Description : What is the name of the network topology in which there are bi-directional links between each possible node? A) Ring B) Star C) Tree D) Mesh
Last Answer : D) Mesh
Description : The network topology that is bi-directional links between each possible node. a. Star b. Mesh c. Bus d. Ring
Last Answer : b. Mesh
Description : What is the name of the network topology in which there are bi- directional links between eachpossible node? A) Ring B) Star C) Tree D) Mesh
Description : In a................ topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring
Last Answer : Mesh
Description : A simple cabling method, known as the..................topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : Bus
Description : 8............. was the first step in the evolution of Ethernet from a coaxial cable bus to hubmanaged, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above
Last Answer : A) Star LAN
Description : Which of the following is/ are the drawbacks of Ring Topology? A) Failure of one computer, can affect the whole network B) Adding or removing the computers disturbs the network activity. C) If the central hub fails, the whole network fails to operate. D) Both of A and B
Last Answer : D) Both of A and B
Description : State two advantages of Mesh topology.
Last Answer : Network Topology refers to layout of a network. Network topology specifically refers to the physical layout of the network especially the locations of the computers & how the cable is run ... to Point Connection: Point-to-point links make fault identification and fault isolation easy.
Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B
Last Answer : C) Star
Description : It is desired to connect five computers that are joined at a single point called central node. i) Draw the setup. ii) Name the topology. iii) State two advantages and disadvantages of this topology.
Last Answer : i. Setup: ii. Name of topology: Star topology iii. Advantages of Star Topology 1) As compared to Bus topology it gives far much better performance, signals don't necessarily get ... as well number of nodes which can be added in such topology is depended on capacity of central device.
Description : Network components are connected to the same cable in the _____ topology. 1) Star 2) Ring 3) Bus 4) Mesh 5) Mixed
Last Answer : Answer :2
Description : In a topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring
Last Answer : A) Mesh
Description : In a ................topology, if there are n devices in a network, each device has n-1 ports for cables. A) Mesh B) Star C) Bus D) Ring
Description : In star topology which device is preferable as a star device between switch and hub? Justify.
Last Answer : Switch in star Topology: Switch is used as a central device to connect different nodes in star topology. Switch is an intelligent device. When switch receives a data packet it reads destination ... whose destination address matches with the address contained in the data packet. Diagram:
Description : Which network topology is consideredpassive? A. Cross B. Ring C. Star D. Mesh E. Bus
Description : Which network topology requires a central controller or hub? a) Star b) Mesh c) Ring d) Bus
Last Answer : a) Star
Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False
Last Answer : A) True, True
Description : Give any four selection criteria for selecting network topology.
Last Answer : Selection criteria for selecting network topology. 1. Size of the network & number of devices or nodes being connected. 2. Ease of configuration & installing. 3. The ease of adding new device in an ... hubs etc. 7. Costs involved. 8. Need of security. 9. Need of network administration.
Description : Which of the following is not a network topology : Star, Mesh , Tree, Bug , Bus -Technology
Last Answer : Answer : Bug
Description : Which topology requires a multipoint connection? A) Mesh B) Star C) Bus D) Ring
Description : Which topology requires acentral controller or hub? A) Mesh B) Star C) Bus D) Ring
Last Answer : Star
Description : Multipoint topology is a. Ring b. Mesh c. Bus d. Star
Last Answer : c. Bus
Description : Ethernet 10 Base 2 is an example of ______network topology. (A) Bus (B) Ring (C) Star (D) Mesh
Last Answer : (A) Bus
Description : A simple cabling method, known as the ……………… topology allows about 30 computers on a maximum cable length of about 600 feet. A) Ring B) Bus C) Star D) Mesh
Last Answer : B) Bus
Description : If all devices are connected to a central hub, then topology is called
Last Answer : C) Star Topology
Description : Discuss hybrid topology with suitable diagram.
Last Answer : Discuss hybrid topology with suitable dig. Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In this case, the bus, star & ring topologies are used to ... many networks are quite complex but they can be reduced to some form of hybrid topology.
Description : List any two disadvantages of bus topology.
Last Answer : Disadvantages of bus topology. 1. Heavy network traffic slows down the bus speed .In bus topology only one computer can transmit & other have to wait till their turn comes & there ... connectors will cause reflections & bring down the whole network causing all network activity to stop.
Description : Which of the following is correct about Star Topology: a) Data on a star network passes through the hub, swithc or concentrator before continuing to its destination. b) The hub, switch or concentrator manages and ... connecting all of the systems to a central node. d) All of Above e) None of These
Last Answer : d) All of Above
Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch
Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch.
Description : For large networks, which topology is used? a. Bus b. Tree c. Ring d. Mesh
Last Answer : b. Tree
Description : What are number of cable links required for the 4 devices connected in mesh topology? a. 3 b.4 c. 6 d.1
Last Answer : c. 6
Description : Use mesh analysis to calculate ammeter current in Fig No. 1
Last Answer : Solution:
Description : Which of the following topologies functions most helpful for colleges, universities and schools so that each of the connect of that topology to the big network in some way: a) Bus b) Star c) Tree d) None of These
Last Answer : c) Tree
Description : In FDDI, data normally travel on ..................A) The primary ring B) The Secondary ring C) Both rings D) Neither ring
Last Answer : A) The primary ring
Description : Devices may bearrangedin a _____ topology. A) mesh B) ring C) bus D) all of theabove
Last Answer : all of theabove
Description : FDDI isa A. ring network B. star network C. mesh network D. bus based network E. None of the above
Last Answer : ring network
Description : was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network. a. Star LAN b. Ring LAN c. Mesh LAN d. All of the above
Last Answer : a. Star LAN
Description : ....... was the first step in the evolution of Ethernet from a coaxial cable bus to hub managed, twisted pair network. A) Star LAN B) Ring LAN C) Mesh LAN D) All of the above
Description : Which one is not a network topology? a. Star b. Ring c. Bus d. Peer to Peer
Last Answer : d. Peer to Peer
Description : In which topology, if a computer’s network cable is broken, whole network goes down. a. Ring b. Star c. Bus d. token ring
Description : what advantage does the mesh topology have over the star and bus topo log?
Last Answer : Mesh topology is reliable and robust as failure of one link doesn't affect other links and the communication between other devices on the network. 3. Mesh topology is secure because there is a point to point link thus unauthorized access is not possible.
Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN
Last Answer : B) VPN
Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling
Last Answer : A) Tunneling
Description : A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ……………… A) Chock point B) meeting point C) firewall point D) secure point
Last Answer : A) Chock point
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv
Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : ............ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C
Last Answer : A) Static subnetting