manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring...

25
END OF TERM - DISCOVERY 1 - REVISION Question I Circle the correct answer. Refer to Fig. 1 below and answer questions 1 to 3 Fig.1 1. Referring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at the same time? A. The two frames will collide and the switch will forward a garbled massage to all hosts on the network. B. The two frames will collide and the switch will forward a garbled message to the source and intended destination hosts only. C. The two frames will be forwarded to the correct destination devices without a collision occurring. D. Tow hosts cannot send information across the switch at the same time because the hosts must wait for a “request for data” frame from the switch. 2. Referring to Fig.1, if host H9 sends a message to host H6, and the destination MAC address is in the MAC table for both switch1 and switch2, which host devices will receive the message? A. Only host H6. B. All hosts connected to switch1 C. All hosts connected to Hub 1 and hosts connected to switch1. D. All hosts on the network.

Transcript of manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring...

Page 1: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

END OF TERM - DISCOVERY 1 - REVISIONQuestion I Circle the correct answer.

Refer to Fig. 1 below and answer questions 1 to 3

Fig.1

1. Referring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at the same time?

A. The two frames will collide and the switch will forward a garbled massage to all hosts on the network.

B. The two frames will collide and the switch will forward a garbled message to the source and intended destination hosts only.

C. The two frames will be forwarded to the correct destination devices without a collision occurring.

D. Tow hosts cannot send information across the switch at the same time because the hosts must wait for a “request for data” frame from the switch.

2. Referring to Fig.1, if host H9 sends a message to host H6, and the destination MAC address is in the MAC table for both switch1 and switch2, which host devices will receive the message?

A. Only host H6.B. All hosts connected to switch1C. All hosts connected to Hub 1 and hosts connected to switch1.D. All hosts on the network.

3. Referring to Fig.1 in the previous page, if host H8 sends a message to host H1, and the destination MAC address is in the switch MAC table, which host device will receive the message?

A. Only host H1.B. All hosts connected to Hub 1C. All hosts connected to switch1 D. All hosts on the network.

Page 2: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Refer to Fig. 2 below and answer questions 4 and 5

Fig.2

4. Referring to Fig.2, what occurs if host H3 and host H4 send a message across Hub-A at the same time?

A. The two frames will collide and the hub will forward garbled message to all hosts on the network.

B. The two frames will collide and the hub will forward a garbles message to the source and intended destination hosts only.

C. The two frames will be forwarded to the correct destination device without a collision occurring.

D. Two hosts cannot send information across the hub at the same time because the hosts must wait for “request for data” frame from the hub.

5. Referring to Fig.2 in the previous page, who receives the garbled message when a collision occurs on a hub network?

A. All PCs connected to the hub where the collision occurred.B. All PCs connected to every hub on the network.C. A hub will not forward a garbled message from a collision.D. A collision will occur on a hub network.

6. The number of local networks in the diagram of Fig.3 is _____

Page 2 of 20

Page 3: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Switch

Router

Fig.3

A. 4 B. 5C. 19 D. 21

7. Computer and data network provides communications between computer users via _____________.A. Copper wireB. Fiber Optics C. Wireless

D. Any of the above

8. Referring to Fig. 4, what should be the default gateway for computer H1 if it needs to send data for computer H4? Use the following data if needed:

Computer name IP AddressH1 10.100.200.2H2 10.100.200.3H3 10.100.200.4H4 10.100.200.5

Fig. 4

Page 3 of 20

Page 4: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

A. 10.100.200.3B. 10.100.200.4C. 10.100.200.5

D. None of the above

9. Which of the following is Not an input device?A. Mouse

B. PlotterC. ScannerD. Light Pen

10. Which of the following is an output device?A. MicB. Touch ScreenC. Bar code reader

D. None of the above

11. The hardware adapter that is used to connect the computer to an Ethernet network is called ___________

A. VGAB. I/O Controller

C. NICD. SCSI

12. Referring to Fig. 5, what is the default gateway that can be assigned to computer H3?

Fig. 5A. 172.16.0.51

B. 172.16.0.50C. 10.0.0.1D. 192.168.1.1

13. ISP stands for ____________________.A. Inter Services ProtocolB. Internet Special Protocol

C. Internet Service Provider

Page 4 of 20

Page 5: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Fig. 6

D. Internet Security Provider

14. POP stands for ___________________.A. Place of Presence

B. Point of PresenceC. Presence of PresenceD. None of the above

15. DSL stands for ___________________. A. Digital Subscriber Line

B. Digital Super LineC. Digital Special LineD. None of the above

16. With reference to Fig. 6, which type of service is offered by the ISP?

A. Symmetric B. Asymmetric

C. SemanticD. None of the above

17. The IP packet is sometimes referred to as:A. SegmentB. Frame

C. DatagramD. Capsule

18. Ping utility is used to test: A. End to End connectivity

B. Hop to hop route

Page 5 of 20

Page 6: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Fig. 7

Fig. 8

C. A and BD. None of the above

19. Tracert utility traces the route from:

A. Destination to second hopB. Source to first hopC. Destination to Source

D. Source to Destination

20. Refer to the Fig. 7, which symbol would represent the Internet when a packet is travelling from a source to destination through many network devices?

A.PC

B.Cloud

C.Router

D. None of above

21. Refer to the Fig. 8, which of the following is appropriate name of the wiring scheme? (1 and 2: Green, 3 and 6: Orange, 4 and 5: Blue, 7 and 8: Brown)

A. T568AB. T568BC. T568CD. T568D

22. Which of the following devices can be used to measure AC/DC voltage, electric current and other cable and electrical characteristics?

A.

Page 6 of 20

Page 7: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

B.

C.

D. None of the above

23. There are two parts to every IP address. How do hosts know which portion is the network and which is the host? This is the job of the ________________.

A. Default Gateway B. Subnet Mask

C. DNSD. None of the above

24. IP addresses are grouped into ________________.

A. 4 classes (A, B, C & D)B. 3 classes (A, B & C)

C. 5 classes (A, B, C, D & E)D. 6 classes (A, B, C, D, E & F)

25. In IP address classes, which of the following is first octet range?A. 192 – 223

B. 1 – 127C. 128 – 191D. 224 – 254

26. In IP address classes, which of the following ranges is used for class B?

A. 192 – 223B. 1 – 127

C. 128 – 191D. 224 – 254

27. In IP address classes, which of the following is third octet range? A. 192 – 223

B. 1 – 127

Page 7 of 20

Page 8: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Fig. 10

Host A

C. 128 – 191D. 224 – 254

28. Which of the following is required uniquely for all hosts to connect directly to the Internet?A. Private IP AddressB. Broadcast IP Address

C. Public IP AddressD. None of the above

29. NAT and DHCP are installed on the Linksys integrated router. Which private IP address is most likely to be assigned to the local computer, Host1? Refer to Figure below.

A. 130.0.0.17B. 128.107.1.2C. 209.165.201

D. 192.168.250.1

30. Refer to Fig. 10. Which of the following protocols will be responsible to assign the IP address, Subnet Mask and Default Gateway to Host A?

A. DNS B. DHCP

C. FTPD. Telnet

Page 8 of 20

Page 9: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

31. What characteristic of word processing software would make it a local application?

A. The application is shared between users. B. The software is stored on the local hard drive.

C. The software is accessible through a web page. D. The software has the ability to manipulate text & graphics.

32. Why do servers often contain duplicate or redundant parts?

A. Servers require more power and thus require more components. B. Servers should be accessible at all times.

C. Servers can be designed as standalone towers or rack mounted. D. Servers are required by networking standards to have duplicate parts.

33. What measurement is commonly associated with computer processing speed?

A. bits B. pixels

C. hertz D. bytes

34. Which adapter enables a computer system to exchange information with other systems on a local network?

A. video card B. sound card C. modem card

D. network interface card35. Which of the following is used to identify a device that a computer uses to access the Internet or

another network?

A. Subnet Mask B. Default Gateway

C. IP AddressD. None of the above

36. Which of the following components provide backup power to a computer system for a short period of time?

A. BIOSB. Surge Suppressor

C. Uninterruptible Power Supply (UPS) D. Modem

37. Which of the following can be used to measure the storage capacity of a computer disk?

A. MHzB. GHzC. Mips

D. TB

Page 9 of 20

Page 10: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

38. Which of the following is equivalent to one Mega Byte (1MB)?

A. 1,073,741,824 bytesB. 1,000,000,000 bytesC. 1024 bytes

D. 1,048,576 bytes

39. What is the main storage drive used by servers, desktops, and laptops?

A. zip drive B. hard drive

C. optical drive (DVD) D. Flash Disk DriveE. Tape Drive

40. Administrators at a multi campus college need access to their schedules wherever the administrators go. Which computing device would be the most appropriate to use?

A. PDA B. Laptop C. Desktop D. Mainframe

41. The IP address is similar to the address of a person and it is also known as the _______________.

A. Logical AddressB. Physical AddressC. MAC addressD. None of the above

42. Which of the following terms will be used when a host needs to send a message to only one destination?

A. BroadcastB. Multicast

C. UnicastD. None of the above

43. Which of the following terms will be used when a host needs to send a message to a number of destinations but not all?

A. Broadcast B. Multicast

C. UnicastD. None of the above

Page 10 of 20

Page 11: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

44. Which of the following terms will be used when a host needs to send a message to all the destinations?

A. BroadcastB. All castC. MulticastD. None of the above

45. Which of the following is a technique that is often deployed on servers and that enables multiple copies of an OS to be run on a single set of hardware, thus creating many virtual machines?

A. Multi boot B. Virtualization

C. UpgradeD. Clean Install

46. Which of the following is not an input device?

A. Mouse B. Monitor

C. ScannerD. Mic

47. Which of the following is not an output device?

A. MonitorB. PrinterC. Speaker

D. Mouse

48. Which of the following units is used to measure the Monitor’s resolution?

A. PixelsB. MHz.C. GHz.D. None of the above

Page 11 of 20

Page 12: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Question II Match the following.1. Match the following terms with their corresponding definitions.

Term Meaning

1. SOHO ___ A term used to measure the storage capacity of a computer disk

2. CLI ___ A term used to define the general working environment of small businesses and home based businesses.

3. GB ___Interference by electromagnetic signals that can cause reduced data integrity and increase errors on the transmission channels

4. EMI ___ A term used to describe a text based user interface for an operating system.

2. Referring to the figure below identify the corresponding network component of the following.

Network Components figure

Network Components Category

1. Hub ___ Network Media

2. MP3 Player ___ Host

3. Cables ___ Peripheral

4. Laptop ___ Network Device

Page 12 of 20

Page 13: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

3. Match between the port/connector name with its corresponding picture.

Port Picture Port / connector Name

1. ___ RJ-45

2. ___ Serial

3. ___ PS/2

4. ___ Parallel

5. Tablet PC ______

Page 13 of 20

Page 14: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

6. Rack Mount Server ______

7.PDA

______

8. Game Device ______

9. Pocket PC ______

Page 14 of 20

Page 15: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Question III [18 marks; 1 each]Check the appropriate answer in the corresponding column.

1. Identify which of the following services offered by ISP is considered as Symmetric or Asymmetric?

Services Symmetric Asymmetric

1. Most commonly used for homes

2. Download speeds are faster than upload

3. Most commonly used for business

4. Necessary for users that download significantly more than upload

5. It can carry large amounts of data in both directions at equal rates.

6. Download Speeds are same as upload speeds.

2. For the following cases, identify if the practice done is a best practice (check "Yes") or not (check "No").

Practices Yes No

1. Hisham labeled all the cables and recorded their locations as he installed them.

2. Salem decided to follow T568A wiring scheme on one end of UTP cables only.

3.Ahmed has short of two 5 meter lengthy UTP cables. He went to a computer shop and purchased an old and used UTP cable in order to save money.

4.To avoid people from tripping over cables, Khalid spread all UTP cables using same pipes that are already in use for all heavy electrical installations.

5. The quality of networking cables should be good even in a very small sized local network.

6. The patch panels could also be supportive for organizing the cables.

Page 15 of 20

Page 16: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

3. Identify if the computer is acting as a server, a workstation or a desktop for each scenario. Check () the appropriate role of server, workstation or desktop.

Scenario Server Workstation Desktop

1.

Salem is purchasing a computer for his family. They will need word processor and spreadsheet applications and want to play DVDs. What kind of computer would best suit their needs?

2.

The Symantec corporation designs and manufactures complex electronic circuit boards for use in aero planes. What kind of computer would be best suited for their design work?

3.

The Preston Inc. just hired 12 new help desk employees to support network end users. The help desk people will need to run basic office applications as well as a help desk problem reporting application. What kind of computer would be best for this type of work?

4.

The Animation company develops virtual reality simulation software for the gaming industry. What kind of computer would be best for developing this software?

5.

Nasir’s mail order business has grown significantly and he needs a new computer to host his web site. He is expecting significant number of web clients to access the computer daily. He also wants to use the computer for centralized file storage and for employee Email. What kind of computer would best suit his needs?

Page 16 of 20

Page 17: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

4. Match all the characteristics with the appropriate type of cable.

Characteristics UTPFiber

OpticCoaxial

1. Used for cable and satellite internet connectivity

2. Uses eight wires

3. Used by cable TV

4. Uses light

5. Most common cabling used for modern Ethernet

6. Used for long distances at high speed

5. Determine the appropriate operating system installation techniques for given scenarios. Check () only one operating system installation technique that is most appropriate for each given scenario.

Scenario

Upg

rade

Cle

an In

stal

l

Virt

ualiz

atio

n

Dua

l Boo

t

1. Nader has decided that he would like to try the Linux OS. His computer currently has Windows XP installed.

2.Abdullah has bought the new operating system and want to install in his home computer, where the previous operating system, that was very old, is corrupted and he no longer needs it.

3. Hamed has Windows XP SP2 installed in his computer and now he wants to update it towards Windows XP SP3.

4.Omar needs to test out database applications on Windows and Unix both, simultaneously. To do this task he needs a high end computer system.

5. Ahmed wants to install Windows XP in his Mac Book, but at the same time he doesn’t want to loose his Mac OS X.

Page 17 of 20

Page 18: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

6. Identify each of the following figures and match with its corresponding appropriate category. Check () the appropriate category for each of the following figures.

Figures Peripheral Host Network device

1.

2.

3.

4.

5.

Page 18 of 20

Page 19: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Question IV Fill in the blanks with the appropriate words from the list below:

Cross talk DSLAM Modem Ipconfig Converged networkClass B RAM CMTS Collision Class CNetwork Operating System IP Address Software HubApplication Software Subnet Mask Drivers CLIDefault Gateway Hardware GPL GUI

1. ________ is a network capable of carrying voice, video and digital data.

2. _ __ is an internal storage hardware that store the data temporary.

3. _______ is a device used in communication to convert digital computer signals into a format

that is sent and received over an analog telephone line.

4. A _______ __ occurs when two or more computers sending data at the same time in Ethernet

network.

5. _____________ command is used to display the computer IP adderss, subnet mask, and default

gateway.

6. __________ separates the DSL phone and data signals.

7. ________ helps users using cable modem to connect to the internet.

8. ____________ means leakage of signals between pairs.

9. ___________ addresses have three octets to represent network portion.

10. __________ addresses have two octets to represent host portion.

11. ____________ identifies the device that the computer uses to access the internet or another

network.

12. ___________ identifies the computer on the network.

13. ___________ is a license for free and open source operating system software.

14. ___________ is a less user-friendly interface to a computer operating system or application.

15. ___________ is used to identify the network on which the computer is connected.

16. _____ ______ is a device that serves as the central point of connection for the devices on a LAN.

17. ____________ is an operating system designed to track networks consisting of multiple users

and programs.

18. ______________ is referred to computer’s physical components.

19. ___________ is a user-friendly interface that uses images, widgets, pictures along with text to

indicate the information and actions available to a user when interacting with a computer.

20. ________________ is referred to programs in a computer system.

Page 19 of 20

Page 20: manjuwiki.wikispaces.commanjuwiki.wikispaces.com/file/view/EOT1+-+Discovery… · Web viewReferring to Fig.1, what occurs if host H9 and host H12 send a message across Switch2 at

Question VMark (T) for true and (F) for false statements:

Statements T/F

1. ASCII is an 8 bit code for character representation (7 bits plus parity)

2. Access Point is a wireless LAN transmitter/ receiver that acts as a connection between wireless clients and wired networks

3. Docking Station is a device that attaches a laptop to AC power desktop peripherals.

4. E-mail server is used to host web sites.

5. With a broadcast, the packet contains a destination IP address with all ones (1s) in the host portion.

6. UDP provides flow control and acknowledgements of packets exchanged between hosts.

7. TCP is used for applications like streaming videos.

8. Multicast addresses allow a source device to send a packet to a group of devices.

9.DHCP provides a mechanism for the automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information.

10. Ports 1024 through 49151 are called as well known ports.

Page 20 of 20