Introduction to Network Administration (CSCT3109)
Computer Science - COS
Semester: First Semester
Level: 300
Year: 2019
REPUBLIC OF CAMEROON THE UNIVERSITY OF BAMENDA
Peace – Work – Fatherland P.O. BOX 39 Bambili
FIRST SEMESTER EXAMINATION
SCHOOL: HTTTC DEPARTMENT: Computer Science OPTION: ICT
COURSE CODE: CSCT3109 COURSE TITLE: Introduction to Network Administration
LECTURER: Dr. SUH Charles FORBACHA CREDIT VALUE: 3
DATE: 14/03/2019 TIME: 1h30 START: 7:30AM END: 9:00AM
INSTRUCTION: Please note that the mark that you achieve from this examination will count toward
70% of your final mark for this module.
The following questions are multiple choice. So please select the correct answer from options a-d.
NB: Please note that only one of the answers (a-d) is correct.
Section A
1) The time needed for each intermediate or end device to hold the message before it can be processed is known as: 1 mark
(a) Queuing Time
(b) Transmission Time
(c) Propagation Time
(d) Latency Time
2) A type of network in which the failure of a single node has no impact on the entire network is called: 1 mark
(a) Ring network
(b) Mesh network
(c) Star network
(d) Tree network
3) A network protocol that takes an IP address in an IP datagram and translates it into the appropriate medium access control layer
address for delivery on a LAN is referred to as: 1 mark
(a) Internet Protocol
(b) Transmission Control Protocol
(c) Network Address Translation
(d) Address Resolution Protocol
4) A network protocol that establishes connections before data transmission begins plus provides acknowledgements for all
transmitted data packets is known as: 1 mark
(a) Transmission Control Protocol
(b) User Datagram Protocol
(c) Internet Control Message Protocol
(d) Dynamic Configuration Protocol
5) Computers that store network software and shared or private user files are known as: 1 mark
(a) Workstations
(b) Mainframes
(c) Servers
(d) Routers
6) An approach which is reliant on a string of tracer-route like probe packets that would enable it to build a network map is called: 1
mark
(a) SNMP-based approaches
(b) Route analytics approaches
(c) Active probing based approach
www.schoolfaqs.net
(d) None of the above
7) A network protocol that takes an IP address in an IP datagram and translates it into the appropriate medium access control layer
address for delivery on a local area network is referred to as: 1 mark
(a) The Internet Protocol
(b) The Address Resolution Protocol
(c) The Dynamic Host Configuration Protocol
(d) The Internet Control Message Protocol
8) The protocol used for the management of TCP/IP networks is: 1 mark
(a) Common Management Information Protocol
(b) Internet Control Message Protocol
(c) User Datagram Protocol
(d) Simple Network Management Protocol
Section B
1) State and briefly explain the four statistics or measures that are useful in evaluating networks. 8 marks (2,2,2,2)
2) State the three major advantages of the star topology. 3 marks
3) Differentiate between a node and a network interface card. 2 marks
4) State and briefly explain the four key elements of an SNMP. 8 marks(2,2,2,2)
5) A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute
with each frame carrying an average of 20,000 bits. What is the throughput of this network? 2 marks
6) What are the propagation time and the transmission time for a 15-Mbyte message (an image) if the
bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the
receiver is 24,000 km and that light travels at 2.4 x 108 m/s. 4 marks
www.schoolfaqs.net