<=Back

<=KNEC Diploma in ICT module 3 Data Communication and Networking past paper: November 2018

Border Gateway protocol(BGP) is a phenomenon protocol in transport layer. Explain three reasons that could be influencing it’s use

    Viewed:  358  times

  Share in:
        

Question Answer:





Questions List:

1. Differentiate between collision domain and broadcast domain as used in data communication
2. Explain three functions of the data link layer as applied in OSI model
3. With the aid of diagram, describe the TCP/IP model
4. Command line network operating system are rarely used by end users in organizations. Explain two disadvantages that could be affecting its popularity
5. Outline four categories of communication software that could be found in computers
6. For each of the scenario, identify the most appropriate internet service. (i)Real-time exchange of text messaging (ii)Personal website for sharing personal opinions on a particular subject (iii)Making digital recording of a broadcast available for downloading. (1marks) (iv)Enable people located in different geographical region to hold meetings
7. Define the term link aggregation as used in computer network design
8. Sarah was required to identify parts of data communication system during an interview. Outline four parts that she could have identified
9. Outline two requirements for using file transfer protocol(FTP) in the internet
10. Explain two circumstances under which coaxial cables are most applicable in local area networks
11. Explain three challenges associated with installing WIFI hot spot for student use in Technical institutions in Kenya?
12. Lucas was required to select a network design for a client. Outline four factors that he could consider, other than cost
13. Differentiate between packet filter and stateful inspection firewalls as used in network security
14. Border Gateway protocol(BGP) is a phenomenon protocol in transport layer. Explain three reasons that could be influencing it’s use
15. Explain each of the following terms as used in the internet\ i)Registrar ii)Domain name
16. Juliet was advised by her friends to use genuine licensed communication software in her company. Explain two reasons that could inform her friends advice
17. Hackers are known to exploit email vulnerabilities to stack private networks. Outline four examples of such Vulnerabilities that they could exploit
18. With the aid of an example, describe two wireless network topologies
19. Explain two advantages of using token passing as used in Local area network
20. Outline three limitations of mesh network
21. Distinguish between managed and unmanaged network switches
22. Outline three factors that determines the throughput of transmission media
23. A lecture described various network troubleshooting techniques in data communication and networking class. Outline two guidelines that he could have mentioned to the class
24. The network design phase is prone to several constraints, explain three typical constraints that are likely to affect organization’s during this phase
25. Outline two roles of computers networks in organizations
26. Figure 1 shows an Ethernet frame. Outline the function of each of the following parts labelled (i) and (ii).
27. CSMA/CD is not commonly used in network interface card configurations. Explain two limitations that could be hampering its use
28. Outline four reasons for updating a network operating system (NOS).
29. Liz discovered that her company network was having a problem that would require attention of their network administrator. Explain three typical signs that she could have discovered
30. Describe two disadvantages of using fibre optic cables
31. List four examples of signals impairment that could be experienced in a transmission medium.
32. Distinguish between link control protocol (LCP) and Network control protocol (NCP) as used in WAN
33. Cloud computing is a technology that is being adapted by business firms. Explain two types of cloud computing service that could be used
34. Explain three circumstances that would necessitate the installation of a frame relay WAN connection in organizations
35. Outline two benefits of installing ISDN connection in organizations
36. Distinguish between host-ID and Network-ID as used in IP addressing
37. Cyclic Redundancy check (CRC) is an error-detecting scheme commonly used in computer networks. Outline four of its strengths that could be driving its popularity
38. Satellite link are not commonly used in local area Networks(LAN). Outline four reasons that discourage their use
39. With the Aid of diagram, describe the user datagram protocol(UDP) datagram