Basic networking test pdf


















Dynamic Hyper Control Protocol D. Dynamic Hyper Configuration Protocol. Dynamic Name System B. Dynamic Network System C. Domain Name System D. Domain Network Service. The transmission capacity of communication channels B.

Connected Computers in the Network C. Class of IP used in Network D. None of Above. Asymmetric Dual Subscriber Line B. Asymmetric Digital System Line C. Asymmetric Dual System Line D. Asymmetric Digital Subscriber Line. All of the above. Layer 1 Physical Layer B. Layer 3 Network Layer C. Layer 4 Transport Layer D. Layer 7 Application Layer. Only Source address B. Only Destination address C. Source and Destination address D. Source or Destination address. Transport, Session, Presentation, Application B.

Network, Transport, Session, Presentation C. Datalink, Network, Transport, Session D. Physical, Datalink, Network, Transport. Network bit — 14, Host bit — 16 B. Network bit — 16, Host bit — 14 C. Network bit — 18, Host bit — 16 D.

Network bit — 12, Host bit — Unicast address B. Network address C. Broadcast address D. None of the above. A packet may be lost B. Packets may arrive out of order C. Duplicate packets may be generated D. Network bits 7, Host bits 24 B. Network bits 8, Host bits 24 C. Network bits 7, Host bits 23 D. Network bits 8, Host bits PIDs of the processes running of different devices are same d.

Answer: a. Which one of the following computer network is built on the top of another network? In computer network nodes are a. Communication channel is shared by all the machines on the network in a.

Answer: broadcast network. Bluetooth is an example of a. Send It! Transmission data rate is decided by. When collection of various computers seems a single coherent system to its client, then it is called. It might consist of an e-mail system, a message accessing board and one or more Web site portals. Extra-net — A network that connects people within this company with people who are outside of the company is called extra-net.

It happens within a secure ,password protected network. Answer: Network Topology is refers to the way computers and its peripheral environment is configured to form networks. Answer: Here all nodes are connected to a hub. Packets sent to the hub. Again packets are sent by Hub to the destination. Answer: Here all nodes are connected in a circle. Token is used for transferring data from computers. Here nodes waits for token to send. Answer: These are the larger one connections of networks.



0コメント

  • 1000 / 1000