0% found this document useful (0 votes)
2 views7 pages

Data-Com

The document contains a series of multiple-choice questions and answers related to data communications and networking concepts. It covers topics such as access privileges, data compression, Internet service providers, and various networking protocols. Each question is followed by the correct answer indicated, providing a comprehensive overview of key terms and definitions in the field.

Uploaded by

jnllmcrisostomo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views7 pages

Data-Com

The document contains a series of multiple-choice questions and answers related to data communications and networking concepts. It covers topics such as access privileges, data compression, Internet service providers, and various networking protocols. Each question is followed by the correct answer indicated, providing a comprehensive overview of key terms and definitions in the field.

Uploaded by

jnllmcrisostomo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

DATA COMMUNICATIONS:

1. On a network, the extent of users capacity to use and modify directories, files, and programs located on other computers
in the network.
A. Access privileges (Correct Answer)
B. Access hole
C. Access aperture
D. Access capacity

2.Techniques for reducing the amount of DATA needed to convey some amount of INFORMATION.
A. Deduction
B. Compression (Correct Answer)
C. Elimination
D. Reduction

3. ISP, a company that provides end users to the Internet.


A. Internet system Protocol
B. Internet system Provider
C. Internet service Provider (Correct Answer)
D. Internet service Protocol

4. A continuous tone established by two connected modems.


A. hum
B. carrier (Correct Answer)
C. signal
D. reverberation

5. ATM scalability references the capability of the technology to support


A. Different Local Area Network
B. Different cell lengths
C. A range of operating rates using the same old formats (Correct Answer)
D. Different Wide Area Network

6. Which of the following is a search service in a Gopher that scans a database of Gopher directory titles and resources and
generates a new Gopher menu containing the result of the search?
A. Veronica (Correct Answer)
B. Eliza
C. Rebecca
D. Eudora

7. IP diagrams on a LAN are transported


A. after the TC header
B. in the LAN header
C. in the application field
D. in the information field of the LAN frame (Correct Answer)

8. The TCP (Transmission Control Protocol) _____ tells you how many bit words are contained in the TCP header.
A. header length (Correct Answer)
B. header number
C. sequence number
D. acknowledgment number
9. In a serial communication, a bit is inserted into the data stream to inform the receiving computer that a byte is to follow.

A. initial bit
B. start bit (Correct Answer)
C. serial bit
D. delay bit

10. In an Internet electronic mail address, to the right side of the @ sign is the ___ of the computer that houses the
mailbox.
A. hosts name
B. domain name (Correct Answer)
C. login name
D. servers name

11. You want to connect a small Token Ring network with an Ethernet network, both of which use NetBEUI. You want to
implement filtering to control network traffic. Which device should you use to accomplish this?
A. A repeater
B. A bridge (Correct Answer)
C. A gateway
D. A router

12. Which connector type is used to connect Thinnet to a NIC?


A. RJ-45
B. BNC barrel
C. AUI
D. BNC T (Correct Answer)

13. Which layer functions is liaison between user support layer and network support layers?
A. network
B. physical
C. transport (Correct Answer)
D. session

14. A method of reducing cost of modems by having the PC's CPU handle the correction error and data compression,
rather than a modem's own processor.
A. Resource Reservation Protocol Interface
B. Rockwell Protocol Interface (Correct Answer)
C. Reservation Protocol Interface
D. Routing Table Maintenance Protocol Interface

15. The protocol used in TCP/IP networks for transferring electronic mail messages between the end user computers and
mail servers.
A. Simple Mail Transfer Protocol (Correct Answer)
B. Simple Mail Management Protocol
C. Sub-network Mail Access Protocol
D. Simple Mail Routing Protocol
16. A proprietary, router-to-router intradomain protocol that was developed by CISCO systems for routing TCP/IP and
OSI-CNLP
A. Interior gateway protocol
B. Internet Routing Protocol
C. Highway Routing Protocol
D. Interior gateway Routing Protocol (Correct Answer)

17. A network system in which the communication path between sender and receiver is maintained on a continuous basis
for the duration of the call.
A. packet switching
B. circuit switching (Correct Answer)
C. multiplexing
D. Hand-off

18. Which of the following protocols is considered a network protocol?


A. FTP
B. SPX
C. Telnet
D. IPX (Correct Answer)

19. A term used in cellular networks for coverage that allows user to make and receive call indoors.
A. Full coverage
B. Indoor coverage
C. Full/Full coverage
D. In-building coverage (Correct Answer)

20. A very high speed (up to more than 1 G bit/s), low latency, full duplex data communication scheme that is optimized
to carry large block of data for both channel and LAN-type connections.
A. High Performance Parallel Interface
B. Fiber channel (Correct Answer)
C. Escon
D. TCP/IP

21. An interface between routers and CSU/DSUs that enables existing routers to support ATM-with a software upgrade
(DXI).
A. Data Electronic Interface
B. Data Encoding Interface
C. Dual Exchange Interface
D. Data Exchange Interface Correct Answer)

22. A local area network without a central file server in which all the computers in the network have access to the public
files located on all other workstations.
A. Door-to-peer network (Correct Answer)
B. Value added network
C. Bus network
D. Ring network
23. A ______ interconnects LAN having identical protocols at the physical and data link layers
A. router
B. bridge (Correct Answer)
C. gateway
D. all of these

24. The process of changing a digital message so that it can be read only by intended parties, or to verify the identity of the
sender, or to be assured that the sender really did send the message.
A. Non-repudiation
B. Encryption (Correct Answer)
C. Encyphering
D. Authentication

25. A public communication provider, such as a telephone company.


A. central office
B. local exchange
C. carrier (Correct Answer)
D. service provider

26. Which type of network media-access do IBM LANs with Multistation Access Units employ?
A. Token passing (Correct Answer)
B. CSMA/CA
C. CSMA/CD
D. Beaconing

27. The capacity to permit users to share access of all kinds, including servers and peripherals such as printers or plotters.
A. Group sharing
B. Device sharing (Correct Answer)
C. Shareware
D. Access sharing

28. A full duplex (on four-wire leased lines) or half-duplex (on a two-wire dial-up lines) synchronous 4800- and 2400-
bits/s modem modulation standard
A. V.25
B. V.29 (Correct Answer)
C. V.10
D. V.30

29. It describes a computer, device, or application that is not attached to a network


A. Standalone (Correct Answer)
B. Unconnected
C. Unilateral
D. Simplex

30. A modem modulation standard (still under development) providing full duplex, 32000-(or maybe 33600-)bits/s data
transfer over a standard one-pair dial-up telephone line.
A. V.40
B. V.34
C. V.34 bis (Correct Answer)
D. V.25
31. Which of the following is not true as an advantage of a large-scale server based network?
A. Inexpensive to implement (Correct Answer)
B. Centralized backups of network data
C. Ease of administration
D. Increased performance

32. A technically straightforward form of conference call in which many callers can converse simultaneously and are
charge premium prices fordoing so.
A. surfing
B. chat line (Correct Answer)
C. satphone
D. internet

33. The practice of using alternative network to that of the normal OPERATOR to gain access to the network.
A. Selection
B. Router
C. Polling
D. Bypass (Correct Answer)

34. On the Internet electronic mail address, the part to the left of the (@) specifies the name of the person's ___.
A. mail package
B. mailing list
C. mailbox name (Correct Answer)
D. mail server

35. A local area network that transmits data at 10 M bit/s over copper cabling.
A. 10 BASE-E
B. 10 BASE-G
C. 10 BASE-T (Correct Answer)
D. 10 BASE-FX

36. Which of the following is the most likely culprit when a computer's operating system is unable to detect a network
card?
A. Wrong IRQ is set on the IDE controller card
B. Wrong IRQ is set on the network card (Correct Answer)
C. Wrong frame type is set on the network card
D. Wrong protocol is bound to the network adapter

37. Which layer of the OSI Reference Model translates data formats?
A. Application
B. Network
C. Data Link
D. Presentation (Correct Answer)

38. What is the main function of the transport layer?


A. node-to-node delivery
B. end-to-end message delivery (Correct Answer)
C. synchronization
D. updating and maintaining of routing tables
39. It is a widely accepted method for integrating SNA SDLC traffic and standard LAN traffic on a single internet (WAN
Link).
A. Bridging
B. Source route bridging
C. Routing
D. Data link switching (Correct Answer)

40. A device (or software on a router) that links an organization internal TCP/IP network to an internet and restricts the
type of traffic that it will pass to provide security.
A. Firewall (Correct Answer)
B. Gopher
C. Router
D. Web Browser

41. The computer that responds to request for services or resources from network clients
A. User
B. Controller
C. Client
D. Server (Correct Answer)

42. In a local area network, it is a garbled transmission that results when two or more workstation transmit to the same
network cable at exactly the same time.
A. handshake
B. fusion
C. interlink
D. collision (Correct Answer)

43. Which of the following is a TCP/IP suite connectionless-mode layer of transport protocol?
A. UDP (Correct Answer)
B. IP
C. TCP
D. SNMP

44. The ATM application class that requires timing relationship, a variable bit rate, and a connection-oriented type of
connection is
A. Class B (Correct Answer)
B. Class C
C. Class D
D. Class A

45. Which of these hardware devices can be used to boost broadband signal strength across a long cable?
A. Multiplexers
B. Repeaters
C. Amplifiers (Correct Answer)
D. Time domain reflectometers

46. A corporate network using facilities in the PSTN to replace the older private network based on a leased line.
A. Network Information Center
B. Private Branch Exchange
C. Interexchange Carrier
D. Virtual Private Network (Correct Answer)
47. Which of the following networks performs both a routing and bridging functions?
A. Gateway
B. Hub
C. Brouter (Correct Answer)
D. Router

48. A privately selected string of letters, numbers and other characters used to identify a particular user and to control
access to protected resources.
A. Password (Correct Answer)
B. Code
C. Security
D. Screen

49. A term used to refer to instances when a service or network element is unavailable owing to a fault.
A. Outage (Correct Answer)
B. Off-air
C. Downtime
D. Fault

50. A router to router protocol serving as a replacement for IP's exterior gateway protocol that provides policy base routing

A. Interior gateway protocol


B. Boundary gateway protocol
C. Common gateway protocol
D. Border gateway protocol (Correct Answer)

You might also like