Question 6 :
What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.
Question 7 :
What protocol is used by DNS name servers?
DNS uses UDP for communication between servers. It is a better choice than TCP because of the improved speed a connectionless protocol offers. Of course, transmission reliability suffers with UDP.
What is the range of addresses in the classes of internet addresses?
Class A 0.0.0.0 - 127.255.255.255
Class B 188.8.131.52 - 184.108.40.206
Class C 192.0.0.0 - 220.127.116.11
Class D 18.104.22.168 - 22.214.171.124
Class E 240.0.0.0 - 247.255.255.255
Question 8 :
What are the important topologies for networks?
In this each computer is directly connected to primary network cable in a single line.
Inexpensive, easy to install, simple to understand, easy to extend.
In this all computers are connected using a central hub.
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical problems.
In this all computers are connected in loop.
All computers have equal access to network media, installation can be simple, and signal does not degrade as much as in other topologies because each computer regenerates it.
Question 9 :
Difference between bit rate and baud rate?
Bit rate is the number of bits transmitted during one second whereas baud rate refers to the number of signal units per second that are required to represent those bits.
baud rate = bit rate / N
where N is no-of-bits represented by each signal shift.
Question 10 :
What is anonymous FTP and why would you use it?
Anonymous FTP enables users to connect to a host without using a valid login and password. Usually, anonymous FTP uses a login called anonymous or guest, with the password usually requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large number of users to access files on the host without having to go to the trouble of setting up logins for them all. Anonymous FTP systems usually have strict controls over the areas an anonymous user can access.