Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Which Internet access method can be affected by the number of people concurrently online in a neighborhood?

  • Dial-up
  • DSL
  • Cable Broadband
  • ISDN

2. For which of these items should you always change the default settings on a wireless router?

  • SSID and Administrative Password
  • IP Address
  • Channel
  • Frequency (2.4/5.0 GHz)

3. When utilizing IPv4, each network node has a ____-bit IP address, which, when used with its 48-bit MAC address, enables network communications and accurate delivery of a packet.

  • 16
  • 32
  • 48
  • 64

4. Which of the following is the default class A subnet mask?

  • 255.255.255.0
  • 255.240.0.0
  • 255.0.0.0
  • 255.255.0.0

5. A _______ is an administrative grouping of network resources such as computers, printers, and network devices.

  • container
  • class
  • range
  • domain

6. A(n)_________ cable is the most frequently used network cable because it is relatively inexpensive and easy to install.

  • Shielded twisted-pair
  • Unshielded twisted-pair
  • Thin coax
  • Thick coax

7. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Tree
  • Star

8. Which standards organization developed the OSI Model?

  • IEEE
  • Department of Defense
  • OSI
  • ISO

9. A network computer that shares resources with and responds to requests from other computers in known as a ________.

  • Client
  • Host
  • Terminal
  • Server

10. A DHCP server is a server that uses software and DHCP to automatically assign a(n) ______ address from a pool of possible addresses.

  • MAC
  • LAA
  • IP
  • BIA

11. Which Internet access method uses existing TV coaxial cables?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

12. Which Internet access method uses existing telephone lines and regular phone service?

  • Cable Broadband
  • DSL
  • T-1
  • ISDN

13. Which of the following types of media are used in LANs?

  • Twisted Pair
  • Coaxial Cable
  • Radio Waves
  • All of the selection are valid

14. Which of the following is a class B address?

  • 126.4.27.19
  • 127.276.2.15
  • 177.125.3.17
  • 221.34.2.17

15. Which of the following network related informational items is not needed in order to install an Operating System on a PC that will be connected to the internet?

  • Default Gateway
  • IP address
  • Subnet mask
  • Switch number

16. A ________ server isolates internal clients from the servers by downloading and storing files on behalf of the clients.

  • DNS
  • DHCP
  • NTP
  • Proxy

17. In which layer of the TCPIP Model do routers belong?

  • Physical
  • Internetwork
  • Application
  • Transport

18. Which of the following is considered a base 10 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

19. Use the ________ utility as the first step in diagnosing connectivity problems.

  • Tracert
  • Nstat
  • Net view
  • Ping

20. Which of the following is a class C address?

  • 169.254.27.19
  • 10.276.2.15
  • 172.22.3.17
  • 221.34.2.17

21. Which of the following is the default class B subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

22. Which of the following is a drawback of Broadband technology, compared to ADSL?

  • Its standards are less developed
  • Its installation is more difficult
  • Multiple subscribers must share a fixed amount of bandwidth
  • Cable is an asymmetrical technology, while ADSL is symmetrical

23. Which of these wireless encryption standards is the most secure?

  • WPA
  • WEP
  • WPA2
  • WEP2

24. Which standards organization developed the 802 series of standards?

  • IEEE
  • ITU
  • OSI
  • ISO

25. Which of the following is a class A address?

  • 126.4.27.19
  • 128.276.2.15
  • 172.22.3.17
  • 192.168.2.17

26. Users on a particular floor can't access the Internet, but can log onto the local network. What should they check first?

  • TCP/IP properties
  • Is switch turned on?
  • Are users on other floors having the same issue?
  • Call their ISP

27. The OSI model consists of ______ distinct layers stacked on one another.

  • two
  • three
  • four
  • seven

28. A computer that acts as both a client and a server is known as a _________.

  • Server
  • Client
  • Host
  • Peer

29. At what layer of the TCP model is the User Datagram Protocol (UDP) found?

  • Host to Host
  • Application
  • Network
  • Internet

30. Which of the following is considered a base 2 numbering system?

  • Hexadecimal
  • Decimal
  • Binary
  • Octal

31. The new IPv6 is better than IPv4 for all the following reasons except:

  • More addresses
  • Less bits in the address
  • Better security
  • Compatibility with IPv4

32. A ________ transmission sends a message to all points on a specific network.

  • multicast
  • unicast
  • simulcast
  • broadcast

33. In which type of wired network is it easier to add multiple new nodes?

  • Bus
  • Star
  • Ring
  • Mesh

34. A ________ is the place where a telephone company terminates lines and switches at a client location.

  • telco office
  • central office
  • central switching facility
  • demarcation point

35. What is the primary difference between LANs and WANs?

  • The use of an external provider due to distance they span
  • The type of DHCP servers they use
  • The type of data they transmit
  • All of the above

36. The _________ layer of the TCP model is responsible for logical addressing.

  • Internetwork
  • Host to Host
  • Logical
  • Session

37. A ______ consists of interconnected computers, printers, and other computer equipment in close physical proximity.

  • WAN
  • MAN
  • WWAN
  • LAN

38. Which of the following is considered a base 16 numbering system?

  • Decimal
  • Binary
  • Hexadecimal
  • Octal

39. Which of the following is the default class C subnet mask?

  • 255.0.0.0
  • 255.255.0.0
  • 255.255.255.0
  • 255.255.255.255

40. What type of topology is represented in this diagram?

  • Bus
  • Ring
  • Point to Point
  • Mesh

41. A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology.

  • bus
  • mesh
  • ring
  • star

42. Which of the following is a cryptographic technique for that converts plain data into coded data?

  • Encryption
  • PKA
  • KPA
  • RXStenography

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91824016
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Consider a tcp connection between two hosts that are 400

Consider a TCP connection between two hosts that are 400 miles away from each other (propagation delay is 100 miles per msec.). Assume that there is no error or loss in this communication and the receive window size is s ...

In relation to internet connectivity both you and the

In relation to Internet connectivity, both you and the chemists at Plains Research are concerned about security. What network device or devices can be used to address the concern about security?

1i which of the following characterizes a market ordera a

1) i. Which of the following characterizes a market order? a) A market order, which is considered a small order, is when 100 shares of a stock are ordered b) A market order is when the investor specifies the maximum pric ...

Answer as thorough as possiblecase 2 describe in detail

Answer as thorough as possible. Case 2: Describe in detail each of four risk factors of holding a domestic bond. Your summary should convince the reader that you fully understand each risk factor.

A federal agency responsible for enforcing laws governing

A federal agency responsible for enforcing laws governing weights and measures routinely inspect packages to determine whether the weight of the content is at least as great as that advertised on the package. A random sa ...

Scenario your algorithm will keep track of a customers

Scenario Your algorithm will keep track of a customer's purchases at the local fireworks stand. Customers will not know exactly how many items they will purchase, so using a For loop on this lab is not allowed. Let's kee ...

A compare the properties of cpu registers with the main

(a) Compare the properties of CPU registers with the main memory in MIPS.  (b) Describe the purpose of the stack pointer ($sp) for procedure calling. (c) What is a "basic block" and how is it used by a compiler? (d) Ther ...

Question 1-what is cost and benefit analysis explain the

Question: 1- What is cost and benefit analysis? Explain the two different types of costs and two different types of benefits. 2- Discuss root-cause analysis as a BPA activity. What are the strengths and limitations of th ...

In 2009 the hershey company of pennsylvania became the

In 2009, the hershey company of pennsylvania became the latest company to open a candy factory in mexico, joining other american candy companies including brach's confections and ferrara pan candy, which had opened plans ...

As a wealthy graduate of the university you have decided to

As a wealthy graduate of the University, you have decided to give back to the University in the form of a scholarship. You have decided to donate a one-time gift of $500,000 that will be invested at a rate of 5.5% per ye ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As