2. How many digits of the DNIC (Data Network Identification Code) identify the country? A. first B. first two C. first three D.
|
|
- Esmond McDonald
- 5 years ago
- Views:
Transcription
1 1. What device separates a single network into two segments but lets the two segments appear as one to higher protocols? A. Switch B. Bridge C. Router D. Gateway 2. How many digits of the DNIC (Data Network Identification Code) identify the country? A. first B. first two C. first three D. first four 3. A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? A. flooding B. delta routing C. static routing D. hot potato routing 4. Frames from one LAN can be transmitted to another LAN via the device A. Bridge B. Router C. Modem D. Repeater 5. Which of the following condition is used to transmit two packets over a medium at the same time? A. Collision B. Contention C. Synchronous D. Asynchronous 6. The houses the switches in token ring. A. NIC B. MAU
2 C. transceiver D. nine-pin connector 7. The packets switching concept was first proposed A. in the late 1950s for Defense Ministry of US B. in the late 1980s for the Defense Ministry of US C. in the early 1960s for military communication systems, mainly to handle speech D. All of the above 8. Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: A. Extranets B. Switching alternating C. Bandwidth alternatives D. Inter organizational networks 9. The geostationary satellite used for communication systems A. rotates with the earth B. is positioned over equator C. remains stationary relative to the earth D. All of the above 10. You have a class A network address with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Whi A B C D
3 11. What are the most commonly used transmission speeds in BPS used in data communication? A. 500 B C D What is the default subnet mask for a class C network? A B C D Which of the following is used for modulation and demodulation? A. modem B. gateway C. protocols D. multiplexer 14. Which of the following is not a disadvantage of wireless LAN? A. interference of transmissions from different B. slower data transmission computers C. higher error rate D. all of the above 15. Which of the following does not allow multiple users or devices to share one communications line? A. controller B. concentrator C. doubleplexer D. multipplexer 16. Which of the following is required to communicate between two computers? A. protocol B. communications software
4 C. communications hardware D. all of the above 17. Which of the following types of channels moves data relatively slowly? A. wideband channel B. voiceband channel C. broadband channel D. narrowband channel 18. With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 222 B. 233 C. 241 D How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? A bits B bits C bits D bits 20. The Internet Control Message Protocol (ICMP) A. reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another C. allows gateways to send error a control messages to other gateways or hosts D. All of the above 21. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
5 plant in the suburbs. To enable everyone to share data and resources between the two LANs, name the device A. Hub B. Cable C. Router D. Modem 22. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver A. cannot talk at once B. can send or receive data one at a time C. can do one way data transmission only D. can receive and send data simultaneously 23. How many hosts are attached to each of the local area networks at your site? A. 64 B. 128 C. 254 D Which of the following technique is used for fragment? A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame C. a technique used in best-effort delivery systems to avoid endlessly looping packets D. all of the above 25. Internet-like networks within an enterprise called - A. Intranets B. Extranets C. Switching alternating D. Inter organizational networks 26. To connect a computer with a device in the same room, you might be likely to use
6 A. a coaxial cable B. a ground station C. a dedicated line D. all of the above 27. Usually, it takes 10-bits to represent one character. How many characters can be transmitted at a speed of 1200 BPS? A. 12 B. 120 C D Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots - A. 3 slots B. 5 slots C. 7 slots D. 9 slots 29. What is the port number for NNTP? A. 70 B. 79 C. 87 D Contention is A. a continuous frequency capable of being modulated or impressed with a second signal B. the condition when two or more stations attempt to use the same channel at the same time C. one or more conductors that serve as a common connection for a related group of devices D. a collection of interconnected functional units that provides a data communications service among stations attached to the network 31. Avalanche photodiode receivers can detect hits of transmitted data by receiving
7 A. 100 photons B. 200 photons C. 300 photons D. 400 photons 32. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. a form of TDMA in which circuit switching is B. the method of determining which device has used to dynamically change the channel assignments access to the transmission medium at any time C. a medium access control technique for multiple access transmission media D. all of the above 33. When you ping the loopback address, a packet is sent where? A. On the network B. Across the wire C. Through the loopback dongle D. Down through the layers of the IP architecture and then up the layers again 34. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. RPC C. SNMP D. SMTP 35. A front-end processor is A. a user computer system B. preliminary processor of batch jobs C. a processor in a large-scale computer that executes operating system instructions D. a minicomputer that relieves main-frame computers at a computer centre of communications control functions 36. Which of the following statements is correct for the use of packet switching?
8 A. the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied C. the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure B. by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved D. all of the above 37. In CRC there is no error if the remainder at the receiver is. A. zero B. non-zero C. the quotient at the sender D. equal to the remainder at the sender 38. What can greatly reduce TCP/IP configuration problems? A. PDC B. WINS Proxy C. WINS Server D. DHCP Server 39. Carrier is A. a continuous frequency capable of being modulated or impressed with a second signal B. the condition when two or more sections attempt to use the same channel at the same time C. one or more conductors that serve as a common connection for a related group of devices D. a collection of interconnected functional units that provides a data communications service among stations attached to the network
9 40. Which of the following device is used to connect two systems, especially if the systems use different protocols? A. hub B. bridge C. gateway D. repeater 41. The synchronous modems are more costly than the asynchronous modems because A. they produce large volume of data B. they contain clock recovery circuits C. they operate with a larger bandwidth D. they transmit the data with stop and start bits 42. A distributed network configuration in which all data/information pass through a central computer is A. bus network B. star network C. ring network D. Point-to-point network 43. Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? A. X.25 B. UDP C. SMTP D. VMTP 44. A remote batch-processing operation in which data is solely input to a central computer would require a: A. simplex lines B. telegraph line C. mixedband channel D. all the above 45. A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum data rate?
10 A. 6 Kbps B. 12 Kbps C. 24 Kbps D. 48 Kbps 46. The slowest transmission speeds are those of A. microwaves B. coaxial cable C. fiber-optic cable D. twisted-pair wire 47. What part of is the Network ID, assuming a default subnet mask? A. 51 B. 192 C D If you get both local and remote echoes, every character you type will appear on the screen A. once B. twice C. three times D. never 49. ICMP (Internet Control Message Protocol) is A. a protocol used to monitor computers B. a protocol that handles error and control messages C. a TCP/IP high level protocol for transferring files from one machine to another D. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address 50. Which of the following refers to the terms "residual error rate"? A. signal to noise ratio divided by the ratio of B. the number of bit errors per twenty four
11 energy per bit to noise per hertz C. the probability that one or more errors will be detected when an error detection mechanism is used hours of continuous operation on an asynchronous line D. the probability that one or more errors will be undetected when an error detection scheme is used 51. Which of the following summation operations is performed on the bits to check an errordetecting code? A. Codec B. Checksum C. Attenuation D. Coder-decoder 52. Select the correct statement about broadband and baseband. A. Baseband refers to local area networks, and broadband refers to wide area networks. B. Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed C. Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable D. Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel 53. An error-detecting code inserted as a field in a block of data to be transmitted is known as A. Checksum B. flow control C. Error detecting code D. Frame check sequence 54. The cheapest modems can transmit A. 100 bits per second B. 300 bits per second C. 600 bits per second D. 900 bits per second
12 55. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answe A. OSI B. Network Server C. Virtual Private Network D. Network operating system 56. Error rate is A. the ratio of the number of data units in error to the total number of data units C. an error-detecting code based on a summation operation performed on the bits to be checked B. a check bit appended to an array of binary digits to make the sum of all the binary digits D. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected 57. Which address is the loopback address? A B C D If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n) A. POS termina B. intelligent terminal C. data collection terminal D. batch processing terminal 59. Which network topology is considered passive? A. Bus B. Star C. Ring D. Cross
13 60. Computers cannot communicate with each other directly over telephone lines because they use digital pulses whereas telephone lines use analog sound frequencies. What is the name of the device A. Modem B. Interface C. Attenuation D. Teleprocessor 61. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers? A. 4 B. 9 C. 12 D The receive equalizer reduces delay distortions using a A. gearshift B. descrambler C. difference engine D. tapped delay lines 63. Four routers have to be interconnected in a point-to-point Network. Each pair of root us may connected by a high-speed line, a medium speed line or a low speed line. Find the total number of topologie A. 12 B. 48 C. 88 D A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most A. ARP.EXE B. NETSTAT.EXE
14 C. Network Monitor D. Performance Monitor 65. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is A. form filling B. menu selection C. question and answer D. open-ended question 66. Error detection at a data link level is achieved by A. bit stuffing B. equalization C. Hamming codes D. cyclic redundancy codes 67. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is A bands B bands C bands D bands 68. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as A. bridges B. User Agent C. Gateways D. mail gateway 69. Sending a file from your personal computer's primary memory or disk to another computer is called A. hang on B. uploading
15 C. logging on D. downloading 70. What is the name of the software package that allows people to send electronic mail along a network of computers and workstations? A. Electronic mail package B. Memory resident package C. Project management package D. Data communication package 71. The communication mode that supports two-way traffic but only one direction at a time is A. simplex B. duplex C. half duplex D. multiplex 72. HMP (Host Monitoring Protocol) is: A. a protocol used to monitor computers B. a protocol that handles error and control messages C. a TCP/IP high level protocol for transferring files from one machine to another D. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address 73. Which of the following is a voice band channel? A. Coaxial cable B. Telephone line C. Telegraph line D. Microwave systems 74. You are working with three networks that have the network IDs , , and What subnet mask can you use to combine these addresses into one?
16 A B C D Which of the following technique is used for encapsulation? A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame C. a technique used in best-effort delivery systems to avoid endlessly looping packets D. all of the above 76. On a class B network, how many hosts are available at each site with a subnet mask of 248? A. 2,046 B. 4,094 C. 8,190 D. 16, What are the data transmission channels available for carrying data from one location to another? A. Voiceband B. Broadband C. Narrowband D. All of the above 78. Devices interconnected by the LAN should include A. mass storage device, printers and plotters B. computers and terminals C. bridges and gateways D. all of the above
17 79. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring? A. 8,000 B frame B. 10,000 B frame C. 50,000 B frame D. 80,000 B frame 80. Data are sent over pin of the EIA-232 interface. A. 1 B. 2 C. 3 D To connect a computer with a device in the same room, you might be likely to use A. a coaxial cable B. a dedicated line C. a ground station D. all of the above 82. Demodulation is a process of A. performing data description B. converting analog to digital signals C. converting digital to analog signals D. multiplexing various signals into one high speed line signals 83. Internet-like networks between a company and its business partners. Select the best fit for answer: A. Extranets B. Switching alternating C. Bandwidth alternatives D. Inter organizational networks 84. Modulation is the process of
18 A. performing data encryption B. converting digital signals to analog signals C. converting analog signals to digital signals D. multiplexing various signals into high speed line signals 85. Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A , , B , , C , , D , , You are working with a network that has the network ID What subnet should you use that supports up to 25 hosts and a maximum number of subnets? A B C D Which of the following statement is incorrect? A. The sender's IP - to- physical address bindingb. The Addresses Resolution Protocol, ARP, is included in every ARP broadcast; receivers update the IP-to-Physical address binding information in their cache before processing an ARP packet. allows a host to find the physical address of a target host on the same physical network, given only the target IP address. C. ARP is a low-level protocol that hides the underlying network physical addressing, permitting us to assign IP-addresses of our choice to every machine. D. All of the above 88. Demodulation is the process of A. converting digital signals to analog signals B. converting analog signals to digital signals C. dividing the high-speed signals into D. combining many low speed channels into one
19 frequency bands high speed channel 89. An example of an analog communication method is A. voice grade telephone line B. laser beam C. microwave D. all of the above 90. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? A. Layer 2 protocols B. Layer 5 protocols C. Layer 7 protocols D. Layer 10 protocols 91. What frequency range is used for FM radio transmission? A. Very Low Frequency : 3 khz to 30. khz B. Low Frequency : 30 khz to 300 khz C. High Frequency : 3 MHz to 30 MHz D. Very High Frequency : 30 MHz to 300 MHz 92. Transmission of computerised data from one location to another is called A. data flow B. data transfer C. data management D. data communication 93. Compared to analog signals, digital signals A. are more accurate B. allow faster transmission C. both (a) and (b) D. all of the above
20 94. HOSTS file entries are limited to how many characters? A. 32 B. 255 C. 926 D. Unlimited 95. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorith A. 5 bps B. 500 bps C bps D bps 96. A central computer surrounded by one or more satellite computers is called a A. bus network B. star network C. ring network D. all of the above 97. An anticipated result from multi programming operations is: A. better scheduling of work B. the handling of more jobs C. reduced computer idle time D. all of the above 98. FDDI is a A. ring network B. mesh network C. bus based network D. none of the above 99. Modem is used in data transmission. When was it invented and in which country? A. 1950, USA B. 1963, USA
21 C. 1950, Japan D. 1965, Germany 100. Which of the following technique is used for Time-To-Line (TTL)? A. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size. B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. C. a technique used in best-effort delivery system to avoid endlessly looping packets. D. all of the above
Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationCOMPONENTS OF DATA COMMUNICATION
COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.
More informationIt is the process of sharing data, programs, and information between two or more computers.
1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationLecture #25: Networks and Communications. Communication and Networks. What will we learn?
Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationSpecial expressions, phrases, abbreviations and terms of Computer Networks
access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous
More informationRAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY
RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.
More informationCome & Join Us at VUSTUDENTS.net
Come & Join Us at VUSTUDENTS.net For Assignment Solution, GDB, Online Quizzes, Helping Study material, Past Solved Papers, Solved MCQs, Current Papers, E-Books & more. Go to http://www.vustudents.net and
More informationCommunications and Networks The McGraw-Hill Companies, Inc. All rights reserved.
Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,
More informationContents. Introduction to Networking. Preface...i. Introduction... xix
Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and
More informationData Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No
Data Communications Course Design 2005-2006 Course Information Organization Division EASTERN ARIZONA COLLEGE Business Course Number CMP 205 Title Credits 3 Developed by Lecture/Lab Ratio Transfer Status
More informationINTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com
INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed
More informationChapter 9 Introduction to Networks
Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations
More informationPengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)
Pengantar Teknologi Informasi dan Teknologi Hijau Suryo Widiantoro, ST, MMSI, M.Com(IS) 1 Topics covered 1. From analog to digital age 2. Networks 3. Wired-communication data 4. Wireless-communication
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationQuestion 7: What are Asynchronous links?
Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:
More informationObjectives. Learn how computers are connected. Become familiar with different types of transmission media
Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More informationInternetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on
CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network
More information16/06/56. Communications and Networks. Communications and Networks. Communications and Networks
Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationComputer science..pharmacy college
Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationComputer Networks Question Bank
Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual
More informationPrepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT
Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define
More informationArea Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low
Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What
More informationComputer Networks. Week 04 Media and Devices. College of Information Science and Engineering Ritsumeikan University
Computer Networks Week 04 Media and Devices College of Information Science and Engineering Ritsumeikan University Network Media and Devices l When you build a network, the network hardware may be used
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : BCA Semester /Year : EVEN / III Subject Name : Data
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationModule 11. OSI Model, Network Devices, and Network Standards
Module 11 OSI Model, Network Devices, and Network Standards Objectives 1. Networking A.Differentiate between layers of the OSI model B.2.9 Compare network devices C.Compare network standards D.2.7 Compare
More informationComputers: Tools for an Information Age. Chapter 7 Networking: Computer Connections
Computers: Tools for an Information Age Chapter 7 Networking: Computer Connections Objectives Describe the basic components of a network Explain the methods of data transmission, including types of signals,
More informationNetworks. Allow number of independent stationary devices or computers to communicate directly
Networks Allow number of independent stationary devices or computers to communicate directly Provides a skeletal infrastructure for a collaborative system Networking By Prashant Mali [BSc,MSc(CS),CNA,LLB]
More informationReview: Networking Fall Final
Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer
More informationNetworks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces
Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6
More informationDATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS A/L Guide TERAN SUBASINGHE Data Communication What is data communication? Data Communication is a process of exchanging data or information between two or more devices along
More informationLecture 8 Winter 2006 Enterprise and Personal Communications Networks
Information Technology Lecture 8 Winter 2006 Enterprise and Personal Communications Networks 1 Objectives Identify the reasons that multiuser systems are used in business. Describe eight network service
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationPSD2A Computer Networks. Unit : I-V
PSD2A Computer Networks Unit : I-V 1 UNIT 1 Introduction Network Hardware Software Reference Models OSI and TCP/IP models Example networks: Internet, ATM, Ethernet and Wireless LANs Physical layer Theoretical
More informationGAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS
GAYATRI COMPUTERS Prepared by : VENKAT.G 1 What is Networking? Module 1: NETWORK BASICS Networking: Connecting two or more computers or network devices(routers/print Servers / Firewall Devices..etc) for
More informationVISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks
Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationQUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for
Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)
More informationReview For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University
School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More informationNetwoking Essentials
Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationBABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017
5 years Integrated M.Sc (IT) Semester 3 Question Bank 060010310 DSE4 Computer Networks Unit 1 Introduction Short Questions 1. State the term data with respect to computer network. 2. What is data communication?
More informationKIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B
KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:
More informationNetwork Media and Layer 1 Functionality
Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)
More informationCS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A
SHRI ANGALAMMAN COLLEGE OF ENGINEERING & TECHNOLOGY (An ISO 9001:2008 Certified Institution) SIRUGANOOR,TRICHY-621105. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CS1302-COMPUTER NETWORKS Year/Sem:
More informationFundamentals of Networking Introduction to Networking Devices
Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationChapter 12. Network Organization and Architecture
Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified
More informationFINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material
FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end Chapters in the book 1, 2, 3, 5, 6 Exam 1 Review Material Topics You are also responsible for the reading in the chapters understanding
More informationQUESTION BANK EVEN SEMESTER
Fatima Michael College of Engineering and Technology DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK EVEN SEMESTER SUB CODE & NAME: EC2352 COMPUTER NETWORKS YEAR / SEM: III / VI Staff
More informationTypical Network Uses
Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationSAE6A/SAZ6B DATA COMMUNICATION AND NETWORKING UNIT : I To V
SAE6A/SAZ6B DATA COMMUNICATION AND NETWORKING UNIT : I To V 1 UNIT 1:Syllabus Introduction to Data Communication Network Protocols & standards standards organizations Line Configuration Topology Transmission
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationThis PDF document is a sample chapter from the book...
This PDF document is a sample chapter from the book... To order this book, print the last page of this document. Copyright 2001 Society of Manufacturing Engineers Chapter 37 Manufacturing Networks 37.1
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationTCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming
2 TCP/IP and OSI Model Ethernet LAN Network Cables Network Devices Network Topologies Redundant Internet Connections VLANs Wireless LANs Upcoming Network Technologies 3 4 Elements of the Network Sender
More informationCS1302 / Computer Networks
CS1302 / Computer Networks Year/Sem : III/VI UNIT I- DATA COMMUNICATIONS 1. Define Data communication 2. List out the characteristics of data communication 3. What are the components of data communication?
More informationTERM EXAMS CS610- COMPUTER NETWORKS
MUHAMMAD FAISAL MIT 4 th Semester Al-Barq Campus (VGJW01) Gujranwala faisalgrw123@gmail.com MEGA File Solved MCQ s For Final TERM EXAMS CS610- COMPUTER NETWORKS Question No: 1 ( Marks: 1 ) - Please choose
More informationDiscovering Computers Chapter 9 Communications and Networks
Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A
KINGS CS1302 / COMPUTER NETWORKS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE SUB.CODE : CS1302 BRANCH / YEAR / SEM: ECE / III / VI SUB.NAME : COMPUTER NETWORKS
More informationCOMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )
Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin
More informationITP 140 Mobile Applications Technologies. Networks
ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)
More informationOverview of Networks
CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and
More informationTime : 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups are directed. Group A.
COPYRIGHT RESERVED End Sem (III) MCA (XVIII) 2017 Time : 3 hours Full Marks: 70 Candidates are required to give their answers in their own words as far as practicable. The figures in the margin indicate
More informationCommunication Technologies
Unit 29: Communication Technologies Unit code: F/601/7264 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationIntroduction to Computer Science (I1100) Networks. Chapter 6
Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and
More informationChapter 9. Introduction. Communications
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Introduction Page 247 Cell phones and other wireless technologies are allowing
More informationVU Mobile Powered by S NO Group All Rights Reserved S NO Group 2012
1 CS610 COMPUTER NETWORKS Final Term Solved MCQs Mega File (Latest All in One) The protocol address of the next hop must be to an equivalent hardware address before a packet can be sent. Encrypted Decrypted
More information06/02/2006. Local & Metropolitan Area Networks 1. INTRODUCTION. Why Study Local and Metropolitan Area Networks? ACOE322. Lecture 1 Introduction
Local & Metropolitan Area Networks ACOE322 Lecture 1 Introduction 1 1. INTRODUCTION In this section we will cover : 1. Overview of data communications and networking 2. Definition and overview of LANs,
More informationWAN Technologies CCNA 4
WAN Technologies CCNA 4 Overview Note: Most of this will be described in more detail in later chapters. Differentiate between a LAN and WAN Identify the devices used in a WAN List WAN standards Describe
More informationCOMMUNICATIONS AND NETWORKS
COMMUNICATIONS AND NETWORKS Data Communications Data communications describes a process in which one computer transfers data, instructions, and information to another computer. The basic model for data
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationClass X Subject : IT (Vocational) Chapter -1 Ouestion / Answer
Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationUnit 09 Computer Networks
Unit 09 Computer Networks Gain a knowledge about network devices. Discuss what network devices are required to create a basic network Draw a bespoke network drawing using Visio 2 In order to setup a network
More informationSYLLABUS. osmania university CHAPTER - 3 : MEDIUM ACCESS CONTROL (MAC) SUBLAYER Standards, Bluetooth, Bridges and Routers.
Contents i SYLLABUS osmania university UNIT - I CHAPTER - 1 : INTRODUCTION Data Communication, Network Topologies : LAN, WAN, MAN, Types : Bus, Star, Ring, Hybrid, Line Configurations, Reference Models
More informationDarshan Institute of Engineering & Technology for Diploma Studies
1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware
More informationNETWORKING COMPONENTS
1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION
More informationUniversity of Southern California EE450: Introduction to Computer Networks
University of Southern California EE450: Introduction to Computer Networks Catalog Description Network architectures; Layered protocols, Network service interface; Local Networks; long-haul Networks; Internal
More informationIntroduction to Networking Devices
Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More information