Test “Computer networks. Test Computer Networks.docx - Tests on the topic "Computer networks" Tests on global computer networks tests

Question. What is this site?
Answer. site is a site containing computer science lessons, computer science tests, computer science lectures, intended for students and those interested in modern IT technologies and computer science. Here anyone can gain knowledge in computer science.
Also on the site are tests for monitoring the knowledge of college students, schoolchildren, or even enterprise employees. Our mission is to provide accessible computer science educational materials.

Question. It seems I found an error in the test/article, how can I tell about it/I want to write to the administration
Answer. You can write to us using or leave a comment at the bottom of the test/article.

Question.I want to publish my test, how can I do this?
Answer. To do this, you can contact the administrator using . In the future, each user will be able to add an article to the site, but the functionality is still under development.

We use cookies to provide the best possible presentation of our website and improve the service we provide. If you continue to use the site we will assume that you are happy with it.

60. Which of the following technologies provides data transmission at speeds of up to 2.488 Gbit/s?

61. Which of the following statements about NAT is true? (Select all that apply.)

A. Each computer on the internal network that uses NAT must have a registered IP address.

b. NAT is compatible with all applications.

V. NAT is not compatible with technologies that encrypt IP data.

d. To map private internal IP addresses to one or more public external addresses in NAT, a special table is used.

62. What is the basic component of networking equipment that connects to a computer?

A. Router.

b. Cable.

V. Network adapter.

Concentrator.

63. In what type of networks is an external transceiver used?

d. In all of the above.

64. Let's say a network adapter needs to be installed in a computer with a PS/2 mouse, keyboard, printer and two ID controllers. All these devices use IRQ by default. The audio adapter is assigned IRQ 10. Which IRQ should be assigned to the network adapter?

65. Which cable meets the fire safety requirements when installed in the space between the false ceiling and the ceiling?

b. Thick coaxial cable.

V. Military specification.

g. Plenum cable.

66. What type of cable is defined by 10Base2 network specifications?

67. What type of cable is used with the vampire tooth connector?

A. Unshielded twisted pair.

b. Shielded twisted pair.

V. Thick coaxial cable.

d. Thin coaxial cable.

68. What is the name for signal leakage from one wire to another that can be reduced by twisting the wires?

A. Electromagnetic interference.

b. Attenuation.

V. Distortion.

d. Crosstalk.

69. What type of connector is used with unshielded twisted pair cable in Ethernet networks?

V. BNC connector.

d. Connector F.

70. Which of the following statements about fiber optic cable is true? (Select all that apply.)

A. Of all the cable types, fiber optic is the easiest to install and manage.

b. Fiber optic cable provides more data security than copper cable.

V. Fiber optic cable is more sensitive to attenuation than copper cable.

d. The throughput of a fiber optic cable in single-mode mode is higher than in multi-mode mode.

71.Test. What device is used to connect two segments of network cables and regenerate the transmitted signal to eliminate the attenuation effect?

A. Circular connector.

b. Patch panel.

V. Repeater.

d. Passive concentrator.

72. Which of the following protocols is a non-routable network and transport layer protocol that is easy and simple to configure?

73. Which part of the IPX address is based on the device's MAC address?

A. Node number.

b. Network number.

V. Subnet number.

d. Host number.

74. Which of the following protocols are connection-oriented? (Select all that apply.)

75. Which statement about IP addresses is true? (Select all that apply.)

A. An IP address consists of two octets.

b. An octet in an IP address consists of eight bits.

V. An IP address is a 32-bit binary number.

d. IP addresses are usually written in hexadecimal format.

76. What is the maximum number of computers in a class B network?

d. More than 16 million.

Test. 77.Which of the following is the default subnet mask for a Class C network?

A. 255.255.255.255.

b. 255.255.255.0.

V. 255.255.0.0.

78. In the classful addressing method, which class address does the IP address 190.23.20J.6 belong to?

A. Class A.

b. Class B.

V. Class C.

d. Class D.

79. Which routing method uses classless addressing?

80. What is the purpose of the DHCP service?

A. To map NetBIOS names to IP addresses.

b. To convert private IP addresses to public addresses.

V. To map IP addresses to MAC addresses.

d. To automatically assign IP addresses to client computers.

81. Which utility can be used to view a cache of IP addresses mapped to MAC addresses?

82. The Internet backbone is a set of communication channels used by local networks to establish connections over long distances. What are the connection points to the highway called?

V. Subnets.

g. Servers.

83. At what points do the main Internet providers establish connections with each other?

V. Supercomputers.

84. Which of the following is a defining, unique characteristic of hypertext files?

A. They are located on the Web server.

b. They can be accessed via a URL.

d. They cannot include integrated graphics.

85. Below are examples of URLs of some Web sites entered in the browser. Which ones are correct?

A. http:\www. acme\.

b. html://www. acme. com.

V. http://bigserver. acme. com/.

g. html:\acme. com.

86. What is the name of the Web site that serves as a “starting point” for users provided by Internet service providers, online services, and major search services?

A. Metasearch service.

b. Portal.

87. Which Internet email protocol is supported on a server that receives emails and allows users to view the headers and decide which emails should be downloaded to their computer?

88. For what purposes is NNTP used?

b. To perform Novell NetWare procedures over TCP/IP.

V. To access newsgroups.

d. To establish a connection with a remote computer and view it on it

files and application execution.

89. What is used to enter the conversation room?

90. What does the H.323 standard established by the ITU describe?

A. Web page format.

b. Video conferencing.

V. Transferring files via the Internet.

d. Operation of search services.

91. Which of the following statements about the RIP protocol are true? (Select all that apply.)

A. RIP is a dynamic routing protocol.

b. In RIP, the network is divided into areas, including a backbone area to which all other areas are connected.

V. The efficiency and extensibility of RIP is better than OSPF.

d. RIP is a distance vector protocol.

92. A directory (directory services) is... (select a defining concept).

V. Database.

d. Storage method.

93. What type of database is the information of which is distributed by a directory service to many computers?

A. Organized database.

b. Distributed database.

94. Which directory services use a flat namespace? (Select all that apply.)

V. Bindery from Novell.

g. Active Directory.

95. What is the namespace called in which the name of a child object includes the name of the parent object?

A. Homogeneous (flat).

b. One generation.

V. Transitive.

g. Continuous.

96. Where are DSA (Directory System Agent), DUA (Directory User Agent) and DIB (Directory Information Base) agents used?

A. Windows 2000 Active Directory.

V. OSI X.500 specification.

d. LDAP client program.

97. What is the name of the view path called? DC= net DC= tacteam OU- training CN= Users CN= John Doe, denoting an object in a directory?

A. Attribute.

b. Relative DN.

d. Common name.

98 -Tests. What is the name of an object in an NDS tree that represents a resource or the end of a branch, but not an object that contains other objects?

A. Leaf object.

b. Root object.

V. Stem object.

d. Parent object.

99. Which Active Directory file stores object grouping scripts and strategies?

A. In the Active Directory log file.

b. In the script file.

V. In the group strategy administrative file.

d. In the SysVol file.

100. Which of the following statements about Windows 2000 domains located in the same domain tree is true?

A. There is no trust between them.

b. There is a two-way transitive trust relationship between them.

V. There is a one-way intransitive trust relationship between them.

d. A trust relationship can only exist between them if it is explicitly created by the administrator,

101. Where are all the permissions associated with an Active Directory object stored?

A. In a child object.

b. In replication strategy.

V. In the access control list.

d. In the OU module.

102. Which of the following is an advantage of text-based operating systems? (Select all that apply.)

A. Compared to systems with a graphical interface, they are faster.

b. They require less resources than graphics systems.

V. They are easier to use than graphics systems.

d. Unlike graphical operating systems, they support multitasking.

103. Which of the following commands is used to display TCP/IP configuration information in the Windows 95 operating system?

104. What is the name of the two or three character suffix located after the period at the end of the file name?

A. File branch.

b. File table.

V. File type.

d. File extension.

105. Which of the following is an advantage of the FAT16 file system in the Microsoft operating system?

A. The number of operating systems it is compatible with is more than any other file system.

b. It provides more security than other popular file systems.

V. It is more reliable (less susceptible to data loss) than any other popular file system.

d. It provides better performance than any other file system.

106. What is the maximum partition size supported by the NTFS file system?

A. 2 GB.

b. 4 GB.

V. 4 GB.

16 GB.

107.Which of the following lines is a route in a UNIX file system?

A. c:/dir01/subdir02/myfile. ext.

b. \dii01\subdii02\myfile. ext.

V. /dirOI/subdir02/myfile. ext.

/dir01/subdir02\myfile. ext.

108. Which of the following file systems uses i-node numbering?

b. UNIX file system.

V. Macintosh HFS.

109. Which component should I install so that a user on a Windows NT client computer can log in directly to the NetWare server?

A. File and Print Services for NetWare.

b. Gateway Services for NetWare.

V. Client Services for NetWare. r. IPX/SPX.

110. How can a Linux client computer access Microsoft server files?

111. Which of the following operating systems uses the HPFS file system?

b. Windows 2000.

g. Windows NT 4.0.

112. What is another name for the protocol used to share network files and resources?

A. Network/transport layer protocol.

b. Link layer protocol.

V. Kernel protocol.

d. Layer 2 protocol.

113. Which of the following statements about the IPX/SPX protocol are true?

A. The IPX/SPX protocol can only be used on NetWare networks.

b. The IPX/SPX protocol is routable.

V. IPX/SPX protocol is not supported on NetWare 5. x.

d. IPX/SPX is slower and more complex to configure than TCP/IP.

114. How do multiple protocols communicate with one network adapter or one protocol communicate with multiple network adapters? (Select all that apply.)

Test -115. Which of the following is used to separate files on Microsoft networks?

116. Which of the following statements about GSNW (Gateway Service for NetWare) are true?

A. The GSNW service is installed on a NetWare server to provide Windows clients with access to the server's resources.

b. The GSNW service is included in the Windows NT Server and Windows 2000 Server operating systems.

V. The GSNW service allows Windows server clients to connect to a NetWare server without installing additional software on the client or configuring the NetWare server.

d. The GSNW service is installed on a Windows server so that clients on that server can access the resources of the NetWare server.

117. Which of the following is a free software product from an independent organization that allows users of Windows and UNIX systems to exchange data over a network?

V. Client Services for UNIX.

118. What are the names of programs that translate data between different protocols and allow computers located on different types of networks to communicate?

A. Bridge software.

b. Server software.

V. Gateway software.

d. Router software.

119. What is the name of the software component that intercepts requests for resources?

A. Platform.

b. Client.

V. Director.

Option number 2.
Question 1. (Difficulty - A) The global network is...
Answer 1. a system of interconnected computers
Answer 2. system of interconnected local networks
Answer 3. a system of interconnected local telecommunications networks
*Answer 4. a system of interconnected local networks and computers of individual users

Question 2. (Difficulty - A) To connect two computers via telephone lines you must have:
Answer 1. modem
* Answer 2. two modems
Answer 3. telephone, modem and special software
Answer 4. via modem on each computer and special software

Question 3. (Difficulty - A) E-mail is:
Answer 1. search program
Answer 2. mail server name
Answer 3. mail program
*Answer 4. exchange of letters on computer networks (e-mail)

Question 4. (Difficulty - A) The HTTP protocol is used to:
*Answer 1. Hypertext transmission
Answer 2: File Transfer
Answer 3: Messaging Control
Answer 4. Run the program from a remote computer

Question 5. (Difficulty - A) What components of a computer network are needed to organize a peer-to-peer local network?
*Answer 1. modem, server computer
Answer 2: network card, network software
Answer 3. server computer, workstations,
Answer 4. communication lines, network card, network software

Question 6. (Difficulty - A) The following are intended for viewing WEB pages:
Answer 1. search engines
*Answer 2. browsers
Answer 3. teleconferences
Answer 4. providers

Question 7. (Difficulty - A) Which of the following computer connection diagrams is a closed chain?
Answer 1. Tire
*Answer 2. Ring
Answer 3. Star

Question 8. (Difficulty - A) Which cable provides data transfer speeds of up to 10 Mbit/s?
*Answer 1. coaxial
Answer 2. twisted pair
Answer 3: fiber optic
Answer 4. there is no correct answer

Question 9. (Difficulty - A) The protocol is used to transfer files over the network...
Answer 1. POP3
Answer 2. HTTP
Answer 3. CMPT
*Answer 4. FTP

Question 10. (Difficulty - A) Select the correct email address:
Answer 1. ivanpetrov@mail
Answer 2. ivan_petrov.mail.ru
Answer 3. ivan petrov.mail.ru
*Answer 4. [email protected]

Question 11. (Difficulty - A) The data transfer speed is 6000 Mbit/min. This amounts to... Mbit/s
Answer 1. 10
*Answer 2. 100
Answer 3. 3600
Answer 4. 36000

Question 12. (Difficulty - A) The email address on the Internet is given: [email protected]. What is the mail server name?
Answer 1. [email protected]
Answer 2. fortune
*Answer 3. list.ru
Answer 4. list

Question 13. (Difficulty - A) A computer connected to the Internet must have
Answer 1. URL;
*Answer 2. IP address
Answer 3. WEB page;
Answer 4. domain name;

Question 14. (Difficulty - A) Select the correct IP address of the computer on the network
*Answer 1. 108.214.198.112
Answer 2. 18.274.198.0
Answer 3. 1278.214.198
Answer 4. 10,0,0,1225

Question 15. (Difficulty - A) The topology of a computer network in which all computers on the network are connected to a central node is called
Answer 1. Tire
Answer 2. Ring
*Answer 3. Star
Answer 4. There is no correct answer

Question 16. (Difficulty - A) What top-level domain means "educational site"?
Answer 1. mil
Answer 2.gov
Answer 3.com
*Answer 4. edu

Question 17. (Difficulty - A) Determine the 2nd level domain www.klyaksa.inform.net
Answer 1. klyaksa
Answer 2. inform
Answer 3. www
*Answer 4. net

Question 18. (Difficulty - B) Determine the computer number on the network by IP 215.128.255.106
Answer 1. 215.128.255.106
Answer 2. 128.255.106
Answer 3. 255.106
*Answer 4. 106

Question 19. (Difficulty - A) A protocol is...
Answer 1. the ability of a computer to send files through communication channels
Answer 2. device for running a local network
*Answer 3. standard for data transmission over a computer network
Answer 4: standard for sending messages via email

Question 20. (Difficulty - B) How long will it take to transfer a 128 KB file over a network whose speed is 128 KB/s?
*Answer 1. 8 p.
Answer 2. 1 p.
Answer 3. 1 min.
Answer 4. 10 s.

Option #1
1. What networks are used by a small group of employees?
a) campus networks
b) corporate networks
c) networks of departments
2. What network characteristic shows the average time for processing user requests?
a) throughput
b) controllability
c) productivity
3. Which layer of the OSI model is the lowest.
a) channel
b) physical
c) applied
4. What type of cable are single-mode cables:
a) fiber optic
b) twisted pair
c) coaxial
5. What communication lines use wireless channels.
a) air
b) cable
c) radio channels
6. Which signal coding belongs to analog modulation.
a) polar
b) Manchester code
c) phase
7. LANThis...:
a) a collection of computers for sharing information in
within limited limits
b) a collection of computers for sharing information over large
distances
c) a set of computers for transmitting data from a common database
8. Network topology is...:



9. Which routers are designed to build a central corporation network:
a) main lines


10. What does not apply to mobile communications:
a) twiding
b) infrared communication
c) cellular telephony

11. Which networks are used to provide their services to a large number of subscribers,
located within a very large area of ​​a city, country, etc.:
a) global
b) local
c) corporate
12. Which device processes frames in parallel?
a) bridge
b) switch
c) hub
13. Which switching uses information buffering:
a) channels
b) packages
c) messages
14. What does not apply to LAN tasks:
a) differentiation of information
b) file separation
c) separation of peripheral devices
15. Is this a MODEM device?
A) to store information
B) to process information at a given time
B) for transmitting information via telephone communication channels
16. A computer intended for shared use, including everything
resources are called...
A) file server.
B) workstation.
C) client server
17. List 3 basic network topologies:
Write down your answer:

Answer common bus, marker ring, star
18.What topologies is Ethernet technology based on:
a) tire
b) star
c) ring
19. The global network is...
a) a system of interconnected computers
b) a system of interconnected local networks
c) a system of interconnected local networks and individual computers
users
20. Which network component includes all connection devices.
a) computers
b) network applications
c) communication equipment
21.
Which protocol ensures the transmission of messages from the sender to the recipient via

unified computer network systems?
a) TCP
b) IP
c) IPX
22. Which level guarantees the delivery of packets without errors.
a) network
b) channel
c) transport
23. The main function of which device is to repeat the frame on all ports:
a) hub
b) switch
c) network adapter
Option No. 2
1. What is the topmost component of the network.
a) computers
b) operating system
c) network applications
2. Which layer of the OSI model is responsible for addressing messages and translating logical addresses into
physical.
a) channel
b) network
c) transport
3. Which cable is most often used in the horizontal subsystem (within a floor)?
a) fiber optic
b) shielded twisted pair
c) unshielded twisted pair
4. What characteristic shows that the network performs all its functions.
a) productivity
b) efficiency
c) reliability
5. Which communication lines do not use insulating shells
a) air
b) cable
c) radio channels
6. Which signal coding belongs to digital coding
a) polar
b) frequency
c) amplitude
7. Which device receives messages sent over the network and automatically tracks
errors:
a) hub
b) switch
c) network adapter

8. The access method is...:
a) logical diagram of connecting network computers via communication channels
b) a set of rules defining the use of a data transmission channel
c) network data transmission scheme
9. How many layers does the OSI model have?
a) 5
b)7
at 10
10.What does not apply to wireless communication lines:
a) communication in the wave range
b) radio communication
c) paging
11. Which routers are designed to divide large local networks into
subsystems:
a) main lines
b) routers of remote offices
c) local network routers
12. Provider is:


normal network operation
13. In what topology is a special format frame used?
a) common bus
b) marker ring
c) star
14. The concept of “dot-to-dot” transmission:
a) data transfer through the hub
b) transferring data from one network adapter to another
c) data transfer through a chain of computers
15. Standard Internet Protocol.
A) PPP.
B) SLIP.
C) TCP/IP.
16. A computer connected to the Internet must have:
Choose one of 3 answer options:
a) domain name
b) URL address
c) IP address
17. Communication channel providing high-speed transmission?
Write down your answer:
__________________________________________
Fiber optic
18.What topology is TokenRing technology based on:
a) tire

b) star
c) ring
19. What components of a computer network are needed to organize a peer-to-peer
local network?
a) modem, computer server, workstations
b) network card, network software
c) file server, workstations, modem
20. Which network characteristic hides details of the network’s operation from the user.
a) extensibility
b) transparency
c) compatibility
21. What applies to intermediate equipment of communication lines:
a) modem
b) hub
c) network adapter
22. What kind of switching allows you to divide data into parts:
a) channels
b) packages
c) messages
23. Which mode of operation of the switch does not exist:
a) half duplex
b) duplex
c) complex
Option #3
1. In which network adapters part of the work is shifted to the driver:
a) client
b) server
c) mixed
2. Which layer of the OSI model is the highest.
a) physical
b) representative
c) applied
3. Which network unites many networks of different departments of one enterprise.
a) networks of departments
b) local networks
c) corporate networks
4. What characteristic of a network is capable of including a wide variety of software and
hardware.
a) controllability
b) compatibility
c) transparency
5. What does not apply to the characteristics of communication lines:
a) noise immunity

b) attenuation
c) noise immunity
6. Which communication lines use several layers of insulating shells
a) air
b) cable
c) radio channels
7. What does not apply to LAN tasks:
a) access to information
b) file separation
c) information protection
8. What topology is based on hubs
a) common bus
b) marker ring
c) star
9. Which layer of the OSI model deals with the transmission of unstructured stream over channels
communications
a) physical
b) channel
c) network
10. Which device is used in analog modulation:
a) network adapter
b) hub
c) modem
11. What bridge operating algorithm does not exist:
a) transparent bridge
b) bridge with source routing
c) bridge with buffering from the source
12. What does the routing table contain:
a) information about router numbers
b) routes to all known networks connected to routers
c) graph of the time a frame passes through the router
13. Which function of the global network does not exist:
a) transport
b) multi-level
c) high-level
14. Which level is presented in the form of various protocols using which
the user gains access to resources
a) representative
b) applied
c) network
15.
The main reason for port disabling in hubs is:
a) no response, frame repetition on all ports
b) lack of response to a sequence of pulses sent to all ports.

c) if the port produces errors
16.
A local network configuration in which all PCs are connected to the same communication line.
A) Ring.
B) Tire.
D) Star.
Networks where all computers have equal rights
17.
Write down your answer:
__________________________________________
peer-to-peer
18.What topology is FDDI technology based on:
a) tire
b) star
c) ring
19. Which cable provides a data transfer speed of 100 Mbps?
a) coaxial
b) twisted pair
c) fiber optic
1
2
20. In what topology can all computers on the network simultaneously transmit
information
a) common bus
b) marker ring
c) star
21. What characteristic of the network allows you to increase the number of network nodes in
within wide limits
a) extensibility
b) scalability
c) compatibility
22. Which level allows you to insert checkpoints into long transmissions.
a) network
b) representative
c) sessional
23. What does not apply to mobile communications:
a) paging
b) radio communication
c) cellular telephony
Option No. 4
1. Which device processes frames sequentially?
a) bridge
b) switch
c) hub
2.
... is a method of describing network environments that reflects the interactions between software and
hardware during a communication session.

a) topology
b) structuring
c) OSI model
3. What characteristic of the network makes it possible to control the constituent elements
networks.
a) reliability
b) controllability
c) productivity
4. Which layer of the OSI model deals with the form of information transmission over the network, without changing
This is its content, and also deals with data encryption.
a) applied
b) transport
c) representative
5. How are network protocols implemented:
a) hardware
b) software modules
c) routing tables
6. What does not apply to the characteristics of communication lines:
a) reliability
b) bandwidth
c) throughput
7. What kind of switching allows you to create a single transmission channel:
a) channels
b) packages
c) messages
8. What does not apply to LAN components:
a) network OS
b) servers
c) switching equipment
9. In what topology do computers participate in packet transmission?
a) common bus
b) marker ring
c) star
10. Network operator is:
a) a company providing paid services to network subscribers
b) a company that maintains the normal operation of the network
c) a company that provides paid services to network subscribers and supports
normal network operation
11. What is the name of the characteristic that transmits data per unit of time?
a) throughput
b) productivity
c) reliability
12. Which networks are not divided into subnets
a) networks of departments
b) global networks

c) corporate networks
13. What does not apply to wireless communication lines:
a) infrared communication
b) radio communication
c) cellular telephony
14. The simplest method of protection against unauthorized access:
a) antiviruses
b) password protection
c) encryption
15. Which protocol performs packet fragmentation:
a) IP
b) TCP
c) IPX

16. Local network configuration based on a file server.
A) Ring.
B) Tire.
C) Star.
17. A computer that presents its resources to other PCs is called...
Write down your answer:
__________________________________________
server
18. What type of cable does TokenRing technology not use:
a) coaxial
b) twisted pair
c) fiber optic
19. Which of the following computer connection diagrams is a closed chain?
20. How does the concentrator work:
a) Tire
b) Ring
c) Star
a) 4 hubs
b) bit
c) all day long
21. Which device transmits frames, while determining the optimal path for the frame to pass through:
a) hub
b) switch
c) router
22. A device that provides digital conversion on the transmitter side
computer signal into a modulated analog signal, and on the receiver side
performs inverse signal conversion.
A) Hub
B) Modem.
D) Switch.
called...
23. Equipment located between networks using the same protocols

A) Bridge.
B) Network adapter.
D) Gateway.
Option #5
1. Which network component forms the software platform
a) communication equipment.
b) network applications
c) operating systems
2. Which network characteristic protects against unauthorized access.
a) reliability
b) security
c) scalability
3. What function do network protocols not perform?
a) transmission of packets between end nodes of the network
b) protection against broadcast storms
c) choosing a packet transmission route
4. Which layer transmits each frame while waiting for an acknowledgment
transfers.
a) channel
b) network
c) transport
5. What bandwidth is recorded in 1 second of time?
a) instant
b) average
c) maximum
6. What applies to the main equipment of communication lines:
a) modem
b) switch
c) hub
7. What kind of switching allows you to transmit email information:
a) channels
b) packages
c) messages
8. How does the switch work:
a) 4 hubs
b) bit
c) all day long
9. Which topology is most likely to cause collisions?
a) common bus
b) marker ring
c) star
10. Which network component operates at the data link layer
a) hub
b) switch
c) network adapter

11.
Which protocol organizes reliable and efficient operation of a composite network:
a) TCP
b) IP
c) IPX
Which WAN component is installed in certain geographic locations,
12.
where divergence and merging of data streams is required:
a) multiplexer
b) switch
c) router
13. Which network characteristic means mean time between failures
a) reliability
b) productivity
c) compatibility
14. Which topology is not used to build large LANs
a) common bus
b) marker ring
c) star
15.
What field is missing from the IP protocol?
16.
What is network equipment?
a) “offset” field
b) field “checksum”
c) field “fragmentation”
A) Hub.
B) Adapter.
C) All answers are correct.
17. Give a transcript of the LAN
Write down your answer:
__________________________________________
Local computing network
18. What type of cable does FDDI technology use:
19. Select the correct IP address of the computer on the network
a) coaxial
b) twisted pair
c) fiber optic
a) 1. 108.214.198.112
b) 2. 18.274.198.0
c) 1278.214.198
Networks where out of all computers one is allocated that manages all resources
20.
Write down your answer:
__________________________________________
client-server
21. What type of cable does Ethernet technology use:
a) coaxial
b) twisted pair
c) fiber optic
d) all types of cables
22. Computer network topology, in which all computers on the network are connected to
the central node is called

a) Tire
b) Ring
c) Star
23. What type of networks is called peer-to-peer?
a) local network;
b) global network;
c) corporate network;