Networking Computer Science Skills Questions - Set 24 - ObjectiveBooks

Networking Computer Science Skills Questions - Set 24

Practice Test: Question Set - 24


1. Transmission of computerized data from one location to another is called
    (A) Data transfer
    (B) Data flow
    (C) Data communication
    (D) Data management

2. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
    (A) A logical address that identifies the workstation
    (B) A physical address that is randomly assigned each time the computer is started
    (C) A physical address that is assigned by the manufacturer
    (D) The logical domain address for the workstation

3. What is the port number for HTTP?
    (A) 99
    (B) 86
    (C) 80
    (D) 23

4. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
    (A) 500 bps
    (B) 1500 bps
    (C) 5 bps
    (D) 1000 bps

5. Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?
    (A) Amplitude modulation
    (B) Frequency-division multiple access
    (C) Frequency modulation
    (D) Frequency-shift keying

6. One important characteristic of the hub architecture of ARC-net is
    (A) Directionalized transmission
    (B) Access control and addressing
    (C) Multiple virtual networks
    (D) Alternative routing

7. Devices interconnected by the LAN should include
    (A) Computers and terminals
    (B) Mass storage device, printers and plotters
    (C) Bridges and gateways
    (D) All of the above

8. A network which is used for sharing data, software and hardware among several users owning microcomputers is called
    (A) WAN
    (B) MAN
    (C) LAN
    (D) VAN

9. Synchronous protocols
    (A) Transmit characters one at a time
    (B) Allow faster transmission than asynchronous protocols do
    (C) Are generally used by personal computers
    (D) Are more reliable

10. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
    (A) Question and answer
    (B) Form filling
    (C) Open-ended question
    (D) Menu selection

11. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.
    (A) 2 (m - 2)
    (B) 2 (2m - 1)
    (C) m - 1
    (D) (2m - l)/mJ

12. Number of bits per symbol used in Baudot code is
    (A) 1
    (B) 5
    (C) 8
    (D) 9

13. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
    (A) Network Server
    (B) Virtual Private Network
    (C) Network operating system
    (D) OSI

14. End-to-end connectivity is provided from host-to-host in:
    (A) Network layer
    (B) Session layer
    (C) Data link layer
    (D) Transport layer

15. The birthplace of the World Wide Web is considered to be
    (A) The Department of Defense
    (B) CERN
    (C) ARPA
    (D) Netscape

Show and hide multiple DIV using JavaScript View All Answers

 Next Tests:

    Blogger Comment
    Facebook Comment