Computer Network Question Answer – (Part 5)

3132

Today I’ll give you more 50 question of computer Network. I think, it is working for you. You can comment your requirements.

Computer Network Question Answer – (Part 5)

Computer Network Question Answer

1. What is the number range of IPX access list?
Answer
The range is 800-899.

2. How can you vary the routers boot sequence?
Answer
It can be done by boot system commands and config register.

3. Which hardware is necessary for broadcasts?
Answer
switch, repeater and bridge.

4. What is the use of IPX SAP?
Answer
It stands for Service Advertising Protocol and it is used to advertise services.

5. Which protocol helps test the connectivity without configuration of layer 3 protocols?
Answer
CDP protocol.

6. What is the default serial encapsulation?
Answer
HDLC is the default serial encapsulation.

7. What is the use of ARP?
Answer
It is used to determine the MAC Address of a workstation.

8. Name the default IPX Ethernet encapsulation?
Answer
Novell-Ether is the default IPX Ethernet encapsulation.

9. Which compression protocols are used for PPP?
Answer
Stac and Predictor.

10. Which authentication method is preferred to set up a session?
Answer
CHAP.

11. What is the use of Multilink Protocol MP?
Answer
It is used to provide load balancing across multiple links.

12. What is magic number?
Answer
It helps avoid frame looping.

13. What is the Quality Protocol?
Answer
It monitors data dropped on a link.

14. Which are the different forms of WAN Services accessed by Cisco Routers?
Answer
These are Switched services, Using protocols connecting peer to peer devices and Interface front end to IBM Enterprise Data center computers.

15. How can we convert the user data from DTE to WAN service form?
Answer
We can use the Modem, CSU/DSU and TA/NT1 for this.

16. Which service is used to get data from multiple sources and allocate bandwidth on one?
Answer
TDM or Time Domain Multiplexing.

17. Which abbrevation is used to tell the router to check all numbers?
Answer
host.

18. What happens if we set a wildcard mask bit to ‘0’ in cisco routers?
Answer
The router checks the corresponding bit value.

19. How many access lists are allowed per interface?
Answer
One Access list per port, per protocol is allowed.

20. When using access lists, what does a Cisco router check first?
Answer
The cisco routers checks whether the packet is routable or bridgeable.

21. What do you know about the UDP Datagram format?
Answer
Source Port – 16 bits, Destination Port – 16 bits, Length – 16 Bits, Checksum – 16 bits, Data.

22. Cisco router has two types of access lists?
Answer
Standard and Extended.

23. What is the use of DDR on Cisco Routers?
Answer
It is used for dial on demand routing. DDR provides routing for low volume and periodic traffic.

24. Which field in the IP Packet has network testing?
Answer
The network testing is found in IP Options field.

25. Which process is used to find an IP address from a MAC Address?
Answer
RARP Process.

26. Which format is useful for configuring the subnet mask for an IP Address?
Answer
dotted decimal, hexadecimal and bit count formats can be used.

27. How many DNS Servers can be specified with one command?
Answer
6 DNS Servers can be specified with one command.

28. Important features of PPP CHAP Authentication?
Answer
Authentication messages and local router challenges.

29. Which is the IPX Serial encapsulation by default?
Answer
HDLC.

30. Which hardware component is used to store backup configuration?
Answer
NVRAM is used for this.

31. What is the range of extended IP access list?
Answer
The range is 100-199.

32. What are the two important TCP Socket classes?
Answer
Socket and ServerSocket. ServerSocket is used for normal two-way socket communication. Socket class allows us to read and write through the sockets. getInputStream() and getOutputStream() are the two methods available in Socket class.

33. What is the difference between URL instance and URLConnection instance?
Answer
A URL instance represents the location of a resource, and a URLConnection instance represents a link for accessing or communicating with the resource at the location.

34. What information is needed to create a TCP Socket?
Answer
The Local System’s IP Address and Port Number. And the Remote System’s IPAddress and Port Number.

35. What is a network card?
Answer
A network card is an expansion card installed in a computer that enables the computer to be physically connected to a network.

36. List the different types of network card?
Answer
The different types of network card are as follows:

Ethernet card.
Wireless network card.
Token Ring network card.

37. What connectors are used in the Ethernet and wireless network cards?
Answer
Ethernet network cards use the RJ-45 connector; whereas, wireless network cards usually have no external connections other than an antenna jack.

38. What are the different types of connectors?
Answer
The different types of connectors are DB-9, DB-25, RJ-11, RJ- 45, Bayonet Neill-Concelman (BNC), PS2/MINI-DIN, and Universal Serial Bus (USB).

39.What is the use of RJ-11 connector?
Answer
The RJ-11 connector is generally used to connect standard telephone cord.

40. What is the use of RJ-45 connector?
Answer
The FU-45 connector is an industry standard for Ethernet and Fast Ethernet networking. It is used to attach short cable (patch cable) to connect the computer to wall jack.

41. What is the use of USB connector?
Answer
USB is an external hardware interface and communications standard that is utilized for connecting varied peripherals to a computer, such as mouse, external drive, digital cameras, memory sticks, and gaming peripherals.

42. What type of connector is used to connect a modem to wall jack?
Answer
RJ-11 is used to connect a modem to wall jack.

43. How many devices can be connected to one USB port?
Answer
USB hubs can generally extend a USB network to a maximum of 127 ports.

44. What is the length of USB cable?
Answer
Normally, USB cables are limited to 5m; however, hubs can be used as an active USB repeater to extend the cable length for up to 5m at a time.

45. What are the main types of computer cabling?
Answer
The following are the main types of computer cabling:
Twisted Pair cable.
Coaxial cable.
Fiber-optic cable.

46. What is Twisted Pair?
Answer
Twisted Pair is made up of insulated copper wire twisted around each other to form wire pairs. It helps in reducing the noise from external sources and crosstalk on multi-pair cables.

47. How many classes of Twisted Pair are available?
Answer
Following two classes of Twisted Pair are available:
1. Unshielded Twisted Pair (UTP).
2. Shielded Twisted Pair (STP).

48. Category 3 and Category 5 cables belong to which class of Twisted Pair?
Answer
The Category 3 and Category 5 cables belong to UTP class of Twisted Pair.

49. How many Twisted Pairs of copper wire are there in Category 5 cable?
Answer
The Category 5 cable contains four Twisted Pairs of copper wire that are capable of transmission of up to 100 Mbps.

50. How is STP cable different from coaxial cable?
Answer
In STP cable, the twisted pair is wrapped in foil to decrease external interference and electromagnetic radiations. In coaxial cable, the center cable is insulated by a plastic-foam, a second conductor, a foil wrap, and an external plastic tube.

Bijay
Hy i'm bijay.I'm someone who loves to enjoy life and tries to focus on real things and real friendships. That's why I live very simply. I don't spend much time fixing myself up or trying to look cool. I live like a normal person. Failure is the key to success; each mistake teaches us something. so friends plz forgive me if i do any mistake.