Computer Science - Networking MCQs Part 2
1. Which of the following refers to the terms "residual error rate"?
A.
the number of bit errors per twenty four hours of continuous operation on an asynchronous line
the number of bit errors per twenty four hours of continuous operation on an asynchronous line
B.
The probability that one or more errors will be undetected when an error detection scheme is used
The probability that one or more errors will be undetected when an error detection scheme is used
C.
the probability that one or more errors will be detected when an error detection mechanism is used
the probability that one or more errors will be detected when an error detection mechanism is used
D.
signal to noise ratio divided by the ratio of energy per bit to noise per hertz
signal to noise ratio divided by the ratio of energy per bit to noise per hertz
E.
None of the above
None of the above
Answer Option B
2. Which of the following summation operations is performed on the bits to check an error-detecting code?
A.
Codec
Codec
B.
Coder-decoder
Coder-decoder
C.
Checksum
Checksum
D.
Attenuation
Attenuation
Answer Option C
3. The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband.
A.
Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel
Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel
B.
Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable
Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable
C.
Baseband refers to local area networks, and broadband refers to wide area networks.
Baseband refers to local area networks, and broadband refers to wide area networks.
D.
Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed
Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed
E.
Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions
Broadband and baseband refer to the different frequencies at which infrared operates then transmitting signals in certain conditions
Answer Option B
4. An error-detecting code inserted as a field in a block of data to be transmitted is known as
A.
Frame check sequence
Frame check sequence
B.
Error detecting code
Error detecting code
C.
Checksum
Checksum
D.
flow control
flow control
E.
None of the above
None of the above
Answer Option A
5. The cheapest modems can transmit
A.
300 bits per second
300 bits per second
B.
1,200 bits per second
1,200 bits per second
C.
2,400 bits per second
2,400 bits per second
D.
4,800 bits per second
4,800 bits per second
E.
None of the above
None of the above
Answer Option A
6. Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device which permits digital to analog conversion at the start of a long distance transmission?
A. Interface
B. Modem
C. Attenuation
D. Teleprocessor
E. None of the above
Answer Option B
7. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers?
A. 16
B. 9
C. 8
D. 4
E. None of the above
Answer Option B
8. The receive equalizer reduces delay distortions using a
A. tapped delay lines
B. gearshift
C. descrambler
D. difference engine
E. None of the above
Answer Option A
9. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologies.
A. 12
B. 81
C. 48
D. 729
Answer Option D
10. A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic?
A. NBTSTAT
B. NETSTAT.EXE
C. Performance Monitor
D. Network Monitor
E. ARP.EXE
Answer Option D
11. Sending a file from your personal computer's primary memory or disk to another computer is called
A. uploading
B. downloading
C. logging on
D. hang on
E. None of the above
Answer Option A
12. What is the name of the software package that allows people to send electronic mail along a network of computers and workstations?
A. Memory resident package
B. Project management package
C. Data communication package
D. Electronic mail package
E. None of the above
Answer Option C
13. The communication mode that supports two-way traffic but only one direction at a time is
A. simplex
B. duplex
C. half duplex
D. multiplex
E. None of the above
Answer Option C
14. HMP (Host Monitoring Protocol) is:
A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
B. a TCP/IP high level protocol for transferring files from one machine to another.
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
E. None of the above
Answer Option C
15. Which of the following is a voiceband channel?
A. Telephone line
B. Telegraph line
C. Coaxial cable
D. Microwave systems
E. None of the above
Answer Option A
16. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?
A. 8000 B frame
B. 80,000 B frame
C. 8 x 105 bit frame
D. 10,000 B frame
Answer Option D
17. Data are sent over pin _____ of the EIA-232 interface.
A. 2
B. 3
C. 4
D. All of the above
Answer Option A
18. To connect a computer with a device in the same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
Answer Option A
19. Demodulation is a process of
A. converting analog to digital signals
B. converting digital to analog signals
C. multiplexing various signals into one high speed line signals
D. performing data description.
Answer Option A
20. Internet-like networks between a company and its business partners. Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
Answer Option D
21. An example of an analog communication method is
A. laser beam
B. microwave
C. voice grade telephone line
D. All of the above
E. None of the above
Answer Option D
22. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
A. Layer 7 protocols
B. Layer 6 protocols
C. Layer 5 protocols
D. Layer 4 protocols
E. None of the above
Answer Option A
23. What frequency range is used for FM radio transmission?
A. Very Low Frequency : 3 kHz to 30. kHz
B. Low Frequency : 30 kHz to 300 kHz
C. High Frequency : 3 MHz to 30 MHz
D. Very High Frequency : 30 MHz to 300 MHz
E. None of the above
Answer Option D
24. Transmission of computerised data from one location to another is called
A. data transfer
B. data flow
C. data communication
D. data management
E. None of the above
Answer Option C
25. Compared to analog signals, digital signals
A. allow faster transmission
B. are more accurate
C. both (a) and (b)
D. All of the above
E. None of the above
Answer Option C
26. FDDI is a
A. ring network
B. star network
C. mesh network
D. bus based network
E. None of the above
Answer Option A
27. An anticipated result from multiprogramming operations is:
A. reduced computer idle time
B. the handling of more jobs
C. better scheduling of work
D. All of the above
E. None of the above
Answer Option D
28. A central computer surrounded by one or more satellite computers is called a
A. bus network
B. ring network
C. star network
D. All of the above
E. None of the above
Answer Option C
29. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
A. 500 bps
B. 1500 bps
C. 5 bps
D. 1000 bps
Answer Option D
30. HOSTS file entries are limited to how many characters?
A. 8
B. 255
C. 500
D. Unlimited
E. None of the above
Answer Option B
31. Demodulation is the process of
A. converting digital signals to analog signals
B. converting analog signals to digital signals
C. combining many low speed channels into one high speed channel
D. dividing the high-speed signals into frequency bands
E. None of the above
Answer Option B
32. Which of the following statement is incorrect?
A. The Addresses Resolution Protocol, ARP, allows a host to find the physical address of a target host on the same physical network, given only the target IP address.
B. The sender's IP - to- physical address binding is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet.
C. ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine.
D. All of the above
E. None of the above
Answer Option D
33. You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports up to 25 hosts and a maximum number of subnets?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Answer Option B
34. Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
E. None of the above
Answer Option C
35. Modulation is the process of
A. converting analog signals to digital signals
B. converting digital signals to analog signals
C. Multiplexing various signals into high speed line signals
D. performing data encryption.
Answer Option B
36. Devices interconnected by the LAN should include
A. Computers and terminals
B. mass storage device, printers and plotters
C. bridges and gateways
D. All of the above
E. None of the above
Answer Option D
37. What are the data transmission channels available for carrying data from one location to another?
A. Narrowband
B. Voiceband
C. Broadband
D. All of the above
E. None of the above
Answer Option D
38. On a class B network, how many hosts are available at each site with a subnet mask of 248?
A. 16,382
B. 8,190
C. 4,094
D. 2,046
E. 1,022
Answer Option D
39. Which of the following technique is used for encapsulation?
A. a technique used in best-effort delivery systems to avoid endlessly looping packets.
B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
D. All of the above
E. None of the above
Answer Option B
40. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?
A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
Answer Option A
41. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?
A. 192
B. 224
C. 240
D. 248
E. 252
Answer Option D
42. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
A. Gateways
B. mail gateway
C. bridges
D. User Agent
E. None of the above
Answer Option B
43. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is
A. 1200 bands
B. 3200 bands
C. 4800 bands
D. 9600 bands
E. None of the above
Answer Option B
44. Error detection at a data link level is achieved by
A. bit stuffing
B. cyclic redundancy codes
C. Hamming codes
D. equalization
Answer Option B
45. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
A. question and answer
B. form filling
C. open-ended question
D. menu selection
E. None of the above
Answer Option D
46. Which network topology is considered passive?
A. Cross
B. Ring
C. Star
D. Mesh
E. Bus
Answer Option E
47. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
A. POS terminal
B. data collection terminal
C. batch processing terminal
D. intelligent terminal
E. None of the above
Answer Option C
48. Which address is the loopback address?
A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
E. None of the above
Answer Option C
49. Error rate is
A. an error-detecting code based on a summation operation performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the sum of all the binary digits.
C. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.
D. the ratio of the number of data units in error to the total number of data units
E. None of the above
Answer Option D
50. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
Answer Option B
Comments
Post a Comment