google.com, pub-4617457846989927, DIRECT, f08c47fec0942fa0 Learn to enjoy every minute of your life.Only I can change my life.

Sunday, April 20, 2014

Solve questions on Networking


1. How many bits are in an IP address?

A. 16 bits
B. 32 bits
C. 64 bits
D. None of the above

Answer :- B.32 bits

2. What is the maximum value of each octet in an IP address?
A. 128
B. 255
C. 256
D. None of the above

Answer :- B. 255

3. How many bits are in a subnet mask?
A. 16 bits
B. 32 bits
C. 64 bits
D. None of the above

Answer :- B. 32 bits

4. A half-duplex circuit means
A. Only one side can talk at a time
B. The signal strength is cut in half
C. The signal strength is doubled
D. Two hosts can talk simultaneously

Answer :- A. Only one side can talk at a time

5. Attenuation means
A. Travel
B. Delay
C. A signal losing strength over distance
D. Loss of signal due to EMI

Answer :- C. A signal losing strength over distance

6. __________ means to convert binary data into a form that can travel on a physical communications link.
A. Encoding
B. Decoding
C. Encrypting
D. Decrypting

Answer :- A.Encoding

7. How many host addresses can be used in a Class C network?
A. 253
B. 254
C. 255
D. 256

Answer :- B. 254

8. What is the minimum number of bits that can be borrowed to form a subnet?
A. 1
B. 2
C. 4
D. None of the above

Answer :- B. 2

9. What is the primary reason for using subnets?
A. To reduce the size of the collision domain
B. To increase the number of host addresses
C. To reduce the size of the broadcast domain
D. None of the above

Answer :- C. To reduce the size of the broadcast domain

10.How many bits can be borrowed to create a subnet for a Class C network?
A. 2
B. 4
C. 6
D. None of the above

Answer :- C. 6

Study material of Computer Science :-


127.0.0.1 is is a special purpose IP address conventionally used as a computer's loopback address.

Definition Thrashing :-
In computer science, thrashing occurs when a computer's virtual memory subsystem is in a constant state of paging, rapidly exchanging data in memory for data on disk, to the exclusion of most application-level processing

Virtual Memory:-
In computing, virtual memory is a memory management technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory. Main storage as seen by a process or task appears as a contiguous address space or collection of contiguous segments.

The time taken to move the disk arm to the desired cylinder is called the :seek time

Class A
0    . 0   . 0   . 0      =  00000000.00000000.00000000.00000000
127.255.255.255   =  01111111.11111111.11111111.11111111
                                  0nnnnnnn.HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B
128. 0. 0. 0          = 10000000.00000000.00000000.00000000
191.255.255.255 = 10111111.11111111.11111111.11111111
                               10nnnnnn.nnnnnnnn.HHHHHHHH.HHHHHHHH
Class C
192. 0. 0. 0          = 11000000.00000000.00000000.00000000
223.255.255.255 = 11011111.11111111.11111111.11111111
                               110nnnnn.nnnnnnnn.nnnnnnnn.HHHHHHHH
Class D
224. 0. 0. 0          = 11100000.00000000.00000000.00000000
239.255.255.255 = 11101111.11111111.11111111.11111111
                               1110XXXX.XXXXXXXX.XXXXXXXX.XXXXXXXX
Class E
240. 0. 0. 0          = 11110000.00000000.00000000.00000000
255.255.255.255 = 11111111.11111111.11111111.11111111
                               1111XXXX.XXXXXXXX.XXXXXXXX.XXXXXXXX
Where:
n indicates a binary slot used for network ID.
H indicates a binary slot used for host ID.
X indicates a binary slot (without specified purpose)

190.255.254.254 -class B

अच्छे विचार करे विचार

  पहचान की नुमाईश, जरा कम करें... जहाँ भी "मैं" लिखा है, उसे "हम" करें... हमारी "इच्छाओं" से ज़्यादा "सुन...