The performance of data communications
network depends on ..............
A) Number of users
B) The hardware and software
C) The transmission
D) All of the above

1 Answer

Answer :

D) All of the above

Related questions

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : This type of software works with end users, application software and computer hardware to handle the majority of technical details. A. Communications software B. Application software C. Utility software D. System software

Last Answer : D. System software

Description : The information tobe communicated ina data communications system is the_______. A) Medium B) Protocol C) Message D) Transmission

Last Answer : Message

Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : Carrier is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : a continuous frequency capableof being modulated or impressed witha second signa

Description : Contention is A. One or more conductors that serve as a common connection for a related group of devices B. a continuous frequency capableof being modulated or impressed witha second signal C. ... that provides a data communications service among stations attached tothe network E. None of the above

Last Answer : the condition whentwo or more stations attempt to use the same channel at the same time

Description : RS-232, RS-449, RS-530, V, 24 and X.21 are examples of ____________. A. standards for interfaces between modems and transmission facilities B. standards for various types of ... for interfaces between terminals and modems D. standards for end to end performance of data communications system

Last Answer : C. standards for interfaces between terminals and modems

Description : Data communications monitors available on the software marked include a. ENVIRON/1 b. TOTAL c. BPL d. Telnet

Last Answer : ENVIRON/1

Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer

Last Answer : a. data link layer

Description : Which of the following is required to communicatebetween two computers? A. communications software B. protocol C. communicationshardware D. access to transmission medium E. All of theabov

Last Answer : All of theabov

Description : Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____: a) Wired b) Wireless c) Wired or Wireless d) None of These

Last Answer : c) Wired or Wireless

Description : Which of the following is not the responsibility of the utilities component of DBMS software? A. creating the physical and logicaldesigns B. removingflaggedrecords for deletion C. creatingand maintaining the data dictionary D. monitoring performance E. None of the above

Last Answer : creating the physical and logicaldesigns

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Touse a cable network for data transmission, we needtwo keydevices:a ______ and a _________ A) CM; CMS B) CT; CMTS C) CM; CMTS D) none of the above

Last Answer : CM; CMS

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : The _______ layer ensures reliable transmission on a single link A. network B. physical C. data link D. transport

Last Answer : C. data link

Description : What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? a) Unshielded twisted pair b) Optical fiber c) Coaxial cable d) Microwave

Last Answer : b) Optical fiber

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches

Last Answer : d. Routers, Bridges and Switches

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer. A. 255.255.0.0 B. 255.255.255.0 C. 255.0.0.0 D. 255.224.0.0 E. 255.255.255.200

Last Answer : 255.255.255.0

Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem

Last Answer : c. Degrade in TCP performance

Description : An example of a medium speed, switched communications service is a. series 1000 b. data phone 50 c. DDD d. All of the above

Last Answer : DDD

Description : Most data communications involving telegraph lines use: a. simplex lines b. wideband channel c. narrowband channel d. dialed service

Last Answer : narrowband channel

Description : ______ cable is used for voice and data communications. A) Coaxial B) Fiber-optic C) Twisted-pair D) none of the above

Last Answer : Twisted-pair

Description : A _________ sine wave is not useful in data communications; we need to send a _______signal. A) composite; single-frequency B) single-frequency; composite C) single-frequency;double-frequency D) none of the above

Last Answer : single-frequency; composite

Description : When data moves from one set of major connections to another on theInternet, we call theseconnections the Internet _____. A) Pathway B) Backbone C) Communications system D) Routers

Last Answer : Backbone

Description : ……….cable is used for voice and data communications. a. Twisted-pair b. None of These c. Coaxial d. Fiber-optic

Last Answer : a. Twisted-pair

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : Glitch

Description : Software in computer a. Enhances the capabilities of the hardware machine b. Increase the speed of central processing unit c. Both of above d. None of above

Last Answer : Enhances the capabilities of the hardware machine

Description : A virtual local areanetwork (VLAN) is configured by _________. A) software B) physical wiring C) hardware D) none of the abov

Last Answer : software

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : Frequencyof failure and network recovery time after a failure are measures of the_______of a network. A) Performance B) Reliability C) Security D) Feasibility

Last Answer : Reliability

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : If you Purchase hardware or software that is incompatible or doesn't meet an end user's needs is an example of?

Last Answer : What is the answer ?

Description : When using a function point estimation worksheet, there are 14 factors that impact the complexity of a project. These factors include _____.  a. data communications, time tradeoffs, and ... programming language  d. reports printed and PCA  e. x-rays, extensibility, and operational conversion

Last Answer : b. end-user efficiency, data communications, and reusability

Description : Transmission media lie below the_______ layer. A) physical B) network C) transport D) application

Last Answer : physical

Description : In a token ring network the transmission speed is 10^7 bps and the propagation speed is 200 metres/micro second. The 1- bit delay in this network is equivalent to: a. 500 metres of cable. b. 200 metres of cable. c. 20 metres of cable. d. 50 metres of cable

Last Answer : c. 20 metres of cable.

Description : Which transmission media provides the highest transmission speed in a network? a. coaxial cable b. twisted pair cable c. optical fiber d. electrical cable

Last Answer : c. optical fiber