Home

What is the correct answer?

4

The key concern in the design of transmission system is -------------- and ---------------

A. data rate ,distance

B. speed, accuracy

C. accuracy, simplicity

D. distance , cost

Correct Answer :

A. data rate ,distance


Related Questions

What is the correct answer?

4

What is used to boost a digital signal?

A. amplifier

B. digi-booster

C. multiplexer

D. booster

What is the correct answer?

4

TCP protocol is responsible for logical addressing and delivery of packets.

A. True.

B. False.

What is the correct answer?

4

Which of the following fields holds the packets of several protocols?

A. NLPID field

B. Pad field

C. UI (0x03) field

D. Q.922 field

What is the correct answer?

4

In flags message attribute, which of the following flag indicates that message has been
completed?

A. \Deleted

B. \Recent

C. \Flagged

D. \Draft

What is the correct answer?

4

UDP datagram has a header, which is of ________.

A. 16 bytes

B. 8-bytes

C. 32 bytes

D. 64 bytes

What is the correct answer?

4

Which of the following can provide a backbone network of 600 meters in length without using repeaters?

A. 10BaseT

B. 100BaseT

C. 10Base5

D. 100BaseFX

What is the correct answer?

4

………………….is a technique of conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel.

A. Line coding

B. Demodulation

C. Modulation

D. Segmentation

What is the correct answer?

4

Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?

A. Use IPX.

B. Implement NAT.

C. Use DHCP.

D. Use DNS.

What is the correct answer?

4

In the IP address 129.2.8.9, what does 129.2 specify?

A. Protocol address

B. Router address

C. Host number

D. Network number

What is the correct answer?

4

A node, which is more powerful, and can handle local information processing or graphics processing is called a------------------.

A. Workstation

B. Server

C. Network Operating System

D. Peer system

What is the correct answer?

4

Internet Architecture Board (IAB) governs which of the following bodies?

A. Internet Assigned Number Authority (IANA)

B. Internet Research Task Force (IRTF)

C. Internet Engineering Task Force (IETF)

D. All of the above

What is the correct answer?

4

Router B receives an update from router A that indicates Net1 is two hops away. The next update from A says Net1 is five hops away. What value is entered in B's routing table for Net1? Assume the basic RIP is being used.

A. 6

B. 7

C. 2

D. 3

What is the correct answer?

4

Which of the following algorithms are meant for establishing the paths through the network?

A. Unicast

B. Broadcast

C. Multicast

D. Any cast

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

Which of the following delivery methods works with only one source and one destination? Multicast

A. Multicast

B. Broadcast

C. Unicast

D. Any cast

What is the correct answer?

4

Identify the topology and network type that uses a central hub with cables connected to workstations.

A. Physical star topology, Ethernet

B. Physical bus topology, Ethernet

C. Physical ring topology, token ring

D. Physical ring topology, Ethernet

What is the correct answer?

4

Which is the port used by POP3?

A. 69

B. 110

C. 143

D. 443

What is the correct answer?

4

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

What is the correct answer?

4

ICMP messages require ………………. levels of encapsulation

A. One

B. Two

C. Three

D. Four

What is the correct answer?

4

Which directory service is used in Windows 2000 Server?

A. Active Directory

B. SAM

C. NDS

D. Bindery

What is the correct answer?

4

Which of the following headers does a router look at to find how to route a data packet?

A. Ethernet frame header

B. MAC address

C. Application header

D. IP header

What is the correct answer?

4

Which of the following is a media type that is most susceptible to interference?

A. Shielded twisted pair (STP)

B. Fiber optics

C. Unshielded twisted pair (UTP)

D. Coaxial

What is the correct answer?

4

TCP protocol is responsible for connection-oriented communication

A. True.

B. False.

What is the correct answer?

4

Which of the following IP addresses are used by multicast devices?

A. Class D

B. Class C

C. Class B

D. Class A

What is the correct answer?

4

127.0.0.1 address is reserved for internal loopback functions.

A. True.

B. False.

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

Class C network address class supports 65,534 hosts.

A. True.

B. False.

What is the correct answer?

4

Which of the following protocols are considered unreliable or connectionless?

A. UDP

B. TCP

C. FTP

D. TFTP

What is the correct answer?

4

_______ Domain name corresponds to US military.

A. .us mili

B. .mili

C. .mil

D. .us

What is the correct answer?

4

Which of the following provides control over multimedia sessions?

A. Session Initiation Protocol (SIP)

B. Session Description Protocol (SDP)

C. Session Announcement Protocol (SAP)

D. Real-time Control Protocol (RTCP)