Practice Test: Question Set - 24
1. Transmission of computerized data from one location to another is called
- (A) Data
transfer
- (B) Data
flow
- (C) Data
communication
- (D) Data
management
2. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
- (A) A
logical address that identifies the workstation
- (B) A
physical address that is randomly assigned each time the computer is started
- (C) A
physical address that is assigned by the manufacturer
- (D) The
logical domain address for the workstation
3. What is the port number for HTTP?
- (A) 99
- (B) 86
- (C) 80
- (D) 23
4. If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
- (A) 500 bps
- (B) 1500 bps
- (C) 5 bps
- (D) 1000 bps
5. Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?
- (A) Amplitude
modulation
- (B) Frequency-division
multiple access
- (C) Frequency
modulation
- (D) Frequency-shift
keying
6. One important characteristic of the hub architecture of ARC-net is
- (A) Directionalized
transmission
- (B) Access
control and addressing
- (C) Multiple
virtual networks
- (D) Alternative
routing
7. Devices interconnected by the LAN should include
- (A) Computers
and terminals
- (B) Mass
storage device, printers and plotters
- (C) Bridges
and gateways
- (D) All
of the above
8. A network which is used for sharing data, software and hardware among several users owning microcomputers is called
- (A) WAN
- (B) MAN
- (C) LAN
- (D) VAN
9. Synchronous protocols
- (A) Transmit
characters one at a time
- (B) Allow faster
transmission than asynchronous protocols do
- (C) Are
generally used by personal computers
- (D) Are more
reliable
10. When the computer provides the manager with a multiple choice of possible answers, the prompting technique is
- (A) Question
and answer
- (B) Form filling
- (C) Open-ended
question
- (D) Menu
selection
11. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.
- (A) 2 (m - 2)
- (B) 2 (2m -
1)
- (C) m - 1
- (D) (2m - l)/mJ
12. Number of bits per symbol used in Baudot code is
- (A) 1
- (B) 5
- (C) 8
- (D) 9
13. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
- (A) Network
Server
- (B) Virtual
Private Network
- (C) Network
operating system
- (D) OSI
14. End-to-end connectivity is provided from host-to-host in:
- (A) Network
layer
- (B) Session
layer
- (C) Data link
layer
- (D) Transport
layer
15. The birthplace of the World Wide Web is considered to be
- (A) The
Department of Defense
- (B) CERN
- (C) ARPA
- (D) Netscape
Next Tests:
Blogger Comment
Facebook Comment