A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
These slides cover a topic on Introduction to switching & circuit switching in Data Communication. All the slides are explained in a very simple manner. It is useful for engineering students & also for the candidates who want to master data communication & computer networking.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
Field of telecommunications has evolved from crudest form of communications to electrical, radio and electro-optical communications. From manual exchange like local battery, central battery exchange, to crossbar switching, director system and to common control systems, telephone communications had started evolving to cater to better and better specifications and needs. Touch tone dial telephone opened a new horizon in the field of end to end signalling. Then came computerised stored program control systems, various multiplexing techniques. With increase in traffic there was a need to study traffic and blocking capabilities....
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
Field of telecommunications has evolved from crudest form of communications to electrical, radio and electro-optical communications. From manual exchange like local battery, central battery exchange, to crossbar switching, director system and to common control systems, telephone communications had started evolving to cater to better and better specifications and needs. Touch tone dial telephone opened a new horizon in the field of end to end signalling. Then came computerised stored program control systems, various multiplexing techniques. With increase in traffic there was a need to study traffic and blocking capabilities....
Computer Networks Multiple Choice Questions (MCQs) cover a wide range of topics related to the fundamental principles, protocols, and technologies that govern the communication and connectivity of computer systems. These questions are designed to test the knowledge and understanding of individuals in the field of computer networking. Below is a description outlining the common themes covered by MCQs in this domain:
Network Basics:
MCQs may assess the understanding of basic networking concepts such as nodes, links, topology, and communication models.
Questions might cover the differences between local area networks (LANs) and wide area networks (WANs), as well as their applications.
Protocols and Standards:
Questions often focus on network protocols, such as TCP/IP, HTTP, FTP, and their roles in data transmission.
Familiarity with networking standards and organizations like the IEEE and the Internet Engineering Task Force (IETF) is commonly tested.
Networking Devices:
MCQs may inquire about the functionality of networking devices like routers, switches, hubs, and their roles in network infrastructure.
Understanding the purpose and operation of devices like modems and gateways may also be examined.
IP Addressing and Subnetting:
Questions might cover topics related to IP addressing, subnetting, and the differences between IPv4 and IPv6.
Subnet masks, network classes, and CIDR notation could be focal points in these questions.
Data Link Layer and Switching:
Understanding the data link layer and its protocols (e.g., Ethernet) is often tested.
Questions may address concepts related to MAC addresses, switching techniques, and VLANs (Virtual Local Area Networks).
Routing and Routing Protocols:
Questions may assess knowledge of routing algorithms and protocols such as RIP, OSPF, and BGP.
Understanding the routing table, routing metrics, and the role of routers in forwarding data is essential.
Wireless Networking:
Topics related to wireless communication standards (e.g., Wi-Fi), security protocols, and frequency bands may be covered.
Questions might address challenges and solutions in wireless networking environments.
Network Security:
MCQs may focus on security protocols, firewalls, encryption, and authentication mechanisms.
Understanding common security threats and countermeasures is typically part of these questions.
Network Management and Troubleshooting:
Questions may assess knowledge of network management protocols (e.g., SNMP) and troubleshooting techniques.
Understanding tools for monitoring, diagnosing, and resolving network issues is crucial.
Emerging Technologies:
Some MCQs may explore contemporary topics such as cloud computing, virtualization, and the Internet of Things (IoT) in the context of networking.
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxbunyansaturnina
Page1 of 10
1. Prior tocellular radio, mobile radio and telephoneservices required:
A. a high-power transmitter/receiver
B. multiple transmitters/receivers
C. only one or two dedicated channels
D. that many channels be used, which exceed the frequency capacity
2. When using cellular networks, __________.
A. a single base station can serve multiple cells
B. adjacent cells must use the same frequencies
C. adjacent cells are assigned different frequencies
D. non-adjacent cells are assigned different frequencies
3. Theideal design for cells in a cellular network is a hexagonal shape because _____.
A. this makes enforcement of shapes easier
B. this is the easiest to implement
C. this makes all frequencies available to all cells
D. this makes the distance to all adjacent cells thesame
4. When a mobile unit moves, it may connect with a different base station. This action is called
____________.
A. a handoff
C. a reconfiguration
B. a transfer
D. a dropped signal
5. Which of the following is NOT one of theways that frequency spectrum can be divided among
active users?
A. frequency division multiple access
C. code division multiple access
B. time division multipleaccess
D. cell division multiple access
6. Because of the limited frequencies available, a key design element of any cellular system is to
___________.
A. usesmall cells
B. employ multipleaccess
C. limit the number of users at one time
D. use as many frequencies as possible
7. The Wireless Application Protocol (WAP) is:
A. proprietary protocol developed in theUSA for wireless security
B. dependent on the specific network technologies employed
C. an Internet standard that replaces HTML, HTTP, and XML
D. designed to overcome many of the limitations hindering acceptance of mobile data services
Page2 of 10
Page3 of 10
8. Which of the following is NOT one of thecomponents of the WAP specification?
A. A framework for wireless telephony applications
B. A full-featured communications protocol stack
C. A programming model based on the WWW
D. A markup languageadhering to XML
9. The WAP Programming Model uses a ________that acts as a proxy server for thewireless domain.
A. translator
C. gateway
B. WAP server
D. decoder
10. For a given system, multiple access is based on _______.
A. TDMA
C. CDMA
B. FDMA
D. all of the above
11. Important objectives of computer security include:
A. confidentiality
C. availability
B. integrity
D. all of the above
12. One type of attack on the security of a computer system or network that impacts the availability
of a system (e.g. destruction of a resourcein the system) is referred to as ___________.
A. incapacitation
C. modification
B. interception
D. all of the above
13. Thetype of attack on communications lines and networks known as traffic analysis belongs to the
general category of ____________.
A. active attacks
C.
This presentation will help girls and women to have a better life escape from betrayal, rapes and murder,
Always take decision with your mind not heart
Raving Fans - A Revolutionary Approach To Customer ServiceAbhishek Jaguessar
Told in the parable style of The One Minute Manager, RAVING FANS uses a brilliantly simple and charming story to teach listeners how to define vision, learn what a customer really wants, institute effective systems, and make Raving Fan Service a constant feature--not just another program of the month.
America is in the midst of a service crisis that has left a wake of disillusioned customers from coast to coast. RAVING FANS includes startling tips and innovative techniques that can help anyone create a revolution in any workplace--and turn their customers into raving, spending fans.
Change management (CM) refers to any approach to transitioning individuals, teams, and organizations using methods intended to re-direct the use of resources, business process, budget allocations, or other modes of operation that significantly reshape a company or organization.
The difference between China and Greek Mythology By Abhishek JaguessarAbhishek Jaguessar
n primitive society, mythologies began to appear in many nations. Mythologies are the collection of ancient philosophy and the explorations of nature and society. They are the source of historical and cultural of every nation and they reflect the life, labor, thoughts and wishes in the childhood period of human beings. Due to the limited productivity and separation of every nation, and based on the difference of politics, cultures and history, myths of different nations myths from different nations vary much and have particular characters. However, there are still some common features of myths of different nations. Hero myths are one of the essential components for the big mythology family. The paper would aim at the simple comparison between Chinese and Greek Hero Myths and give a perspective insight to hero myths of the tw
Kashmir is India’s only Muslim majority territory
India accuses Pakistan of waging a proxy war by arming militants
Jammu’s population is 2/3 Hindu
Kashmiris never voted; extremists/separatists were born
Why did the U.S. adopt Pakistan as its ally?
A parenting style is a psychological construct representing standard strategies that parents use in their child rearing. The quality of parenting can be more essential than the quantity of time spent with the child. For instance, a parent can spend an entire afternoon with his or her child, yet the parent may be engaging in a different activity and not demonstrating enough interest towards the child. Parenting styles are the representation of how parents respond and demand to their children. Parenting practices are specific behaviors, while parenting styles represent broader patterns of parenting practices
Preparing for an exam can be stressful and time-consuming, but it doesn't have to be. There’s no need to stress out or cram. By doing a couple simple things ahead of time, you can ensure that you are confident and ready for anything that comes up on the test.
A sex-determination system is a biological system that determines the development of sexual characteristics in an organism. Most organisms that create their offspring using sexual reproduction have two sexes. Occasionally, there are hermaphrodites in place of one or both sexes.
Luckily, there are signs we can look for when trying to detect a lie.
Dr. Lillian Glass, a behavioral analyst and body language expert who has worked with the FBI on unmasking signals of deception, says when trying to figure out if someone is lying, you first need to understand how the person normally acts. Then you'll want to pay careful attention to their facial expressions, body language, and speech patterns, she writes in her book "The Body Language of Liars."
Sexual assault is a crime of power and control. The term sexual assault refers to sexual contact or behavior that occurs without explicit consent of the victim. Some forms of sexual assault include: Penetration of the victim's body, also known as rape. Attempted rape.
Shiva (or Siva) is one of the most important gods in the Hindu pantheon and, along with Brahma and Vishnu, is considered a member of the holy trinity (trimurti) of Hinduism. A complex character, he may represent goodness, benevolence and serve as the Protector but he also has a darker side as the leader of evil spirits, ghosts and vampires and as the master of thieves, villains and beggars. He is also associated with Time, and particularly as the destroyer of all things. Nevertheless, Shiva is also associated with creation. In Hinduism, the universe is thought to regenerate in cycles (every 2,160,000,000 years). Shiva destroys the universe at the end of each cycle which then allows for a new Creation. Shiva is also the great ascetic, abstaining from all forms of indulgence and pleasure, concentrating rather on meditation as a means to find perfect happiness. He is the most important Hindu god for the Shaivism sect, the patron of Yogis and Brahmins, and also the protector of the Vedas, the sacred texts.
Child-selling is the practice of selling children, usually by parents, close persons, ... Brokers who sold babies were found in Augusta, Ga., and Wichita, Kans. ... in 1953 or 1954, when there was starvation, "across the country people sold their
Dynastar Biology Figures and Structures By Abhishek JaguessarAbhishek Jaguessar
Biology is a natural science concerned with the study of life and living organisms,
including their structure, function, growth, evolution, distribution, identification and
taxonomy. Modern biology is a vast and eclectic field, composed of many branches and
sub disciplines.
This brief book can be used by teachers and students in the biology field. Students of
higher classes can also use this book. This book can also be used as references.
Biology has always been an entertaining subject especially with the pictures in it. The
figures and structures are very important in biology; they can demonstrate and
summarize a whole chapter.
The validation of my writing efforts by my sisters Fatemah, Ganistha and Arzeenah and
my friend Vimi who means a lot for me. Finally I dedicate this brief book to all my family.
Mahavidyas (Great Wisdoms) or Dasha-Mahavidyas are a
group of ten aspects of devi Parvati or Goddess Shakti in
Hinduism. The 10 Mahavidyas are Wisdom Goddesses,
aspects of devi Parvati, who represents a spectrum of
feminine divinity, from horrific goddesses at one end, to
the gentle at the other.
The development of Mahavidyas represents an important
turning point in the history of Shaktism as it marks the rise
of Bhakti aspect in Shaktism, which reached its zenith in
1700 CE. First sprung forth in the post-Puranic age, around
6th century C.E., it was a new theistic movement in which
the Supreme Being was envisioned as female. A fact
epitomized by texts like Devi-Bhagavata Purana, especially
its last nine chapters (31-40) of the seventh skandha,
which are known as the Devi Gita, and soon became
central texts of Shaktism.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. 1. Frames from one LAN can be transmitted to
another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem
3. 2. Which of the following condition is used to
transmit two packets over a medium at the
same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
E. None of the above
4. 3. You have a class A network address 10.0.0.0
with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow
for the largest possible number of host IDs per
subnet. Which subnet mask should you assign?
A. 255.240.0.0
B. 255.248.0.0
C. 255.252.0.0
D. 255.254.0.0
E. 255.255.255.255
5. 4. What is the default subnet mask for a class C
network?
A. 127.0.0.1
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
E. None of the above
6. 5. Which of the following is used for
modulation and demodulation?
A. modem
B. protocols
C. gateway
D. multiplexer
E. None of the above
7. 6. Which of the following is not a disadvantage
of wireless LAN?
A. Slower data transmission
B. higher error rate
C. interference of transmissions from different
computers
D. All of the above
8. 7. The Internet Control Message Protocol (ICMP)
A. allows gateways to send error a control messages to
other gateways or hosts
B. provides communication between the Internet Protocol
Software on one machine and the Internet Protocol
Software on another
C. reports error conditions to the original source, the
source must relate errors to individual application
programs and take action to correct the problem
D. All of the above
E. None of the above
9. 8. Your company has a LAN in its downtown office
and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to
share data and resources between the two
LANs, what type of device(s) are needed to
connect them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
10. 9. The term 'duplex' refers to the ability of the
data receiving stations to echo back a
confirming message to the sender. In full
duplex data transmission, both the sender
and the receiver
A. cannot talk at once
B. can receive and send data simultaneously
C. can send or receive data one at a time
D. can do one way data transmission only
E. None of the above
11. 10.Which of the following technique is used for
fragment?
A. a technique used in best-effort delivery systems to
avoid endlessly looping packets
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol
and places it in the data portion of the low level frame
C. one of the pieces that results when an IP gateway
divides an IP datagram into smaller pieces for
transmission across a network that cannot handle the
original datagram size
D. All of the above
E. None of the above
12. 11.Contention is
A. One or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition when two or more stations attempt to use the
same channel at the same time
D. collection of interconnected functional units that provides a
data communications service among stations attached to the
network
E. None of the above
13. 12.When you ping the loopback address, a
packet is sent where?
A. On the network
B. Down through the layers of the IP architecture and then up
the layers again
C. Across the wire
D. through the loopback dongle
E. None of the above
14. 13.Which of the following TCP/IP protocol is
used for transferring electronic mail
messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
15. 14.Which of the following device is used to
connect two systems, especially if the
systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
E. None of the above
16. 15.The synchronous modems are more costly
than the asynchronous modems because
A. they produce large volume of data
B. they contain clock recovery circuits
C. they transmit the data with stop and start bits.
D. they operate with a larger bandwidth
E. None of the above
17. 16.A distributed network configuration in which
all data/information pass through a central
computer is
A. bus network
B. star network
C. ring network
D. Point-to-point network
E. None of the above
18. 17.Which of the following TCP/IP protocol allows
an application program on one machine to
send a datagram to an application program
on another machine?
A. UDP
B. VMTP
C. X.25
D. SMTP
E. None of the above
19. 18. A remote batch-processing operation in
which data is solely input to a central
computer would require a:
A. telegraph line
B. simplex lines
C. mixedband channel
D. All the above
E. None of the above
20. 19.What part of 192.168.10.51 is the Network
ID, assuming a default subnet mask?
A. 192
B. 192.168.10
C. 0.0.0.5
D. 51
E. None of the above
21. 20.The slowest transmission speeds are those of
A. twisted-pair wire
B. coaxial cable
C. fiber-optic cable
D. microwaves
22. 21.A noiseless 3 KHz Channel transmits bits with
binary level signals. What is the maximum
data rate?
A. 3 Kbps
B. 6 Kbps
C. 12 Kbps
D. 24 Kbps.
23. 22.Carrier is
A. One or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition when two or more sections attempt to use the
same channel at the same time
D. a collection of interconnected functional units that provides
a data communications service among stations attached to
the network
E. None of the above
24. 23.What can greatly reduce TCP/IP configuration
problems?
A. WINS Server
B. WINS Proxy
C. DHCP Server
D. PDC
E. None of the above
25. 24. Which of the following statements is correct for the
use of packet switching?
A. the subdivision of information into individually addressed
packets in conjunction with alternative routing
arrangement enabled the transmission path to be altered
in the event of congestion or individual link failure
B. the employment of additional intelligence within the
network enabled more sophisticated error control and link
control procedures to be applied
C. by employing wide bandwidth circuits for the trunk
networks substantial economies through extensive
sharing of capacity could be achieved.
D. All of the above
E. None of the above
26. 25. A front-end processor is
A. a user computer system
B. a processor in a large-scale computer that executes
operating system instructions
C. a minicomputer that relieves main-frame
computers at a computer centre of communications
control functions
D. preliminary processor of batch jobs.
E. None of the above
27. 26.To connect a computer with a device in the
same room, you might be likely to use
A. a coaxial cable
B. a dedicated line
C. a ground station
D. All of the above
E. None of the above
28. 27.Internet-like networks within an enterprise.
A. Intranets
B. Switching alternating
C. Inter organizational networks
D. Extranets
29. 28.With an IP address of 100, you currently have
80 subnets. What subnet mask should you
use to maximize the number of available
hosts?
A. 192
B. 224
C. 240
D. 248
E. 252
30. 29.Which of the following types of channels
moves data relatively slowly?
A. wideband channel
B. voiceband channel
C. narrowband channel
D. broadband channel
E. None of the above
31. 30.Which of the following is required to
communicate between two computers?
A. communications software
B. protocol
C. communications hardware
D. access to transmission medium
E. All of the above
32. 31.Which of the following does not allow
multiple users or devices to share one
communications line?
A. doubleplexer
B. multipplexer
C. concentrator
D. controller
E. None of the above
33. 32.The geostationary satellite used for
communication systems
A. rotates with the earth
B. remains stationary relative to the earth
C. is positioned over equator
D. All of the above
E. None of the above
34. 33.Telecommunication networks frequently
interconnect an organization with its
customers and suppliers. Select the best fit
for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
35. 34.The _____ houses the switches in token ring.
A. transceiver
B. nine-pin connector
C. MAU
D. NIC
E. None of the above
36. 35.What device separates a single network into
two segments but lets the two segments
appear as one to higher protocols?
A. Switch
B. Bridge
C. Gateway
D. Router
37. 36. Which of the following refers to the terms
"residual error rate"?
A. the number of bit errors per twenty four hours of
continuous operation on an asynchronous line
B. The probability that one or more errors will be undetected
when an error detection scheme is used
C. the probability that one or more errors will be detected
when an error detection mechanism is used
D. signal to noise ratio divided by the ratio of energy per bit to
noise per hertz
E. None of the above
38. 37. The research and development department at your office
has been experimenting with different technologies to
help improve the performance of the network. One group
has been examining the use of a broadband network
versus a based band network. Select the correct
statement about broadband and baseband.
A. Broadband networks carry several channels on a single cable, whereas in
a baseband network several cables carry one channel
B. Baseband networks carry a single channel on a single cable, whereas
broadband networks carry several channels on a single cable
C. Baseband refers to local area networks, and broadband refers to wide
area networks.
D. Baseband operates at a standard bit rate, whereas broadband may
operate at different rates as needed
E. Broadband and baseband refer to the different frequencies at which
infrared operates then transmitting signals in certain conditions
39. 38.An error-detecting code inserted as a field in
a block of data to be transmitted is known as
A. Frame check sequence
B. Error detecting code
C. Checksum
D. flow control
E. None of the above
40. 39. The cheapest modems can transmit
A. 300 bits per second
B. 1,200 bits per second
C. 2,400 bits per second
D. 4,800 bits per second
E. None of the above
41. 40. Computers cannot communicate with each other
directly over telephone lines because they use
digital pulses whereas telephone lines use analog
sound frequencies. What is the name of the device
which permits digital to analog conversion at the
start of a long distance transmission?
A. Interface
B. Modem
C. Attenuation
D. Teleprocessor
E. None of the above
42. 41. Four routers have to be interconnected in a point-
to-point Network. Each pair of root us may
connected by a high-speed line, a medium speed
line or a low speed line. Find the total number of
topologies.
A. 12
B. 81
C. 48
D. 729
43. 42.Sending a file from your personal computer's
primary memory or disk to another computer
is called
A. uploading
B. downloading
C. logging on
D. hang on
E. None of the above
44. 43. HMP (Host Monitoring Protocol) is:
A. a TCP/IP protocol used to dynamically bind a high level IP
Address to a low-level physical hardware address
B. a TCP/IP high level protocol for transferring files from one
machine to another.
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
E. None of the above
45. 44.Which of the following is a voiceband
channel?
A. Telephone line
B. Telegraph line
C. Coaxial cable
D. Microwave systems
E. None of the above
46. 45.Demodulation is a process of
A. converting analog to digital signals
B. converting digital to analog signals
C. multiplexing various signals into one high speed line signals
D. performing data description.
47. 46.Internet-like networks between a company
and its business partners. Select the best fit
for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
48. 47.An example of an analog communication
method is
A. laser beam
B. microwave
C. voice grade telephone line
D. All of the above
E. None of the above
49. 48.Which of the following layer protocols are
responsible for user and the application
programme support such as passwords,
resource sharing, file transfer and network
management?
A. Layer 7 protocols
B. Layer 6 protocols
C. Layer 5 protocols
D. Layer 4 protocols
E. None of the above
50. 49.What frequency range is used for FM radio
transmission?
A. Very Low Frequency : 3 kHz to 30. kHz
B. Low Frequency : 30 kHz to 300 kHz
C. High Frequency : 3 MHz to 30 MHz
D. Very High Frequency : 30 MHz to 300 MHz
E. None of the above
51. 50.Transmission of computerised data from one
location to another is called
A. data transfer
B. data flow
C. data communication
D. data management
E. None of the above
52. 51.Compared to analog signals, digital signals
A. allow faster transmission
B. are more accurate
C. both (a) and (b)
D. All of the above
E. None of the above
53. 52.FDDI is a
A. ring network
B. star network
C. mesh network
D. bus based network
E. None of the above
54. 53.A central computer surrounded by one or
more satellite computers is called a
A. bus network
B. ring network
C. star network
D. All of the above
E. None of the above
55. 54. If delays are recorded as 10 bit numbers in a 50
router network, and delay vectors are exchanged
twice a second, how much bandwidth per fill duplex
line is occupied by the distributed routing
algorithm?
A. 500 bps
B. 1500 bps
C. 5 bps
D. 1000 bps
56. 55.HOSTS file entries are limited to how many
characters?
A. 8
B. 255
C. 500
D. Unlimited
E. None of the above
57. 56. Which of the following statement is incorrect?
A. The Addresses Resolution Protocol, ARP, allows a host to find
the physical address of a target host on the same physical
network, given only the target IP address.
B. The sender's IP - to- physical address binding is included in
every ARP broadcast; receivers update the IP-to-Physical
address binding information in their cache before processing
an ARP packet.
C. ARP is a low-level protocol that hides the underlying
network physical addressing, permitting us to assign IP-
addresses of our choice to every machine.
D. All of the above
E. None of the above
58. 57.Which of the following best illustrates the
default subnet mask for a class A,B, and C
Network?
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
E. None of the above
59. 58. Modulation is the process of
A. converting analog signals to digital signals
B. converting digital signals to analog signals
C. Multiplexing various signals into high speed line signals
D. performing data encryption.
60. 59.Devices interconnected by the LAN should
include
A. Computers and terminals
B. mass storage device, printers and plotters
C. bridges and gateways
D. All of the above
E. None of the above
61. 60.On a class B network, how many hosts are
available at each site with a subnet mask of
248?
A. 16,382
B. 8,190
C. 4,094
D. 2,046
E. 1,022
62. 61.Which of the following technique is used for
encapsulation?
A. a technique used in best-effort delivery systems to avoid
endlessly looping packets.
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol
and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides
an IP datagram into smaller pieces for transmission across
a network that cannot handle the original datagram size
D. All of the above
E. None of the above
63. 62.You are working with three networks that
have the network IDs 192.168.5.0,
192.168.6.0, and 192.168.7.0. What subnet
mask can you use to combine these
addresses into one?
A. 255.255.252.0
B. 225.255.254.0
C. 255.255.255.240
D. 255.255.255.252
64. 63.With an IP address set starting with 150, you
currently have six offices that you are treating as
subnets. Plans are in place to open 10 more
offices before the end of the year. What subnet
mask should you use to satisfy the needed
number of subnets and maximize the number of
hosts available at each site?
A. 192
B. 224
C. 240
D. 248
E. 252
65. 64.A machine that connects to two or more
electronic mail systems and transfers mail
messages among them is known as
A. Gateways
B. mail gateway
C. bridges
D. User Agent
E. None of the above
66. 65.Error detection at a data link level is achieved
by
A. bit stuffing
B. cyclic redundancy codes
C. Hamming codes
D. equalization
67. 66.When the computer provides the manager
with a multiple choice of possible answers,
the prompting technique is
A. question and answer
B. form filling
C. open-ended question
D. menu selection
E. None of the above
69. 68.Which address is the loopback address?
A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
E. None of the above
70. 69.Intranets and extranets can use their network
fire walls and other security features to
establish secure Internet links within an
enterprise or with its trading partners. Select
the best fit for answer:
A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI
71. 70.Which of the following is an advantage to
using fiber optics data transmission?
A. resistance to data theft
B. fast data transmission rate
C. low noise level
D. few transmission errors
E. All of the above
72. 71.Communication network is
A. one or more conductors that serve as a common connection
for a related group of devices
B. a continuous frequency capable of being modulated or
impressed with a second signal
C. the condition with two or more stations attempt to use the
same channel at the same time
D. a collection of interconnected functional units that provides
a data communications service among stations attached to
the network
E. None of the above
73. 72.Which of the following technique is used for
Time-To-Line (TTL)?
A. a technique used in best-effort delivery system to avoid
endlessly looping packets.
B. a technique used by protocols in which a lower level
protocol accepts a message from a higher level protocol and
places it in the data portion of the low level frame
C. One of the pieces that results when an IP gateway divides an
IP datagram into smaller pieces for transmission across a
network that cannot handle the original datagram size.
D. All of the above
E. None of the above
74. 73. Which of the following statement is incorrect?
A. if a host moves from one network to another, its IP address
must change
B. routing uses the network portion of the IP address, the path
taken by packets travelling to a host with multiple IP
addresses depends on the address used.
C. IP addresses encode both a network and a host on that
network, they do not specify an individual machine, but a
connection to a network.
D. All of the above
E. None of the above
75. 74.Bandlimited signal is
A. transmission of signals without modulation
B. a signal all of whose energy is contained within a
finite frequency range
C. simultaneous transmission of data to a number of
stations
D. All of the above
E. None of the above
76. 75.Computers in a LAN can be interconnected by
radio and infrared technologies.
A. Wireless LANs
B. Network Topologies
C. Multiplexer
D. Modem
77. 76.How many digits of the Network User
Address are known as the DNIC (Data
Network Identification Code)?
A. first three
B. first four
C. first five
D. first seven
E. None of the above
78. 77.Which of the following is the address of the
router?
A. The IP address
B. The TCP address
C. The subnet mask
D. The default gateway
E. None of the above
79. 78.A devices that links two homogeneous
packet-broadcast local networks, is
A. hub
B. bridge
C. repeater
D. gateway
E. None of the above
80. 79.Identify the odd term amongst the following
group:
A. Coaxial cable
B. Optical fibre
C. Twisted pair wire
D. Microwaves
E. None of the above
81. 80.Which of the following divides the high speed
signal into frequency bands?
A. t-switch
B. modem
C. frequency-division multiplexer
D. time-division multiplexer
E. None of the above
82. 81.What is the first octet range for a class C IP
address?
A. 192 - 255
B. 192 - 223
C. 192 - 226
D. 128 - 191
E. 1 - 126
83. 82.Which of the following conditions is used to
transmit two packets over a medium at the
same time?
A. Contention
B. Collision
C. Synchronous
D. Asynchronous
84. 83. Distributed Queue Dual Bus is a standard for
A. LAN
B. MAN
C. WAN
D. Wireless LAN.
E. LAN and MAN
85. 84. A teleprocessing system may consist of
A. user systems
B. communications systems
C. computer center systems
D. All of the above
E. None of the above
86. 85.If the ASCII character G is sent and the
character D is received, what type of error is
this?
A. single-bit
B. multiple-bit
C. burst
D. recoverable
87. 86.Which layer of OSI determines the interface
of the system with the user?
A. Network
B. Application
C. Data-link
D. Session
E. None of the above
88. 87.The transfer of data from a CPU to peripheral
devices of a computer is achieved through
A. modems
B. computer ports
C. interfaces
D. buffer memory
E. None of the above
89. 88.What is the number of separate protocol
layers at the serial interface gateway
specified by the X.25 standard?
A. 4
B. 2
C. 6
D. 3
E. None of the above
90. 89.Many data communication networks have been
established which provide a wealth of on-
demand information services to people at
home. What is the name of the system which
provides an interactive, graphics-rich service
that permits user to select what they want?
A. Teletex system
B. Fax system
C. Videotex system
D. Microwave system
E. None of the above
91. 90.Which of the following statements is correct?
A. Terminal section of a synchronous modem contains the
scrambler
B. Receiver section of a synchronous modem contains the
scrambler
C. Transmission section of a synchronous modem contains the
scrambler
D. Control section of a synchronous modem contains the
scrambler
E. None of the above
92. 91.Because the configuration information for a
DHCP client is received dynamically, you must
use which utility to read the current
configuration to verify the settings?
A. PING
B. TRACERT
C. ARP
D. IPCONFIG
E. None of the above
93. 92.Which of the following characteristic(s) is/are
suited to the PSS applications?
A. bursty traffic and low communications intensity
B. widely dispersed terminals and access to international
packets switched services
C. Multiple remote host or applications accessed by a single
local access circuit terminal and circuit
D. All of the above
E. None of the above
94. 93.Which of the following is separated by a
subnet mask?
A. DHCP scopes
B. Network ID and host ID
C. Domains
D. Subnets
95. 94.The signal to noise ratio for a voice grade line
is 30.1 dB (decibels) or a power ratio of
1023:1. The maximum achievable data rate
on this line whose spectrum ranges from 300
Hz to 4300 Hz is
A. 6200 bps
B. 9600 bps
C. 34000 bps
D. 31000 bps
E. None of the above
96. 95. TCP is:
A. Operates at the Data Link layer
B. Connection orientated and unreliable
C. Connection orientated and reliable
D. Connectionless and unreliable
97. 96. An encyclopedic database
A. is an information utility that specializes in storing
and searching information
B. is generally free
C. is easy for beginners to use
D. All of the above
E. None of the above
98. 97.Which of the following statements is correct?
A. Protocol converters are the same as multiplexers
B. Protocol converters are the same as TDMs
C. Protocol converters are usually not operated in pairs.
D. Protocol converters are usually operated in
E. None of the above
99. 98.Examples are packet switching using frame
relay, and cell switching using ATM
technologies. Select the best fit for answer:
A. Bandwidth alternatives
B. Switching alternating
C. Inter organizational networks
D. Extranets
100. 99.The physical layer, in reference to the OSI
model, defines
A. data link procedures that provide for the exchange of data
via frames that can be sent and received
B. the interface between the X.25 network and packet mode
device
C. the virtual circuit interface to packet-switched service
D. All of the above
E. None of the above
101. 100.A required characteristic of an online real-
time system is:
A. more than one CPU
B. offline batch processing
C. no delay in processing
D. All of the above
E. None of the above
102. 101.How many class A, B, and C network IDs can
exist?
A. 2,113,658
B. 16,382
C. 126
D. 128
E. None of the above
103. 102.Messages from one computer terminal can be
sent to another by using data networks. The
message to be sent is converted to an electronic
digital signal, transmitted via a cable, telephone
or satellite and then converted back again at the
receiving end. What is this system of sending
messages called?
A. Paperless office
B. Electronic mail
C. Global network
D. Electronic newspaper
E. None of the above
104. 103. HDLC (High-level Data Link Control) is
A. a method of determining which device has access to the
transmission medium at any time
B. a method access control technique for multiple-access
transmission media
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-
switched network
E. None of the above
105. 104.The first step in troubleshooting many
problems is to verify which of the following?
A. The subnet mask is valid
B. TCP/IP is installed correctly on the client
C. The WINS server is running
D. The BDC is operable
E. None of the above
106. 105.What protocol is used between E-Mail
servers?
A. FTP
B. SMTP
C. SNMP
D. POP3
107. 106.If you configure the TCP/IP address and other
TCP/IP parameters manually, you can always verify
the configuration through which of the following?
Select the best answer.
A. Network Properties dialog box
B. Server Services dialog box
C. DHCPINFO command-line utility
D. Advanced Properties tab of TCP/ IP Info.
E. None of the above
108. 107.In a PC to telephone hookup for long
distance communication, modem is
connected between the telephone line and
A. PC
B. synchronous port
C. crossover cable
D. asynchronous port
E. None of the above
109. 108.A hard copy would be prepared on a
A. typewriter terminal
B. line printer
C. plotter
D. All of the above
E. None of the above
110. 109.Arzeenah is in charge of a small network and wants to
make it simple but secure. The users want to have full
control over their data and still be able to share data
with the rest of the office. The networking knowledge
of the office staff is basic. Which network(s) would be
the best for Arzeenah to set up?
A. Peer-to-peer
B. Master domain
C. Server-based
D. WAN
E. Share-level
111. 110.When UPC is used, the price of the item is
located
A. on the item
B. on the item and on the shelf
C. in computer storage
D. on the shelf and in computer storage
E. None of the above
112. 111. Error control is needed at the transport
layer because of potential errors occurring
A. from transmission line noise
B. in routers
C. from out-of-sequence delivery
D. from packet losses.
113. 112.The transport layer protocol is connectionless.
A. NVT
B. FTP
C. TCP
D. UDP
E. None of the above
114. 113.The fundamental requirements of private-
to-public network interconnection methods
which need to be provided in gateways is/are
A. universal accessibility for private network Data Terminal
Equipment (DTE)
B. adequate cost control mechanisms for administration of the
private networks
C. to assign address to private network DTEs
D. a and b both
E. None of the above
116. 115.The difference between a multiplexer and a
statistical multiplexer is
A. Statistical multiplexers need buffers while multiplexers do
not need buffers
B. Multiplexer use X.25 protocol, while statistical multiplexers
use the Aloha protocol
C. Multiplexers often waste the output link capacity while
statistical multiplexers optimize its use
D. Multiplexers use Time Division Multiplexing (TDM) while
statistical multiplexers use Frequency Division Multiplexing
(FDM)
E. None of the above
117. 116.You are trying to decide which type of network you
will use at your office, and you want the type that
will provide communication and avoid collisions on
the cable. Which of the following is the best choice?
A. Token-Ring
B. CSMA/CD
C. Ethernet
D. CSMA/CA
E. ARCnet
118. 117.A decrease in magnitude of current, voltage,
a power of a signal in transmission between
points, is known as
A. Attenuation
B. Amplitude
C. Aloha
D. Carrier
E. None of the above
119. 118.The term "remote job entry" relates to
A. batch processing
B. realtime processing
C. transaction processing
D. distributed processing
E. None of the above
120. 119.The modern enterprise is interconnected
internally and externally by the Internet,
intranets, and other networks. Select the
best fit for answer:
A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks
E. None of the above
121. 120.When using the loopback address, if TCP/IP
is installed correctly, when should you
receive a response?
A. Immediately
B. Only if the address fails
C. After the next host comes online
D. Within two minutes
E. None of the above
122. 121. MAC is
A. a method of determining which device has access to the
transmission medium at any time
B. a method access control technique or multiple-access
transmission media
C. a very common bit-oriented data link protocol issued to ISO.
D. network access standard for connecting stations to a circuit-
switched network
E. None of the above
123. 122. Parity bit is
A. an error-detecting code based on a summation operation
performed on the bits to be checked.
B. a check bit appended to an array of binary digits to make the
sum of all the binary digits.
C. a code in which each expression conforms to specific rules of
construction, so that if certain errors occur in an expression,
the resulting expression will not conform to the rules of
construction and thus the presence of the errors in detected
D. the ratio of the number of data units in error to the total
number of data units
E. None of the above
124. 123.Which of the following file retrieval
methods use hypermedia?
A. HTTP
B. WAIS
C. Veronica
D. Archie
E. None of the above
125. 124.Which IP address class has few hosts per
network?
A. D
B. C
C. B
D. A
E. None of the above
126. 125. What is the port number for POP3?
A. 110
B. 90
C. 80
D. 49
127. 126.Which of the following provides a storage
mechanism for incoming mail but does not
allow a user to download messages
selectively?
A. SMTP
B. DHCP
C. IMAP
D. POP3
128. 127.Ethernet and Token-Ring are the two most
commonly used network architectures in the world.
Jim has heard of the different topologies for
networks and wants to choose the architecture that
will provide him with the most options. Which of
the following would that be? Choose the most
correct answer.
A. Token-Ring because it currently can run at both 4Mbps and
16Mbps. This means that it can be used in any topology
B. Ethernet, because it is cabled using fiber-optic cable
C. Token-Ring, because it uses a MAU
D. Ethernet, because it can be set up with most topologies and can
use multiple transfer speeds
E. Neither Token-Ring nor Ethernet is the proper choice. Only
ARCnet can be used in all topologies
129. 128.Two devices are in network if
A. a process in one device is able to exchange information with
a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
130. 129.When collection of various computers
seems a single coherent system to its client,
then it is called
A. computer network
B. distributed system
C. both (a) and (b)
D. none of the mentioned
131. 130.Which one of the following computer
network is built on the top of another
network?
A. prior network
B. chief network
C. prime network
D. overlay network
132. 131.In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
133. 132.Communication channel is shared by all the
machines on the network in
A. broadcast network
B. unicast network
C. multicast network
D. none of the mentioned
134. 133. Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. none of the mentioned
135. 134.A list of protocols used by a system, one
protocol per layer, is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. none of the mentioned
136. 135.Which one of the following extends a
private network across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
137. 136. The IETF standards documents are called
A. RFC
B. RCF
C. ID
D. None of the mentioned