logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign?


  • Options
  • A. 255.255.192.0
  • B. 255.255.224.0
  • C. 255.255.240.0
  • D. 255,255.248.0
  • E. 255.255.252.0

  • Correct Answer
  • 255.255.252.0 


  • Networking problems


    Search Results


    • 1. Microprogramming is

    • Options
    • A. assembly language programming
    • B. programming of minicomputers
    • C. control unit programming
    • D. macro programming of microcomputers
    • E. None of the above
    • Discuss
    • 2. Stephanie is in charge of a small network and wants to make it simple but secure. The users want to have full control over their data and still be able to share data with the rest of the office. The networking knowledge of the office staff is basic. Which network(s) would be the best for Stephanie to set up?

    • Options
    • A. Peer-to-peer
    • B. Master domain
    • C. Server-based
    • D. WAN
    • E. Share-level
    • Discuss
    • 3. Which of the following statements is correct?

    • Options
    • A. Terminal section of a synchronous modem contains the scrambler
    • B. Receiver section of a synchronous modem contains the scrambler
    • C. Transmission section of a synchronous modem contains the scrambler
    • D. Control section of a synchronous modem contains the scrambler
    • E. None of the above
    • Discuss
    • 4. You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign?

    • Options
    • A. 255.255.224.0
    • B. 255.255.240.0
    • C. 255.255.248.0
    • D. 255.255.255.0
    • E. 255.255.255.255
    • Discuss
    • 5. The encoding method specified in the EIA-232 standard is _____.

    • Options
    • A. NRZ-I
    • B. NRZ-L
    • C. Manchester
    • D. Differential Manchester
    • Discuss
    • 6. What is the name of the device that converts computer output into a form that can be transmitted over a telephone line?

    • Options
    • A. Teleport
    • B. Modem
    • C. Multiplexer
    • D. Concentrator
    • E. None of the above
    • Discuss
    • 7. Which of the following file retrieval methods use hypermedia?

    • Options
    • A. HTTP
    • B. WAIS
    • C. Veronica
    • D. Archie
    • E. None of the above
    • Discuss
    • 8. Which of the following characteristics is not true of NetBEUI?

    • Options
    • A. Highly-customizable
    • B. Routable
    • C. Little configuration required
    • D. Fast for small networks to Self-tuning
    • Discuss
    • 9. Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

    • Options
    • A. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology
    • B. Ethernet, because it is cabled using fiber-optic cable
    • C. Token-Ring, because it uses a MAU
    • D. Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
    • E. Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
    • Discuss
    • 10. Data communications monitors available on the software market include

    • Options
    • A. ENVIRON/1
    • B. TOTAL
    • C. BPL
    • D. Telenet
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment