A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
2. 1. Frames from one LAN can be transmitted to
another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
3. 2. Which of the following condition is used to
transmit two packets over a medium at the
same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
4. 3. You have a class A network address 10.0.0.0
with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow
for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
5. 4. What is the default subnet mask for a class C
network?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
6. 5. Which of the following is used for
modulation and demodulation?
A. modem
B. protocols
C. gateway
D. multiplexer
E. None of the above
7. 6. Which of the following is not a disadvantage
of wireless LAN?
A. Slower data transmission
B. higher error rate
C. interference of transmissions from different
computers
D. All of the above
8. 7. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to
other gateways or hosts
B. provides communication between the Internet Protocol
Software on one machine and the Internet Protocol
Software on another
C. reports error conditions to the original source, the
source must relate errors to individual application
programs and take action to correct the problem
D. All of the above
E. None of the above
9. 8. Your company has a LAN in its downtown office
and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to
share data and resources between the two
LANs, what type of device(s) are needed to
connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
10. 9. The term 'duplex' refers to the ability of the
data receiving stations to echo back a
confirming message to the sender. In full
duplex data transmission, both the sender
and the receiver
A. cannot talk at once
B. can receive and send data simultaneously
C. can send or receive data one at a time
D. can do one way data transmission only
E. None of the above
11. 10.Which of the following technique is used for
fragment?
A. a technique used in best-effort delivery systems to
avoid endlessly looping packets
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol
and places it in the data portion of the low level frame
C. one of the pieces that results when an IP gateway
divides an IP datagram into smaller pieces for
transmission across a network that cannot handle the
original datagram size
D. All of the above
E. None of the above
12. 11.Contention is
A. One or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition when two or more stations attempt to use the
same channel at the same time
D. collection of interconnected functional units that provides a
data communications service among stations attached to the
network
E. None of the above
13. 12.When you ping the loopback address, a
packet is sent where?
A. On the network
B. Down through the layers of the IP architecture and then up
the layers again
C. Across the wire
D. through the loopback dongle
E. None of the above
14. 13.Which of the following TCP/IP protocol is
used for transferring electronic mail
messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
15. 14.Which of the following device is used to
connect two systems, especially if the
systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
E. None of the above
16. 15.The synchronous modems are more costly
than the asynchronous modems because
A. they produce large volume of data
B. they contain clock recovery circuits
C. they transmit the data with stop and start bits.
D. they operate with a larger bandwidth
E. None of the above
17. 16.A distributed network configuration in which
all data/information pass through a central
computer is
A. bus network
B. star network
C. ring network
D. Point-to-point network
E. None of the above
18. 17.Which of the following TCP/IP protocol allows
an application program on one machine to
send a datagram to an application program
on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
E. None of the above
19. 18. A remote batch-processing operation in
which data is solely input to a central
computer would require a:
A. telegraph line
B. simplex lines
C. mixedband channel
D. All the above
E. None of the above
20. 19.What part of 192.168.10.51 is the Network
ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
E. None of the above
21. 20.The slowest transmission speeds are those of
A. twisted-pair wire
B. coaxial cable
C. fiber-optic cable
D. microwaves
22. 21.A noiseless 3 KHz Channel transmits bits with
binary level signals. What is the maximum
data rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
23. 22.Carrier is
A. One or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition when two or more sections attempt to use the
same channel at the same time
D. a collection of interconnected functional units that provides
a data communications service among stations attached to
the network
E. None of the above
24. 23.What can greatly reduce TCP/IP configuration
problems?
A. WINS Server
B. WINS Proxy
C. DHCP Server
D. PDC
E. None of the above
25. 24. Which of the following statements is correct for the
use of packet switching?
A. the subdivision of information into individually addressed
packets in conjunction with alternative routing
arrangement enabled the transmission path to be altered
in the event of congestion or individual link failure
B. the employment of additional intelligence within the
network enabled more sophisticated error control and link
control procedures to be applied
C. by employing wide bandwidth circuits for the trunk
networks substantial economies through extensive
sharing of capacity could be achieved.
D. All of the above
E. None of the above
26. 25. A front-end processor is
A. a user computer system
B. a processor in a large-scale computer that executes
operating system instructions
C. a minicomputer that relieves main-frame
computers at a computer centre of communications
control functions
D. preliminary processor of batch jobs.
E. None of the above
27. 26.To connect a computer with a device in the
same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
E. None of the above
28. 27.Internet-like networks within an enterprise.
A. Intranets
B. Switching alternating
C. Inter organizational networks
D. Extranets
29. 28.With an IP address of 100, you currently have
80 subnets. What subnet mask should you
use to maximize the number of available
hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
30. 29.Which of the following types of channels
moves data relatively slowly?
A. wideband channel
B. voiceband channel
C. narrowband channel
D. broadband channel
E. None of the above
31. 30.Which of the following is required to
communicate between two computers?
A. communications software
B. protocol
C. communications hardware
D. access to transmission medium
E. All of the above
32. 31.Which of the following does not allow
multiple users or devices to share one
communications line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
E. None of the above
33. 32.The geostationary satellite used for
communication systems
A. rotates with the earth
B. remains stationary relative to the earth
C. is positioned over equator
D. All of the above
E. None of the above
34. 33.Telecommunication networks frequently
interconnect an organization with its
customers and suppliers. Select the best fit
for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
35. 34.The _____ houses the switches in token ring.
A. transceiver
B. nine-pin connector
C. MAU
D. NIC
E. None of the above
36. 35.What device separates a single network into
two segments but lets the two segments
appear as one to higher protocols?
A. Switch
B. Bridge
C. Gateway
D. Router
37. 36. Which of the following refers to the terms
"residual error rate"?
A. the number of bit errors per twenty four hours of
continuous operation on an asynchronous line
B. The probability that one or more errors will be undetected
when an error detection scheme is used
C. the probability that one or more errors will be detected
when an error detection mechanism is used
D. signal to noise ratio divided by the ratio of energy per bit to
noise per hertz
E. None of the above
38. 37. The research and development department at your office
has been experimenting with different technologies to
help improve the performance of the network. One group
has been examining the use of a broadband network
versus a based band network. Select the correct
statement about broadband and baseband.
A. Broadband networks carry several channels on a single cable, whereas in
a baseband network several cables carry one channel
B. Baseband networks carry a single channel on a single cable, whereas
broadband networks carry several channels on a single cable
C. Baseband refers to local area networks, and broadband refers to wide
area networks.
D. Baseband operates at a standard bit rate, whereas broadband may
operate at different rates as needed
E. Broadband and baseband refer to the different frequencies at which
infrared operates then transmitting signals in certain conditions
39. 38.An error-detecting code inserted as a field in
a block of data to be transmitted is known as
A. Frame check sequence
B. Error detecting code
C. Checksum
D. flow control
E. None of the above
40. 39. The cheapest modems can transmit
A. 300 bits per second
B. 1,200 bits per second
C. 2,400 bits per second
D. 4,800 bits per second
E. None of the above
41. 40. Computers cannot communicate with each other
directly over telephone lines because they use
digital pulses whereas telephone lines use analog
sound frequencies. What is the name of the device
which permits digital to analog conversion at the
start of a long distance transmission?
A. Interface
B. Modem
C. Attenuation
D. Teleprocessor
E. None of the above
42. 41. Four routers have to be interconnected in a point-
to-point Network. Each pair of root us may
connected by a high-speed line, a medium speed
line or a low speed line. Find the total number of
topologies.
A. 12
B. 81
C. 48
D. 729
43. 42.Sending a file from your personal computer's
primary memory or disk to another computer
is called
A. uploading
B. downloading
C. logging on
D. hang on
E. None of the above
44. 43. HMP (Host Monitoring Protocol) is:
A. a TCP/IP protocol used to dynamically bind a high level IP
Address to a low-level physical hardware address
B. a TCP/IP high level protocol for transferring files from one
machine to another.
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
E. None of the above
45. 44.Which of the following is a voiceband
channel?
A. Telephone line
B. Telegraph line
C. Coaxial cable
D. Microwave systems
E. None of the above
46. 45.Demodulation is a process of
A. converting analog to digital signals
B. converting digital to analog signals
C. multiplexing various signals into one high speed line signals
D. performing data description.
47. 46.Internet-like networks between a company
and its business partners. Select the best fit
for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
48. 47.An example of an analog communication
method is
A. laser beam
B. microwave
C. voice grade telephone line
D. All of the above
E. None of the above
49. 48.Which of the following layer protocols are
responsible for user and the application
programme support such as passwords,
resource sharing, file transfer and network
management?
A. Layer 7 protocols
B. Layer 6 protocols
C. Layer 5 protocols
D. Layer 4 protocols
E. None of the above
50. 49.What frequency range is used for FM radio
transmission?
A. Very Low Frequency : 3 kHz to 30. kHz
B. Low Frequency : 30 kHz to 300 kHz
C. High Frequency : 3 MHz to 30 MHz
D. Very High Frequency : 30 MHz to 300 MHz
E. None of the above
51. 50.Transmission of computerised data from one
location to another is called
A. data transfer
B. data flow
C. data communication
D. data management
E. None of the above
52. 51.Compared to analog signals, digital signals
A. allow faster transmission
B. are more accurate
C. both (a) and (b)
D. All of the above
E. None of the above
53. 52.FDDI is a
A. ring network
B. star network
C. mesh network
D. bus based network
E. None of the above
54. 53.A central computer surrounded by one or
more satellite computers is called a
A. bus network
B. ring network
C. star network
D. All of the above
E. None of the above
55. 54. If delays are recorded as 10 bit numbers in a 50
router network, and delay vectors are exchanged
twice a second, how much bandwidth per fill duplex
line is occupied by the distributed routing
algorithm?
A. 500 bps
B. 1500 bps
C. 5 bps
D. 1000 bps
56. 55.HOSTS file entries are limited to how many
characters?
A. 8
B. 255
C. 500
D. Unlimited
E. None of the above
57. 56. Which of the following statement is incorrect?
A. The Addresses Resolution Protocol, ARP, allows a host to find
the physical address of a target host on the same physical
network, given only the target IP address.
B. The sender's IP - to- physical address binding is included in
every ARP broadcast; receivers update the IP-to-Physical
address binding information in their cache before processing
an ARP packet.
C. ARP is a low-level protocol that hides the underlying
network physical addressing, permitting us to assign IP-
addresses of our choice to every machine.
D. All of the above
E. None of the above
58. 57.Which of the following best illustrates the
default subnet mask for a class A,B, and C
Network?
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
E. None of the above
59. 58. Modulation is the process of
A. converting analog signals to digital signals
B. converting digital signals to analog signals
C. Multiplexing various signals into high speed line signals
D. performing data encryption.
60. 59.Devices interconnected by the LAN should
include
A. Computers and terminals
B. mass storage device, printers and plotters
C. bridges and gateways
D. All of the above
E. None of the above
61. 60.On a class B network, how many hosts are
available at each site with a subnet mask of
248?
A. 16,382
B. 8,190
C. 4,094
D. 2,046
E. 1,022
62. 61.Which of the following technique is used for
encapsulation?
A. a technique used in best-effort delivery systems to avoid
endlessly looping packets.
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol
and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides
an IP datagram into smaller pieces for transmission across
a network that cannot handle the original datagram size
D. All of the above
E. None of the above
63. 62.You are working with three networks that
have the network IDs 192.168.5.0,
192.168.6.0, and 192.168.7.0. What subnet
mask can you use to combine these
addresses into one?
A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
64. 63.With an IP address set starting with 150, you
currently have six offices that you are treating as
subnets. Plans are in place to open 10 more
offices before the end of the year. What subnet
mask should you use to satisfy the needed
number of subnets and maximize the number of
hosts available at each site?
A. 192
B. 224
C. 240
D. 248
E. 252
65. 64.A machine that connects to two or more
electronic mail systems and transfers mail
messages among them is known as
A. Gateways
B. mail gateway
C. bridges
D. User Agent
E. None of the above
66. 65.Error detection at a data link level is achieved
by
A. bit stuffing
B. cyclic redundancy codes
C. Hamming codes
D. equalization
67. 66.When the computer provides the manager
with a multiple choice of possible answers,
the prompting technique is
A. question and answer
B. form filling
C. open-ended question
D. menu selection
E. None of the above
69. 68.Which address is the loopback address?
A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
E. None of the above
70. 69.Intranets and extranets can use their network
fire walls and other security features to
establish secure Internet links within an
enterprise or with its trading partners. Select
the best fit for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
71. 70.Which of the following is an advantage to
using fiber optics data transmission?
A. resistance to data theft
B. fast data transmission rate
C. low noise level
D. few transmission errors
E. All of the above
72. 71.Communication network is
A. one or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition with two or more stations attempt to use the
same channel at the same time
D. a collection of interconnected functional units that provides
a data communications service among stations attached to
the network
E. None of the above
73. 72.Which of the following technique is used for
Time-To-Line (TTL)?
A. a technique used in best-effort delivery system to avoid
endlessly looping packets.
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol and
places it in the data portion of the low level frame
C. One of the pieces that results when an IP gateway divides an
IP datagram into smaller pieces for transmission across a
network that cannot handle the original datagram size.
D. All of the above
E. None of the above
74. 73. Which of the following statement is incorrect?
A. if a host moves from one network to another, its IP address
must change
B. routing uses the network portion of the IP address, the path
taken by packets travelling to a host with multiple IP
addresses depends on the address used.
C. IP addresses encode both a network and a host on that
network, they do not specify an individual machine, but a
connection to a network.
D. All of the above
E. None of the above
75. 74.Bandlimited signal is
A. transmission of signals without modulation
B. a signal all of whose energy is contained within a
finite frequency range
C. simultaneous transmission of data to a number of
stations
D. All of the above
E. None of the above
76. 75.Computers in a LAN can be interconnected by
radio and infrared technologies.
A. Wireless LANs
B. Network Topologies
C. Multiplexer
D. Modem
77. 76.How many digits of the Network User
Address are known as the DNIC (Data
Network Identification Code)?
A. first three
B. first four
C. first five
D. first seven
E. None of the above
78. 77.Which of the following is the address of the
router?
A. The IP address
B. The TCP address
C. The subnet mask
D. The default gateway
E. None of the above
79. 78.A devices that links two homogeneous
packet-broadcast local networks, is
A. hub
B. bridge
C. repeater
D. gateway
E. None of the above
80. 79.Identify the odd term amongst the following
group:
A. Coaxial cable
B. Optical fibre
C. Twisted pair wire
D. Microwaves
E. None of the above
81. 80.Which of the following divides the high speed
signal into frequency bands?
A. t-switch
B. modem
C. frequency-division multiplexer
D. time-division multiplexer
E. None of the above
82. 81.What is the first octet range for a class C IP
address?
A. 192 - 255
B. 192 - 223
C. 192 - 226
D. 128 - 191
E. 1 - 126
83. 82.Which of the following conditions is used to
transmit two packets over a medium at the
same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
84. 83. Distributed Queue Dual Bus is a standard for
A. LAN
B. MAN
C. WAN
D. Wireless LAN.
E. LAN and MAN
85. 84. A teleprocessing system may consist of
A. user systems
B. communications systems
C. computer center systems
D. All of the above
E. None of the above
86. 85.If the ASCII character G is sent and the
character D is received, what type of error is
this?
A. single-bit
B. multiple-bit
C. burst
D. recoverable
87. 86.Which layer of OSI determines the interface
of the system with the user?
A. Network
B. Application
C. Data-link
D. Session
E. None of the above
88. 87.The transfer of data from a CPU to peripheral
devices of a computer is achieved through
A. modems
B. computer ports
C. interfaces
D. buffer memory
E. None of the above
89. 88.What is the number of separate protocol
layers at the serial interface gateway
specified by the X.25 standard?
A. 4
B. 2
C. 6
D. 3
E. None of the above
90. 89.Many data communication networks have been
established which provide a wealth of on-
demand information services to people at
home. What is the name of the system which
provides an interactive, graphics-rich service
that permits user to select what they want?
A. Teletex system
B. Fax system
C. Videotex system
D. Microwave system
E. None of the above
91. 90.Which of the following statements is correct?
A. Terminal section of a synchronous modem contains the
scrambler
B. Receiver section of a synchronous modem contains the
scrambler
C. Transmission section of a synchronous modem contains the
scrambler
D. Control section of a synchronous modem contains the
scrambler
E. None of the above
92. 91.Because the configuration information for a
DHCP client is received dynamically, you must
use which utility to read the current
configuration to verify the settings?
A. PING
B. TRACERT
C. ARP
D. IPCONFIG
E. None of the above
93. 92.Which of the following characteristic(s) is/are
suited to the PSS applications?
A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international
packets switched services
C. Multiple remote host or applications accessed by a single
local access circuit terminal and circuit
D. All of the above
E. None of the above
94. 93.Which of the following is separated by a
subnet mask?
A. DHCP scopes
B. Network ID and host ID
C. Domains
D. Subnets
95. 94.The signal to noise ratio for a voice grade line
is 30.1 dB (decibels) or a power ratio of
1023:1. The maximum achievable data rate
on this line whose spectrum ranges from 300
Hz to 4300 Hz is
A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
E. None of the above
96. 95. TCP is:
A. Operates at the Data Link layer
B. Connection orientated and unreliable
C. Connection orientated and reliable
D. Connectionless and unreliable
97. 96. An encyclopedic database
A. is an information utility that specializes in storing
and searching information
B. is generally free
C. is easy for beginners to use
D. All of the above
E. None of the above
98. 97.Which of the following statements is correct?
A. Protocol converters are the same as multiplexers
B. Protocol converters are the same as TDMs
C. Protocol converters are usually not operated in pairs.
D. Protocol converters are usually operated in
E. None of the above
99. 98.Examples are packet switching using frame
relay, and cell switching using ATM
technologies. Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
100. 99.The physical layer, in reference to the OSI
model, defines
A. data link procedures that provide for the exchange of data
via frames that can be sent and received
B. the interface between the X.25 network and packet mode
device
C. the virtual circuit interface to packet-switched service
D. All of the above
E. None of the above
101. 100.A required characteristic of an online real-
time system is:
A. more than one CPU
B. offline batch processing
C. no delay in processing
D. All of the above
E. None of the above
102. 101.How many class A, B, and C network IDs can
exist?
A. 2,113,658
B. 16,382
C. 126
D. 128
E. None of the above
103. 102.Messages from one computer terminal can be
sent to another by using data networks. The
message to be sent is converted to an electronic
digital signal, transmitted via a cable, telephone
or satellite and then converted back again at the
receiving end. What is this system of sending
messages called?
A. Paperless office
B. Electronic mail
C. Global network
D. Electronic newspaper
E. None of the above
104. 103. HDLC (High-level Data Link Control) is
A. a method of determining which device has access to the
transmission medium at any time
B. a method access control technique for multiple-access
transmission media
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-
switched network
E. None of the above
105. 104.The first step in troubleshooting many
problems is to verify which of the following?
A. The subnet mask is valid
B. TCP/IP is installed correctly on the client
C. The WINS server is running
D. The BDC is operable
E. None of the above
106. 105.What protocol is used between E-Mail
servers?
A. FTP
B. SMTP
C. SNMP
D. POP3
107. 106.If you configure the TCP/IP address and other
TCP/IP parameters manually, you can always verify
the configuration through which of the following?
Select the best answer.
A. Network Properties dialog box
B. Server Services dialog box
C. DHCPINFO command-line utility
D. Advanced Properties tab of TCP/ IP Info.
E. None of the above
108. 107.In a PC to telephone hookup for long
distance communication, modem is
connected between the telephone line and
A. PC
B. synchronous port
C. crossover cable
D. asynchronous port
E. None of the above
109. 108.A hard copy would be prepared on a
A. typewriter terminal
B. line printer
C. plotter
D. All of the above
E. None of the above
110. 109.Arzeenah is in charge of a small network and wants to
make it simple but secure. The users want to have full
control over their data and still be able to share data
with the rest of the office. The networking knowledge
of the office staff is basic. Which network(s) would be
the best for Arzeenah to set up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. WAN
E. Share-level
111. 110.When UPC is used, the price of the item is
located
A. on the item
B. on the item and on the shelf
C. in computer storage
D. on the shelf and in computer storage
E. None of the above
112. 111. Error control is needed at the transport
layer because of potential errors occurring
A. from transmission line noise
B. in routers
C. from out-of-sequence delivery
D. from packet losses.
113. 112.The transport layer protocol is connectionless.
A. NVT
B. FTP
C. TCP
D. UDP
E. None of the above
114. 113.The fundamental requirements of private-
to-public network interconnection methods
which need to be provided in gateways is/are
A. universal accessibility for private network Data Terminal
Equipment (DTE)
B. adequate cost control mechanisms for administration of the
private networks
C. to assign address to private network DTEs
D. a and b both
E. None of the above
116. 115.The difference between a multiplexer and a
statistical multiplexer is
A. Statistical multiplexers need buffers while multiplexers do
not need buffers
B. Multiplexer use X.25 protocol, while statistical multiplexers
use the Aloha protocol
C. Multiplexers often waste the output link capacity while
statistical multiplexers optimize its use
D. Multiplexers use Time Division Multiplexing (TDM) while
statistical multiplexers use Frequency Division Multiplexing
(FDM)
E. None of the above
117. 116.You are trying to decide which type of network you
will use at your office, and you want the type that
will provide communication and avoid collisions on
the cable. Which of the following is the best choice?
A. Token-Ring
B. CSMA/CD
C. Ethernet
D. CSMA/CA
E. ARCnet
118. 117.A decrease in magnitude of current, voltage,
a power of a signal in transmission between
points, is known as
A. Attenuation
B. Amplitude
C. Aloha
D. Carrier
E. None of the above
119. 118.The term "remote job entry" relates to
A. batch processing
B. realtime processing
C. transaction processing
D. distributed processing
E. None of the above
120. 119.The modern enterprise is interconnected
internally and externally by the Internet,
intranets, and other networks. Select the
best fit for answer:
A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
E. None of the above
121. 120.When using the loopback address, if TCP/IP
is installed correctly, when should you
receive a response?
A. Immediately
B. Only if the address fails
C. After the next host comes online
D. Within two minutes
E. None of the above
122. 121. MAC is
A. a method of determining which device has access to the
transmission medium at any time
B. a method access control technique or multiple-access
transmission media
C. a very common bit-oriented data link protocol issued to ISO.
D. network access standard for connecting stations to a circuit-
switched network
E. None of the above
123. 122. Parity bit is
A. an error-detecting code based on a summation operation
performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the
sum of all the binary digits.
C. a code in which each expression conforms to specific rules of
construction, so that if certain errors occur in an expression,
the resulting expression will not conform to the rules of
construction and thus the presence of the errors in detected
D. the ratio of the number of data units in error to the total
number of data units
E. None of the above
124. 123.Which of the following file retrieval
methods use hypermedia?
A. HTTP
B. WAIS
C. Veronica
D. Archie
E. None of the above
125. 124.Which IP address class has few hosts per
network?
A. D
B. C
C. B
D. A
E. None of the above
126. 125. What is the port number for POP3?
A. 110
B. 90
C. 80
D. 49
127. 126.Which of the following provides a storage
mechanism for incoming mail but does not
allow a user to download messages
selectively?
A. SMTP
B. DHCP
C. IMAP
D. POP3
128. 127.Ethernet and Token-Ring are the two most
commonly used network architectures in the world.
Jim has heard of the different topologies for
networks and wants to choose the architecture that
will provide him with the most options. Which of
the following would that be? Choose the most
correct answer.
A. Token-Ring because it currently can run at both 4Mbps and
16Mbps. This means that it can be used in any topology
B. Ethernet, because it is cabled using fiber-optic cable
C. Token-Ring, because it uses a MAU
D. Ethernet, because it can be set up with most topologies and can
use multiple transfer speeds
E. Neither Token-Ring nor Ethernet is the proper choice. Only
ARCnet can be used in all topologies
129. 128.Two devices are in network if
A. a process in one device is able to exchange information with
a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
130. 129.When collection of various computers
seems a single coherent system to its client,
then it is called
A. computer network
B. distributed system
C. both (a) and (b)
D. none of the mentioned
131. 130.Which one of the following computer
network is built on the top of another
network?
A. prior network
B. chief network
C. prime network
D. overlay network
132. 131.In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
133. 132.Communication channel is shared by all the
machines on the network in
A. broadcast network
B. unicast network
C. multicast network
D. none of the mentioned
134. 133. Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. none of the mentioned
135. 134.A list of protocols used by a system, one
protocol per layer, is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
136. 135.Which one of the following extends a
private network across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
137. 136. The IETF standards documents are called
A. RFC
B. RCF
C. ID
D. None of the mentioned