logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?


  • Options
  • A. 192
  • B. 224
  • C. 240
  • D. 248
  • E. 252

  • Correct Answer
  • 248 


  • Networking problems


    Search Results


    • 1. Which of the following refers to the terms "residual error rate"?

    • Options
    • A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line
    • B. The probability that one or more errors will be undetected when an error detection scheme is used
    • C. the probability that one or more errors will be detected when an error detection mechanism is used
    • D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz
    • E. None of the above
    • Discuss
    • 2. Which address is the loopback address?

    • Options
    • A. 0.0.0.1
    • B. 127.0.0.0
    • C. 127.0.0.1
    • D. 255.255.255.255
    • E. None of the above
    • Discuss
    • 3. Modulation is the process of

    • Options
    • A. converting analog signals to digital signals
    • B. converting digital signals to analog signals
    • C. Multiplexing various signals into high speed line signals
    • D. performing data encryption.
    • Discuss
    • 4. Sending a file from your personal computer's primary memory or disk to another computer is called

    • Options
    • A. uploading
    • B. downloading
    • C. logging on
    • D. hang on
    • E. None of the above
    • Discuss
    • 5. Compared to analog signals, digital signals

    • Options
    • A. allow faster transmission
    • B. are more accurate
    • C. both (a) and (b)
    • D. All of the above
    • E. None of the above
    • Discuss
    • 6. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

    • Options
    • A. Layer 7 protocols
    • B. Layer 6 protocols
    • C. Layer 5 protocols
    • D. Layer 4 protocols
    • E. None of the above
    • Discuss
    • 7. To connect a computer with a device in the same room, you might be likely to use

    • Options
    • A. a coaxial cable
    • B. a dedicated line
    • C. a ground station
    • D. All of the above
    • Discuss
    • 8. Which of the following best illustrates the default subnet mask for a class A,B, and C Network?

    • Options
    • A. 0.0.0.0, 0.0.0.1, 0.0.1.1
    • B. 255.255.255.0, 255.255.0.0, 255.0.0.0
    • C. 255.0.0.0, 255.255.0.0, 255.255.255.0
    • D. 255.255.0.0, 255.255.255.0, 255.255.255.255
    • E. None of the above
    • Discuss
    • 9. HOSTS file entries are limited to how many characters?

    • Options
    • A. 8
    • B. 255
    • C. 500
    • D. Unlimited
    • E. None of the above
    • Discuss
    • 10. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

    • Options
    • A. 255.255.252.0
    • B. 225.255.254.0
    • C. 255.255.255.240
    • D. 255.255.255.252
    • Discuss


    Comments

    There are no comments.

Enter a new Comment