logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • Which of the following refers to the terms "residual error rate"?


  • Options
  • A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line
  • B. The probability that one or more errors will be undetected when an error detection scheme is used
  • C. the probability that one or more errors will be detected when an error detection mechanism is used
  • D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz
  • E. None of the above

  • Correct Answer
  • The probability that one or more errors will be undetected when an error detection scheme is used 


  • Networking problems


    Search Results


    • 1. Which address is the loopback address?

    • Options
    • A. 0.0.0.1
    • B. 127.0.0.0
    • C. 127.0.0.1
    • D. 255.255.255.255
    • E. None of the above
    • Discuss
    • 2. Modulation is the process of

    • Options
    • A. converting analog signals to digital signals
    • B. converting digital signals to analog signals
    • C. Multiplexing various signals into high speed line signals
    • D. performing data encryption.
    • Discuss
    • 3. Sending a file from your personal computer's primary memory or disk to another computer is called

    • Options
    • A. uploading
    • B. downloading
    • C. logging on
    • D. hang on
    • E. None of the above
    • Discuss
    • 4. Compared to analog signals, digital signals

    • Options
    • A. allow faster transmission
    • B. are more accurate
    • C. both (a) and (b)
    • D. All of the above
    • E. None of the above
    • Discuss
    • 5. A 8-Mbps token ring has a token holding timer value of 10 msec. What is the longest frame (assume header bits are negligible) that can be sent on this ring?

    • Options
    • A. 8000 B frame
    • B. 80,000 B frame
    • C. 8 x 105 bit frame
    • D. 10,000 B frame
    • Discuss
    • 6. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

    • Options
    • A. 192
    • B. 224
    • C. 240
    • D. 248
    • E. 252
    • Discuss
    • 7. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

    • Options
    • A. Layer 7 protocols
    • B. Layer 6 protocols
    • C. Layer 5 protocols
    • D. Layer 4 protocols
    • E. None of the above
    • Discuss
    • 8. To connect a computer with a device in the same room, you might be likely to use

    • Options
    • A. a coaxial cable
    • B. a dedicated line
    • C. a ground station
    • D. All of the above
    • Discuss
    • 9. Which of the following best illustrates the default subnet mask for a class A,B, and C Network?

    • Options
    • A. 0.0.0.0, 0.0.0.1, 0.0.1.1
    • B. 255.255.255.0, 255.255.0.0, 255.0.0.0
    • C. 255.0.0.0, 255.255.0.0, 255.255.255.0
    • D. 255.255.0.0, 255.255.255.0, 255.255.255.255
    • E. None of the above
    • Discuss
    • 10. HOSTS file entries are limited to how many characters?

    • Options
    • A. 8
    • B. 255
    • C. 500
    • D. Unlimited
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment