Telecom Distributions Practice Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mp5647
M
Mp5647
Community Contributor
Quizzes Created: 2 | Total Attempts: 10,063
Questions: 76 | Attempts: 154

SettingsSettingsSettings
Telecom Distributions Practice Exam - Quiz

The following questions are derived from the information that is in Ch. 4, 5, 8 of the powerpoint. Although the exam will most definitely look different, the following questions cover material that we'll be tested on, on Monday. Also, at the end I list some of the UNIX commands that we talked about on Friday.


Questions and Answers
  • 1. 

    What is the minimum and maximum size of the ethernet frame?

    • A.

      72 bytes, 1526 bytes

    • B.

      78 bytes, 1580 bytes

    • C.

      10 bytes, 1000 bytes

    • D.

      There is minimum or maximum

    Correct Answer
    A. 72 bytes, 1526 bytes
    Explanation
    The minimum and maximum size of an ethernet frame is 72 bytes and 1526 bytes respectively. The ethernet frame is a data packet that is transmitted over an Ethernet network. The minimum size of 72 bytes ensures that the frame contains the necessary headers and control information. The maximum size of 1526 bytes is determined by the maximum payload size allowed in an Ethernet frame, which is 1500 bytes, along with the additional headers and control information.

    Rate this question:

  • 2. 

    IEEE is the organization that sets up the standards for electronic items.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    IEEE, which stands for the Institute of Electrical and Electronics Engineers, is indeed the organization responsible for setting up standards for electronic items. They develop and publish technical standards that are widely used in various industries, including electronics. These standards ensure interoperability, safety, and reliability of electronic devices, allowing different manufacturers to produce compatible and high-quality products. Therefore, the statement "IEEE is the organization that sets up the standards for electronic items" is true.

    Rate this question:

  • 3. 

    What is 802?

    • A.

      MAN Network Committee

    • B.

      Ethernet Network Committee

    • C.

      LAN Network Committee

    • D.

      WAN Network Committee

    Correct Answer
    C. LAN Network Committee
    Explanation
    802 refers to the set of standards developed by the LAN (Local Area Network) Network Committee. These standards define the specifications for Ethernet and other networking technologies used in local area networks. Therefore, the correct answer is LAN Network Committee.

    Rate this question:

  • 4. 

    CSMA/CD does not allow bandwidth sharing.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to manage access to the shared medium. It allows multiple devices to share the available bandwidth by using a collision detection mechanism. When two devices transmit data simultaneously and a collision occurs, CSMA/CD detects the collision and initiates a backoff algorithm to retransmit the data. Therefore, CSMA/CD actually enables bandwidth sharing among devices in an Ethernet network. Hence, the given statement is false.

    Rate this question:

  • 5. 

    Network interface card digital operations...

    • A.

      Provide technical solutions.

    • B.

      Transmits and receives Ethernet frames.

    • C.

      Controls the entire network.

    • D.

      Sets the protocols

    Correct Answer
    B. Transmits and receives Ethernet frames.
    Explanation
    A network interface card (NIC) is responsible for transmitting and receiving Ethernet frames. It acts as a communication link between a computer and a network, allowing the computer to send and receive data over the network. The NIC converts the digital data from the computer into a format that can be transmitted over the network, and it also receives incoming data from the network and converts it into a format that the computer can understand. Therefore, the NIC's main function is to transmit and receive Ethernet frames.

    Rate this question:

  • 6. 

    Based on 10-mbps Ethernet, which of the following is not one of the first three widely used ethernet technologies:

    • A.

      10base5

    • B.

      10base2

    • C.

      10base7

    • D.

      10baseT

    Correct Answer
    C. 10base7
    Explanation
    10base7 is not one of the first three widely used Ethernet technologies. The first three widely used Ethernet technologies are 10base5, 10base2, and 10baseT. 10base5 uses thick coaxial cable, 10base2 uses thin coaxial cable, and 10baseT uses twisted pair cable. 10base7 does not exist as a widely used Ethernet technology.

    Rate this question:

  • 7. 

    What type of coax does 10base5 use?

    • A.

      Thick wire

    • B.

      Thin wire

    • C.

      Fiber

    • D.

      Cat 3,4,5,5e, 6 UTP

    Correct Answer
    A. Thick wire
    Explanation
    10base5, also known as Thick Ethernet, uses thick wire coaxial cable. This type of coaxial cable has a larger diameter and is more robust compared to thin wire coaxial cable. Thick wire coaxial cable is capable of transmitting data over longer distances and at higher speeds, making it suitable for use in Ethernet networks. It is important to note that while 10base5 originally used thick wire coax, modern Ethernet networks typically use other types of cables, such as Cat 5e or Cat 6 UTP, for improved performance and compatibility with newer technologies.

    Rate this question:

  • 8. 

    What 10-mbps ethernet use fiber?

    Correct Answer
    10baseF
    Explanation
    10baseF refers to the 10 Mbps Ethernet standard that uses fiber optic cables for data transmission. Fiber optic cables offer high bandwidth and long-distance capabilities, making them suitable for use in scenarios where copper cables may not be feasible. By using fiber optic cables, 10baseF can achieve faster and more reliable data transmission compared to other Ethernet standards that use copper cables.

    Rate this question:

  • 9. 

    With regards to 100-mbps ethernet, it is advantageous to have a smaller network diameter than 10-mbps ethernet.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Having a smaller network diameter is not advantageous for 100-mbps ethernet compared to 10-mbps ethernet. In fact, a larger network diameter is more beneficial for higher-speed networks like 100-mbps ethernet. A larger network diameter allows for more devices to be connected to the network without causing congestion or a decrease in performance. With a smaller network diameter, there is a higher chance of network congestion and slower data transfer speeds. Therefore, the statement is false.

    Rate this question:

  • 10. 

    Someone would use 1000-mpbs ethernet because their bandwidth demand excedes 100 mbps.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The explanation for the given correct answer is that someone would use 1000-mbps ethernet because their bandwidth demand exceeds 100 mbps. This means that their network requires a higher speed connection in order to handle the amount of data being transmitted. A 1000-mbps ethernet connection, also known as Gigabit Ethernet, is capable of providing a much faster and more efficient network connection compared to a 100-mbps ethernet connection. Therefore, if someone's bandwidth demand exceeds 100 mbps, they would need to use a 1000-mbps ethernet connection to meet their requirements.

    Rate this question:

  • 11. 

    What is frame bursting?

    • A.

      Type of virus found on a network.

    • B.

      When the Hulk bursts out of his shirt!

    • C.

      Increased network speed.

    • D.

      Sending multiple frames into a burst of transmission.

    Correct Answer
    D. Sending multiple frames into a burst of transmission.
    Explanation
    Frame bursting is a technique used in networking where multiple frames are sent together in a burst of transmission. This helps to increase network efficiency and speed by reducing the overhead associated with transmitting individual frames. By sending multiple frames at once, the network can make better use of available bandwidth and improve overall throughput. This technique is commonly used in wireless networks to optimize data transmission and improve network performance.

    Rate this question:

  • 12. 

    Wireless eithernet is ethernet over ____________ (RF) or ___________ (IR).

    Correct Answer
    radio frequency, infrared
    Explanation
    The correct answer is radio frequency, infrared. Wireless Ethernet refers to the transmission of Ethernet signals using radio frequency (RF) or infrared (IR) technology. RF technology uses radio waves to transmit data wirelessly, while IR technology uses infrared light waves. Both RF and IR enable wireless communication, allowing devices to connect to a network without the need for physical Ethernet cables.

    Rate this question:

  • 13. 

    What does CSMA/CA stand for?

    Correct Answer
    Carrier Sense Multiple Access/Collision Avoidance
    Carrier Sense Multiple Access/ Collision Avoidance
    Explanation
    CSMA/CA stands for Carrier Sense Multiple Access/Collision Avoidance. This protocol is used in wireless networks to avoid collisions between multiple devices trying to access the same channel simultaneously. The "Carrier Sense" part refers to the devices sensing the channel to check if it is busy before transmitting data. The "Multiple Access" part means that multiple devices can access the channel. The "Collision Avoidance" part refers to the mechanism used to avoid collisions by using random backoff times before retransmitting data.

    Rate this question:

  • 14. 

    Which of the following is NOT a way that CSMA/CA differs from CSMA/CD?

    • A.

      Wireless transceiver cannot listen for other transmissions while transmitting

    • B.

      Stations attempt to avoid collisions by using random backoff delays

    • C.

      Avoid collisions by sending faster signals

    • D.

      Handshaking sequence used between communicating stations

    Correct Answer
    C. Avoid collisions by sending faster signals
    Explanation
    CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) and CSMA/CD (Carrier Sense Multiple Access with Collision Detection) are both protocols used in Ethernet networks to avoid collisions. One way in which CSMA/CA differs from CSMA/CD is that in CSMA/CA, the wireless transceiver cannot listen for other transmissions while transmitting. This is because in wireless networks, multiple devices may be sharing the same medium (airwaves) and it is not possible to simultaneously transmit and receive. Therefore, CSMA/CA uses a mechanism where stations attempt to avoid collisions by using random backoff delays, rather than listening for other transmissions. The option "Avoid collisions by sending faster signals" is incorrect because it does not accurately describe the difference between CSMA/CA and CSMA/CD.

    Rate this question:

  • 15. 

    Signals propagate through objects (walls) . Name what type of signal it is:

    • A.

      RF Based

    • B.

      IR Based

    Correct Answer
    A. RF Based
    Explanation
    RF (Radio Frequency) signals are able to propagate through objects such as walls. This type of signal is commonly used in wireless communication systems, including Wi-Fi, Bluetooth, and cellular networks. RF signals have a longer wavelength compared to IR (Infrared) signals, allowing them to penetrate obstacles like walls more effectively. IR signals, on the other hand, are typically used for short-range communication and require line-of-sight between the transmitter and receiver. Therefore, the correct answer is RF Based.

    Rate this question:

  • 16. 

    Uses spread spectrum technologies frequency hopping and direct sequence

    • A.

      IR - Based

    • B.

      RF - Based

    Correct Answer
    B. RF - Based
    Explanation
    The correct answer is RF - Based. This means that the technology being referred to uses radio frequency (RF) for its operation. RF-based systems are commonly used in various wireless communication applications, such as Wi-Fi, Bluetooth, and cellular networks. They allow for the transmission of data over long distances and through obstacles, making them suitable for a wide range of devices and environments.

    Rate this question:

  • 17. 

    Bounces signals off walls, ceilings, floors

    • A.

      Point-to-point IR

    • B.

      Diffused IR

    Correct Answer
    B. Diffused IR
    Explanation
    Diffused IR refers to the use of infrared signals that are scattered or spread out in various directions. This allows the signals to bounce off walls, ceilings, and floors, providing a wider coverage area for communication. In contrast, point-to-point IR involves a direct line of sight between the transmitter and receiver, while diffused IR allows for more flexibility in signal transmission and reception. Therefore, diffused IR is the correct answer as it describes the ability to bounce signals off surfaces.

    Rate this question:

  • 18. 

    Point-to-point

    • A.

      IR Based

    • B.

      RF Based

    Correct Answer
    A. IR Based
    Explanation
    The correct answer is "IR Based". This suggests that the method being referred to is based on Infrared (IR) technology. This technology involves the use of infrared signals to transmit data or control devices wirelessly. It is commonly used in remote controls for televisions, DVD players, and other electronic devices.

    Rate this question:

  • 19. 

    IEEE 802.5 specification is the _____________ most popular networking technology.

    Correct Answer
    second
    Explanation
    The given correct answer for this question is "second." This implies that the IEEE 802.5 specification is the second most popular networking technology. However, without further context or options provided, it is difficult to determine the absolute popularity or ranking of the IEEE 802.5 specification among other networking technologies.

    Rate this question:

  • 20. 

    Which of the following are considered advantages of token-ring?

    • A.

      No collisions

    • B.

      Performs better than Ethernet under heavy traffic loads

    • C.

      Max nodes available compared to Ethernet

    Correct Answer(s)
    A. No collisions
    B. Performs better than Ethernet under heavy traffic loads
    Explanation
    Token-ring networks have the advantage of no collisions because only one device can transmit data at a time, as it requires a token to do so. This ensures that there is no overlapping of data transmission, reducing the chances of collisions. Additionally, token-ring networks are known to perform better than Ethernet under heavy traffic loads. This is because the token passing mechanism allows for efficient utilization of network bandwidth, preventing congestion and ensuring smoother data transmission. However, the statement regarding the maximum number of nodes available compared to Ethernet is not mentioned in the given options.

    Rate this question:

  • 21. 

    What does MAU stand for?

    • A.

      Multiple access unit

    • B.

      Multiple available units

    • C.

      Multistation access unit

    • D.

      It's an abbreviation for Maui, Hawaii

    Correct Answer
    C. Multistation access unit
    Explanation
    MAU stands for Multistation access unit. This is a device used in computer networks to connect multiple stations or devices to a local area network (LAN). It serves as a central hub or switch that allows multiple devices to access the network simultaneously. The other options, multiple access unit and multiple available units, do not accurately represent the meaning of MAU in the context of computer networking. The last option, "It's an abbreviation for Maui, Hawaii," is not a valid explanation as it does not relate to the topic of computer networking.

    Rate this question:

  • 22. 

    MAU connects stations.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement "MAU connects stations" is true. MAU stands for Media Access Unit, which is a device used in computer networks to connect multiple stations or nodes together. It acts as a central hub or switch that allows communication between different devices connected to it. Therefore, the statement is correct as MAU plays a crucial role in connecting stations in a network.

    Rate this question:

  • 23. 

    Typical wiring for MAU are STP cables but UTP and Fiber obtic cables are also supported.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that the typical wiring for MAU (Media Attachment Unit) is done using STP (Shielded Twisted Pair) cables. However, it also acknowledges that UTP (Unshielded Twisted Pair) and Fiber Optic cables are also supported options for wiring MAUs. Therefore, the statement is true as it confirms that STP cables are the typical choice for MAU wiring, but alternative options such as UTP and Fiber Optic cables can also be used.

    Rate this question:

  • 24. 

    The number of MAUs has no affects on maximum distance between MAUs.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. The number of Monthly Active Users (MAUs) can indeed have an effect on the maximum distance between MAUs. A higher number of MAUs may result in a larger geographical spread, leading to a greater distance between individual MAUs. Conversely, a lower number of MAUs may indicate a more concentrated user base, resulting in a smaller maximum distance between MAUs. Therefore, the number of MAUs can impact the maximum distance between them.

    Rate this question:

  • 25. 

    FDDI (fiber-distributed data interface) is

    • A.

      Self-healing baseband network technology

    • B.

      Popular in LAN

    • C.

      Similar to token-ring

    Correct Answer(s)
    A. Self-healing baseband network technology
    B. Popular in LAN
    C. Similar to token-ring
    Explanation
    FDDI (fiber-distributed data interface) is a self-healing baseband network technology that is popular in LANs and is similar to token-ring. This means that FDDI is a type of network technology that uses fiber optics to transmit data, and it has the ability to automatically detect and repair faults in the network. It is commonly used in local area networks (LANs) and operates in a similar manner to token-ring networks, where data is passed around the network in a sequential manner using a token.

    Rate this question:

  • 26. 

    FDDI-II (or hybrid ring control) supports voice, video, and other multimedia applications.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    FDDI-II, also known as hybrid ring control, is a networking standard that is capable of supporting voice, video, and other multimedia applications. This means that it can handle the transmission of data for these types of applications effectively. Therefore, the statement that FDDI-II supports voice, video, and other multimedia applications is true.

    Rate this question:

  • 27. 

    Bluetooth networks use a topology called piconet

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Bluetooth networks use a topology called piconet. In a piconet, one device acts as the master and other devices act as slaves. The master device controls the communication and synchronization between the devices in the network. This topology allows for efficient and flexible connections between devices, making it suitable for applications such as wireless headphones, speakers, and other short-range wireless communication devices. Therefore, the statement "Bluetooth networks use a topology called piconet" is true.

    Rate this question:

  • 28. 

    Using piconet topology, what is the max amount of bluetooth enabled devices that can communicate?

    • A.

      12

    • B.

      8

    • C.

      10

    • D.

      11

    Correct Answer
    B. 8
    Explanation
    In a piconet topology, the maximum number of Bluetooth enabled devices that can communicate is 8. This is because a piconet is formed by one master device and up to seven slave devices. The master device controls the communication and the slave devices can only communicate with the master device. Therefore, the maximum number of devices that can be part of a piconet is 8.

    Rate this question:

  • 29. 

    Using bluetooth, multiple masters can exist at one time.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Bluetooth technology operates on a master-slave relationship, where one device acts as the master and the other devices act as slaves. In a Bluetooth network, only one device can be the master, and multiple slaves can connect to it. Therefore, the statement that multiple masters can exist at one time using Bluetooth is false.

    Rate this question:

  • 30. 

    Bluetooth is vulnerable to:

    • A.

      Eavesdropping

    • B.

      Denial of service attacks

    • C.

      Bluejacking

    Correct Answer(s)
    A. Eavesdropping
    B. Denial of service attacks
    C. Bluejacking
    Explanation
    Bluetooth is vulnerable to eavesdropping, denial of service attacks, and bluejacking. Eavesdropping refers to the unauthorized interception of Bluetooth signals, allowing an attacker to listen in on conversations or access sensitive information. Denial of service attacks involve overwhelming a Bluetooth device or network with excessive requests, causing it to become unresponsive or crash. Bluejacking is a type of attack where unsolicited messages or spam are sent to Bluetooth-enabled devices, often for the purpose of annoyance or harassment. These vulnerabilities highlight the importance of implementing security measures and keeping Bluetooth devices updated to protect against potential threats.

    Rate this question:

  • 31. 

    Bluetooth is supported by all major operating systems and is controlled by the Bluetooth Special Interest Group.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Bluetooth is indeed supported by all major operating systems, including Windows, macOS, Linux, Android, and iOS. It is a wireless communication technology that allows devices to connect and exchange data over short distances. The Bluetooth Special Interest Group (SIG) is the organization responsible for developing and maintaining the Bluetooth standard. They ensure compatibility and interoperability between different Bluetooth devices, making sure that they work seamlessly across various platforms and operating systems. Therefore, the statement is true.

    Rate this question:

  • 32. 

    Select the layers of a TCP/IP network model.

    • A.

      Application

    • B.

      Presentation

    • C.

      Session

    • D.

      Internet

    • E.

      Network interface

    • F.

      Data-link

    • G.

      Physical

    • H.

      Transport

    Correct Answer(s)
    A. Application
    D. Internet
    E. Network interface
    G. Physical
    H. Transport
    Explanation
    The TCP/IP network model consists of multiple layers that are responsible for different functions in the network. The application layer provides services to the user and is responsible for protocols such as HTTP, FTP, and SMTP. The internet layer handles the routing of data packets across different networks. The network interface layer deals with the physical connection between a device and the network. The physical layer is responsible for the actual transmission of data over the physical medium. The transport layer ensures the reliable delivery of data between hosts. Therefore, the correct answer includes the layers: application, internet, network interface, physical, and transport.

    Rate this question:

  • 33. 

    What does TCP/IP stand for?

    Correct Answer(s)
    Transmission Control Protocol/Internet Protocol
    Explanation
    TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP is responsible for breaking data into packets, ensuring their reliable delivery, and reassembling them at the destination. IP is responsible for addressing and routing packets across networks. Together, TCP/IP provides a standardized set of rules and protocols for data transmission over networks, enabling devices to communicate with each other on the internet.

    Rate this question:

  • 34. 

    TCP/IP is the most commonly used network protocol suite today.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    TCP/IP is the most commonly used network protocol suite today because it provides a reliable and efficient way for devices to communicate over a network. It is widely adopted and supported by various operating systems and network devices. TCP/IP offers a standardized set of protocols that enable data transmission, routing, and addressing on the internet. Its versatility and compatibility have made it the de facto standard for networking, making the statement "True".

    Rate this question:

  • 35. 

    TCP/IP has a ________ protocol.

    • A.

      Closed

    • B.

      Available

    • C.

      Open

    • D.

      Trusted

    Correct Answer
    C. Open
    Explanation
    TCP/IP is a networking protocol suite that is widely used for communication over the internet. It is an open protocol because it is publicly available and can be implemented by anyone. Being open means that it is not proprietary or restricted to a specific vendor or organization. This allows for interoperability and the development of compatible networking devices and software by different manufacturers.

    Rate this question:

  • 36. 

    Internet Protocol is responsible for the _____________ addressing of each packet created by the transport layer.

    Correct Answer
    logical
    Explanation
    Internet Protocol is responsible for the logical addressing of each packet created by the transport layer. This means that IP assigns a unique logical address to each packet so that it can be properly routed across the network. The logical address is used to identify the source and destination of the packet, allowing it to be delivered to the correct destination.

    Rate this question:

  • 37. 

    IP Datagram transmission may take different routes.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    IP Datagram transmission may take different routes because of the nature of the Internet. When an IP packet is sent from one device to another, it can traverse multiple networks, routers, and links. Each router along the path determines the best route for forwarding the packet based on its own routing table and network conditions. This dynamic routing allows for load balancing, fault tolerance, and efficient use of network resources. As a result, the same IP packet can take different routes to reach its destination, making the statement true.

    Rate this question:

  • 38. 

    IP is very reliable and guarantees data delivery.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement that "IP is very reliable and guarantees data delivery" is false. While IP (Internet Protocol) is a fundamental protocol used for transmitting data over the internet, it does not guarantee reliable delivery. IP is a best-effort delivery protocol, which means that it does not ensure that data packets will reach their destination reliably or in a specific order. It is up to higher-level protocols or applications to implement mechanisms for reliable data delivery if needed.

    Rate this question:

  • 39. 

    With regards to Basic IP datagram transmission, the destination computer may receive packets out of order.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    In Basic IP datagram transmission, packets may be routed through different paths and may arrive at the destination computer in a different order than they were sent. This can happen due to network congestion, routing changes, or other factors. Therefore, it is possible for the destination computer to receive packets out of order.

    Rate this question:

  • 40. 

    An IP address is composed of two parts: the _______ ID and the _________ ID. (seperate your answers with a comma (ex: apple, banana))

    Correct Answer
    network, host
    Explanation
    An IP address consists of two parts: the network ID and the host ID. The network ID identifies the network to which the device belongs, while the host ID identifies the specific device within that network. These two components work together to route data packets across the internet.

    Rate this question:

  • 41. 

    The network ID represents:

    • A.

      The type of internet browser the user has

    • B.

      The network on which the computer is located

    • C.

      The individual computer on a network

    Correct Answer
    B. The network on which the computer is located
    Explanation
    The network ID represents the network on which the computer is located. This ID is used to identify and differentiate different networks within a larger network infrastructure. It helps in routing data packets to the correct network and ensures that communication between devices within the same network is efficient.

    Rate this question:

  • 42. 

    The host ID represents

    • A.

      The individual computer on a network

    • B.

      The network on which the computer is located

    • C.

      The mac address

    Correct Answer
    A. The individual computer on a network
    Explanation
    The host ID represents the individual computer on a network. It is a unique identifier assigned to each device connected to a network. This ID helps in distinguishing one computer from another on the same network. It is used for communication and routing purposes, allowing data to be sent to the correct destination. The host ID is different from the network ID, which represents the network on which the computer is located. The MAC address, on the other hand, is a hardware identifier assigned to the network interface card of a device, but it is not the same as the host ID.

    Rate this question:

  • 43. 

    An IP address is unique.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. This address serves as a unique identifier for the device, allowing it to send and receive data across the network. Each device on a network must have a unique IP address to ensure proper communication and routing of data. Therefore, the statement "An IP address is unique" is true.

    Rate this question:

  • 44. 

    An IP address has 4 numbers, called octets, that are seperated by comma's.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    They are separated by periods.

    Rate this question:

  • 45. 

    Based on the 4 numbers in an IP address, which represent 8 bits, how many bits long is a full IP address?

    Correct Answer
    32
    Explanation
    4 numbers x 8 bits each = 32 bits

    Rate this question:

  • 46. 

    IP addresses are divided into classes:

    • A.

      A-Z

    • B.

      A-E

    • C.

      B-C

    • D.

      M-P

    Correct Answer
    B. A-E
    Explanation
    IP addresses are divided into classes, which are denoted by letters A through E. Each class represents a range of IP addresses that can be assigned to networks. Class A addresses are used for large networks, with the first octet representing the network portion and the remaining three octets representing the host portion. Class B addresses are used for medium-sized networks, with the first two octets representing the network portion and the remaining two octets representing the host portion. Class C addresses are used for small networks, with the first three octets representing the network portion and the remaining octet representing the host portion. Class D addresses are reserved for multicast groups, and Class E addresses are reserved for experimental purposes.

    Rate this question:

  • 47. 

    IP addresses are assigned by software.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    IP addresses are indeed assigned by software. When a device connects to a network, it requests an IP address from a Dynamic Host Configuration Protocol (DHCP) server. The server then assigns an available IP address to the device. This process is automated and handled by software, ensuring that each device on a network has a unique IP address. Therefore, the statement "IP addresses are assigned by software" is true.

    Rate this question:

  • 48. 

    ARP stands for ____________ and is used to convert _________ IP addresses to _________ MAC addresses. (seperate your answers with a comma (ex: Coke, Pepsi, Mountain Dew))

    Correct Answer
    Address Resolution Protocol, logical, physical
    Explanation
    ARP stands for Address Resolution Protocol and is used to convert logical IP addresses to physical MAC addresses.

    Rate this question:

  • 49. 

    ARP is an essential part of the packet delivery process as it obtains the MAC address for a given IP address

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ARP (Address Resolution Protocol) is indeed an essential part of the packet delivery process. When a device wants to send a packet to a specific IP address, it needs to know the MAC address (hardware address) of the destination device. ARP helps in this process by sending out a broadcast message on the local network, asking which device has the specified IP address. The device with the matching IP address responds with its MAC address, allowing the sender to encapsulate the packet with the correct MAC address and deliver it to the intended recipient. Therefore, the statement is true.

    Rate this question:

  • 50. 

    TCP is connection oriented and reliable.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    TCP (Transmission Control Protocol) is indeed connection oriented and reliable. This means that TCP establishes a connection between the sender and receiver before transferring data, ensuring that packets are delivered in the correct order and without errors. TCP also provides mechanisms for flow control and error detection, making it a reliable protocol for transmitting data over a network.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 31, 2012
    Quiz Created by
    Mp5647
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.