CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Computer Networks Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM NETWORKING INTERVIEW QUESTIONS COMPUTER NETWORKS INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Computer Networks Interview Questions & Answers - Learning Mode

A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media. A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.

Try Computer Networks Interview Questions & Answers - Exam Mode
Subcategories for Computer Networks Interview Questions & Answers - Learning Mode

Following are sub categories for which Interview Questions & Answers are available under Computer Networks Interview Questions & Answers - Learning Mode. Please select the appropriate sub-category:-

V-Model Interview Questions & Answers (0) Learning Mode | Exam Mode

1 2 3 4 5 6 7 Next

Sort By : Latest First | Oldest First | By Rating

Computer Networks Interview Questions & Answers - Learning Mode
Try Computer Networks Interview Questions & Answers - Exam Mode
Question: What is the difference between tree and forest?

Answer: The basic difference is Forest is main domain who can control all tree on networks. Source: CoolInterview.com
Question: What is the difference between physical address and logical address?



Answer: A Physical address is a 48-bit flat address burned into the ROM of the NIC card which is a Layer1 device of the OSI model. This iis divided into 24-bit vendor code and 24-bit serial address. This is unique for each system and cannot be changed.

A Logical address is a 32- bit address assigned to each system in a network. This works in Layer-3 of OSI Model. This would be generally the IP address.
Source: CoolInterview.com
Question: What are 10Base2, 10Base5 and 10BaseT Ethernet LANs ?

Answer: 10Base2?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with a contiguous cable segment length of 100 meters and a maximum of 2 segments.

10Base5?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per segment.

10BaseT?An Ethernet term meaning a maximum transfer rate of 10 Megabits per second that uses baseband signaling a Source: CoolInterview.com
Question: What are the difference between node,host,terminal,system,hub?

Answer: These are all different things in networking.
Hub:Where we connect all the the links for a networking connection.
Node:It can be identified as a one connection.
Host:is nothing than if you are going to send a request to the server the questioned system can be know as a host.

Source: CoolInterview.com
Question: What are the advantages and disadvantages of the three types of routing tables?

Answer: The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be manually modified every time there is a change. A dynamic table changes its information based on network traffic, reducing the amount of manual maintenance. A fixed central table lets a manager modify only one table, which is then read by other devices. The fixed central table reduces the need to update each machine's table, as with the fixed table. Usually a dynamic table causes the fewest probl Source: CoolInterview.com
Question: What is RAID?

Answer: A method for providing fault tolerance by using multiple hard disk drives. Source: CoolInterview.com
Question: What is the difference between TFTP and FTP application layer protocols?

Answer: The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but does not provide reliability or security. It uses the fundamental packet delivery services offered by UDP.

The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for copying a file from one host to another. It uses the services offered by TCP and so is reliable and secure. It establishes two connections (virtual circuits) between the hosts, one for data transfer an Source: CoolInterview.com
Question: If you are given the IP address can u tell how many computers can be connected?What do you look at?



Answer: Normally in IP address in fourth tab usually they will give the serial number of the using computer. in that case we can say how many computers are there. if not its impossiable to say. Source: CoolInterview.com
Question: What is NETBIOS and NETBEUI?

Answer: NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.

NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets. Source: CoolInterview.com
Question: What is Proxy ARP?

Answer: It is using a router to answer ARP requests. This will be done when the originating host believes that a destination is local, when in fact is lies beyond router. Source: CoolInterview.com
Question: What is wide-mouth frog?

Answer: Wide-mouth frog is the simplest known key distribution center (KDC) authentication protocol. Source: CoolInterview.com
Question: What is the difference between an unspecified passive open and a fully specified passive open

Answer: An unspecified passive open has the server waiting for a connection request from a client. A fully specified passive open has the server waiting for a connection from a specific client. Source: CoolInterview.com
Question: What is piggy backing?



Answer: Piggybacking is gaining access to restricted communication channel by using session that another user has already established. Piggybacking can be defeated by logging off before leaving a workstation or terminal or by initiating a protected mode, such as via a screensaver, that requires re-authentication before access can be resumed. Source: CoolInterview.com
Question: What is MAC address?

Answer: The address for a device as it is identified at the Media Access Control (MAC) layer in the network architecture. MAC address is usually stored in ROM on the network adapter card and is unique. Source: CoolInterview.com
Question: Explain the function of Transmission Control Block

Answer: A TCB is a complex data structure that contains a considerable amount of information about each connection. Source: CoolInterview.com
Question: What are the different type of networking / internetworking devices?

Answer: Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.

Bridges:
These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are rep Source: CoolInterview.com
Question: What is multicast routing?

Answer: Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing. Source: CoolInterview.com
Question: What are the types of Transmission media?

Answer: Signals are usually transmitted over some transmission media that are broadly classified in to two categories:-

Guided Media:
These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fi Source: CoolInterview.com
Question: what is .ost file?



Answer: In Microsoft Office Outlook 2003, a new offline folder file format is introduced that offers greater storage capacity for items and folders and supports multilingual Unicode data. An offline file folder is used to keep a local copy of your Exchange Server mailbox on your computer. The items in your .ost file are synchronized with the server when a connection is available.

Steps for offline file folder:-

1. On the File menu, click Work Offline.

2. Select or clear th Source: CoolInterview.com
Question: What are major types of networks and explain?

Answer: Server-based network.
Peer-to-peer network.

Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.

Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration. Source: CoolInterview.com

1 2 3 4 5 6 7 Next



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.546875 Seconds