CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Networking
Comments
Question
Which of the following medium access control technique is used for bus/tree?
Options
A. token ring
B. token bus
C. CSMA
D. MAC
E. None of the above
Correct Answer
token bus
Networking problems
Search Results
1. Which of the following is not a standard synchronous communication protocol?
Options
A. SDLC
B. SMTP
C. SLIP
D. PAS
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: PAS
2. The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as
Options
A. 148.20.2.30
B. 164.100.9.61
C. 210.20.2.64
D. 128.10.2.30
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: 128.10.2.30
3. In OSI model, which of the following layer provides error-free delivery of data?
Options
A. Data link
B. Network
C. transport
D. Session
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: transport
4. You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?
Options
A. 255.255.255.0
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
Show Answer
Scratch Pad
Discuss
Correct Answer: 255.255.255.224
5. Error detection at the data link level is achieved by?
Options
A. Bit stuffing
B. Hamming codes
C. Cyclic Redundancy codes
D. Equalization
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Cyclic Redundancy codes
6. The main difference between TCP and UDP is
Options
A. UDP is connection oriented where as TCP is datagram service
B. TCP is an Internet protocol where as UDP is an ATM protocol
C. UDP is a datagram where as TCP is a connection oriented service
D. All of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: UDP is a datagram where as TCP is a connection oriented service
7. What is the first octet range for a class A IP address?
Options
A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
E. 128 - 191
Show Answer
Scratch Pad
Discuss
Correct Answer: 1 - 126
8. On a class B network, how many subnets are available with a subnet mask of 248?
Options
A. 2
B. 6
C. 30
D. 62
E. 126
Show Answer
Scratch Pad
Discuss
Correct Answer: 30
9. Which of the following communications lines is best suited to interactive processing applications?
Options
A. narrowband channels
B. simplex lines
C. full-duplex lines
D. mixed band channels
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: full-duplex lines
10. In OSI network architecture, the routing is performed by
Options
A. network layer
B. data link layer
C. transport layer
D. session layer
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: network layer
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT