logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • Which of the following TCP/IP protocol is used for transferring files from one machine to another?


  • Options
  • A. RARP
  • B. ARP
  • C. TCP
  • D. FTP
  • E. None of the above

  • Correct Answer
  • FTP 


  • Networking problems


    Search Results


    • 1. With an IP address starting at 200, you currently have 10 subnets. What subnet mask should you use to maximize the number of available hosts?

    • Options
    • A. 192
    • B. 224
    • C. 240
    • D. 248
    • E. 252
    • Discuss
    • 2. Communication circuits that transmit data in both directions but not at the same time are operating in

    • Options
    • A. a simplex mode
    • B. a half-duplex mode
    • C. a full-duplex mode
    • D. an asynchronous mode
    • E. None of the above
    • Discuss
    • 3. Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error?

    • Options
    • A. one bit or any odd number of bits inverted in a block of data during transmission
    • B. two bits or any even number of bits inverted in a block during transmission
    • C. one bit or any odd number of bits inverted in a byte during transmission
    • D. two bits or any even number of bits inverted in a byte during transmission
    • E. None of the above
    • Discuss
    • 4. Networks where end user workstations are tied to LAN servers to share resources and application processing.

    • Options
    • A. Internetworked enterprise
    • B. Information super highway
    • C. Business applications of telecommunications
    • D. Client/Server networks
    • Discuss
    • 5. If the client receives an address from a DHCP server, what is the only information available in the Network Properties dialog box?

    • Options
    • A. The IP address
    • B. The subnet address
    • C. That the client is receiving its address from DHCP
    • D. The default gateway
    • E. None of the above
    • Discuss
    • 6. In OSI network architecture, the dialogue control and token management are responsibilities of

    • Options
    • A. session layer
    • B. network layer
    • C. transport layer
    • D. data link layer
    • E. None of the above
    • Discuss
    • 7. Since bridges buffer frames, it is possible to interconnect different network segments which use different MAC protocols

    • Options
    • A. True
    • B. False.
    • Discuss
    • 8. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?

    • Options
    • A. Start the Replication service on Kim's Windows for Workgroups computer
    • B. Relocate Kim's home directory to her Windows for Workgroups computer
    • C. Map a drive on Kim's Windows for Workgroups computer to her home directory on the server
    • D. You cannot do this. Home directories can be accessed only by Windows NT computers
    • Discuss
    • 9. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

    • Options
    • A. True
    • B. False
    • Discuss
    • 10. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?

    • Options
    • A. Token passing provides higher throughput than CSMA/CD when twisted-pair wiring is used
    • B. The station that holds the token is allowed to transmit a message on the network
    • C. The station that hold the token has the highest priority on the network
    • D. A token contains information that is used to route messages between rings
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment