Home
Current Affairs January 2024

What is the correct answer?

4

The key concern in the design of transmission system is -------------- and ---------------

A. data rate ,distance

B. speed, accuracy

C. accuracy, simplicity

D. distance , cost

Correct Answer :

A. data rate ,distance


Related Questions

What is the correct answer?

4

Which of the following IP addresses are used by multicast devices?

A. Class D

B. Class C

C. Class B

D. Class A

What is the correct answer?

4

Which of the following defines a family of standards for 100 Mbps fiber optic LANs that
provides the physical layer and media access control sub-layer of the data link layer, as
defined by the ISO/OSI Model?

A. Ethernet

B. IEEE 802

C. Fiber Distributed Data Interface (FDDI)

D. Point-to-Point Protocol (PPP)

What is the correct answer?

4

At which layer of the OSI model do FTP, SMTP, POP3, and HTTP function?

A. Physical

B. Network

C. Transport

D. Application

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

A router receives an IP packet with source IP address 130.45.3.3 and destination IP address 202.23.4.16. The router cannot find the destination IP address in its routing table. Which ICMP message should be sent?

A. Time stamp request

B. Router solicitation

C. Destination Unreachable

D. Parameter problem on a datagram

What is the correct answer?

4

_____________ command is used by the client to transfer the job across to the server.

A. Any upper layer protocol

B. User datagram protocol

C. Transmission Control protocol

D. Remote Shell protocol

What is the correct answer?

4

You have a network card with the connector in question 43, and it also has a 15 pin female connector, the pins being in two rows. What type of card is it?

A. ethernet

B. token ring

C. arcnet

D. dlc

What is the correct answer?

4

Your network has gotten a single class C address but has 300 computers. How can you connect them to the Internet?

A. Use IPX.

B. Implement NAT.

C. Use DHCP.

D. Use DNS.

What is the correct answer?

4

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

What is the correct answer?

4

What is the maximum frame size of a frame relay?

A. < or = to 1600 octets

B. > or = to 1800 octets

C. < or = to 1800 octets

D. > or = to 1600 octets

What is the correct answer?

4

The worldwide Internet is a well-known example of ------------------.

A. PAN

B. Subnet

C. Intra-Network

D. Inter-network

What is the correct answer?

4

Which of the following delivery methods works with only one source and one destination? Multicast

A. Multicast

B. Broadcast

C. Unicast

D. Any cast

What is the correct answer?

4

What can be used in the place of DNS to resolve host names to IP addresses?

A. WINS

B. LMHosts

C. Hosts

D. DHCP

What is the correct answer?

4

Which of the following is the IEEE specification for wireless networks?

A. 802.3

B. 802.5

C. 802.2

D. 802.11b

What is the correct answer?

4

Which is the port used by HTTPS?

A. 123

B. 143

C. 69

D. 443

What is the correct answer?

4

T1 makes up 24 channels.

A. True.

B. False.

What is the correct answer?

4

802.5 project standard defines Token Ring.

A. True.

B. False

What is the correct answer?

4

Which of the following fields holds the packets of several protocols?

A. NLPID field

B. Pad field

C. UI (0x03) field

D. Q.922 field

What is the correct answer?

4

Which of the following is required to communicate between two computers?

A. Communications software

B. Protocol

C. Communication hardware

D. All of the above including access to transmission medium

What is the correct answer?

4

25 is used by SMTP

A. True.

B. False.

What is the correct answer?

4

In Secure Electronic Transaction, the description of the purchase and cost is contained in
________ message.

A. Authorization

B. Purchase order

C. Inquiry

D. Capture

What is the correct answer?

4

If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ………….

A. Skeleton

B. Private

C. Public

D. Symmetric

What is the correct answer?

4

Your Web server is also configured as an FTP server. What part of the data packet will tell the server which application the data is meant for?

A. Port

B. IP address

C. MAC address

D. Frame header

What is the correct answer?

4

What layer of the OSI protocol reference model does a bridge operate under?

A. Physical

B. Data-link

C. Network

D. Transport

What is the correct answer?

4

Telnet protocol uses ___________ representation for the function Synchronize.

A. SYC

B. SYNCH

C. SNZ

D. SY

What is the correct answer?

4

--------------- is/are used for error detection.

A. Parity bit

B. checksum

C. both A) and B)

D. neither A) nor B).

What is the correct answer?

4

Which type of connector is used on 10Base2 networks?

A. SC

B. BNC

C. RJ-45

D. RJ-11

What is the correct answer?

4

DSL stands for ------------------------

A. data subscriber lines

B. dual subscriber lines

C. delay subscriber lines

D. digital subscriber lines

What is the correct answer?

4

You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured for an IP network over 100BaseT using DHCP. You can't connect, even though the client says that DHCP is working on his 100BaseT network. What should

A. Use Ipconfig /release to release the old DHCP address.

B. Use Winipcfg and click Release to release the old DHCP address.

C. Use Ifconfig to initialize the NIC.

D. Use Tracert to determine the problem.

What is the correct answer?

4

What is used to boost a digital signal?

A. amplifier

B. digi-booster

C. multiplexer

D. booster