Description : Which of the following is incorrect about Hybrid Topology: a) A Hybrid topology always accrues when two different basic network topologies are connected. b) It is a mixture of above mentioned topologies c) ... which in turn participate in a variety of topologies d) All of Above d) None of These
Last Answer : d) None of These
Description : SONET network topologies can be__________. A) linear B) ring C) mesh D) all of theabove
Last Answer : ring
Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729
Last Answer : 729
Description : A combination of any two or more network topologies are known as: a) Bi-Lateral b) Hybrid c) Collateral d) None of These
Last Answer : b) Hybrid
Description : Which of the following topologies functions most helpful for colleges, universities and schools so that each of the connect of that topology to the big network in some way: a) Bus b) Star c) Tree d) None of These
Last Answer : c) Tree
Description : Which of the following characters is correct regarding network topologies: a) Network Topologies describe the ways in which the elements of a network are mapped. b) Network Topologies describe the physical and logical arrangement of the network nodes. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Define topology and mention the types of topologies
Last Answer : Topology defines the physical or logical arrangement of links in a network. Types of topology : - Mesh - Star - Tree - Bus - Ring
Description : Internet refers to: a) A large Network of Networks b) A communication system for different states of India c) A communication system provided for large number of computer users. d) None of These
Last Answer : a) A large Network of Networks
Description : What is a complex combination of topologies known as?
Last Answer : What is the answer ?
Description : What are the most common logical topologies?
Description : _________is suitable for use in star and ring topologies: a) Twisted Pair b) Bind Pair c) Combined Pair d) None of These
Last Answer : a) Twisted Pair
Description : List four system topologies that can be constructed using point-to-point fiber optic links.
Last Answer : Linear bus, ring, star, and tree topologies.
Description : What is internet? a single network a vast collection of different networks interconnection of local area networks None of the Above
Last Answer : a vast collection of different network
Description : Enlist different types of computer networks on the basis of their geography.
Last Answer : Classification of networks based on geography LAN - Local Area Network MAN - Metropolitan Area Network WAN - Wide Area Network CAN - Campus Area Network PAN - Personal Area Network
Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These
Description : Which of the following is true for neural networks? (i) The training time depends on the size of the network. (ii) Neural networks can be simulated on a conventional computer. (iii) Artificial neurons are identical in ... b) (ii) is true c) (i) and (ii) are true d) None of the mentioned
Last Answer : c) (i) and (ii) are true
Description : Will all phones work on any network now if you get the right sim card or do individual networks still have exclusives on phones so you have to purchase their model?
Last Answer : answer:It is my understanding that you have to buy an unlocked phone and then obtain a SIM card from your choice of wireless service provider. I do not know if you can buy a phone from AT&T ... wanted to use it on Verizon for example, Verizon would not reap any benefit other than your monthly fees.
Description : In hindsight, do you think it was a mistake for the Conan O'Brien Show to move from the big 3 networks to a smaller cable network?
Last Answer : No. Because I hated that show. They should do the same to David Letterman, and cut the Tonight Show with Jay Leno to 30 min seeing the people I know only listen to the monologue and the first skit and rarely special guests and never the music at the end.
Description : ……….. is called network of networks. -Technology
Last Answer : Internetis called network of networks.
Description : Which network is known as the network of networks?
Last Answer : The internet.
Description : The most famous Recurrent Neural Network is _______ (A) Perceptrons (B) Radial Basis Networks (C) Hopfield net (D) None of the Above
Last Answer : (C) Hopfield net
Description : _________ is a computational model based on the structure of biological neural networks? (A) Artificial Neural Network (ANN) (B) Biological Network (C) Both(A) & (B) (D) None of the Above
Last Answer : (A) Artificial Neural Network (ANN)
Description : Why is the XOR problem exceptionally interesting to neural network researchers? a) Because it can be expressed in a way that allows you to use a neural network b) Because it is complex ... solved by a single layer perceptron d) Because it is the simplest linearly inseparable problem that exists.
Last Answer : d) Because it is the simplest linearly inseparable problem that exists.
Description : Semantic Network is also known as Frame networks. a) True b) False
Last Answer : a) True
Description : Which of the following is an extension of the semantic network? a) Expert Systems b) Rule Based Expert Systems c) Decision Tree Based networks d) Partitioned Networks
Last Answer : d) Partitioned Networks
Description : The secondgeneration of cable networks is called a(n) _________ network. A) HFC B) HCF C) CFH D) none of the above
Last Answer : HFC
Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : VOFR
Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252
Last Answer : 255.255.252.0
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above
Last Answer : a. i only
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : The ability of a single network to span multiple physical networks is known as ______ a. Subnetting b. Masking c. Fragmenting d. Hopping
Last Answer : a. Subnetting
Description : The purpose of a proxy server is to control exchange of data between the two networks at …………..instead of ……….. A. an application level , an IP level B. network layer, physical layer C. an application layer, physical layer D. Network layer , an application layer
Last Answer : A. an application level , an IP level
Description : . In addresses for _______ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host. A. class A B. class C C. class B D. class D
Last Answer : C. class B
Description : A network router joins two _________ together? A. Computers B. Switches C. Networks D. Gateway
Last Answer : C. Networks
Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These
Last Answer : a) Hacking
Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : ________ is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. a) Internet Hardware Addresses b) Ethernet Software Addresses c) Ethernet Hardware Addresses d) None of the mentioned
Last Answer : Ethernet Hardware Addresses
Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1) Transport 2) Network 3) Presentation 4) Session
Last Answer : 2) Network
Description : Considering areas of concern, external network requirements, internal network requirements is the evaluation of a) Assess the security provisions for cloud applications b) Ensure cloud networks and ... Manage people, roles and identities d) Understand the security requirements of the exit process
Last Answer : Ensure cloud networks and connections are secure
Description : Most networks employ devices for routing services. Routers work at which of the Following OSI Layers? 1 Transport 2 Network 3 Presentation 4 Session
Last Answer : 2 Network
Description : This set of Artificial Intelligence MCQs focuses on Neural Networks - 2 . 1. Why is the XOR problem exceptionally interesting to neural network researchers? a) Because it can be expressed in ... by a single layer perceptron d) Because it is the simplest linearly inseparable problem that exists.
Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above
Last Answer : A) i only
Description : Internet is ................. A) Network of Networks B) Networks of Communication C) Networks of Data D) Group of LAN
Last Answer : A) Network of Networks
Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above
Description : An internet is a __________ a) Collection of WANS b) Network of networks c) Collection of LANS d) Collection of identical LANS and WANS
Last Answer : b) Network of networks
Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network
Last Answer : c. Security Administrator Tool for Analysis Networks
Description : _____________ layer protocols determine how the data is physically sent over the network’s physical layer or medium. A. Application layer B. Transport layer C. Network layer D. Link layer
Last Answer : D. Link layer
Description : Line access and avoidance of collision are the main functions of: (A) the CPU (B) the monitor (C) network protocols (D) wide area networks
Last Answer : (C) network protocols