Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=Diploma in ICT module 3 Data Communication and Networking past paper: March 2024

Internet Control Message Protocol (ICMP) is an outstanding LAN protocol. Explain two roles that could be carried out by this protocol

    Viewed:  186  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. Explain three advantages of the OSI Model in data communication
2. Differentiate between Class D and a Class E IP address
3. Bob, a network administrator, in a certain company was required to carry out several routine maintenance tasks for the network operating system. Outline four routine tasks that he could perform.
4. During a job interview, Joel was required to mention features of a TCP/IP protocol. Describe three of these features
5. Outline two limitations of a hub in a modern network
6. Explain two circumstances under which an unguided media would be most appropriate when installing a computer network
7. Outline four functions of a bookmark when browsing Internet
8. Outline two benefits of using Internet of things (IoT) in an organization
9. IEEE 802.11 standard is widely used in data communication. Outline four disadvantages that are likely to be exhibited by this standard
10. Explain two weaknesses exhibited by Shielded Twisted Pair (STP) copper cables
11. Outline two LAN transmission methods
12. Helen was required to setup ISDN services in a wide area network for a client. Explain three categories of this services that she could have configured.
13. Distinguish between Symmetric DSL and Asymmetric DSL
14. Neon Data Communication Ltd. has installed a new telecommunication device that uses the latest technology. Explain two measures that the company would take to cope with this change.
15. Outline two characteristics of thinnet Ethernet
16. Explain three circumstances that would necessitate the use of a divide-and-conquer troubleshooting technique when identifying a network problem
17. ABC Company Ltd. intends to install a computer network for its head office. Outline four goals of the proposed network.
18. Explain two effects of using pirated communication software in organizations
19. Fast Ethernet is commonly installed in business firms. Explain two benefits that could be influencing this trend.
20. Outline two reasons for using leased lines for Wide Area Network connections in organizations
21. Internet Control Message Protocol (ICMP) is an outstanding LAN protocol. Explain two roles that could be carried out by this protocol
22. Distinguish between Synchronize Sequence Number (SYN) and Acknowledgement (ACK) as used in 3-way TCP communication
23. Border Gateway Protocol (BGP) is commonly used by ISP companies in their network. Explain three functions of this protocol
24. Differentiate between a virus and a worm as applied in network security
25. Doreen designed a network for a client that would use a DHCP server. Describe two benefits that the client would realize while using the network
26. Describe three methods of Internet connections that could be used by organizations
27. OSPF uses specific messages for communication between routers that are also using the same protocol. Explain three such messages
28. Outline three characteristics of an Infra-red signal
29. Beth was troubleshooting a faulty UTP cable in a local area network. Describe two possible hardware tools that he could have used
30. Outline three functions of a layer 3 switch
31. Distinguish between data packet and data frame as applied in data communication
32. Peter designed a partial mesh topology network for his client. Explain three advantages that the client would realize after implementation
33. Outline four communication services that could be realized by a college after installation of Internet
34. Explain two disadvantages of FTP
35. Differentiate between noise and distortion as applied in transmission media
36. Personal Identification Number (PIN) is a method used to authenticate networks users. Describe two limitations of this method
37. Janet highlighted factors that would affect performance of a computer network design. Outline four factors that she could have highlighted


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com