<=Back

<= KNEC Diploma in ICT module 3 Data Communication and Networking past paper: November 2021

Outline two parts of Ethernet MAC address

    Viewed:  411  times

  Share in:
        

Question Answer:





Questions List:

1. Differentiate between analog and digital signal as used in data communication
2. Explain three functions of physical layer in OSI model
3. User datagram protocol header is made up of several fields. Explain three fields that could be found in the header
4. Mary intends to use commands line network operating system for her computer network. Outline four advantages of the operating system that could have influenced her choice
5. Outline four types of communication software that could be found in a computer
6. For each of the following scenarios, suggest the most appropriate internet connection justifying your answer. (4 marks) (i) A host server that is accessed by millions of users; ii)A home office that uses existing telephone lines; (iii) A video chat on a mobile phone; (iv)Connecting several branches of company located in several towns
7. Outline two uses of a network baseline during network troubleshooting
8. Unipolar encoding scheme has several problems that makes it unpopular in modern digital transmission scheme. Explain two such problems
9. Outline two roles of simple Mail Transfer Protocol (SMTP).
10. Figure 1 shows a copper twisted pair cable (STP) use it to answer the question that follows: Outline the functions of the parts labelled (i), (ii), (iii) and (iv)
11. Describe three organizations that regulates WLAN
12. Kate designed a computer network that uses hybrid network topology. Outline four factors that could have influenced her design
13. Differentiate between next-generation firewall and cloud firewall
14. Dynamic Host configuration protocol (DHCP) is used to automate IP addressing in a network. Explain three components of this protocol
15. Explain each of the following terms as used in the internet; (i)Attachments. ii)Favourite.
16. Peter was advised by his friends to use unattended installation for a network software. Outline four advantages of this installation method
17. Judy discovered several network vulnerabilities in her company network. Outline four examples of these vulnerabilities that she could have noted
18. Alice intends to use WiMAX (World Interoperability for Microwave Access) to interconnect the two network branches located in towns. Explain two features of this transmission media that could have influenced her decision
19. Explain two challenges of a bus network topology
20. Outline three challenges of peer to peer network model
21. Distinguish between hub and a switch
22. Outline three factors that determine the bandwidth of a transmission media
23. Betty intend to troubleshoot computer network for a client. Outline four common hardware troubleshooting tools that she could use.
24. During network design, networks are categorized based on the number of nodes connected. Explain such categories
25. Outline two parts of Ethernet MAC address
26. For each of the following functions of Ethernet frame, identify the field responsible i)Detect errors in an Ethernet frame. ii)Describe which higher-level protocol is used. iii)Notifies the destination to get ready. iv)Shows frame MAC address of the origin.
27. Carriers sense media access or collusion detection uses several steps that guarantees delivery of data packets from sender to receiver hosts. Outline four such steps
28. Outline four factor that should be considered before installing a communication software in a computer
29. Margret was diagnosing a tablet that was not connecting to the company’s WIFI. Explain three causes and solutions of this problems
30. Describe two types of fiber optic cables
31. Outline two disadvantages of time-division multiplexing scheme (TDM).
32. Distinguish between access rate and committed information rate as used in frame relay configuration
33. Joan was required to install a computer network to use the most current technology in data communication. Explain the two challenges that she could have experienced during the installation
34. Internet Service Provider prefers using point-to- point protocol when connecting their customers to WAN. Explain three advantages that could have influenced the trend.
35. Outline two characteristics of WAN
36. Distinguish between unicast IPv6 address and anyCast IPv6 address
37. Paul noted that cyclic redundancy check (CRC) is an error detecting scheme that is commonly used in data communication systems. Outline four advantages that could be influencing this trend.
38. Every internet uses address resolution protocol for it to function properly. Explain two function of this protocol
39. Figure 2 shows a TCP/IP model. Use it to answer the questions that follows Explain the function of the layer labelled (i) and (ii).
40. List four protocols that could be used in the application layer