KNEC Diploma in ICT module 3 Data Communication and Networking past paper: November 2021 Answers

Answered

Course Name:  Information and Communication Technology
Also Done By:
NA
Course Level:  Diploma
Sub Level:       Module III
Course Unit:   Data Communication and Networking
Exam body:    KNEC

Share with Friends:
        
Go Back



1. Differentiate between analog and digital signal as used in data communication ()

2. Explain three functions of physical layer in OSI model ()

3. User datagram protocol header is made up of several fields. Explain three fields that could be found in the header ()

4. Mary intends to use commands line network operating system for her computer network. Outline four advantages of the operating system that could have influenced her choice ()

5. Outline four types of communication software that could be found in a computer ()

6. For each of the following scenarios, suggest the most appropriate internet connection justifying your answer. (4 marks) (i) A host server that is accessed by millions of users; ii)A home office that uses existing telephone lines; (iii) A video chat on a mobile phone; (iv)Connecting several branches of company located in several towns ()

7. Outline two uses of a network baseline during network troubleshooting ()

8. Unipolar encoding scheme has several problems that makes it unpopular in modern digital transmission scheme. Explain two such problems ()

9. Outline two roles of simple Mail Transfer Protocol (SMTP). ()

10. Figure 1 shows a copper twisted pair cable (STP) use it to answer the question that follows: Outline the functions of the parts labelled (i), (ii), (iii) and (iv) ()

11. Describe three organizations that regulates WLAN ()

12. Kate designed a computer network that uses hybrid network topology. Outline four factors that could have influenced her design ()

13. Differentiate between next-generation firewall and cloud firewall ()

14. Dynamic Host configuration protocol (DHCP) is used to automate IP addressing in a network. Explain three components of this protocol ()

15. Explain each of the following terms as used in the internet; (i)Attachments. ii)Favourite. ()

16. Peter was advised by his friends to use unattended installation for a network software. Outline four advantages of this installation method ()

17. Judy discovered several network vulnerabilities in her company network. Outline four examples of these vulnerabilities that she could have noted ()

18. Alice intends to use WiMAX (World Interoperability for Microwave Access) to interconnect the two network branches located in towns. Explain two features of this transmission media that could have influenced her decision ()

19. Explain two challenges of a bus network topology ()

20. Outline three challenges of peer to peer network model ()

21. Distinguish between hub and a switch ()

22. Outline three factors that determine the bandwidth of a transmission media ()

23. Betty intend to troubleshoot computer network for a client. Outline four common hardware troubleshooting tools that she could use. ()

24. During network design, networks are categorized based on the number of nodes connected. Explain such categories ()

25. Outline two parts of Ethernet MAC address ()

26. For each of the following functions of Ethernet frame, identify the field responsible i)Detect errors in an Ethernet frame. ii)Describe which higher-level protocol is used. iii)Notifies the destination to get ready. iv)Shows frame MAC address of the origin. ()

27. Carriers sense media access or collusion detection uses several steps that guarantees delivery of data packets from sender to receiver hosts. Outline four such steps ()

28. Outline four factor that should be considered before installing a communication software in a computer ()

29. Margret was diagnosing a tablet that was not connecting to the company’s WIFI. Explain three causes and solutions of this problems ()

30. Describe two types of fiber optic cables ()

31. Outline two disadvantages of time-division multiplexing scheme (TDM). ()

32. Distinguish between access rate and committed information rate as used in frame relay configuration ()

33. Joan was required to install a computer network to use the most current technology in data communication. Explain the two challenges that she could have experienced during the installation ()

34. Internet Service Provider prefers using point-to- point protocol when connecting their customers to WAN. Explain three advantages that could have influenced the trend. ()

35. Outline two characteristics of WAN ()

36. Distinguish between unicast IPv6 address and anyCast IPv6 address ()

37. Paul noted that cyclic redundancy check (CRC) is an error detecting scheme that is commonly used in data communication systems. Outline four advantages that could be influencing this trend. ()

38. Every internet uses address resolution protocol for it to function properly. Explain two function of this protocol ()

39. Figure 2 shows a TCP/IP model. Use it to answer the questions that follows Explain the function of the layer labelled (i) and (ii). ()

40. List four protocols that could be used in the application layer ()