Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=Diploma in ICT module 3 Data Communication and Networking past paper: July 2016

Network operating systems provide critical functions in data communication systems. Outline four typical functions that are likely to be realized. (4mks)

    Viewed:  254  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. List three criteria that could be used to classify data communication networks. (3mks)
2. Distinguish between a Powered-over-Ethernet (PoE) and a non-PoE switch. (4mks)
3. Outline three factors that should be considered when selecting a switch, other than cost. (3mks)
4. Bottom-up troubleshooting approach could be used by network administrators to establish a network fault. Outline four disadvantages they are likely realize while using this approach. (4mks)
5. Implementation of any network design should follow several design principles. Describe three principles that should be adhered to. (6mks)
6. Outline two categories of wireless networks. (2mks)
7. Explain the term encapsulation as applied to transport protocols. (2mks)
8. Distinguish between blogs and portals as used in internet. (4mks)
9. CFG polytechnic has introduced Internet services to its students. Explain two challenges that the college is likely to experience. (4mks)
10. Explain each of the following terms as used in the Internet; i) Cookies; (2mks) ii) History. (2mks)
11. Network operating systems provide critical functions in data communication systems. Outline four typical functions that are likely to be realized. (4mks)
12. Logical security measures are normally recommended approaches of preventing network insecurity incidences. Explain two such measures. (4mks)
13. Explain this two sub layers of the data link layer used by LAN. (4mks)
14. Every network topology requires careful consideration before installation. Outline four factors that should be considered before installation, other than cost. (4mks)
15. Explain three desirable characteristics of a web browser. (6mks)
16. Network reliability is one of design metrics for corporate networks. Explain two measures that could be adopted to enhance network reliability. (4mks)
17. Network intrusions are increasingly affecting business operations. Explain two wrong practices that could intensify these intrusions. (4mks)
18. Maria intends to replace static routing protocol in her company’s network. Explain three disadvantages of routing protocols that could influence her decision. (6mks)
19. Outline two disadvantages of using frame relay protocol. (2mks)
20. Distinguish between network and host addresses as applied in PI addressing. (4mks)
21. Shielded twisted-pair (STP) cable are commonly used in private networks. Explain two benefits of STP cables that could be influencing this trend. (4mks)
22. With the aid of a diagram, describe the structure of a coaxial cable. (4mks)
23. Data transmission uses several multiplexing techniques. Describe three multiplexing techniques that are likely to be used. (6mks)
24. Describe two types of connectors used with fiber optic cables. (4mks)
25. Outline two strengths of TCP/IP protocol in data communication. (2mks)
26. Paul was required to identify ISDN cannels in a job interview. Explain two channels that he could have mentioned. (4mks)
27. Bring your own device (BYOD) pose some risks to some software cooperate networks. Explain two potential risks that are likely to be experienced. (4mks)
28. Explain three circumstances under which point-to-point protocol (PPP) could be used on a corporate network. (6mks)
29. Explain three parts/ elements of data link layer frame. (6mks)
30. Distinguish between data terminal equipment and data communication equipment. (4mks)
31. UDP is a simple protocol that provides the basic transport layer functions. Explain three requirements for its application in a network. (6mks)
32. Tom was required to install a communication software in his company’s network. Explain two methods of installation that he could use. (4mks)
33. Outline four minimum documentation details for troubleshooting a network. (4mks)
34. Define the term blind spot as applied in data communication. (2mks)
35. Charles intends to set up an email server for his company. Outline four requirements that she should consider in order to achieve her objective. (4mks)
36. Outline two functions of the application layers of the OSI model. (2mks)
37. Explain two circumstances that could necessitate use of the file transfer protocol in data communication. (4mks)


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com