Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. Which of the following statement is incorrect?

  2. A.

     The CCITT Recommendation X.25 specifies three layers of communication: physical, link and network.

    B.

     The second layer of communication is the data-link layer

    C.

     Errors in the physical layer can be detected by the data link layer

    D.

     The fourth layer, in reference to the OSI model, is the session layer

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Devices on one network can communicate with devices on another network via a

  4. A.

     file server

    B.

     utility server

    C.

     printer server

    D.

     gateway

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?

  6. A.

     Telex

    B.

     Word processor

    C.

     Facsimile

    D.

     Electronic mail

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Which file transfer protocol uses UDP?

  8. A.

     NFS

    B.

     TELNET

    C.

     TFTP

    D.

     FTP

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?

  10. A.

     255.255.255.0

    B.

     255.255.255.224

    C.

     255.255.255.240

    D.

     255.255.255.248

    E.

     255.255.255.252

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be

  12. A.

     5

    B.

     10

    C.

     20

    D.

     32

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. Which of the following medium access control technique is used for bus/tree?

  14. A.

     token ring

    B.

     token bus

    C.

     CSMA

    D.

     MAC

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:

  16. A.

     ring network

    B.

     spider network

    C.

     hierarchical network

    D.

     data control network

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. The size or magnitude of a voltage or current waveform is

  18. A.

     Amplitude

    B.

     Aloha

    C.

     Angle Modulation

    D.

     Attenuation

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. Which of the following network access standard is used for connecting stations to a circuit-switched network?

  20. A.

     X.3

    B.

     X.21

    C.

     X.25

    D.

     X.75

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum