KNEC Diploma in ICT module 3 Data Communication and Networking past paper: November 2018 Answers

All answers available

Course Name:  Information and Communication Technology
Also Done By:
NA
Course Level:  Diploma
Sub Level:       Module III
Course Unit:   Data Communication and Networking
Exam body:    KNEC

Share with Friends:
        
Go Back



1. Differentiate between collision domain and broadcast domain as used in data communication ()

2. Explain three functions of the data link layer as applied in OSI model ()

3. With the aid of diagram, describe the TCP/IP model ()

4. Command line network operating system are rarely used by end users in organizations. Explain two disadvantages that could be affecting its popularity ()

5. Outline four categories of communication software that could be found in computers ()

6. For each of the scenario, identify the most appropriate internet service. (i)Real-time exchange of text messaging (ii)Personal website for sharing personal opinions on a particular subject (iii)Making digital recording of a broadcast available for downloading. (1marks) (iv)Enable people located in different geographical region to hold meetings ()

7. Define the term link aggregation as used in computer network design ()

8. Sarah was required to identify parts of data communication system during an interview. Outline four parts that she could have identified ()

9. Outline two requirements for using file transfer protocol(FTP) in the internet ()

10. Explain two circumstances under which coaxial cables are most applicable in local area networks ()

11. Explain three challenges associated with installing WIFI hot spot for student use in Technical institutions in Kenya? ()

12. Lucas was required to select a network design for a client. Outline four factors that he could consider, other than cost ()

13. Differentiate between packet filter and stateful inspection firewalls as used in network security ()

14. Border Gateway protocol(BGP) is a phenomenon protocol in transport layer. Explain three reasons that could be influencing it’s use ()

15. Explain each of the following terms as used in the internet\ i)Registrar ii)Domain name ()

16. Juliet was advised by her friends to use genuine licensed communication software in her company. Explain two reasons that could inform her friends advice ()

17. Hackers are known to exploit email vulnerabilities to stack private networks. Outline four examples of such Vulnerabilities that they could exploit ()

18. With the aid of an example, describe two wireless network topologies ()

19. Explain two advantages of using token passing as used in Local area network ()

20. Outline three limitations of mesh network ()

21. Distinguish between managed and unmanaged network switches ()

22. Outline three factors that determines the throughput of transmission media ()

23. A lecture described various network troubleshooting techniques in data communication and networking class. Outline two guidelines that he could have mentioned to the class ()

24. The network design phase is prone to several constraints, explain three typical constraints that are likely to affect organization’s during this phase ()

25. Outline two roles of computers networks in organizations ()

26. Figure 1 shows an Ethernet frame. Outline the function of each of the following parts labelled (i) and (ii). ()

27. CSMA/CD is not commonly used in network interface card configurations. Explain two limitations that could be hampering its use ()

28. Outline four reasons for updating a network operating system (NOS). ()

29. Liz discovered that her company network was having a problem that would require attention of their network administrator. Explain three typical signs that she could have discovered ()

30. Describe two disadvantages of using fibre optic cables ()

31. List four examples of signals impairment that could be experienced in a transmission medium. ()

32. Distinguish between link control protocol (LCP) and Network control protocol (NCP) as used in WAN ()

33. Cloud computing is a technology that is being adapted by business firms. Explain two types of cloud computing service that could be used ()

34. Explain three circumstances that would necessitate the installation of a frame relay WAN connection in organizations ()

35. Outline two benefits of installing ISDN connection in organizations ()

36. Distinguish between host-ID and Network-ID as used in IP addressing ()

37. Cyclic Redundancy check (CRC) is an error-detecting scheme commonly used in computer networks. Outline four of its strengths that could be driving its popularity ()

38. Satellite link are not commonly used in local area Networks(LAN). Outline four reasons that discourage their use ()

39. With the Aid of diagram, describe the user datagram protocol(UDP) datagram ()