10. You need to determine whether IP information has been assigned to your Windows NT.
Which utility should you use?
A
NBTSTAT B.NETSTAT
.
D
C.IPCONFIG WINIPCFG
.
E. PING
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


11. Eight stations are competing for the use of the shared channel using the modified Adaptive
free walk protocol by Gallager. If the stations 7 and 8 are suddenly become ready at once,
how many bit slots are needed to resolve the contention?
A
1 slots
.
B.5 slots
C.10 slots
D
14 slots
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. When two computers communicate with each other, they send information back and forth. If
they are separated by a reasonable distance, they can send and receive the information
through a direct cable connection which is called a null-modem connection. Presently what is
the maximum distance in metres permitted in this null-modem connection?
A
80
.
B.100
C.30
D
150
.
E. None of the above
Answer & Explanation
Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. Modulation in which the two binary values are represented by two different amplitudes of the
carrier frequency is known as
A
Amplitude-shift keying
.
B.Amplitude
C.Amplitude modulation
D
Aloha
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. You have been contracted to install a windows NT network in an office that is located in a
strip mall. The office is located next to the power plant of the building, so a UPS
(uninterruptible power supply) has already been installed. What type of cable should you use
for the network cabling? Choose the best answer.
A
TI B.UTP
.
D
C.Fiber-optic PSTN
.
E. STP
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


15. Communication circuits that transmit data in both directions but not at the same time are
operating in
A
a simplex mode
.
B.a half-duplex mode
C.a full-duplex mode
D
an asynchronous mode
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:
16. In a synchronous modem, the digital-to-analog converter transmits signal to the
A
equalizer
.
B.modulator
C.demodulator
D
terminal
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. If the client receives an address from a DHCP server, what is the only information available
in the Network Properties dialog box?
A
The IP address
.
B.The subnet address
C.That the client is receiving its address from DHCP
D
The default gateway
.
E. None of the above
Answer & Explanation

Answer: Option C
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. An internetworking protocol that provides virtual circuit service across multiple X.25
protocol, is
A
X.75
.
B.X.25
C.X.400
D
X.21
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. Which of the following TCP/IP protocol is used for transferring files from one machine to
another?
A
RARP
.
B.ARP
C.TCP
D
FTP
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Which of the following is an example of bounded medium?


A
Coaxial cable
.
B.Wave guide
C.Fiber optic cable {d) All of the above
D
None of the above
.
Answer & Explanation

Answer: Option D
21. Which transmission mode is used for data communication along telephone lines?
A
Parallel
.
B.Serial
C.Synchronous
D
Asynchronous
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. Who invented the modem?


A
Wang Laboratories Ltd.
.
B.AT & T Information Systems, USA
C.Apple Computers Inc.
D
Digital Equipment Corpn.
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should
you use to maximize the number of available hosts?
A
192 B.224
.
D
C.240 248
.
E. 252
View Answer Workspace Report Discuss in Forum

24. Which of the following communications modes support two-way traffic but in only one
direction of a time?
A
simplex
.
B.half-duplex
C.three-quarters duplex
D
full-of the above
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP
address from a server?
A
RDP
.
B.RARP
C.RIP
D
X.25
.
E. None of the above
Answer & Explanation

Answer: Option B
26. In OSI network architecture, the dialogue control and token management are responsibilities
of
A
session layer
.
B.network layer
C.transport layer
D data link layer
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. Which of the following transmission systems provides the highest data rate to an individual
device
A
Computer bus
.
B.Telephone lines
C.Voice band modem
D
leased lines
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. Which of the following connectivity devices is used to extend a network on a purely


mechanical basis?
A
Gateway
.
B.Switch
C.Router
D
Active hub
.
Answer & Explanation

Answer: Option D

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI
model. A number of standards were agreed upon during that time. Which of the following is
the standard for Ethernet?
A
802.2 B.802.3
.
D
C.802.4 802.5
.
E. 802.6
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. Which of the following digits are known as the terminal number of the Network User
Address (NUA)?
A
5-7
.
B.1-4
C.8-12
D
13-14
.
E. None of the above
Answer & Explanation

Answer: Option C
31. Which of the following device is used with an X.25 network to provide service to
asynchronous terminals
A
repeater
.
B.bridges
C.gateway
D
Packet assembler/disassemble
.
E. None of the above
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. A medium access control technique for multiple access transmission media is
A
Aloha
.
B.Amplitude
C.Angle modulation
D
Attenuation
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. The core diameter of a single-mode fibers is about


A
10 times the wavelength of the light carried in the fiber
.
B.10 times the fiber radius
C.7 times the light carried in the fiber
D
3 times the wavelength of the light carried in the fiber
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which of the following TCP/IP protocol is used for remote terminal connection service?
A
TELNET
.
B.FTP
C.RARP
D
UDP
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. Networks where end user workstations are tied to LAN servers to share resources and
application processing.
A
Internetworked enterprise
.
B.Information super highway
C.Business applications of telecommunications
D
Client/Server networks
.
Answer & Explanation

Answer: Option D

1. In communication satellite, multiple repeaters are known as

detector
modulator
stations
transponders
View Answer / Hide Answer

ANSWER: transponders

2. The loss in signal power as light travels down the fiber is called
attenuation
progragation
scattering
interruption
View Answer / Hide Answer

ANSWER: attenuation

3. Communication circuits that transmit data in both directions but not at the same time are
operating in

a simplex mode
a half duplex mode
a full duplex mode
an asynchronous mode
View Answer / Hide Answer

ANSWER: a half duplex mode

4. Print server uses ________ which is a buffer that holds data before it is sent to the printer.

Queue
Spool
Node
Stack
View Answer / Hide Answer

ANSWER: Spool

5. Frames from one LAN can be transmitted to another LAN via the device

Router
Bridge
repeater
Modem
View Answer / Hide Answer

ANSWER: Bridge

6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?

255.240.0.0
255.248.0.0
255.252.0.0
255.254.0.0
View Answer / Hide Answer

ANSWER: 255.254.0.0

7. You want to implement a mechanism that automates the IP configuration, including IP


address, subnet mask, default gateway, and DNS information. Which protocol will you use to
accomplish this?

SMTP
SMNP
DHCP
ARP
View Answer / Hide Answer

ANSWER: DHCP

8. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
cannot talk at once
can receive and send data simultaneously
can send or receive data one at a time
can do one way data transmission only
View Answer / Hide Answer

ANSWER: can receive and send data simultaneously

9. Contention is

One or more conductors that serve as a common connection for a related group of devices
a continuous frequency capable of being modulated or impressed with a second signal
the condition when two or more stations attempt to use the same channel at the same time
a collection of interconnected functional units that provides a data communications service
among stations attached to the network
View Answer / Hide Answer

ANSWER: the condition when two or more stations attempt to use the same channel at the
same time

10. When you ping the loopback address, a packet is sent where?

On the network
Down through the layers of the IP architecture and then up the layers again
Across the wire
through the loopback dongle
View Answer / Hide Answer

ANSWER: Down through the layers of the IP architecture and then up the layers again

41. Which utility is an all-purpose tool for troubleshooting TCP/IP problems?


A
NBTSTAT
.
B.Netstat
C.PING
D
Hostname
.
E. None of the above
Answer & Explanation
Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. In communication satellite, multiple repeaters are known as


A
detector
.
B.modulator
C.stations
D
transponders
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


1.  A devices that links two homogeneous packet-broadcast local networks, is
A
gateway
.
B.repeater
C.bridge
D
hub
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. A computer that handles resource sharing and network management in a local area network.
Select the best fit for answer:
A
Network Server
.
B.Virtual Private Network
C.Network operating system
D
OSI
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted.
As with the length of segments and the number of segments, a limit exists as to how many
repeaters can be used between any two nodes. What is the maximum number of repeaters that
can be used?
A
Five B.Two
.
D
C.Four Six
.
E. Three
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. How much power (roughly) a light-emitting diode can couple into an optical fiber?
A
100 microwatts
.
B.440 microwatts
C.100 picowatts
D
10 milliwatts
.
E. None of the above
Answer & Explanation
Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A
gateway
.
B.bridge
C.acoustic coupler
D
time-division multiplexer
.
E. None of the above
Answer & Explanation

Answer: Option C
6. With telecommunications and a personal computer you can
A
"download" free public domain programs
.
B.send letters to be printed and delivered by the post office
C.order goods at a substantial discount
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. Which of the following statement is correct?


A
Teleprinters are used for printing at remote locations, not for input.
.
B.Teleprinters are same as teletypes
C.Teleprinters are same as x400
D
Teleprinters have a printer for output and keyboard for input
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. What does 224 translate to in binary?


A
11110000
.
B.00011110
C.00001111
D
11100000
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. What can cause a problem with communication with a client by name but not by IP address?
A
The IP address
.
B.Static files such as an LMHOSTS file or a DNS database
C.Subnet mask
D
The default gateway
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


10. Layer one of the OSI model is
A
physical layer
.
B.link layer
C.transport layer
D
network layer
.
E. None of the above
Answer & Explanation

Answer: Option A
11. What is the term used to describe addresses available on a DHCP server?
A
Pools
.
B.Scopes
C.Ranges
D
Notes
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. Which of the following signals is not standard RS - 232-C signal?


A
VDR
.
B.RTS
C.CTS
D
DSR
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

13. What is the default subnet mask for a class B network?


A
127.0.01
.
B.255.0.0.0
C.255.255.0.0
D
255.255.255.0
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. Which of the following files is used for NetBIOS name resolution?


A
HOSTS
.
B.LMHOSTS
C.ARP
D
FQDN
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. In CRC the quotient at the sender


A
becomes the dividend at the receiver
.
B.becomes the divisor at the receiver
C.is discarded
D
is the remainder
.
Answer & Explanation
Answer: Option C
16. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A
1
.
B.2
C.3
D
multiple
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. The OCR reading unit attached to a POS terminal is called a


A
light pen
.
B.wand
C.cursor
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. A protocol is a set of rules governing a time sequence of events that must take place
A
between peers
.
B.between modems
C.between an interface
D
across an interface
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. The coming together of three technologies i.e. microelectronics, computing and


communications has ushered in
A
information explosion
.
B.information technology
C.business revolution
D
educational upgradation
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Terminals are used to


A
collect data from the physical system
.
B.provide information for the manager
C.communicate management decisions to the physical system
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:
16. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A
1
.
B.2
C.3
D
multiple
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. The OCR reading unit attached to a POS terminal is called a


A
light pen
.
B.wand
C.cursor
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. A protocol is a set of rules governing a time sequence of events that must take place
A
between peers
.
B.between modems
C.between an interface
D
across an interface
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. The coming together of three technologies i.e. microelectronics, computing and


communications has ushered in
A
information explosion
.
B.information technology
C.business revolution
D
educational upgradation
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Terminals are used to


A
collect data from the physical system
.
B.provide information for the manager
C.communicate management decisions to the physical system
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:
21. Sales persons and other employees of the company who spend much of their time away from
their offices but keep in touch with their company's microcomputers or main frame
computers over telephone lines are called
A
field workers
.
B.telecommuters
C.teleprocessors
D
company directors
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. What is the standard protocol for network management features?


A
SNA B.FTP
.
D
C.SNMP SMS
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. The application layer of a network


A
establishes, maintains, and terminates virtual circuits
.
B.defines the user's port into the network
C.consists of software being run on the computer connected to the network
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
26. Most data communications involving telegraph lines use:
A
simplex lines
.
B.wideband channels
C.narrowband channels
D
dialed service
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible
number of host IDs per subnet. Which subnet mask should you assign?
A
255.255.224.0 B.255.255.240.0
.
D
C.255.255.248.0 255.255.252.0
.
E. 255.255.255.255
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. Modulation is the process of


A
sending a file from one computer to another computer
.
B.converting digital signals to analog signals
C.converting analog signals to digital signals
D
echoing every character that is received
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


29. Which multiplexing technique shifts each signal to a different carrier frequency?
A
FDM
.
B.synchronous TDM
C.asynchronous TDM
D
All of the above
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. Which of the following protocol is connection-oriented?


A
IPX B.UDP
.
D
C.NetBEUI TCP
.
Answer & Explanation

Answer: Option D
31. The loss in signal power as light travels down the fiber is called
A
attenuation
.
B.propagation
C.scattering
D
interruption
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. Operating system functions may include


A
input/output control
.
B.virtual storage
C.multiprogramming
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. Which layer of international standard organization's OSI model is responsible for creating
and recognizing frame boundaries?
A
physical layer
.
B.data link layer
C.transport layer
D
network layer
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which of the following might be used by a company to satisfy its growing communications
needs?
A
front-end processor
.
B.multiplexer
C.controller
D
concentrator
.
E. All of the above
Answer & Explanation
Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. Different computers are connected to a LAN by a cable and a/an


A
modem
.
B.interface card
C.special wires
D
telephone lines
.
E. None of the above
Answer & Explanation

Answer: Option B
36. The Token-Ring architecture was developed for a more efficient way to determine who
should be transmitting at any one time. With Ethernet, collisions may take place, causing the
transmitting computers to have to retransmit their data. The use of token guarantees that only
one computer can transmit at a time. What happens as the network increases in size? Choose
the best answer
A
An additional token is added for every 1,000 nodes
.
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater
B.
then 500
C.The network becomes less efficient
D After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by
. the more powerful Hyperstation Unified Bandwidth device
E. The network becomes more efficient
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. A characteristic of a multiprogramming system is:


A
simultaneous execution of program instructions from two applications
.
B.concurrent processing of two or more programs
C.multiple CPUs
D
All the above
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. When a host knows its physical address but not its IP address, it can use _____.
A
RARP
.
B.ARP
C.IGMP
D
ICMP
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. What is the name given to the exchange of control signals which is necessary for establishing
a connection between a modem and a computer at one end of a line and another modem and
computer at the other end?
A
Handshaking
.
B.Modem options
C.Protocol
D
Duplexing
.
E. None of the above
Answer & Explanation
Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. A communications medium that uses pulses of laser light in glass fibers. Select the best fit
for answer:
A
Fiber optic cables
.
B.Cellular phone systems
C.Telecommunications processors
D
Telecommunications software
.
Answer & Explanation

Answer: Option A
41. After you have verified that TCP/IP is installed correctly, what is the next step in verifying
the TCP/IP configuration?
A
Ping the broadcast address
.
B.Ping the Microsoft Web site
C.Ping a distant router.
D
Ping the address of the local host
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. Which utility is useful for troubleshooting NetBIOS name resolution problems?


A
NBTSTAT
.
B.Netstat
C.PING
D
Hostname
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. The EIA-232 interface has _____ pins.


A
20 B.24
.
D
C.25 30
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. In OSI model, which of the following layer transforms information from machine format into
that understandable by user
A
application
.
B.presentation
C.session
D
physical
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. The channel in the data communication model can be


A
postal mail service
.
B.telephone lines
C.radio signals
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D
46. Which of the following is an important characteristic of LAN?
A
application independent interfaces
.
B.unlimited expansion
C.low cost access for low bandwidth channels
D
parallel transmission
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. Which of the following is a wrong example of network layer:


A
Internet Protocol (IP) ARPANET
.
B.X. 25 Packet Level Protocol (PLP) - ISO
C.Source routing and Domain naming - Usenet
D
X.25 level 2 - ISO
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


48. A 2000-character text file has to be transmitted by using a 1,200 baud modem. Can you tell
how long will it take?
A
2 seconds
.
B.20 seconds
C.120 seconds
D
12 seconds
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:
1.  Most networks are connected to other local area or wide area networks. Select the best fit for
answer:
A
Internet works
.
B.The Internet
C.Internet revolution
D
Internet technologies
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per
subnet. What subnet mask should you use?
A
255.255.192.0 B.255.255.224.0
.
D
C.255.255.240.0 255.255.248.0
.
E. 255.255.252.0
Answer & Explanation

Answer: Option E

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the
maximum possible transmission rate?
A
1.5 Mbaud/sec
.
B.6 Mband/sec
C.12 Mbaud/sec
D
24 Mbaud/sec
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. Which of the following digits are known as the sub-address digits (for use by the user) of the
Network User Address (NUA)?
A
5-7
.
B.1-4
C.8-12
D
13-14
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. Error detecting code is


A an error-detecting code based on a summation operation performed on the bits to be
. checked
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specify rules of construction, so that if certain
C. errors occur in an expression, the resulting expression will not conform to the rules of
construction and thus the presence of the error is detected.
D
the ratio of the data units in error to the total number of data units
.
E. None of the above
Answer & Explanation

Answer: Option C
6. A modulator converts a _____ signal to a(n) _____ signal.
A
FSK; PSK
.
B.PSK; FSK
C.analog; digital
D
digital; analog
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. The birthplace of the World Wide Web is considered to be


A
the Department of Defense
.
B.CERN
C.ARPA
D
Netscape
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


8. You have purchased a MAU (Multistation Access Unit) from your computer supplier and now
must decide what type of network card you should install in the workstations. Which of the
following would be the most appropriate?
A
Fast SCSI Wide
.
B.Token-Ring
C.ArcServe
D
Ethernet
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. What is the loopback address?


A
127.0.0.1
.
B.255.0.0.0
C.255.255.0.0
D
255.255.255.255.0
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. An ROP would be attached to a


A
simplex channel
.
B.duplex channel
C.half duplex channel
D
full duplex channel
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:
16. A band is always equivalent to
A
a byte
.
B.a bit
C.100 bits
D
16 bits
.
E. None of the above
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. What is the port number for HTTP?


A
99 B.86
.
D
C.80 23
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. The most flexibility in how devices are wired together is provided by


A
bus networks
.
B.ring networks
C.star networks
D
T-switched networks
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. Which of the following statement is incorrect?


A The transport layer provides for any format, translationer code conversion necessary to put
. the data into an intelligible format.
The presentation layer transforms information from machine format to the understandable
B.
format.
C.The data link layer handles the transfer of data between the ends of a physical link.
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. When you connect to an online information service, you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name given
to this brief dialogue between you and the information system?
A
Security procedure
.
B.Safeguard procedure
C.Identification procedure
D
Log-on procedure
.
E. None of the above
Answer & Explanation

Answer: Option D
31. A software that allows a personal computer to pretend it as a terminal is
A
auto-dialing
.
B.bulletin board
C.modem
D
terminal emulation
.
E. None of the above
View Answer Workspace Report Discuss in Forum

32. What is the name of the network topology in which there are bi-directional links between
each possible node?
A
Ring
.
B.Star
C.Tree
D
Mesh
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. What is the main purpose of a data link content monitor?


A
to detect problems in protocols
.
B.to determine the type of transmission used in a data link
C.to determine the type of switching used in a data link.
D
to determine the flow of data
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Synchronous protocols
A
transmit characters one at a time
.
B.allow faster transmission than asynchronous protocols do
C.are generally used by personal computers
D
are more reliable
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. To set up a bulletin board system you need


A
a smart modem with auto-answer capabilities
.
B.a telephone line
C.a personal computer
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D
36. Videotex is a combination of
A
television
.
B.communication
C.computer technology
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. Which of the following frequency ranges is used for AM radio transmission?


A
Very Low Frequency : 3 kHz to 30 kHz
.
B.Medium Frequency : 300 kHz to 3 MHz
C.High Frequency : 3 MHz to 30 MHz
D
Very High Frequency : 30 MHz to 300 MHz
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. Baseband is
A
transmission of signals without modulation
.
B.a signal all of whose energy is contained within a finite frequency range
C.the simultaneous transmission of data to a number of stations
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital
signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per
second are actually sent?
A
32 Kbps
.
B.64 Kbps
C.8 Kbps
D
128 Kbps.
.
Answer & Explanation

Answer: Option A
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. X.21 is
A
a method of determining which device has access to the transmission medium at any time
.
B.a method access control technique for multiple-access transmission media
C.a very common bit-oriented data link protocol issued by ISO
D
network access standard for connecting stations to a circuit-switched network
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:
41. What is the minimum number of wires required for sending data over a serial
communications links?
A
2
.
B.1
C.4
D
3
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. In cyclic redundancy checking, the divisor is _____ the CRC.


A
the same size as
.
B.one bit less than
C.one bit more than
D
two bits more
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. Which command-line tool is included with every Microsoft TCP/IP client?


A
DHCP
.
B.WINS
C.PING
D
WINIPCFG
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is
_____.
A
even B.odd
.
D
C.indeterminate 42
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. An error-detecting code inserted as a field in a block of data to be transmitted is known as


A Frame check sequence
.
B.Error detecting code
C.Checksum
D
flow control
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


6.  Which of the following summation operation is performed on the bits to check an error-
detecting code?
A
Codec
.
B.Coder-decoder
C.Checksum
D
Attenuation
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. The standard suit of protocols used by the Internet, intranets, extranets, and some other
networks.
A
TCP/IP
.
B.Protocol
C.Open Systems
D
Internetwork processor
.
Answer & Explanation

Answer: Option A

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. Networks that follow the 802.5 standard appear to be in a star topology but are actually
operating in what type of topology?
A
Linear bus
.
B.Modified star
C.Modified ring
D
Ring
.
E. Hybrid hub
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. A communications device that combines transmissions from several 1/ O devices into one line
is a:
A
concentrator
.
B.modifier
C.multiplexer
D
full-duplex line
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. The main difference between synchronous and asynchronous transmission is


A
the clocking is derived from the data in synchronous transmission
.
B.the clocking is mixed with the data in asynchronous transmission
C.the pulse height is different.
D
the bandwidth required is different
.
E. None of the above
Answer & Explanation

Answer: Option A
11. ARP (Address Resolution Protocol) is
A a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical
. hardware address
B.a TCP/IP high level protocol for transferring files from one machine to another
C.a protocol used to monitor computers
D
a protocol that handles error and control messages
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. Which of the following uses network address translation?


A
Routers
.
B.Network adapter drivers
C.Hubs
D
Windows 95
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. The X.25 standard specifies a


A
technique for start-stop data
.
B.technique for dial access
C.DTE/DCE interface
D
data bit rate
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. The most important part of a multiple DHCP configurations is to make sure you don't have
which of the following in the different scopes? Select the best answer.
A
Duplicate addresses
.
B.Duplicate pools
C.Duplicate subnets
D
Duplicate default gateways
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. When a group of computers is connected together in a small area without the help of
telephone lines, it is called
A
Remote communication network (RCN)
.
B.Local area network(LAN)
C.Wide area network (WAN)
D
Value added network (VAN)
.
E. None of the above
Answer & Explanation
Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


16. The 802.5 standard implements a way for preventing collisions on the network. How are
collisions prevented when using this standard?
A
CSMA/CD
.
B.Token passing
C.Collision detection
D
Time sharing
.
E. Switched repeaters
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. A communication network which is used by large organizations over regional, national or
global area is called
A
LAN
.
B.WAN
C.MAN
D
Intranet
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. Information systems with common hardware, software, and network standards that provide
easy access for end users and their networked computer systems. Select the best fit for
answer:
A
TCP/IP
.
B.Protocol
C.Open Systems
D
Internetwork processor
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. Which of the following TCP/IP protocol is used for file transfer with minimal capability and
minimal overhead?
A
RARP
.
B.FTP
C.TFTP
D
TELNET
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Terminals are required for


A
realtime, batch processing, and timesharing
.
B.realtime, timesharing, and distributed processing
C.realtime, distributed processing, and manager inquiry
D
realtime, timesharing, and message switching
.
E. None of the above
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


21. Sending a file from your personal computer's primary memory or disk to another computer is
called
A
uploading
.
B.downloading
C.logging on
D
hang on
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. Business meeting and conferences can be held by linking distantly located people through a
computer network. Not only the participants exchange information but are able to see each
other. What is it called?
A
Telemeeting
.
B.Telemailing
C.Teleconferencing
D
Teletalking
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. What frequency range is used for microwave communications, satellite and radar?
A Low Frequency : 30 kHz to 300 kHz
.
B.Medium Frequency : 300 kHz to 3 MHz
C.Super High Frequency : 3000 MHz to 30000 MHz
D
Extremely High Frequency :30,000 MHz
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. Which of the following statements is incorrect?


A The difference between synchronous and asynchronous transmission is the clocking
. derived from the data in synchronous transmission
Half-duplex line is a communication line in which data can move in two directions, but not
B.
at the same time.
C.Teleprocessing combines telecommunications and DP techniques in online activities.
D
Batch processing is the preferred processing mode for telecommunication operations
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. If the ASCII character H is sent and the character I is received, what type of error is this?
A
single-bit B.multiple-bit
.
D
C.burst recoverable
.
Answer & Explanation

Answer: Option A
26. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital
signals. If Delta modulation is selected, then how many bits per second are actually sent?
A 32 kbps
.
B.8 kbps
C.128 kbps
D
64 kbps.
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. UDP is:
A
Not a part of the TCP/IP suite
.
B.Connection oriented and unreliable
C.Connection orientated and reliable
D
Connectionless and unreliable
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. The interactive transmission of data within a time sharing system may be best suited to
A
simplex lines
.
B.half-duplex lines
C.full-duplex lines
D
biflex-line
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. What OSI layer handles logical address to logical name resolution?


A
Transport
.
B.Physical
C.Presentation
D
Data Link
.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. The MAC (Media Access Control) address of the network card is used in both Ethernet and
Token-Ring networks and is essential for communication. What does MAC provide?
A
A logical address that identifies the workstation
.
B.A physical address that is randomly assigned each time the computer is started
C.A physical address that is assigned by the manufacturer
D
The logical domain address for the workstation
.
E. An alias for the computer name
Answer & Explanation

Answer: Option C

Explanation:
31. Which of the following is an example of a client-server model?
A
TELNET
.
B.FTP
C.DNS
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. In CRC there is no error if the remainder at the receiver is _____.


A
the quotient at the sender
.
B.nonzero
C.zero
D
equal to the remainder at the sender
.
E. None of the above.
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. A WATS arrangement


A
is always less expensive than flat-rate service
.
is less expensive than flat-rate service only when the number of calls is large and the
B.
duration of each is short
is less expensive than flat-rate service only when the number of calls is small and the
C.
duration of each is long
D
is never less expensive than flat-rate service
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


34. A T-switch is used to
A
control how messages are passed between computers
.
B.echo every character that is received
C.transmit characters one at a time
D
rearrange the connections between computing equipment
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. A global network of millions of business, government, educational, and research networks;
computer systems; database; and end users. Select the best fit for answer:
A
Internet works
.
B.The Internet
C.Internet revolution
D
Internet technologies
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


36. Alice is setting up a small network in her home so that she can study for her MCSE exams.
She doesn't have a lot of money to spend on hardware, so she wants to use a network
topology that requires the least amount of hardware possible. Which topology should she
select?
A
Star B.Right
.
D
C.Token-Ring Ethernet
.
E. Bus
Answer & Explanation
Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. The CCITT Recommendation X.25 specifies three layers of communications:


A
application, presentation and session
.
B.Session, transport and network
C.physical datalink and network
D
datalink, network and transport
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. Which of the following technique is used for allocating capacity on a satellite channel using
fixed-assignment FDM?
A
Amplitude modulation
.
B.Frequency-division multiple access
C.Frequency modulation
D
Frequency-shift keying
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. The amount of uncertainty in a system of symbol is called


A
Bandwidth
.
B.Entropy
C.loss
D
Quantum
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. Which of the following allows a simple email service and is responsible for moving
messages from one mail server to another?
A
IMAP B.DHCP
.
D
C.SMTP FTP
.
E. POP3
Answer & Explanation

Answer: Option C

Explanation:
44. Many large organizations with their offices in different countries of the world connect their
computers through telecommunication satellites and telephone lines. Such a communication
network is called
A
LAN
.
B.WAN
C.ECONET
D
EITHERNET
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. A network which is used for sharing data, software and hardware among several users
owning microcomputers is called
A
WAN
.
B.MAN
C.LAN
D
VAN
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


6.  The main difference between TCP and UDP is
A
UDP is connection oriented where as TCP is datagram service
.
B.TCP is an Internet protocol where as UDP is an ATM protocol
C.UDP is a datagram where as TCP is a connection oriented service
D
All of the above
.
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. What operates in the Data Link and the Network layer?


A
NIC
.
B.Bridge
C.Brouter
D
Router
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. What is the name of the computer based EMMS that provides a common forum where users
can check in at their convenience, post messages, actively exchange ideas and participate in
ongoing discussions?
A
E-mail
.
B.Bulletin board system (BBS)
C.Teleconferencing
D
Videoconferencing
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. Which of the following statement is incorrect?


A The CCITT Recommendation X.25 specifies three layers of communication: physical, link
. and network.
B.The second layer of communication is the data-link layer
C.Errors in the physical layer can be detected by the data link layer
D
The fourth layer, in reference to the OSI model, is the session layer
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

10. Devices on one network can communicate with devices on another network via a
A
file server
.
B.utility server
C.printer server
D
gateway
.
E. None of the above
Answer & Explanation

Answer: Option D
11. After coding a document into a digital signal, it can be sent by telephone, telex or satellite to
the receiver where the signal is decoded and an exact copy of the original document is made.
What is it called?
A
Telex
.
B.Word processor
C.Facsimile
D
Electronic mail
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. Which file transfer protocol uses UDP?


A
NFS
.
B.TELNET
C.TFTP
D
FTP
.
E. None of the above
Answer & Explanation

Answer: Option C
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. You are working with a class C network. You are required to configure it for five subnets,
each of which will support 25 nodes. What subnet should you use?
A
255.255.255.0 B.255.255.255.224
.
D
C.255.255.255.240 255.255.255.248
.
E. 255.255.255.252
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total
number of lines required would be
A
5
.
B.10
C.20
D
32
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. Which of the following medium access control technique is used for bus/tree?
A
token ring
.
B.token bus
C.CSMA
D
MAC
.
E. None of the above
Answer & Explanation

Answer: Option B
16. A distributed data processing configuration in which all activities must pass through a
centrally located computer is called a:
A
ring network
.
B.spider network
C.hierarchical network
D
data control network
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. The size or magnitude of a voltage or current waveform is


A
Amplitude
.
B.Aloha
C.Angle Modulation
D
Attenuation
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

18. Which of the following network access standard is used for connecting stations to a circuit-
switched network?
A
X.3
.
B.X.21
C.X.25
D
X.75
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. Which of the following is not a transmission medium?


A
telephone lines
.
B.coaxial cable
C.modem
D
microwave systems
.
E. satellite systems
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Which of the following statement is incorrect?


A Gateways are assumed to know correct routes; hosts begin with minimal routing
. information and learn new routes from gateways.
Layered protocols are designed so that layer n at the destination receives exactly the same
B.
object sent by layer n at the source.
Application programs as well as all protocol software from the Internet layer upward use
C.
only IP addresses; the network interface layer handles physical addresses.
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D
21. A batch processing terminal would not include a
A
CPU
.
B.card reader
C.card punch
D
line printer
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. Packet Switch Stream (PSS) was introduced in


A
the US in 1961 (&) the UK in 1981
.
B.the UK in 1980
C.the US in 1961
D
None of the above
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. The physical layer of a network


A defines the electrical characteristics of signals passed between the computer and
. communication devices
B.controls error detection and correction
C.constructs packets of data and sends them across the network
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. Which of the following allows devices on one network to communicate with devices on
another network?
A
multiplexer
.
B.gateway
C.t-switch
D
modern
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. An error detecting code is which code is the remainder resulting from dividing the bits to be
checked by a predetermined binary number, is known as
A
Cyclic redundancy check
.
B.Checksum
C.Error detecting code
D
Error rate
.
E. None of the above
Answer & Explanation

Answer: Option A
26. Bulletin board system
A
is a public access message system
.
B.is a modem capable of accepting commands
C.converts analog signals to digital signals
D
converts digital signals to analog signals
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. In OSI model, which of the following layer provides error-free delivery of data?
A
Data link
.
B.Network
C.transport
D
Session
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. Error detection at the data link level is achieved by?


A
Bit stuffing
.
B.Hamming codes
C.Cyclic Redundancy codes
D
Equalization
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. The area of coverage of a satellite radio beam is known as


A
Footprint
.
B.Circular polarization
C.Beam width
D
Identity
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. Which of the following data transmission media has the largest terrestrial range without the
use of repeaters or other devices?
A
Hardwiring
.
B.Microwave
C.Satellite
D
Laser
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
31. What is the minimum number of wires needed to send data over a serial communication link
layer?
A
1
.
B.2
C.4
D
6
.
E. none of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. The _____ layer is the layer closest to the transmission medium.


A
transport
.
B.network
C.data link
D
physical
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. What is the name of the device that connects two computers by means of a telephone line?
A
Tape
.
B.modem
C.bus
D
cable
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


34. What is the main difference between DDCMP and SDLG?
A
DDCMP does not need special hardware to final the beginning of a message.
.
B.DDCMP has a message header
C.SDLC has a IP address
D
SDLC does not use CRC
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. On a class B network, how many subnets are available with a subnet mask of 248?
A
2 B.6
.
D
C.30 62
.
E. 126
Answer & Explanation

Answer: Option C
36. Ethernet networks can be cabled in a number of topologies, depending on what works best in
each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the
best answer as to why Ethernet becomes less efficient as size increases.
A
Network collisions occur
.
B.Repeaters cannot increase the signal strength sufficiently
C.Cable terminators do not reflect the signal properly
D
Cable terminators do not absorb the signal properly
.
E. "Line echo" occurs due to the impedance of the cable
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


37. In a _____ topology, if there are n devices in a network, each device has n - 1 ports for
cables.
A
ring
.
B.bus
C.star
D
mesh
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. Typewriter terminals can print computer-generated data at a rate of


A
10 characters per second
.
B.120 characters per second
C.120 characters per minute
D
1200 characters per minute
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

39. To avoid transmission errors, a check figure is calculated by the


A
transmitting computer
.
B.receiving computer
C.both (a) and (b)
D
Start and stop bit
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. What is the first octet range for a class A IP address?


A
1 - 126
.
B.192 - 255
C.192 - 223
D
1 - 127
.
E. 128 - 191
Answer & Explanation

Answer: Option A

Explanation:
41. Which of the following is not a standard synchronous communication protocol?
A
SDLC
.
B.SMTP
C.SLIP
D
PAS
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. The network layer, in reference to the OSI model, provide


A data link procedures that provide for the exchange of data via frames that can be sent and
. received
B.the interface between the X.25 network and packet mode device
C.the virtual circuit interface to packet-switched service
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. In OSI network architecture, the routing is performed by


A
network layer
.
B.data link layer
C.transport layer
D
session layer
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

44. Which of the following communications lines is best suited to interactive processing


applications?
A
narrowband channels
.
B.simplex lines
C.full-duplex lines
D
mixed band channels
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. What is the first octet range for a class B IP address?


A
128 - 255
.
B.1 - 127
C.192 - 223
D
128 - 191
.
E. 127 - 191
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace


46. The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in
dotted decimal notation as
A
148.20.2.30
.
B.164.100.9.61
C.210.20.2.64
D
128.10.2.30
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. Which of the following items is not used in Local Area Networks (LANs)?
A
Computer
.
B.Modem
C.Printer
D
Cable
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. Error detection at a data link level is achieved by


A
bit stuffing
.
B.cyclic redundancy codes
C.Hamming codes
D
equalization
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

49. RS-232-G
A is an interface between two data circuit terminating equipment as examplified by a local
. and remote modem
is an interface standard between Data terminal Equipment and Data Circuit Terminating
B.
Equipment
specifies only the mechanical characteristics of an interface by providing a 25-pin
C.
connector
D
requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
.
E. None of the above
Answer & Explanation

Answer: Option B
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

50. A subdivision of main storage created by operational software is referred to as a:


A
compartment
.
B.time-shared program
C.divided core
D
partition
.
E. None of the above
Answer & Explanation

Answer: Option D
1.  What protocol is used between E-Mail servers?
A
FTP B.SMTP
.
D
C.SNMP POP3
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

2. If you configure the TCP/IP address and other TCP/IP parameters manually, you can always
verify the configuration through which of the following? Select the best answer.
A
Network Properties dialog box
.
B.Server Services dialog box
C.DHCPINFO command-line utility
D
Advanced Properties tab of TCP/ IP Info.
.
E. None of the above
Answer & Explanation

Answer: Option A
Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

3. In a PC to telephone hookup for long distance communication, modem is connected between
the telephone line and
A
PC
.
B.synchronous port
C.crossover cable
D
asynchronous port
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

4. Which of the following communications service provides message preparation and


transmission facilities?
A
Teletex
.
B.Teletext
C.x400
D
Fax
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

5. Four bits are used for packet sequence numbering in a sliding window protocol used in a
computer network. What is the maximum window size?
A
4
.
B.8
C.15
D
16
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:
6. A hard copy would be prepared on a
A
typewriter terminal
.
B.line printer
C.plotter
D
All of the above
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

7. Which of the following device copies electrical signals from one Ethernet to another?
A
bridge
.
B.repeater
C.hub
D
passive hub
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

8. Stephanie is in charge of a small network and wants to make it simple but secure. The users
want to have full control over their data and still be able to share data with the rest of the
office. The networking knowledge of the office staff is basic. Which network(s) would be the
best for Stephanie to set up?
A
Peer-to-peer
.
B.Master domain
C.Server-based
D
WAN
.
E. Share-level
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

9. When UPC is used, the price of the item is located


A
on the item
.
B.on the item and on the shelf
C.in computer storage
D
on the shelf and in computer storage
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

10. Error control is needed at the transport layer because of potential errors occurring _____.
A from transmission line noise
.
B.in routers
C.from out-of-sequence delivery
D
from packet losses.
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


11. The transport layer protocol is connectionless.
A
NVT
.
B.FTP
C.TCP
D
UDP
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

12. The fundamental requirements of private-to-public network interconnection methods which


need to be provided in gateways is/are
A
universal accessibility for private network Data Terminal Equipment (DTE)
.
B.adequate cost control mechanisms for administration of the private networks
C.to assign address to private network DTEs
D
a and b both
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

13. Communication between computers is almost always


A
serial
.
B.parallel
C.series parallel
D
direct
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

14. Which of the following is considered a broadband communications channel?


A
coaxial cable
.
B.fiber optic cable
C.microwave circuits
D
satellites systems
.
E. All of the above
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

15. Data link layer retransmits the damaged frames in most networks. If the probability of a
frame's being damaged is p, what is the mean number of transmissions required to send a
frame if acknowledgements are never lost.
A
P I (K + 1)
.
B.KIK (1 + F)
C.1/ (1 - F)
D
K I (K - P)
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


16. Which of the following characteristics is not true of NetBEUI?
A
Highly-customizable
.
B.Routable
C.Little configuration required
D
Fast for small networks to Self-tuning
.
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

17. The difference between a multiplexer and a statistical multiplexer is


A
Statistical multiplexers need buffers while multiplexers do not need buffers
.
B.Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol
Multiplexers often waste the output link capacity while statistical multiplexers optimize its
C.
use
D Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use
. Frequency Division Multiplexing (FDM)
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

18. You are trying to decide which type of network you will use at your office, and you want the
type that will provide communication and avoid collisions on the cable. Which of the
following is the best choice?
A
Token-Ring B.CSMA/CD
.
D
C.Ethernet CSMA/CA
.
E. ARCnet
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

19. Which of the following network access standard is used for connecting stations to a packet-
switched network?
A
X.3
.
B.X.21
C.X.25
D
X.75
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

20. Interconnected networks need communication processors such as switches, routers, hubs, and
gateways. Select the best fit for answer:
A
TCP/IP
.
B.Protocol
C.Open Systems
D Internetwork processor
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discu


21. A decrease in magnitude of current, voltage, a power of a signal in transmission between
points, is known as
A
Attenuation
.
B.Amplitude
C.Aloha
D
Carrier
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

22. The term "remote job entry" relates to


A
batch processing
.
B.realtime processing
C.transaction processing
D
distributed processing
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

23. Which of the following performs modulation and demodulation?


A
fiber optic
.
B.satellite
C.coaxial cable
D
modem
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

24. Data communications monitors available on the software market include


A
ENVIRON/1
.
B.TOTAL
C.BPL
D
Telenet
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

25. Which of the following statement is correct?


A spin stabilized satellite used solar cells mounted on a cylinder body that continuously
A
rotates so that 40 a time and it also uses gyroscopic action of a spinning satellite to
.
maintain its orientation towards the earth and the sun.
A spin stabilized satellite uses solar panels whose cells are continually oriented toward the
B.
sun
Satellite transponders use lower frequency reception of radiation from earth stations and
C.
higher frequency for transmission to earth stations.
D satellite transponders use a single frequency for reception and transmission from one point
. on earth to another
E. None of the above
Answer & Explanation

Answer: Option A
26. What is the default subnet mask for a class A network?
A
127.0.0.1
.
B.255.0.0.0
C.255.255.255.0.0
D
255.255.255.0
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

27. When using the loopback address, if TCP/IP is installed correctly, when should you receive a
response?
A
Immediately
.
B.Only if the address fails
C.After the next host comes online
D
Within two minutes
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

28. Which of the following statement is correct?


A Satellite transponders contain a receiver and transmitter designed to relay microwave
. transmissions from one point on earth to another.
Satellite transponders contain a device that echos the radiation without change from one
B.
point on earth to another.
C.Satellite transponder contains devices that transform the message sent from one location
on earth to a different code for transmission to another location.
D Satellite transponders use lower frequency reception of radiation from earth stations and
. higher frequency for transmission to earth stations
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

29. The modern enterprise is interconnected internally and externally by the Internet, intranets,
and other networks. Select the best fit for answer:
A
Internetworked enterprise
.
B.Information super highway
C.Business applications of telecommunications
D
Client/Server networks
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

30. The data communication support should include, but is not restricted to


A
file transfer and transaction processing
.
B.file and database access
C.terminal support, electronic mail and voice grams.
D
All of the above
.
Answer & Explanation

Answer: Option D

Explanation:
31. MAC is
A
a method of determining which device has access to the transmission medium at any time
.
B.a method access control technique or multiple-access transmission media
C.a very common bit-oriented data link protocol issued to ISO.
D
network access standard for connecting stations to a circuit-switched network
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. What is the name of the device that converts computer output into a form that can be
transmitted over a telephone line?
A
Teleport
.
B.Modem
C.Multiplexer
D
Concentrator
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. You are working with a network that has the network ID 172.16.0.0, and you require 25
subnets for your company and an additional 30 for the company that will merge with you
within a month. Each network will contain approximately 600 nodes. What subnet mask
should you assign?
A
255.255.192.0 B.255.255.224.0
.
D
C.255.255.240.0 255,255.248.0
.
E. 255.255.252.0
Answer & Explanation
Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which application allows a user to access and change remote files without actual transfer?
A
TELNET
.
B.NFS
C.FTP
D
DNS
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. Parity bit is
A an error-detecting code based on a summation operation performed on the bits to be
. checked.
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specific rules of construction, so that if
C. certain errors occur in an expression, the resulting expression will not conform to the rules
of construction and thus the presence of the errors in detected
D
the ratio of the number of data units in error to the total number of data units
.
E. None of the above
Answer & Explanation

Answer: Option B
31. MAC is
A
a method of determining which device has access to the transmission medium at any time
.
B.a method access control technique or multiple-access transmission media
C.a very common bit-oriented data link protocol issued to ISO.
D network access standard for connecting stations to a circuit-switched network
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

32. What is the name of the device that converts computer output into a form that can be
transmitted over a telephone line?
A
Teleport
.
B.Modem
C.Multiplexer
D
Concentrator
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

33. You are working with a network that has the network ID 172.16.0.0, and you require 25
subnets for your company and an additional 30 for the company that will merge with you
within a month. Each network will contain approximately 600 nodes. What subnet mask
should you assign?
A
255.255.192.0 B.255.255.224.0
.
D
C.255.255.240.0 255,255.248.0
.
E. 255.255.252.0
Answer & Explanation

Answer: Option E

Explanation:
No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

34. Which application allows a user to access and change remote files without actual transfer?
A
TELNET
.
B.NFS
C.FTP
D
DNS
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

35. Parity bit is
A an error-detecting code based on a summation operation performed on the bits to be
. checked.
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specific rules of construction, so that if
C. certain errors occur in an expression, the resulting expression will not conform to the rules
of construction and thus the presence of the errors in detected
D
the ratio of the number of data units in error to the total number of data units
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.


36. Which of the following file retrieval methods use hypermedia?
A
HTTP
.
B.WAIS
C.Veronica
D Archie
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

37. Which IP address class has few hosts per network?


A
D
.
B.C
C.B
D
A
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

38. Microprogramming is
A
assembly language programming
.
B.programming of minicomputers
C.control unit programming
D
macro programming of microcomputers
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.


View Answer Workspace Report Discuss in Forum

39. You are working with a network that has the network ID 192.168.10.0. What subnet should
you use that supports up to 12 hosts and a maximum number of subnets?
A
255.255.255.192
.
B.255.255.255.224
C.255.255.255. 240
D
255.255.255.248
.
E. 255.255.255.252
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

40. Which of the following statements is incorrect?


A Multiplexers are designed to accept data from several I/O devices and transmit a unified
. stream of data on one communication line.
B.HDLC is a standard synchronous communication protocol.
RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the
C.
DCE indicates that it is ready to accept data.
D
RTS/CTS is the way the terminal indicates ringing
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:
41. If communication software can be called the "traffic cop" of a micro communication system,
then what should the modem be called?
A
Park
.
B.Bridge
C.Interface
D
Link
.
E. None of the above
Answer & Explanation
Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

42. Which of the following specifies the network address and host address of the computer?
A
The IP address
.
B.The TCP address
C.The subnet mask
D
The default gateway
.
E. None of the above
Answer & Explanation

Answer: Option A

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

43. For connecting modem, a computer must be equipped with a port that conforms to the RS-
232 standard of the Electronic Industries Association of America. What do the letters 'RS'
stand for?
A
Recognised standard
.
B.Random sequence
C.Recommended standard
D
Registered source
.
E. None of the above
Answer & Explanation

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum


44. A network that requires human intervention of route signals is called a
A
bus network
.
B.ring network
C.star network
D
T-switched network
.
E. None of the above
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

45. What is the port number for POP3?


A
110 B.90
.
D
C.80 49
.
Answer & Explanation

Answer: Option A
46. Which of the following provides a storage mechanism for incoming mail but does not allow a
user to download messages selectively?
A
SMTP B.DHCP
.
D
C.IMAP POP3
.
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

47. On a class C network with a subnet mask of 192, how many subnets are available?
A
254 B.62
.
D
C.30 14
.
E. 2
Answer & Explanation

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

48. Ethernet and Token-Ring are the two most commonly used network architectures in the
world. Jim has heard of the different topologies for networks and wants to choose the
architecture that will provide him with the most options. Which of the following would that
be? Choose the most correct answer.
A Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it
. can be used in any topology
B.Ethernet, because it is cabled using fiber-optic cable
C.Token-Ring, because it uses a MAU
D Ethernet, because it can be set up with most topologies and can use multiple transfer
. speeds
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all
E.
topologies
Answer & Explanation

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

49. A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital
signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is
used.
A
500 Kbps
.
B.32 Kbps
C.8 Kbps
D
64 Kbps.
.
Answer & Explanation
Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

View Answer Workspace Report Discuss in Forum

50. How can you see the address of the DHCP server from which a client received its IP address?
A
By using Advanced Properties of TCP/IP
.
B.By using IPCONFIG/ALL
C.By using DHCPINFO
D
By pinging DHCP
.
E. None of the above
Answer & Explanation

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

Вам также может понравиться