What are the different types of computer networks and network topologies?

1 Answer

Answer :

Star network,ring network,tree network,bus network

Related questions

Description : Which of the following is incorrect about Hybrid Topology: a) A Hybrid topology always accrues when two different basic network topologies are connected. b) It is a mixture of above mentioned topologies c) ... which in turn participate in a variety of topologies d) All of Above d) None of These

Last Answer : d) None of These

Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove

Last Answer : ring

Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729

Last Answer : 729

Description : A combination of any two or more network topologies are known as: a) Bi-Lateral b) Hybrid c) Collateral d) None of These

Last Answer : b) Hybrid

Description : Which of the following topologies functions most helpful for colleges, universities and schools so that each of the connect of that topology to the big network in some way: a) Bus b) Star c) Tree d) None of These

Last Answer : c) Tree

Description : Which of the following characters is correct regarding network topologies: a) Network Topologies describe the ways in which the elements of a network are mapped. b) Network Topologies describe the physical and logical arrangement of the network nodes. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Define topology and mention the types of topologies

Last Answer : Topology defines the physical or logical arrangement of links in a network. Types of topology : - Mesh - Star - Tree - Bus - Ring

Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These

Last Answer : a) A large Network of Networks

Description : What is a complex combination of topologies known as?

Last Answer : What is the answer ?

Description : What are the most common logical topologies?

Last Answer : What is the answer ?

Description : _________is suitable for use in star and ring topologies: a) Twisted Pair b) Bind Pair c) Combined Pair d) None of These

Last Answer : a) Twisted Pair

Description : List four system topologies that can be constructed using point-to-point fiber optic links.

Last Answer : Linear bus, ring, star, and tree topologies.

Description : What is internet?  a single network  a vast collection of different networks  interconnection of local area networks  None of the Above

Last Answer :  a vast collection of different network

Description : Enlist different types of computer networks on the basis of their geography. 

Last Answer : Classification of networks based on geography LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network CAN - Campus Area Network PAN - Personal Area Network

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following is true for neural networks? (i) The training time depends on the size of the network. (ii) Neural networks can be simulated on a conventional computer. (iii) Artificial neurons are identical in ... b) (ii) is true c) (i) and (ii) are true d) None of the mentioned

Last Answer : c) (i) and (ii) are true

Description : Will all phones work on any network now if you get the right sim card or do individual networks still have exclusives on phones so you have to purchase their model?

Last Answer : answer:It is my understanding that you have to buy an unlocked phone and then obtain a SIM card from your choice of wireless service provider. I do not know if you can buy a phone from AT&T ... wanted to use it on Verizon for example, Verizon would not reap any benefit other than your monthly fees.

Description : In hindsight, do you think it was a mistake for the Conan O'Brien Show to move from the big 3 networks to a smaller cable network?

Last Answer : No. Because I hated that show. They should do the same to David Letterman, and cut the Tonight Show with Jay Leno to 30 min seeing the people I know only listen to the monologue and the first skit and rarely special guests and never the music at the end.

Description : ……….. is called network of networks. -Technology

Last Answer : Internetis called network of networks.

Description : Which network is known as the network of networks?

Last Answer : The internet.

Description : The most famous Recurrent Neural Network is _______ (A) Perceptrons (B) Radial Basis Networks (C) Hopfield net (D) None of the Above

Last Answer : (C) Hopfield net

Description : _________ is a computational model based on the structure of biological neural networks? (A) Artificial Neural Network (ANN) (B) Biological Network (C) Both(A) & (B) (D) None of the Above

Last Answer : (A) Artificial Neural Network (ANN)

Description : Why is the XOR problem exceptionally interesting to neural network researchers? a) Because it can be expressed in a way that allows you to use a neural network b) Because it is complex ... solved by a single layer perceptron d) Because it is the simplest linearly inseparable problem that exists.

Last Answer : d) Because it is the simplest linearly inseparable problem that exists.

Description : Semantic Network is also known as Frame networks. a) True b) False

Last Answer : a) True

Description : Which of the following is an extension of the semantic network? a) Expert Systems b) Rule Based Expert Systems c) Decision Tree Based networks d) Partitioned Networks

Last Answer : d) Partitioned Networks

Description : The secondgeneration of cable networks is called a(n) _________ network. A) HFC B) HCF C) CFH D) none of the above

Last Answer : HFC

Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above

Last Answer : VOFR

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance

Last Answer : a. You can control where traffic goes in the three networks

Description : The ability of a single network to span multiple physical networks is known as ______ a. Subnetting b. Masking c. Fragmenting d. Hopping

Last Answer : a. Subnetting

Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer

Last Answer : A. an application level , an IP level

Description : . In addresses for _______ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host. A. class A B. class C C. class B D. class D

Last Answer : C. class B

Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway

Last Answer : C. Networks

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned

Last Answer : Ethernet Hardware Addresses

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1) Transport 2) Network 3) Presentation 4) Session

Last Answer : 2) Network

Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process

Last Answer : Ensure cloud networks and connections are secure

Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session

Last Answer : 2 Network

Description : This set of Artificial Intelligence MCQs focuses on Neural Networks - 2 . 1. Why is the XOR problem exceptionally interesting to neural network researchers? a) Because it can be expressed in ... by a single layer perceptron d) Because it is the simplest linearly inseparable problem that exists.

Last Answer : d) Because it is the simplest linearly inseparable problem that exists.

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : Internet is ................. A) Network of Networks B) Networks of Communication C) Networks of Data D) Group of LAN

Last Answer : A) Network of Networks

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : An internet is a __________ a) Collection of WANS b) Network of networks c) Collection of LANS d) Collection of identical LANS and WANS

Last Answer : b) Network of networks

Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network

Last Answer : c. Security Administrator Tool for Analysis Networks

Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer

Last Answer : D. Link layer 

Description : Line access and avoidance of collision are the main functions of: (A) the CPU (B) the monitor (C) network protocols (D) wide area networks 

Last Answer : (C) network protocols