OSI Reference Model
OSI Reference Model
OSI Reference Model
Class A subnetting is a form of network addressing typically reserved for the government and
larger institutions. It can have a large number of unique nodes, which can prove quite a
challenge. Here, Todd Lammle offers a simple approach to this addressing.
RSS
Comments 6
Facebook 6
Linkedin
Twitter
More
The Class A networking address scheme is designed for the government and large institutions needing a
great deal of unique nodes. Although the Class A network has only 254 unique network addresses, it can
contain approximately 17 million unique nodes, which can make subnetting such a network a nightmare.
Getting up to speed with subnetting Class A addresses requires a little forethought, some basic
information, and a lot of practice. Here, I will explain Class A subnet masks and how to assign valid
subnets and host addresses to provide flexibility in configuring your network.
If you wanted to create smaller networks (subnetworks) out of a Class A network ID, you’d borrow bits
from the host portion of the mask. The more bits you borrow, the more subnets you can have, but this
means fewer hosts per subnet. However, with a Class A mask, you have 24 bits to manipulate, so this
isn’t typically a problem.
Table A
Subnet zero
This chart assumes you can use subnet zero. If you’re not using subnet zero, subtract two from each
number in the Subnets column in Table A above.
Once you have an idea what your network will look like, write down the number of physical subnets you
have and the number of hosts needed for each subnet. For example, on a WAN point-to-point link, you
need only two IP addresses, so you can use a /30 mask.
/30
The slash (/) indicates the number of mask bits turned on. It saves you from typing, or pronouncing, the
whole mask. For example, /8 means 255.0.0.0, /16 is 255.255.0.0, and /24 is 255.255.255.0. You
pronounce it as "configure a slash 24 mask on that network." It's just an easier way of saying "configure
a 255.255.255.0 mask on that network."
Figure A is an example of assigning masks on a case-by-case basis or, in this instance, LAN by LAN. It
shows a network with eight LANs and two WANs connected to the corporate office, along with one
additional point-to-point, Fast Ethernet LAN connection to another building located next to the main
corporate office. This figure is an example of how I would draw out the network.
Figure A
Notice that I indicated the number of host addresses needed for each network connection.
Using this type of drawing, you can now look at the chart and assign a mask that fits each network. Just
remember to keep growth projections in mind.
Classless routing—the practice of assigning different size masks on your network—does not work unless
you run a routing protocol that supports prefix routing. RIP version 2, OSPF, and EIGRP are examples of
routing protocols that can support classless routing. Classful routing, on the other hand, means that all
hosts have the same size mask. RIP version 1 and IGRP are classful routing protocols, and neither will
work in a classless environment.
Classless routing
For more information on the protocols supporting classless routing, read these Todd Lammle articles:
Valid subnet address: To figure out the valid subnet address, simply subtract the subnet mask
from 256. For example, if you had a Class A mask of 255.240.0.0, the equation would be 256-
240=16. The number 16 is the first subnet and also your block size. Keep adding the block size
(in this case 16) to itself until you reach the subnet mask value. The valid subnets in this example
are 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224. As another example, if you had
a Class A subnet mask of 255.255.240.0, you’d use the mask on the second and third octets
minus 256. The second octet would be 256-255=1, 2, 3, etc., all the way to 254; the third octet
would be 256-240=16, 32, 48, etc.
Broadcast address: To determine the broadcast address of each subnet, just subtract 1 from the
next subnet value. For example, within the 16 subnet, the next subnet is 32, so the broadcast
address of the 16 subnet is 31. The broadcast address for the 32 subnet is 47, because the next
subnet is 48. The broadcast address for the 48 subnet is 63, because the next subnet is 64.
Valid host range: The valid hosts are the numbers between the subnet address and the
broadcast address. For the 16 subnet, the valid host range you can assign on a network is 17-30
because the subnet number is 16 and the broadcast address is 31. For the 32 subnet, the valid
host range is 33 to 46 because the subnet number is 32 and the broadcast address is 47. You
can’t use the subnet number and broadcast addresses as valid host addresses.
Figure B
In this example, the network ID used for the entire internetwork is 10.1.1.0.
You can build this network in many different ways, but I prefer to start with the WAN links (block size of
four) on the bottom and work my way up, while the largest LANs start at the top and work toward the
bottom. The network will work any way you construct it, as long as you configure your block sizes
correctly on the chart.
Now you have to assign the valid host ID to each LAN and WAN, and your network should be up and
running. It would be a good idea for you to use EIGRP as your routing protocol to help you get this up
and running quickly.
Subnet: 10.0.0.0
Broadcast: 10.15.255.255
Valid host range: 10.0.0.1 through 10.15.255.254
Subnet: 10.240.0.0
Broadcast: 10.255.255.255
Valid host range: 10.240.0.1 through 10.255.255.254
Subnet: 10.0.0.0
Broadcast: 10.0.127.255
Valid host range: 10.0.0.1 through 10.0.127.254
You must remember that the third octet is using only one subnet bit. This bit can be either off or on; if it
is off, the subnet is 0. If it is on, the subnet is 128.
Subnet: 10.0.128.0
Broadcast: 10.0.255.255
Valid host range: 10.0.128.1 through 10.0.255.254
If you use the 10.2.3.0 network, your subnets are always 2.3 in the second and third octets, respectively.
But the fourth octet is where it changes, as in 256-252=4, 8, 12, 16, 20, 24, 28, etc., all the way to 248. If
you use subnet zero, your first subnets are 0, and your last subnet is 255.
Subnet: 10.2.3.0
Broadcast: 10.2.3.3
Valid hosts: 10.2.3.1 and 10.2.3.2
Subnet: 10.2.3.252
Broadcast: 10.2.3.255
Valid hosts: 10.2.3.253 and 10.2.3.254
Application Layer
Application layer provides platform to send and receive data over the network. All applications and
utilities that communicate with network fall in this layer. For examples
Application layer protocols that we should know for exam are following:
SNMP (Simple Network Management Protocol) — Used to control the connected networking devices.
TFTP (Trivial File Transfer Protocol) — Used to transfer the files rapidly.
DNS (Domain Naming System) — Used to translate the name with IP address and vice versa.
DHCP (Dynamic Host Configuration Protocol) — Used to assign IP address and DNS information
automatically to hosts.
Presentation layer
Presentation layer prepares the data. It takes data from application layer and marks it with formatting code
such as .doc, .jpg, .txt, .avi etc. These file extensions make it easy to realize that particular file is
formatted with particular type of application. With formatting presentation layer also deals with
compression and encapsulation. It compresses (on sending computer) and decompresses (on receiving
computer) the data file. This layer can also encapsulate the data, but it’s uncommon as this can be done by
lower layers more effectively.
Transport Layer
So far CCNA exam is concern; this is the most important layer to study. I suggest you to pay extra
attentions on this layer, as it is heavily tested in exam.
1. Segmentation
2. Connection management
3. Reliable and unreliable data delivery
4. Flow control
5. Connection multiplexing
Segmentation
Segmentation is the process of breaking large data file into smaller files that can be accommodated by
network. To understand this process thinks about a 700 MB movie that you want to download from
internet. You have 2MBPS internet connection. How will you download a 700MB movie on 2MBPS
internet connection?
In this case segmentation process is used. On server transport layer breaks 700MB movie in smaller size
of segments (less than your internet connection speed). Assume that 700Mb movie is divided in 700
segments. Each segment has file size of 1Mb that your PC can easily download at current connection
speed. Now your PC will download 700 small files instead of one large file. So next time when you see
download progress bar in browser, think it about segment receiver progress bar. Once your browser
receives all segments from server, it will pop up a message indicating download is completed. Transport
layer at your PC will merge all segments back in a single 700Mb movie file. End user will never know
how a 700Mb movie makes its way through the 2Mbps connection line.
Connection management
Transport layer setup, maintain and tear down connections for session layer. Actual mechanic of
connection is controlled by transport layer. Transport layer use two protocols for connection management
UDP and TCP.
UDP
UDP is a connection less protocol. Connection-less transmission is said to be unreliable. Now, don't get
worried about the term "unreliable" this doesn't mean that the data isn't going to get its destination; its
only means that it isn't guaranteed to get its destination. Think of your options when you are sending a
postcard, put it in the mailbox, and chances are good that it will get where it's supposed to go but there is
no guarantee. There is always a chance of missing in the way. On the other hand, it's cheap.
TCP
TCP is a connection oriented protocol. Connection-oriented transmission is said to be reliable. Think TCP
as registry AD facility available in Indian post office. For this level of service, you have to buy extra
ticket and put a bunch of extra labels on it to track where it is going and where it has been. You get a
receipt when it is delivered. In this method you have a guaranteed delivery. All of this costs you more—
but it is reliable!
Reliability
Reliability means guaranteed data delivery. To insure delivery of each single segment, connection
oriented method is used. In this approach before sending any segments three way handshake process is
done.
Once connection is established data transmission will be initiated. To provide maximum reliability it
includes following functions:-
Flow control
In this method sender sends data according to its buffer size. Receiver receives data in its buffer. When
receivers buffer get filled, it send a not ready signal to sender, so sender can stop transmitting more
segments. Receivers send ready signal when it becomes ready to receive next segments. This method has
two problems.
First, the receiver may respond to the sender with a not ready signal only when its buffer fills up.
While this message is on its way to the sender, the sender is still sending segments to the receiver,
which the receiver will have to drop because its buffer space is full.
The second problem with the uses of this method is that once the receiver is ready to receive
more segments, it must first send a ready signal to the sender, which must be received before
sender can send more segments.
Windowing
In windowing a window size is defined between sender and receiver. Sender host will wait for an
acknowledgement signal after sending the segments equal to the window size. If any packet lost in the
way, receiver will respond with acknowledgement for lost packet. Sender will send lost packet again.
Window size is automatically set during the three step handshake process. It can be adjust anytime
throughout the lifetime of connection.
Connection multiplexing feature allows multiple applications to connect at a time. For example a server
performs a number of functions like email, FTP, DNS, Web service, file service, data service etc.
Suppose server has a single IP address, how will it perform all these different functions for all the hosts
that want to connect with it? To make this possible transport layer assigns a unique set of numbers for
each connection. These numbers are called port or socket numbers. These port numbers allow multiple
applications to send and receive data simultaneously.
TCP UDP
FTP 20, 21 DNS 53
Telnet 23 DHCP 67,68
SMTP 25 TFTP 69
DNS 53 NTP 123
HTTP 80 SNMP 161
POP 110
NNTP 119
HTTPS 443
Network Layer
Network layer is responsible for providing logical address known as IP address. Router works on this
layer. Main functions of this layer are following:-
Define IP address
Find routes based on IP address to reach its destination
Connect different data link type together like as Token Ring, Serial, FDDI, Ethernet etc.
IP address
IP address a 32 bit long software address which made from two components:
Subnet mask is used to distinguish between network component and host component.
127 is a reserved address and it is used for testing, like a loop back on an interface:
IP packet
Network layer receive segment from transport layer and wrap it with IP header that is known as datagram.
Datagram
Datagram is just another name of packet. Network layer use datagram to transfer information between
nodes.
Two types of packets are used at the Network layer: data and route updates.
Data packets
Data packets are used to transport the user data across the network. Protocols used by data packets are
known as routed protocol. For example IP and IPv6
MAC Address
MAC address is a 48 bit long layer two address. It is also known as hardware address. This address is
burnt with device by manufacturing company.
The first six hexadecimal digits of a MAC address represent its manufacture company.
You can have the same MAC address in different broadcast domains.
Frame
Data link layer receive packet from network layer and wrap it with layer two Header that is known as
frame. There are two specifications of Ethernet frame.
1. Ethernet II
2. 802
Ethernet II does not have any sub layers, while IEEE 802.2/3 has two: LLC and MAC.
Ethernet II has a type field instead of a length field (used in 802.3).
802.2 use a SAP or SNAP field to differentiate between encapsulated layer-3 payloads.
With a SNAP frame, the SAP fields are set to 0xAA and the type field is used to indicate the
layer-3 protocol.
802.2 SAP frame is eight bits in length and only the first six bits are used for identifying upper-
layer protocols, which allows up to 64 protocols.
802.2 SNAP frame supports up to 65,536 protocols.
Physical Layer
Physical layer deals with communication media. This layer receive frame from data link layer and convert
them in bits. It loads these bits on actual communication media. Depending on media type these bit values
are converted in single. Some use audio tones, while others utilize state transitions—changes in voltage
from high to low and low to high.
Piece of data passed between layers collectively known as PDU (protocol data unit). Layers have
different terms to describe it like (segment in transport layer, packet in network layer, frame at data link
layer, and signal at physical layer.)
PDU include data file and a consistent body of information attached onto data at each successive layer.
This information is called header and footer. It includes instructions on how to restore the file to its
original state when it receives to the target system.
As a PDU passes through the layers, a header (and footer only on data link layer) is added to the packet
with information to the peer layer on the destination system for reconstructing the data on its way back up
through the layers of the destination network.
In data exchange process, participating computers work in reverse mode. Layers on receiving computer
perform the same task in reverse mode.
The receiving device takes delivery of, handles, and translates the data from the sending device at a
particular layer. For example on sending computer presentation layer compress the data, same
presentation layer on receiving computer decompress the data.
On sending computer
On receiving computer
Physical layer receive signals from media and convert them in frames. Frames are forwarded to
the data link layer.
Data link layer check the frame. All tampered frame are dropped here. If frame is correct, data
link layer strip down its header and footer from frame and hand over packet to network layer.
Network layer check the packet with its own implementations. If it's found everything fine with
packet, it strips down its header from packet and hand over segment to transport layer.
Transport layer again do the same job. It verifies the segments with its own protocol rules. Only
the verified segments are processed. Transport layer remove its header from verified segments
and reassemble the segments in data. Data is handed over the session layer.
Session layer keep track of open connection and forwarded the receiving data to presentation
layer.
Presentation form the data in such a way that application layer use it.
Application layer on receiving computer find the appropriate application from the computer and
open data within particular application.
In nutshell
At the sending device, each layer breaks the data down into smaller packets and adds its own header.
At the receiving device, each layer strips off the header and builds the data packets into larger packets.
Each protocol layer is blind to the headers of any other protocol layer and cannot process them.
TCP/IP protocol model is another popular layer model that describes network standards. For CCNA exam
you should be aware about this model as well. This model has same names of layers as OSI reference
model has. Don't be confuse with same name, layers at both model have different functionality in each
model.
Let's see how TCP/IP model is different from OSI reference model
Application layer:
TCP/IP model combine the functionality of application layer, presentation layer and session layer from
OSI model in single application layer. In TCP/IP model application layer do all tasks those are performed
by upper layers in OSI model. Application layer deals with high level protocols, including data
presentation, compression and dialog control.
Transport layer:
In TCP/IP model transport layer provides quality of services. TCP protocol is used for reliable data
delivery. Flow control and error correction methods are used for guaranteed data delivery.
Internet layer:
In TCP/IP model Internet layer provide all the functionality that network layer provides in OSI model.
Internet layer is responsible for finding the correct path for datagram [packet].
Name of this layer may confuse you as OSI model has a layer of same name. In TCP/IP model network
access layer deals with LAN and WAN protocols and all the functionality provided by physical and data
link layer in OSI model.
Cisco's three-layer hierarchical model
Cisco's three layer hierarchical model is a set of networking specification provided by Cisco. This model
describe which cisco device works on which layers.
Core Layer
Distribution Layer
Distribution layer stands between access and core layers. Router and layer 3 switch works in this layer.
Access Layer
This layer provides user's initial access to the network via switches or hubs.
That’s all for this article. In next article I will explain another CCNA topic.
I know the following - but I'm not sure what their meaning is:
Fragment
Segment
Packet
Frame
Datagram
schmijos
2,14211329
add a comment
4 Answers
active oldest votes
Taking from Section 1.2 in TCP/IP Illustrated: Vol 1 by Richard Stevens et al.,
consider the 4 layered TCP/IP stack:
+-------------+-------------------------+
| Application | Telnet, FTP, etc |
+-------------+-------------------------+
| Transport | TCP, UDP |
+-------------+-------------------------+
| Network | IP, ICMP |
+-------------+-------------------------+
| Link | drivers, interface card |
+-------------+-------------------------+
Segment: If the transport protocol is TCP, the unit of data sent from TCP to
network layer is called Segment.
Datagram: This is used in 2 layers. If the network protocol is IP, the unit of data is
up vote 31 called Datagram. At transport layer, if protocol is UDP, we use datagram there as
down vote well. Hence, we differentiate them as UDP Datagram, IP Datagram.
accepted
Frame: Physical layer representation.
Packet: It is a more generic term used either transport layer or network layer. TCP
Packet, UDP Packet, IP Packet etc. I have not seen it to represent Physical layer
data units.
Bhaskar
8661716
Whilst it's not common, you do occasionally hear of "ethernet packets", eg on
1 the Wireshark wiki. "Frame" is certainly more standard at the physical layer.
– Tom Anderson Jul 24 '12 at 21:37
"Protocol data unit" is a generic, albeit achingly OSI-ish, term for all of these,
across the hierarchy. – Tom Anderson Jul 24 '12 at 21:38
I haven't read the book though I should.. but are you sure that's taken from
stevens book? 'cos that doesn't really look quite right from a technical
perspective.. e.g. I think in the TCP/IP reference model / architecture, it's
Internetwork Layer not Network layer. Network layer is ISO/OSI terminology.
And I think there's a "Link Layer" in the TCP/IP ref model that I don't see in
your answer. And in the ISO OSI ref model, layer 1(Physical) I have heard a
'packet' there is called a symbol, Layer 2 is a frame. – barlop Nov 19 '14 at
6:35
@barlop: Replace "Network" with "Internet" and replace "Physical" with
"Network Access" in the above diagram, and it will match the TCP/IP model I
studied from O'Reilly. – Wildcard Oct 8 '15 at 8:06
@Wildcard The term datagram is used in the definition of UDP(the D in UDP),
and the RFC for IP(uses the term IP datagram), and the term is defined in RFC
1594 See that definition. It says it should be self contained n have sufficient
info to be routed from source to dest. UDP resembles the datagram definition
1
because it is connection-less, so it doesn't rely on earlier messages, so is self
contained in that sense.Packet resembles the datagram definition,'cos it has the
source n dest network address so "self contained" and "sufficient information
to be routed from source to dest") – barlop Oct 8 '15 at 10:02
show 8 more comments
The answer above is complete. Nevertheless, I think the term packet came from packet
switching if I remembered that correctly ..
So here is the Packet Term. In regard of fragment I concur with Josua Schmid's answer.
1. How many digits of the DNIC (Data Network Identification Code) identify the country?
A
first three
.
B.first four
C.first five
D
first six
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
2. A station in a network forwards incoming packets by placing them on its shortest output
queue. What routing algorithm is being used?
A
hot potato routing
.
B.flooding
C.static routing
D
delta routing
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
3. The probability that a single bit will be in error on a typical public telephone line using 4800
bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error
rate for a communication line using 9-bit frames is approximately equal to
A
0.003
.
B.0.009
C.0.991
D
0.999
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
4. Frames from one LAN can be transmitted to another LAN via the device
A
Router B.Bridge
.
D
C.Repeater Modem
.
Answer & Explanation
Answer: Option B
Explanation:
5. Which of the following condition is used to transmit two packets over a medium at the same
time?
A
Contention
.
B.Collision
C.Synchronous
D
Asynchronous
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A
255.240.0.0 B.255.248.0.0
.
D
C.255.252.0.0 255.254.0.0
.
E. 255.255.255.255
Answer & Explanation
Answer: Option D
Explanation:
7. What are the most commonly used transmission speeds in BPS used in data communication?
A
300
.
B.1200
C.2400
D
9600
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option D
Explanation:
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option D
Explanation:
12. Your company has a LAN in its downtown office and has now set up a LAN in the
manufacturing plant in the suburbs. To enable everyone to share data and resources between
the two LANs, what type of device(s) are needed to connect them? Choose the most correct
answer.
A
Modem B.Cable
.
D
C.Hub Router
.
Answer & Explanation
Answer: Option D
Explanation:
13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A
cannot talk at once
.
B.can receive and send data simultaneously
C.can send or receive data one at a time
D
can do one way data transmission only
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
14. How many hosts are attached to each of the local area networks at your site?
A 128
.
B.254
C.256
D
64
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option C
Explanation:
Explanation:
12. Your company has a LAN in its downtown office and has now set up a LAN in the
manufacturing plant in the suburbs. To enable everyone to share data and resources between
the two LANs, what type of device(s) are needed to connect them? Choose the most correct
answer.
A
Modem B.Cable
.
D
C.Hub Router
.
Answer & Explanation
Answer: Option D
Explanation:
13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
A
cannot talk at once
.
B.can receive and send data simultaneously
C.can send or receive data one at a time
D
can do one way data transmission only
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
Answer: Option C
Explanation:
16. Contention is
A
One or more conductors that serve as a common connection for a related group of devices
.
B.a continuous frequency capable of being modulated or impressed with a second signal
C.the condition when two or more stations attempt to use the same channel at the same time
D a collection of interconnected functional units that provides a data communications service
. among stations attached to the network
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option B
Explanation:
Answer: Option C
Explanation:
Answer: Option B
Explanation:
20. Which of the following TCP/IP protocol is used for transferring electronic mail messages
from one machine to another?
A
FTP
.
B.SNMP
C.SMTP
D
RPC
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
21. Which of the following device is used to connect two systems, especially if the systems use
different protocols?
A
hub
.
B.bridge
C.gateway
D
repeater
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
22. The synchronous modems are more costly than the asynchronous modems because
A
they produce large volume of data
.
B.they contain clock recovery circuits
C.they transmit the data with stop and start bits.
D
they operate with a larger bandwidth
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
23. A distributed network configuration in which all data/information pass through a central
computer is
A
bus network
.
B.star network
C.ring network
D
Point-to-point network
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
25. A remote batch-processing operation in which data is solely input to a central computer
would require a:
A
telegraph line
.
B.simplex lines
C.mixedband channel
D
All the above
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Explanation:
27. If you get both local and remote echoes, every character you type will appear on the screen
A
once
.
B.twice
C.three times
D
never
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
28. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?
A
192
.
B.192.168.10
C.0.0.0.5
D
51
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
30. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum
data rate?
A
3 Kbps
.
B.6 Kbps
C.12 Kbps
D
24 Kbps.
.
Answer & Explanation
Answer: Option B
Explanation:
31. Carrier is
A
One or more conductors that serve as a common connection for a related group of devices
.
B.a continuous frequency capable of being modulated or impressed with a second signal
C.the condition when two or more sections attempt to use the same channel at the same time
D a collection of interconnected functional units that provides a data communications service
. among stations attached to the network
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option C
Explanation:
Answer: Option B
Explanation:
34. Which of the following statements is correct for the use of packet switching?
the subdivision of information into individually addressed packets in conjunction with
A
alternative routing arrangement enabled the transmission path to be altered in the event of
.
congestion or individual link failure
the employment of additional intelligence within the network enabled more sophisticated
B.
error control and link control procedures to be applied
by employing wide bandwidth circuits for the trunk networks substantial economies
C.
through extensive sharing of capacity could be achieved.
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option C
Explanation:
Answer: Option A
Explanation:
37. Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk
Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are
needed to resolve the contention?
A
7 slots
.
B.5 slots
C.10 slots
D
14 slots
.
Answer & Explanation
Answer: Option A
Explanation:
38. Usually, it takes 10-bits to represent one character. How many characters can be transmitted
at a speed of 1200 BPS?
A
10
.
B.12
C.120
D
1200
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
39. To connect a computer with a device in the same room, you might be likely to use
A
a coaxial cable
.
B.a dedicated line
C.a ground station
D All of the above
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option A
Explanation:
Answer: Option B
Explanation:
42. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use
to maximize the number of available hosts?
A
192 B.224
.
D
C.240 248
.
E. 252
Answer & Explanation
Answer: Option E
Explanation:
Answer: Option C
Explanation:
Answer: Option E
Explanation:
45. Which of the following does not allow multiple users or devices to share one
communications line?
A
doubleplexer
.
B.multipplexer
C.concentrator
D
controller
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option C
Explanation:
Answer: Option B
Explanation:
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
50. What device separates a single network into two segments but lets the two segments appear
as one to higher protocols?
A
Switch B.Bridge
.
D
C.Gateway Router
.
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
2. Which of the following summation operations is performed on the bits to check an error-
detecting code?
A
Codec B.Coder-decoder
.
D
C.Checksum Attenuation
.
Answer & Explanation
Answer: Option C
Explanation:
3. The research and development department at your office has been experimenting with
different technologies to help improve the performance of the network. One group has been
examining the use of a broadband network versus a based band network. Select the correct
statement about broadband and baseband.
A Broadband networks carry several channels on a single cable, whereas in a baseband
. network several cables carry one channel
Baseband networks carry a single channel on a single cable, whereas broadband networks
B.
carry several channels on a single cable
C.Baseband refers to local area networks, and broadband refers to wide area networks.
D Baseband operates at a standard bit rate, whereas broadband may operate at different rates
. as needed
Broadband and baseband refer to the different frequencies at which infrared operates then
E.
transmitting signals in certain conditions
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option A
Explanation:
Answer: Option B
Explanation:
7. What is the usual number of bits transmitted simultaneously in parallel data transmission used
by microcomputers?
A
16
.
B.9
C.8
D
4
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
9. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may
connected by a high-speed line, a medium speed line or a low speed line. Find the total
number of topologies.
A
12 B.81
.
D
C.48 729
.
Answer & Explanation
Answer: Option D
Explanation:
10. A network consists of eight NT servers. You are planning to move servers to different
segments of your network, what utility should be used at each server to determine which
server generates the most traffic?
A
NBTSTAT
.
B.NETSTAT.EXE
C.Performance Monitor
D
Network Monitor
.
E. ARP.EXE
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option A
Explanation:
12. What is the name of the software package that allows people to send electronic mail along a
network of computers and workstations?
A
Memory resident package
.
B.Project management package
C.Data communication package
D
Electronic mail package
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
13. The communication mode that supports two-way traffic but only one direction at a time is
A
simplex
.
B.duplex
C.half duplex
D
multiplex
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option C
Explanation:
Answer: Option A
Explanation:
Answer: Option D
Explanation:
At 8 Mbps, a station can transmit 80,000 bits or 10,000 bytes in 10 msec. This is an upper
bound on frame length. From this amount, some overhead must be subtracted, giving a
slightly lower limit for the data portion. Therefore, 10,000 B frame is the correct answer.
Explanation:
18. To connect a computer with a device in the same room, you might be likely to use
A
a coaxial cable
.
B.a dedicated line
C.a ground station
D
All of the above
.
Answer & Explanation
Answer: Option A
Explanation:
19. Demodulation is a process of
A
converting analog to digital signals
.
B.converting digital to analog signals
C.multiplexing various signals into one high speed line signals
D
performing data description.
.
Answer & Explanation
Answer: Option A
Explanation:
20. Internet-like networks between a company and its business partners. Select the best fit for
answer:
A Bandwidth alternatives
.
B.Switching alternating
C.Inter organizational networks
D
Extranets
.
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option D
Explanation:
22. Which of the following layer protocols are responsible for user and the application
programme support such as passwords, resource sharing, file transfer and network
management?
A
Layer 7 protocols
.
B.Layer 6 protocols
C.Layer 5 protocols
D
Layer 4 protocols
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option D
Explanation:
Answer: Option C
Explanation:
Answer: Option C
Explanation:
Answer: Option D
Explanation:
22. Which of the following layer protocols are responsible for user and the application
programme support such as passwords, resource sharing, file transfer and network
management?
A
Layer 7 protocols
.
B.Layer 6 protocols
C.Layer 5 protocols
D
Layer 4 protocols
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option C
Explanation:
Answer: Option C
Explanation:
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option C
Explanation:
29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are
exchanged twice a second, how much bandwidth per fill duplex line is occupied by the
distributed routing algorithm?
A
500 bps
.
B.1500 bps
C.5 bps
D
1000 bps
.
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option C
Explanation:
29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are
exchanged twice a second, how much bandwidth per fill duplex line is occupied by the
distributed routing algorithm?
A
500 bps
.
B.1500 bps
C.5 bps
D
1000 bps
.
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option B
Explanation:
Answer: Option B
Explanation:
Answer: Option D
Explanation:
33. You are working with a network that has the network ID 192.168.10.0. What subnet should
you use that supports up to 25 hosts and a maximum number of subnets?
A
255.255.255.192 B.255.255.255.224
.
D
C.255.255.255.240 255.255.255.248
.
E. 255.255.255.252
Answer & Explanation
Answer: Option B
Explanation:
34. Which of the following best illustrates the default subnet mask for a class A,B, and C
Network?
A
0.0.0.0, 0.0.0.1, 0.0.1.1
.
B.255.255.255.0, 255.255.0.0, 255.0.0.0
C.255.0.0.0, 255.255.0.0, 255.255.255.0
D
255.255.0.0, 255.255.255.0, 255.255.255.255
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option D
Explanation:
37. What are the data transmission channels available for carrying data from one location to
another?
A
Narrowband
.
B.Voiceband
C.Broadband
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
38. On a class B network, how many hosts are available at each site with a subnet mask of 248?
A
16,382 B.8,190
.
D
C.4,094 2,046
.
E. 1,022
Answer & Explanation
Answer: Option D
Explanation:
Explanation:
40. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0,
and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
A
255.255.252.0 B.225.255.254.0
.
D
C.255.255.255.240 255.255.255.252
.
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
42. A machine that connects to two or more electronic mail systems and transfers mail messages
among them is known as
A Gateways
.
B.mail gateway
C.bridges
D
User Agent
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
43. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the
modulation rate is
A
1200 bands
.
B.3200 bands
C.4800 bands
D
9600 bands
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
45. When the computer provides the manager with a multiple choice of possible answers, the
prompting technique is
A
question and answer
.
B.form filling
C.open-ended question
D
menu selection
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option E
Explanation:
47. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would
use a(n)
A
POS terminal
.
B.data collection terminal
C.batch processing terminal
D
intelligent terminal
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option C
Explanation:
49. Error rate is
A an error-detecting code based on a summation operation performed on the bits to be
. checked.
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specific rules of construction, so that if
C. certain errors occur in an expression, the resulting expression will not conform to the rules
of construction and thus the presence of the errors is detected.
D
the ratio of the number of data units in error to the total number of data units
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
50. Intranets and extranets can use their network fire walls and other security features to establish
secure Internet links within an enterprise or with its trading partners. Select the best fit for
answer:
A
Network Server
.
B.Virtual Private Network
C.Network operating system
D
OSI
.
Answer & Explanation
Answer: Option B
Explanation:
1. Telecommunications networks come in a wide range of speed and capacity capabilities. Select
the best fit for answer:
A
Bandwidth alternatives
.
B.Switching alternating
C.Inter organizational networks
D
Extranets
.
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option C
Explanation:
4. What frequency range is used for TV transmission and low power microwave applications?
A
Very Low Frequency : 3 kHz to 30 kHz
.
B.Medium Frequency : 300 kHz to 3 MHz
C.Ultra High Frequency : 300 MHz to 3000 MHz
D
Super High Frequency : 3000 MHz to 30000 MHz
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option C
Explanation:
Answer: Option C
Explanation:
Answer: Option B
Explanation:
12. When two computers communicate with each other, they send information back and forth. If
they are separated by a reasonable distance, they can send and receive the information
through a direct cable connection which is called a null-modem connection. Presently what is
the maximum distance in metres permitted in this null-modem connection?
A
80
.
B.100
C.30
D
150
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
13. Modulation in which the two binary values are represented by two different amplitudes of the
carrier frequency is known as
A
Amplitude-shift keying
.
B.Amplitude
C.Amplitude modulation
D
Aloha
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
14. You have been contracted to install a windows NT network in an office that is located in a
strip mall. The office is located next to the power plant of the building, so a UPS
(uninterruptible power supply) has already been installed. What type of cable should you use
for the network cabling? Choose the best answer.
A
TI B.UTP
.
D
C.Fiber-optic PSTN
.
E. STP
Answer & Explanation
Answer: Option E
Explanation:
Answer: Option B
Explanation:
16. In a synchronous modem, the digital-to-analog converter transmits signal to the
A
equalizer
.
B.modulator
C.demodulator
D
terminal
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
17. If the client receives an address from a DHCP server, what is the only information available
in the Network Properties dialog box?
A
The IP address
.
B.The subnet address
C.That the client is receiving its address from DHCP
D
The default gateway
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
18. An internetworking protocol that provides virtual circuit service across multiple X.25
protocol, is
A
X.75
.
B.X.25
C.X.400
D
X.21
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
19. Which of the following TCP/IP protocol is used for transferring files from one machine to
another?
A
RARP
.
B.ARP
C.TCP
D
FTP
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option D
21. Which transmission mode is used for data communication along telephone lines?
A
Parallel
.
B.Serial
C.Synchronous
D
Asynchronous
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
23. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should
you use to maximize the number of available hosts?
A
192 B.224
.
D
C.240 248
.
E. 252
View Answer Workspace Report Discuss in Forum
24. Which of the following communications modes support two-way traffic but in only one
direction of a time?
A
simplex
.
B.half-duplex
C.three-quarters duplex
D
full-of the above
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
25. Which of the following TCP/IP internet protocol a diskless machine uses to obtain its IP
address from a server?
A
RDP
.
B.RARP
C.RIP
D
X.25
.
E. None of the above
Answer & Explanation
Answer: Option B
26. In OSI network architecture, the dialogue control and token management are responsibilities
of
A
session layer
.
B.network layer
C.transport layer
D data link layer
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
27. Which of the following transmission systems provides the highest data rate to an individual
device
A
Computer bus
.
B.Telephone lines
C.Voice band modem
D
leased lines
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
29. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI
model. A number of standards were agreed upon during that time. Which of the following is
the standard for Ethernet?
A
802.2 B.802.3
.
D
C.802.4 802.5
.
E. 802.6
Answer & Explanation
Answer: Option B
Explanation:
30. Which of the following digits are known as the terminal number of the Network User
Address (NUA)?
A
5-7
.
B.1-4
C.8-12
D
13-14
.
E. None of the above
Answer & Explanation
Answer: Option C
31. Which of the following device is used with an X.25 network to provide service to
asynchronous terminals
A
repeater
.
B.bridges
C.gateway
D
Packet assembler/disassemble
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
32. A medium access control technique for multiple access transmission media is
A
Aloha
.
B.Amplitude
C.Angle modulation
D
Attenuation
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option A
Explanation:
34. Which of the following TCP/IP protocol is used for remote terminal connection service?
A
TELNET
.
B.FTP
C.RARP
D
UDP
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
35. Networks where end user workstations are tied to LAN servers to share resources and
application processing.
A
Internetworked enterprise
.
B.Information super highway
C.Business applications of telecommunications
D
Client/Server networks
.
Answer & Explanation
Answer: Option D
detector
modulator
stations
transponders
View Answer / Hide Answer
ANSWER: transponders
2. The loss in signal power as light travels down the fiber is called
attenuation
progragation
scattering
interruption
View Answer / Hide Answer
ANSWER: attenuation
3. Communication circuits that transmit data in both directions but not at the same time are
operating in
a simplex mode
a half duplex mode
a full duplex mode
an asynchronous mode
View Answer / Hide Answer
4. Print server uses ________ which is a buffer that holds data before it is sent to the printer.
Queue
Spool
Node
Stack
View Answer / Hide Answer
ANSWER: Spool
5. Frames from one LAN can be transmitted to another LAN via the device
Router
Bridge
repeater
Modem
View Answer / Hide Answer
ANSWER: Bridge
6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
255.240.0.0
255.248.0.0
255.252.0.0
255.254.0.0
View Answer / Hide Answer
ANSWER: 255.254.0.0
SMTP
SMNP
DHCP
ARP
View Answer / Hide Answer
ANSWER: DHCP
8. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver
cannot talk at once
can receive and send data simultaneously
can send or receive data one at a time
can do one way data transmission only
View Answer / Hide Answer
9. Contention is
One or more conductors that serve as a common connection for a related group of devices
a continuous frequency capable of being modulated or impressed with a second signal
the condition when two or more stations attempt to use the same channel at the same time
a collection of interconnected functional units that provides a data communications service
among stations attached to the network
View Answer / Hide Answer
ANSWER: the condition when two or more stations attempt to use the same channel at the
same time
10. When you ping the loopback address, a packet is sent where?
On the network
Down through the layers of the IP architecture and then up the layers again
Across the wire
through the loopback dongle
View Answer / Hide Answer
ANSWER: Down through the layers of the IP architecture and then up the layers again
Explanation:
Answer: Option D
Explanation:
Answer: Option C
Explanation:
2. A computer that handles resource sharing and network management in a local area network.
Select the best fit for answer:
A
Network Server
.
B.Virtual Private Network
C.Network operating system
D
OSI
.
Answer & Explanation
Answer: Option A
Explanation:
3. Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted.
As with the length of segments and the number of segments, a limit exists as to how many
repeaters can be used between any two nodes. What is the maximum number of repeaters that
can be used?
A
Five B.Two
.
D
C.Four Six
.
E. Three
Answer & Explanation
Answer: Option C
Explanation:
4. How much power (roughly) a light-emitting diode can couple into an optical fiber?
A
100 microwatts
.
B.440 microwatts
C.100 picowatts
D
10 milliwatts
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
5. A modem that is attached to the telephone system by jamming the phone's handset into two
flexible receptacles in the coupler?
A
gateway
.
B.bridge
C.acoustic coupler
D
time-division multiplexer
.
E. None of the above
Answer & Explanation
Answer: Option C
6. With telecommunications and a personal computer you can
A
"download" free public domain programs
.
B.send letters to be printed and delivered by the post office
C.order goods at a substantial discount
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option D
Explanation:
Answer: Option D
Explanation:
9. What can cause a problem with communication with a client by name but not by IP address?
A
The IP address
.
B.Static files such as an LMHOSTS file or a DNS database
C.Subnet mask
D
The default gateway
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
11. What is the term used to describe addresses available on a DHCP server?
A
Pools
.
B.Scopes
C.Ranges
D
Notes
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option C
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option B
Explanation:
18. A protocol is a set of rules governing a time sequence of events that must take place
A
between peers
.
B.between modems
C.between an interface
D
across an interface
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option B
Explanation:
Answer: Option D
Explanation:
16. How many pairs of stations can simultaneously communicate on Ethernet LAN?
A
1
.
B.2
C.3
D
multiple
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option B
Explanation:
18. A protocol is a set of rules governing a time sequence of events that must take place
A
between peers
.
B.between modems
C.between an interface
D
across an interface
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option B
Explanation:
Answer: Option D
Explanation:
21. Sales persons and other employees of the company who spend much of their time away from
their offices but keep in touch with their company's microcomputers or main frame
computers over telephone lines are called
A
field workers
.
B.telecommuters
C.teleprocessors
D
company directors
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option C
Explanation:
Answer: Option C
Explanation:
26. Most data communications involving telegraph lines use:
A
simplex lines
.
B.wideband channels
C.narrowband channels
D
dialed service
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
27. You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible
number of host IDs per subnet. Which subnet mask should you assign?
A
255.255.224.0 B.255.255.240.0
.
D
C.255.255.248.0 255.255.252.0
.
E. 255.255.255.255
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option D
31. The loss in signal power as light travels down the fiber is called
A
attenuation
.
B.propagation
C.scattering
D
interruption
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
33. Which layer of international standard organization's OSI model is responsible for creating
and recognizing frame boundaries?
A
physical layer
.
B.data link layer
C.transport layer
D
network layer
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
34. Which of the following might be used by a company to satisfy its growing communications
needs?
A
front-end processor
.
B.multiplexer
C.controller
D
concentrator
.
E. All of the above
Answer & Explanation
Answer: Option E
Explanation:
Answer: Option B
36. The Token-Ring architecture was developed for a more efficient way to determine who
should be transmitting at any one time. With Ethernet, collisions may take place, causing the
transmitting computers to have to retransmit their data. The use of token guarantees that only
one computer can transmit at a time. What happens as the network increases in size? Choose
the best answer
A
An additional token is added for every 1,000 nodes
.
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater
B.
then 500
C.The network becomes less efficient
D After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by
. the more powerful Hyperstation Unified Bandwidth device
E. The network becomes more efficient
Answer & Explanation
Answer: Option E
Explanation:
Answer: Option B
Explanation:
38. When a host knows its physical address but not its IP address, it can use _____.
A
RARP
.
B.ARP
C.IGMP
D
ICMP
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
39. What is the name given to the exchange of control signals which is necessary for establishing
a connection between a modem and a computer at one end of a line and another modem and
computer at the other end?
A
Handshaking
.
B.Modem options
C.Protocol
D
Duplexing
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
40. A communications medium that uses pulses of laser light in glass fibers. Select the best fit
for answer:
A
Fiber optic cables
.
B.Cellular phone systems
C.Telecommunications processors
D
Telecommunications software
.
Answer & Explanation
Answer: Option A
41. After you have verified that TCP/IP is installed correctly, what is the next step in verifying
the TCP/IP configuration?
A
Ping the broadcast address
.
B.Ping the Microsoft Web site
C.Ping a distant router.
D
Ping the address of the local host
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option A
Explanation:
Answer: Option C
Explanation:
44. In OSI model, which of the following layer transforms information from machine format into
that understandable by user
A
application
.
B.presentation
C.session
D
physical
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option D
46. Which of the following is an important characteristic of LAN?
A
application independent interfaces
.
B.unlimited expansion
C.low cost access for low bandwidth channels
D
parallel transmission
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option B
Explanation:
1. Most networks are connected to other local area or wide area networks. Select the best fit for
answer:
A
Internet works
.
B.The Internet
C.Internet revolution
D
Internet technologies
.
Answer & Explanation
Answer: Option A
Explanation:
2. You are working with a network that is 172.16.0.0 and would like to support 600 hosts per
subnet. What subnet mask should you use?
A
255.255.192.0 B.255.255.224.0
.
D
C.255.255.240.0 255.255.248.0
.
E. 255.255.252.0
Answer & Explanation
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
3. A 6-MHz channel is used by a digital signaling system utilizing 4-level signals. What is the
maximum possible transmission rate?
A
1.5 Mbaud/sec
.
B.6 Mband/sec
C.12 Mbaud/sec
D
24 Mbaud/sec
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
4. Which of the following digits are known as the sub-address digits (for use by the user) of the
Network User Address (NUA)?
A
5-7
.
B.1-4
C.8-12
D
13-14
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option C
6. A modulator converts a _____ signal to a(n) _____ signal.
A
FSK; PSK
.
B.PSK; FSK
C.analog; digital
D
digital; analog
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option B
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option A
Explanation:
16. A band is always equivalent to
A
a byte
.
B.a bit
C.100 bits
D
16 bits
.
E. None of the above
Answer & Explanation
Answer: Option E
Explanation:
Answer: Option C
Explanation:
Answer: Option A
Explanation:
Answer: Option A
Explanation:
20. When you connect to an online information service, you are asked to provide some kind of
identification such as your name, an account number and a password. What is the name given
to this brief dialogue between you and the information system?
A
Security procedure
.
B.Safeguard procedure
C.Identification procedure
D
Log-on procedure
.
E. None of the above
Answer & Explanation
Answer: Option D
31. A software that allows a personal computer to pretend it as a terminal is
A
auto-dialing
.
B.bulletin board
C.modem
D
terminal emulation
.
E. None of the above
View Answer Workspace Report Discuss in Forum
32. What is the name of the network topology in which there are bi-directional links between
each possible node?
A
Ring
.
B.Star
C.Tree
D
Mesh
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option A
Explanation:
34. Synchronous protocols
A
transmit characters one at a time
.
B.allow faster transmission than asynchronous protocols do
C.are generally used by personal computers
D
are more reliable
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option D
36. Videotex is a combination of
A
television
.
B.communication
C.computer technology
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option B
Explanation:
38. Baseband is
A
transmission of signals without modulation
.
B.a signal all of whose energy is contained within a finite frequency range
C.the simultaneous transmission of data to a number of stations
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
39. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital
signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per
second are actually sent?
A
32 Kbps
.
B.64 Kbps
C.8 Kbps
D
128 Kbps.
.
Answer & Explanation
Answer: Option A
Explanation:
40. X.21 is
A
a method of determining which device has access to the transmission medium at any time
.
B.a method access control technique for multiple-access transmission media
C.a very common bit-oriented data link protocol issued by ISO
D
network access standard for connecting stations to a circuit-switched network
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
41. What is the minimum number of wires required for sending data over a serial
communications links?
A
2
.
B.1
C.4
D
3
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option C
Explanation:
Answer: Option C
Explanation:
44. If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is
_____.
A
even B.odd
.
D
C.indeterminate 42
.
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option C
Explanation:
7. The standard suit of protocols used by the Internet, intranets, extranets, and some other
networks.
A
TCP/IP
.
B.Protocol
C.Open Systems
D
Internetwork processor
.
Answer & Explanation
Answer: Option A
Explanation:
No answer description available for this question. Let us discuss.
8. Networks that follow the 802.5 standard appear to be in a star topology but are actually
operating in what type of topology?
A
Linear bus
.
B.Modified star
C.Modified ring
D
Ring
.
E. Hybrid hub
Answer & Explanation
Answer: Option D
Explanation:
9. A communications device that combines transmissions from several 1/ O devices into one line
is a:
A
concentrator
.
B.modifier
C.multiplexer
D
full-duplex line
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option A
11. ARP (Address Resolution Protocol) is
A a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical
. hardware address
B.a TCP/IP high level protocol for transferring files from one machine to another
C.a protocol used to monitor computers
D
a protocol that handles error and control messages
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option B
Explanation:
Answer: Option C
Explanation:
14. The most important part of a multiple DHCP configurations is to make sure you don't have
which of the following in the different scopes? Select the best answer.
A
Duplicate addresses
.
B.Duplicate pools
C.Duplicate subnets
D
Duplicate default gateways
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
15. When a group of computers is connected together in a small area without the help of
telephone lines, it is called
A
Remote communication network (RCN)
.
B.Local area network(LAN)
C.Wide area network (WAN)
D
Value added network (VAN)
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
17. A communication network which is used by large organizations over regional, national or
global area is called
A
LAN
.
B.WAN
C.MAN
D
Intranet
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
18. Information systems with common hardware, software, and network standards that provide
easy access for end users and their networked computer systems. Select the best fit for
answer:
A
TCP/IP
.
B.Protocol
C.Open Systems
D
Internetwork processor
.
Answer & Explanation
Answer: Option C
Explanation:
19. Which of the following TCP/IP protocol is used for file transfer with minimal capability and
minimal overhead?
A
RARP
.
B.FTP
C.TFTP
D
TELNET
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Explanation:
Answer: Option A
Explanation:
22. Business meeting and conferences can be held by linking distantly located people through a
computer network. Not only the participants exchange information but are able to see each
other. What is it called?
A
Telemeeting
.
B.Telemailing
C.Teleconferencing
D
Teletalking
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
23. What frequency range is used for microwave communications, satellite and radar?
A Low Frequency : 30 kHz to 300 kHz
.
B.Medium Frequency : 300 kHz to 3 MHz
C.Super High Frequency : 3000 MHz to 30000 MHz
D
Extremely High Frequency :30,000 MHz
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option D
Explanation:
25. If the ASCII character H is sent and the character I is received, what type of error is this?
A
single-bit B.multiple-bit
.
D
C.burst recoverable
.
Answer & Explanation
Answer: Option A
26. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital
signals. If Delta modulation is selected, then how many bits per second are actually sent?
A 32 kbps
.
B.8 kbps
C.128 kbps
D
64 kbps.
.
Answer & Explanation
Answer: Option B
Explanation:
27. UDP is:
A
Not a part of the TCP/IP suite
.
B.Connection oriented and unreliable
C.Connection orientated and reliable
D
Connectionless and unreliable
.
Answer & Explanation
Answer: Option D
Explanation:
28. The interactive transmission of data within a time sharing system may be best suited to
A
simplex lines
.
B.half-duplex lines
C.full-duplex lines
D
biflex-line
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option A
Explanation:
30. The MAC (Media Access Control) address of the network card is used in both Ethernet and
Token-Ring networks and is essential for communication. What does MAC provide?
A
A logical address that identifies the workstation
.
B.A physical address that is randomly assigned each time the computer is started
C.A physical address that is assigned by the manufacturer
D
The logical domain address for the workstation
.
E. An alias for the computer name
Answer & Explanation
Answer: Option C
Explanation:
31. Which of the following is an example of a client-server model?
A
TELNET
.
B.FTP
C.DNS
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option A
Explanation:
Answer: Option B
Explanation:
Answer: Option D
Explanation:
35. A global network of millions of business, government, educational, and research networks;
computer systems; database; and end users. Select the best fit for answer:
A
Internet works
.
B.The Internet
C.Internet revolution
D
Internet technologies
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Explanation:
Answer: Option C
Explanation:
38. Which of the following technique is used for allocating capacity on a satellite channel using
fixed-assignment FDM?
A
Amplitude modulation
.
B.Frequency-division multiple access
C.Frequency modulation
D
Frequency-shift keying
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
40. Which of the following allows a simple email service and is responsible for moving
messages from one mail server to another?
A
IMAP B.DHCP
.
D
C.SMTP FTP
.
E. POP3
Answer & Explanation
Answer: Option C
Explanation:
44. Many large organizations with their offices in different countries of the world connect their
computers through telecommunication satellites and telephone lines. Such a communication
network is called
A
LAN
.
B.WAN
C.ECONET
D
EITHERNET
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
45. A network which is used for sharing data, software and hardware among several users
owning microcomputers is called
A
WAN
.
B.MAN
C.LAN
D
VAN
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option C
Explanation:
Answer: Option C
Explanation:
8. What is the name of the computer based EMMS that provides a common forum where users
can check in at their convenience, post messages, actively exchange ideas and participate in
ongoing discussions?
A
E-mail
.
B.Bulletin board system (BBS)
C.Teleconferencing
D
Videoconferencing
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option D
Explanation:
10. Devices on one network can communicate with devices on another network via a
A
file server
.
B.utility server
C.printer server
D
gateway
.
E. None of the above
Answer & Explanation
Answer: Option D
11. After coding a document into a digital signal, it can be sent by telephone, telex or satellite to
the receiver where the signal is decoded and an exact copy of the original document is made.
What is it called?
A
Telex
.
B.Word processor
C.Facsimile
D
Electronic mail
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option C
Explanation:
13. You are working with a class C network. You are required to configure it for five subnets,
each of which will support 25 nodes. What subnet should you use?
A
255.255.255.0 B.255.255.255.224
.
D
C.255.255.255.240 255.255.255.248
.
E. 255.255.255.252
Answer & Explanation
Answer: Option B
Explanation:
14. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total
number of lines required would be
A
5
.
B.10
C.20
D
32
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
15. Which of the following medium access control technique is used for bus/tree?
A
token ring
.
B.token bus
C.CSMA
D
MAC
.
E. None of the above
Answer & Explanation
Answer: Option B
16. A distributed data processing configuration in which all activities must pass through a
centrally located computer is called a:
A
ring network
.
B.spider network
C.hierarchical network
D
data control network
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
18. Which of the following network access standard is used for connecting stations to a circuit-
switched network?
A
X.3
.
B.X.21
C.X.25
D
X.75
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option C
Explanation:
Answer: Option D
21. A batch processing terminal would not include a
A
CPU
.
B.card reader
C.card punch
D
line printer
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
24. Which of the following allows devices on one network to communicate with devices on
another network?
A
multiplexer
.
B.gateway
C.t-switch
D
modern
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
25. An error detecting code is which code is the remainder resulting from dividing the bits to be
checked by a predetermined binary number, is known as
A
Cyclic redundancy check
.
B.Checksum
C.Error detecting code
D
Error rate
.
E. None of the above
Answer & Explanation
Answer: Option A
26. Bulletin board system
A
is a public access message system
.
B.is a modem capable of accepting commands
C.converts analog signals to digital signals
D
converts digital signals to analog signals
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
27. In OSI model, which of the following layer provides error-free delivery of data?
A
Data link
.
B.Network
C.transport
D
Session
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option A
Explanation:
30. Which of the following data transmission media has the largest terrestrial range without the
use of repeaters or other devices?
A
Hardwiring
.
B.Microwave
C.Satellite
D
Laser
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
31. What is the minimum number of wires needed to send data over a serial communication link
layer?
A
1
.
B.2
C.4
D
6
.
E. none of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option D
Explanation:
33. What is the name of the device that connects two computers by means of a telephone line?
A
Tape
.
B.modem
C.bus
D
cable
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
35. On a class B network, how many subnets are available with a subnet mask of 248?
A
2 B.6
.
D
C.30 62
.
E. 126
Answer & Explanation
Answer: Option C
36. Ethernet networks can be cabled in a number of topologies, depending on what works best in
each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the
best answer as to why Ethernet becomes less efficient as size increases.
A
Network collisions occur
.
B.Repeaters cannot increase the signal strength sufficiently
C.Cable terminators do not reflect the signal properly
D
Cable terminators do not absorb the signal properly
.
E. "Line echo" occurs due to the impedance of the cable
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option B
Explanation:
Answer: Option C
Explanation:
Answer: Option A
Explanation:
41. Which of the following is not a standard synchronous communication protocol?
A
SDLC
.
B.SMTP
C.SLIP
D
PAS
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option C
Explanation:
Answer: Option A
Explanation:
Answer: Option C
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option D
Explanation:
Answer: Option D
Explanation:
47. Which of the following items is not used in Local Area Networks (LANs)?
A
Computer
.
B.Modem
C.Printer
D
Cable
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option B
Explanation:
49. RS-232-G
A is an interface between two data circuit terminating equipment as examplified by a local
. and remote modem
is an interface standard between Data terminal Equipment and Data Circuit Terminating
B.
Equipment
specifies only the mechanical characteristics of an interface by providing a 25-pin
C.
connector
D
requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option D
1. What protocol is used between E-Mail servers?
A
FTP B.SMTP
.
D
C.SNMP POP3
.
Answer & Explanation
Answer: Option B
Explanation:
2. If you configure the TCP/IP address and other TCP/IP parameters manually, you can always
verify the configuration through which of the following? Select the best answer.
A
Network Properties dialog box
.
B.Server Services dialog box
C.DHCPINFO command-line utility
D
Advanced Properties tab of TCP/ IP Info.
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
3. In a PC to telephone hookup for long distance communication, modem is connected between
the telephone line and
A
PC
.
B.synchronous port
C.crossover cable
D
asynchronous port
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option A
Explanation:
5. Four bits are used for packet sequence numbering in a sliding window protocol used in a
computer network. What is the maximum window size?
A
4
.
B.8
C.15
D
16
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
6. A hard copy would be prepared on a
A
typewriter terminal
.
B.line printer
C.plotter
D
All of the above
.
E. None of the above
Answer & Explanation
Answer: Option D
Explanation:
7. Which of the following device copies electrical signals from one Ethernet to another?
A
bridge
.
B.repeater
C.hub
D
passive hub
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
No answer description available for this question. Let us discuss.
8. Stephanie is in charge of a small network and wants to make it simple but secure. The users
want to have full control over their data and still be able to share data with the rest of the
office. The networking knowledge of the office staff is basic. Which network(s) would be the
best for Stephanie to set up?
A
Peer-to-peer
.
B.Master domain
C.Server-based
D
WAN
.
E. Share-level
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option D
Explanation:
10. Error control is needed at the transport layer because of potential errors occurring _____.
A from transmission line noise
.
B.in routers
C.from out-of-sequence delivery
D
from packet losses.
.
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option D
Explanation:
Answer: Option D
Explanation:
No answer description available for this question. Let us discuss.
Answer: Option A
Explanation:
Answer: Option E
Explanation:
15. Data link layer retransmits the damaged frames in most networks. If the probability of a
frame's being damaged is p, what is the mean number of transmissions required to send a
frame if acknowledgements are never lost.
A
P I (K + 1)
.
B.KIK (1 + F)
C.1/ (1 - F)
D
K I (K - P)
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option B
Explanation:
Answer: Option A
Explanation:
18. You are trying to decide which type of network you will use at your office, and you want the
type that will provide communication and avoid collisions on the cable. Which of the
following is the best choice?
A
Token-Ring B.CSMA/CD
.
D
C.Ethernet CSMA/CA
.
E. ARCnet
Answer & Explanation
Answer: Option A
Explanation:
19. Which of the following network access standard is used for connecting stations to a packet-
switched network?
A
X.3
.
B.X.21
C.X.25
D
X.75
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
20. Interconnected networks need communication processors such as switches, routers, hubs, and
gateways. Select the best fit for answer:
A
TCP/IP
.
B.Protocol
C.Open Systems
D Internetwork processor
.
Answer & Explanation
Answer: Option D
Explanation:
Answer: Option A
Explanation:
Answer: Option A
Explanation:
Answer: Option D
Explanation:
Answer: Option A
Explanation:
Answer: Option A
26. What is the default subnet mask for a class A network?
A
127.0.0.1
.
B.255.0.0.0
C.255.255.255.0.0
D
255.255.255.0
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
27. When using the loopback address, if TCP/IP is installed correctly, when should you receive a
response?
A
Immediately
.
B.Only if the address fails
C.After the next host comes online
D
Within two minutes
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option A
Explanation:
29. The modern enterprise is interconnected internally and externally by the Internet, intranets,
and other networks. Select the best fit for answer:
A
Internetworked enterprise
.
B.Information super highway
C.Business applications of telecommunications
D
Client/Server networks
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
Answer: Option D
Explanation:
31. MAC is
A
a method of determining which device has access to the transmission medium at any time
.
B.a method access control technique or multiple-access transmission media
C.a very common bit-oriented data link protocol issued to ISO.
D
network access standard for connecting stations to a circuit-switched network
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
32. What is the name of the device that converts computer output into a form that can be
transmitted over a telephone line?
A
Teleport
.
B.Modem
C.Multiplexer
D
Concentrator
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
33. You are working with a network that has the network ID 172.16.0.0, and you require 25
subnets for your company and an additional 30 for the company that will merge with you
within a month. Each network will contain approximately 600 nodes. What subnet mask
should you assign?
A
255.255.192.0 B.255.255.224.0
.
D
C.255.255.240.0 255,255.248.0
.
E. 255.255.252.0
Answer & Explanation
Answer: Option E
Explanation:
34. Which application allows a user to access and change remote files without actual transfer?
A
TELNET
.
B.NFS
C.FTP
D
DNS
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
35. Parity bit is
A an error-detecting code based on a summation operation performed on the bits to be
. checked.
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specific rules of construction, so that if
C. certain errors occur in an expression, the resulting expression will not conform to the rules
of construction and thus the presence of the errors in detected
D
the ratio of the number of data units in error to the total number of data units
.
E. None of the above
Answer & Explanation
Answer: Option B
31. MAC is
A
a method of determining which device has access to the transmission medium at any time
.
B.a method access control technique or multiple-access transmission media
C.a very common bit-oriented data link protocol issued to ISO.
D network access standard for connecting stations to a circuit-switched network
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
32. What is the name of the device that converts computer output into a form that can be
transmitted over a telephone line?
A
Teleport
.
B.Modem
C.Multiplexer
D
Concentrator
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
33. You are working with a network that has the network ID 172.16.0.0, and you require 25
subnets for your company and an additional 30 for the company that will merge with you
within a month. Each network will contain approximately 600 nodes. What subnet mask
should you assign?
A
255.255.192.0 B.255.255.224.0
.
D
C.255.255.240.0 255,255.248.0
.
E. 255.255.252.0
Answer & Explanation
Answer: Option E
Explanation:
No answer description available for this question. Let us discuss.
34. Which application allows a user to access and change remote files without actual transfer?
A
TELNET
.
B.NFS
C.FTP
D
DNS
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
35. Parity bit is
A an error-detecting code based on a summation operation performed on the bits to be
. checked.
B.a check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to specific rules of construction, so that if
C. certain errors occur in an expression, the resulting expression will not conform to the rules
of construction and thus the presence of the errors in detected
D
the ratio of the number of data units in error to the total number of data units
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
Answer: Option A
Explanation:
Answer: Option B
Explanation:
38. Microprogramming is
A
assembly language programming
.
B.programming of minicomputers
C.control unit programming
D
macro programming of microcomputers
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
39. You are working with a network that has the network ID 192.168.10.0. What subnet should
you use that supports up to 12 hosts and a maximum number of subnets?
A
255.255.255.192
.
B.255.255.255.224
C.255.255.255. 240
D
255.255.255.248
.
E. 255.255.255.252
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option D
Explanation:
41. If communication software can be called the "traffic cop" of a micro communication system,
then what should the modem be called?
A
Park
.
B.Bridge
C.Interface
D
Link
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation:
42. Which of the following specifies the network address and host address of the computer?
A
The IP address
.
B.The TCP address
C.The subnet mask
D
The default gateway
.
E. None of the above
Answer & Explanation
Answer: Option A
Explanation:
43. For connecting modem, a computer must be equipped with a port that conforms to the RS-
232 standard of the Electronic Industries Association of America. What do the letters 'RS'
stand for?
A
Recognised standard
.
B.Random sequence
C.Recommended standard
D
Registered source
.
E. None of the above
Answer & Explanation
Answer: Option C
Explanation:
Answer: Option D
Explanation:
Answer: Option A
46. Which of the following provides a storage mechanism for incoming mail but does not allow a
user to download messages selectively?
A
SMTP B.DHCP
.
D
C.IMAP POP3
.
Answer & Explanation
Answer: Option D
Explanation:
47. On a class C network with a subnet mask of 192, how many subnets are available?
A
254 B.62
.
D
C.30 14
.
E. 2
Answer & Explanation
Answer: Option E
Explanation:
48. Ethernet and Token-Ring are the two most commonly used network architectures in the
world. Jim has heard of the different topologies for networks and wants to choose the
architecture that will provide him with the most options. Which of the following would that
be? Choose the most correct answer.
A Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it
. can be used in any topology
B.Ethernet, because it is cabled using fiber-optic cable
C.Token-Ring, because it uses a MAU
D Ethernet, because it can be set up with most topologies and can use multiple transfer
. speeds
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all
E.
topologies
Answer & Explanation
Answer: Option D
Explanation:
49. A 4 KHz noiseless channel with one sample every 125 per sec, is used to transmit digital
signals. Find the bit rate (bits per second) that are sent, if CCITT 2.048 Mbps encoding is
used.
A
500 Kbps
.
B.32 Kbps
C.8 Kbps
D
64 Kbps.
.
Answer & Explanation
Answer: Option D
Explanation:
50. How can you see the address of the DHCP server from which a client received its IP address?
A
By using Advanced Properties of TCP/IP
.
B.By using IPCONFIG/ALL
C.By using DHCPINFO
D
By pinging DHCP
.
E. None of the above
Answer & Explanation
Answer: Option B
Explanation: