Home / Computer Science / Computer Networking :: Networking Miscellaneous

Computer Science :: Computer Networking

  1. Which multiplexing technique shifts each signal to a different carrier frequency?

  2. A.

     FDM

    B.

     synchronous TDM

    C.

     asynchronous TDM

    D.

     All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Which of the following protocol is connection-oriented?

  4. A.

     IPX

    B.

     UDP

    C.

     NetBEUI

    D.

     TCP

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. The loss in signal power as light travels down the fiber is called

  6. A.

     attenuation

    B.

     propagation

    C.

     scattering

    D.

     interruption

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Operating system functions may include

  8. A.

     input/output control

    B.

     virtual storage

    C.

     multiprogramming

    D.

     All of the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. Which layer of international standard organization's OSI model is responsible for creating and recognizing frame boundaries?

  10. A.

     physical layer

    B.

     data link layer

    C.

     transport layer

    D.

     network layer

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. Which of the following might be used by a company to satisfy its growing communications needs?

  12. A.

     front-end processor

    B.

     multiplexer

    C.

     controller

    D.

     concentrator

    E.

     All of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. Different computers are connected to a LAN by a cable and a/an

  14. A.

     modem

    B.

     interface card

    C.

     special wires

    D.

     telephone lines

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

  16. A.

     An additional token is added for every 1,000 nodes

    B.

     The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500

    C.

     The network becomes less efficient

    D.

     After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device

    E.

     The network becomes more efficient

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. A characteristic of a multiprogramming system is:

  18. A.

     simultaneous execution of program instructions from two applications

    B.

     concurrent processing of two or more programs

    C.

     multiple CPUs

    D.

     All the above

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. When a host knows its physical address but not its IP address, it can use _____.

  20. A.

     RARP

    B.

     ARP

    C.

     IGMP

    D.

     ICMP

    E.

     None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum