Computer Science - Networking

46. 

Which network topology is considered passive?

A. Cross
B. Ring
C. Star
D. Mesh
E. Bus

Answer: Option E

Explanation:

No answer description available for this question. Let us discuss.

47. 

If a firm wanted to transmit data from 1,000 punched cards to a remote computer, they would use a(n)

A. POS terminal
B. data collection terminal
C. batch processing terminal
D. intelligent terminal
E. None of the above

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

48. 

Which address is the loopback address?

A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
E. None of the above

Answer: Option C

Explanation:

No answer description available for this question. Let us discuss.

49. 

Error rate is

A. an error-detecting code based on a summation operation performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the sum of all the binary digits.
C. a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected.
D. the ratio of the number of data units in error to the total number of data units
E. None of the above

Answer: Option D

Explanation:

No answer description available for this question. Let us discuss.

50. 

Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:

A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI

Answer: Option B

Explanation:

No answer description available for this question. Let us discuss.

« Prev   1 2 3 4 5 6 7 8 9 10