0

Network Configuration

Description: Network Configuration Computer NetworkComputer Network
Number of Questions: 15
Created by:
Tags: Network Configuration Computer Network
Attempted 0/15 Correct 0 Score 0

Which one of the following types of networking saves enormous amounts of application development time and complexity?

  1. Remote bridge

  2. SNETG box

  3. Indirect networking

  4. Direct networking

  5. Shared networking


Correct Option: C
Explanation:

This networking saves enormous amounts of application development time and complexity.

Which of the following types of networking involves two or more disjointed networks, each of which are interconnected with two or more systems?

  1. Peer to peer computing

  2. Subnet working box

  3. Direct networking

  4. Private networking

  5. Shared networking


Correct Option: D
Explanation:

This type of networking involves two or more disjointed networks and each of them are interconnected with two or more systems.

Which of the following types of networking attempts to make the WAN look like a single large subnetwork which is transport protocol independent?

  1. Extended subnetworking

  2. Shared networking

  3. Direct networking

  4. Subnetworking box

  5. Relay flow


Correct Option: A
Explanation:

This type of networking attempts to make the WAN look like a single large subnetwork which is transport protocol independent.

In which of the following flows does the transfer of information involve exactly two programs, accomplished either in an unstaged manner or in a staged manner?

  1. Collaborative computing

  2. Transfer flow

  3. Relay flow

  4. Lattice flow

  5. Communication support


Correct Option: B
Explanation:

In this flow, the transfer of information involves exactly two programs and is accomplished either in an unstaged manner or in a staged manner.

Which of the following subsystems of GSM uses an intelligent network?

  1. Client server computing

  2. Wireless session protocol

  3. Networking and switching subsystem

  4. Base station subsystem

  5. Mobile station


Correct Option: C
Explanation:

This subsystem of GSM uses an intelligent network.

Which of the following types of networking involves just a single network interconnecting two systems within each application program?

  1. Subnetworking box

  2. Simple networking

  3. Direct networking

  4. Shared networking

  5. Lattice flow


Correct Option: B
Explanation:

This networking involves just a single network interconnecting two systems within the application programs.

Which of the following types of flow is an ISO defined term for combinations of staged and unstaged closed 2-way flows between a pair of programs?

  1. Dialog flow

  2. Lattice flow

  3. Relay flow

  4. Communication support

  5. Remote bridge


Correct Option: A
Explanation:

This type of flow is an ISO defined term for combinations of staged and unstaged closed 2-way flows between a pair of programs.

Which of the following networking techniques is a collection of networking programs that exchange information between immediately logical adjacent physical computing devices?

  1. Peer to peer computing

  2. Shared networking

  3. Direct networking

  4. Subnetworking

  5. Communication support


Correct Option: D
Explanation:

This networking technique is a collection of networking programs that exchange information between immediately logical adjacent physical computing devices.

Which of the following operates at the physical layer, taking data bits from several devices and interleaving this data into a single physical link?

  1. Communication support

  2. Subnetworking box

  3. Multiplexer

  4. Demultiplexer

  5. Gateway


Correct Option: C
Explanation:

It operates at the physical layer, taking data bits from several devices and interleaving this data into a single physical link.

Which of the following types of flow constitutes the classical nested programming structure?

  1. Lattice flow

  2. Tree flow

  3. Relay flow

  4. Communication support

  5. Sify my storage


Correct Option: B
Explanation:

This type of flow constitutes the classical nested programming structure.

Which of the following communication techniques is a combination of a remote bridge and a router, performing the function of both and often will route the protocols?

  1. Client server computing

  2. Communication support

  3. Remote bridge

  4. Gateway

  5. Brouter


Correct Option: E
Explanation:

This communication technique is a combination of a remote bridge and a router, performing the function of both and often it will route the protocols.

Which of the following operates at the physical layer, simply extending the physical characteristic of the network by regenerating signals?

  1. Virtual machine technology

  2. Repeater

  3. Remote bridge

  4. Gateway

  5. Demultiplexer


Correct Option: B
Explanation:

It operates at the physical layer, simply extending the physical characteristic of the network by regenerating signals.

Which of the following communication techniques interconnects different networks and determines the optimal path for a packet of data to traverse?

  1. Collaborative computing

  2. Communication support

  3. Remote bridge

  4. Gateway

  5. Router


Correct Option: E
Explanation:

This communication technique interconnects different networks and determines the optimal path for a packet of data to traverse.

Which of the following allows the sharing of leased facilities and can accommodate data, voice and video traffic?

  1. Bandwidth manager

  2. Technical account manager

  3. Technical account manager business review

  4. Global coordinator

  5. Collaborative computing


Correct Option: A
Explanation:

It allows the sharing of leased facilities and can accommodate data, voice and video traffic.

Which of the following supports is used selectively or as enhancement to normal application processing?

  1. Distributed service support

  2. Communication support

  3. Standard application support

  4. Lattice flow

  5. Distributive computing


Correct Option: A
Explanation:

This support is used selectively or as an enhancement to normal application processing.

- Hide questions