Fields in Computer Science Networking Practice Test - Set 26 - ObjectiveBooks

Fields in Computer Science Networking Practice Test - Set 26

Practice Test: Question Set - 26


1. Which of the following technique is used for encapsulation?
    (A) A technique used in best-effort delivery systems to avoid endlessly looping packets
    (B) A technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
    (C) One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
    (D) None of the above

2. What does 240 translate to in binary?
    (A) 11110000
    (B) 00011110
    (C) 00001111
    (D) 11100000

3. In cyclic redundancy checking, the divisor is _______ the CRC.
    (A) The same size as
    (B) One bit less than
    (C) One bit more than
    (D) Two bits more

4. If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)
    (A) POS terminal
    (B) Data collection terminal
    (C) Batch processing terminal
    (D) Intelligent terminal

5. A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as
    (A) Aloha
    (B) Angle modulation
    (C) Amplitude modulation
    (D) Modem

6. An ROP would be attached to a
    (A) Simplex channel
    (B) Duplex channel
    (C) Half duplex channel
    (D) Full duplex channel

7. Which of the following summation operations is performed on the bits to check an error-detecting code?
    (A) Codec
    (B) Coder-decoder
    (C) Checksum
    (D) Attenuation

8. Which of the following uses network address translation?
    (A) Routers
    (B) Network adapter drivers
    (C) Hubs
    (D) Windows 95

9. What is the maximum number of entries in the HOSTS file?
    (A) 8
    (B) 255
    (C) 500
    (D) Unlimited

10. HMP (Host Monitoring Protocol) is:
    (A) A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
    (B) A TCP/IP high level protocol for transferring files from one machine to another
    (C) A protocol used to monitor computers
    (D) A protocol that handles error and control messages

11. Terminals are required for
    (A) Realtime, batch processing, and timesharing
    (B) Realtime, timesharing, and distributed processing
    (C) Realtime, distributed processing, and manager inquiry
    (D) Realtime, timesharing, and message switching

12. What is the minimum number of wires required for sending data over a serial communications links?
    (A) 2
    (B) 1
    (C) 4
    (D) 3

13. An example of an analog communication method is
    (A) Laser beam
    (B) Microwave
    (C) Voice grade telephone line
    (D) All of the above

14. What OSI layer handles logical address to logical name resolution?
    (A) Transport
    (B) Physical
    (C) Presentation
    (D) Data Link

15. The systematic access of small computers in a distributed data processing system is referred to as:
    (A) Dialed service
    (B) Multiplexing
    (C) Polling
    (D) Conversational mode

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests:

    Blogger Comment
    Facebook Comment