A name or number used to identify a storage location devices?
a. A byte
b. A record
c. An address
d. All of above

1 Answer

Answer :

An address

Related questions

Description : A name or number used to identify storage location devices? A) A byte B) A record C) An address D) All of above

Last Answer : Answer : C

Description : A name or number used to identify a storage location devices? a. A byte b. A record c. An address d. All of above

Last Answer : c. An address

Description : A name or number used to identify a storage location is called A) A byte B) A record C) An address D) All of above

Last Answer : Answer : C

Description : A name or number used to identify a storage location is called a. A byte b. A record c. An address d. All of above

Last Answer : c. An address

Description : A name or number used to identify a storage location is called a. A byte b. A record c. An address d. All of above

Last Answer : c. An address

Description : Each station on an Ethernet network has a unique _______ address imprinted onits network interface card (NIC). A) 5-byte B) 32-bit C) 48-bit D) none of the above

Last Answer : 48-b

Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3

Last Answer : 1

Description : A 4 byte IP address consists of __________ a. only network address b. only host address c. network address & host address d. network address & MAC address

Last Answer : c. network address & host address

Description : One 4 byte IP address is subdivided into __________ A. only network address B. only host address C. network address & host address D. network address & MAC address

Last Answer : C. network address & host address

Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity

Last Answer : b. Traffic control

Description : The physical location of arecord isdetermined bya mathematical formula that transforms a file key into a record location in A. a tree file B. an indexed file C. a hashedfile D. a sequential file E. None of the above

Last Answer : a hashedfile

Description : Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify? a. Track number b. Sector number c. Surface number d. All of above

Last Answer : Track number

Description : Which of the following will happen when data is entered into a memory location? a. It will add to the content of the location b. It will change the address of the memory location c. It will erase the previous content d. It will not be fruitful if there is already some data at the location

Last Answer : It will erase the previous content

Description : how many address lines are needed to address each machine location in a 2048 x 4 memory chip? a. 10 b. 11 c. 8 d. 12

Last Answer : 11

Description : Which of the following registers is used to keep track of address of the memory location where the next instruction is located? a. Memory address register b. Memory data register c. Instruction register d. Program counter

Last Answer : Program counter

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

Last Answer : Instruction register

Description : A type of core store that has a lower access time than the devices used for working store in the same processor is known as a. Core memory b. Buffer c. Fast core d. Address register

Last Answer : Address register

Description : Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address ? a. Hub b. Modem c. Switch d. Gateway

Last Answer : c. Switch

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : Either of the above

Description : The most common typeof storage devices are– (A) persistent (B) optical (C) magnetic (D) flash (E) steel

Last Answer : flash

Description : Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The number of characters that can be stored in given physical space is a. Word length b. Byte c. Data density d. Field

Last Answer : Data density

Description : In IPv4, what is needed to determine thenumber of the last byte of a fragment? A) Identification number B) Offset number C) Total length D) (b) and (c)

Last Answer : (b) and (c)

Description : Identify the classof the following IPv4 address: 191.1.2.3. A) A B) B C) C D) none of the above

Last Answer : B

Description : Identify the classof the following IPv4 address: 229.1.2.3. A) A B) B C) D D) none of the above

Last Answer : D

Description : Identify the classof the following IPv4 address: 4.5.6.7. A) A B) B C) C D) none of the above

Last Answer : A

Description : The least significant 23 bits in a 48-bit Ethernet address identify a ________. A) multicast router B) host C) multicast group D) noneof the above

Last Answer : multicast group

Description : Each IP address can identify the ………... or ………... of IP packets. A. source, destination B. length, size C. source, length D. Size , destination

Last Answer : A. source, destination

Description : Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address

Last Answer : c) port address

Description : A storage area used to store data to a compensate for the difference in speed at which the different units can handle data is a. Memory b. Buffer c. Accumulator d. Address

Last Answer : Buffer

Description : A 32 bit microprocessor has the word length equal to a. 2 byte b. 32 byte c. 4 byte d. 8 byte

Last Answer : 4 byte

Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits

Last Answer : Eight bits

Description : A byte consists of a. One bit b. Four bits c. Eight bits d. Sixteen bits

Last Answer : Eight bits

Description : Which of the following magazines covers only the IBM PC and its compatibles? a. Byte b. PC Magazine c. Personal Computing d. Interface Age

Last Answer : PC Magazine

Description : A band is always equivalent to a. a byte b. a bit c. 100 bits d. none of above

Last Answer : none of above

Description : The most common protocol for point-to-pointaccess is the Point-to-Point Protocol (PPP), which is a _________protocol. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : byte-oriented

Description : High-level Data Link Control (HDLC) is a _______ protocol for communication over point-to-pointand multipoint links. A) bit-oriented B) byte-oriented C) character-oriented D) none of the above

Last Answer : bit-oriented

Description : In______ transmission, wesend1 start bit (0) at thebeginningand 1 or more stop bits (1s) at the end of each byte. A) synchronous B) asynchronous C) isochronous D) none of the above

Last Answer : asynchronous

Description : In_______transmission, astartbit and a stopbit frame a character byte. A) asynchronous serial B) synchronous serial C) parallel D) (a) and (b)

Last Answer : asynchronous serial

Description : Each ________in a SONET framecancarry a digitized voice channel. A) bit B) byte C) frame D) none of the above

Last Answer : byte

Description : In SONET, for each byte, the bitsare transmitted ____________. A) from least significant to the most significant B) from most significant tothe least significant C) two at atime D) three at atime

Last Answer : from least significant to the most significant

Description : In IPv4, if the fragment offset hasa value of 100, it means that _______. A) thedatagram has notbeen fragmented B) thedatagram is 100 bytes in size C) thefirst byte of the datagram is byte100 D) the first byteof the datagram is byte800

Last Answer : the first byteof the datagram is byte800

Description : An ICMP message has _____ headerand a variable-size data section. A) a 16-byte B) a 32-byte C) an 8-byte D) noneof the above

Last Answer : an 8-byte

Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte

Last Answer : Kilo Byte

Description : Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is __________. a. 400 bps b. 800 bps c. 1600 bps d. 3200 bps

Last Answer : d. 3200 bps

Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity

Last Answer : b. Flow control

Description : Which form of byte assigning strategy is adopted in class B type of network corresponding to IP addresses? a. Network.Node.Node.Node b. Network.Network.Node.Node c. Network.Network.Network.Node d. Network.Node.Node.Node

Last Answer : b. Network.Network.Node.Node

Description : Station A uses 32 byte packets to transmit messages to Station B using a sliding window protocol. The round trip delay between A and B is 80 milliseconds and the bottleneck bandwidth on the path between A and B ... What is the optimal window size that A should use? a. 20 b. 40 c. 160 d. 320

Last Answer : b. 40

Description : What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields? a. 1 byte b. 1 bit c. 4 bit d. 16 bit

Last Answer : a. 1 byte