Get premium membership and access revision papers, questions with answers as well as video lessons.
Bmit 217: Internet And Communications Technology Question Paper
Bmit 217: Internet And Communications Technology
Course:Bmit
Institution: Kabarak University question papers
Exam Year:2009
COURSE CODE: BMIT 217
COURSE TITLE: INTERNET AND COMMUNICATION TECHNOLOGY
STREAM: Y2S1
DAY: TUESDAY
TIME: 9.00 – 12.00 P.M.
DATE: 08/12/2009
INSTRUCTIONS:
Answer Question ONE and any other THREE Question
QUESTION ONE [40MKS]
a) Give short and clear answers to the following descriptions:
i. The arrangement of computers, cables and peripherals on a network is referred
as…..[1mk].
ii. To understand how computers communicate on bus topology you need to be familiar
with sending the signal, signal bounce and ……. [1mk].
iii. A component called …………… can connect two pieces of cable together to make a
long piece of cable [1mk].
iv. A passive hub do not require…………to run but active hub require it [1mk].
v. The ring topology provides equal access to all computers and …………..is even
despite many users [1mk]
vi. The ……………….. is a cable that consist of core of copper wire surrounded by
insulation, a braided metal shielding, and outer cover [1mk].
vii. If you need to transmit data at very high speed over a long distance in very secure
media, you use…………. [1mk].
viii. A peripheral that acts as the physical interface between the computer and network
cable is known as………. [1mk].
ix. The phrase…………….is misleading because it implies a network completely free of
cabling [1mk]
x. A narrowband is a technique used in ………….. [1mk]
b) Name three advantages of using computer networks [3mk]
c) You have a 20-user, thin net, coaxial network that has been in use for a year. Three new
client computers are going to be added to the network. Your vendor installed the new
computer over the weekend, but when you came in the morning nobody could access the
server.
i. Highlight four things that could cause the network not to function [4mks]
ii. What could you do to resolve those causes [2mks]
d) You are required to give simple answers to the following questions:
i. Coaxial cable consists of a core made of solid or stranded………….. [1mk]
ii. UTP cable for data transmission up to 10Mbs is category……….. [1mk]
iii. The electronic signals that make up the data are actually carried by the ……… in the
coaxial cable [1mk]
iv. STP uses a foil wrap for ………….. [1mk]
v. Twisted-pair cabling uses ………….. telephone connectors to connect to a computer
[1mk]
vi. Fiber-optic cable transmissions are not subject to electrical …….. [1mk]
vii. Access methods prevent………. Access to the cable [1mk]
viii. Packets may contain session-control, code, such as error correction, that indicates the
need for a ………… [1mk]
ix. The basic topologies are ………, …….., ……. [2mks]
e) Describe the roles of Network Interface Card [4mks]
f) State and explain what can be done to speed up the movement of data through the network
card [7mks]
QUESTION TWO [20MKS]
a) Differentiate between Baseband and Broadband transmission [4mks]
b) The following are the IEEE 802 standards. Study and complete the table. [10mks]
802.x standard Basis for Standard
802.1 Internetworking
802.2 Logical Link Control
802.3
802.4
802.5
802.6
802.7
802.8 Fiber optic technologies
802.9 Hybrid Voice/Data network
802.10
802.11
802.12
802.13 Unused
802.14 Cable modem
802.15
802.16
c) Describe the following types of cables
i. Coaxial cable [2mks]
ii. Twisted pair cable [2mks]
iii. Fiber-optic cable [2mks]
QUESTION THREE [20MKS]
a) Define ODI and the role it plays in Novel Network Operating System (NOS) [3mks]
b) State and explain the network services provided by Windows NT to facilitate a smooth
running of the network [5mks]
c) Study and complete the table below [12mks]
Memorization Tool OSI layer Function
All Application Interaction at the user or application level
People
Seen
Need
Data
Process
QUESTION FOUR [20MKS]
a) Define
i. Data Encryption [2mks]
ii. Data Encryption standard [2mks]
b) Describe the ways by which unauthorized users can gain access to the networks [4mks]
c) Describe how unauthorized access to the network can be prevented [2mks]
d) The network at Sandimu Manufacturer’s site has been running well. However, a user in the
quality control division now calls you office as a system administrator to report that she is
unable to get the daily status report printed by the printer in the department, meanwhile, the
shipping department reports that a rerouted print job did not print in the quality control
department. What is your strategy for solving this problem? 10mks]
QUESTION FIVE [20MKS]
a) Briefly explain the following:
i. What is a MODEM [1mk]
ii. Functions of a MODEM [4mks]
iii. Characteristics of a MODEM [2mks]
b) Peer-to-peer Ethernet can be implemented in the form of either a physical bus or a physical
star, with these two topologies in mind:
i. Draw a logical bus with a physical bus [3mks]
ii. Draw a logical bus with a physical star [3mks]
c) Grace is a principal at Embaro polytechnic with three heads of departments. Each HOD has
a computer; she is wondering how computer network may increase efficiency and reduce
cost. Required:
i. What is your advice to Grace [2mks]
ii. Identify some of the documents that Grace might share with HODs
[2mks]
iii. How will you help Grace create the shared folder for the document you
identified [3mks]
More Question Papers