Home / CSE / Networking :: Section 2

CSE :: Networking

  1. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

  2. A.
    192
    B.
    224
    C.
    240
    D.
    248
    E.
    252

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as

  4. A.
    Gateways
    B.
    mail gateway
    C.
    bridges
    D.
    User Agent
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. If digital data rate of 9600 bps is encoded using 8-level phase shift keying (PSK) method, the modulation rate is

  6. A.
    1200 bands
    B.
    3200 bands
    C.
    4800 bands
    D.
    9600 bands
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Error detection at a data link level is achieved by

  8. A.
    bit stuffing
    B.
    cyclic redundancy codes
    C.
    Hamming codes
    D.
    equalization

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is

  10. A.
    question and answer
    B.
    form filling
    C.
    open-ended question
    D.
    menu selection
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. Which network topology is considered passive?

  12. A.
    Cross
    B.
    Ring
    C.
    Star
    D.
    Mesh
    E.
    Bus

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)

  14. A.
    POS terminal
    B.
    data collection terminal
    C.
    batch processing terminal
    D.
    intelligent terminal
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. Which address is the loopback address?

  16. A.
    0.0.0.1
    B.
    127.0.0.0
    C.
    127.0.0.1
    D.
    255.255.255.255
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. Error rate is

  18. A.
    an error-detecting code based on a summation operation performed on the bits to be checked.
    B.
    a check bit appended to an array of binary digits to make the sum of all the binary digits.
    C.
    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.
    D.
    the ratio of the number of data units in error to the total number of data units
    E.
    None of the above

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

  20. A.
    Network Server
    B.
    Virtual Private Network
    C.
    Network operating system
    D.
    OSI

    View Answer

    Workspace

    Discuss Discuss in Forum