Get premium membership and access revision papers, questions with answers as well as video lessons.

Introduction To Computer Networks (Bbit 241) (Cisy 131) 2Nd Trimester 2014 Question Paper

Introduction To Computer Networks (Bbit 241) (Cisy 131) 2Nd Trimester 2014 

Course:Bachelor Of Business Information Technology

Institution: Kenya Methodist University question papers

Exam Year:2014



INTRODUCTION TO COMPUTER NETWORKS (BBIT 241) (CISY 131) 2ND TRIMESTER 2014
KENYA METHODIST UNIVERSITY

END OF 2'ND 'TRIMESTER 2014 (DAY) EXAMINATION

FACULTY : COMPUTING & INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 241/CISY 131
UNIT TITLE : INTRODUCTION TO COMPUTER NETWORKS
TIME : 2 HOURS


Instructions:

Question One

In a small scale LAN a computer is connected to a LAN switch is then connected to the rooter is connected to a second LAN switch. A server is then connected to this second switch. Determine which layer of the OSI reference model that the devices are used within.
The computer/server
The LAN switches
The rooter
(6mks)
What is the difference between a router and switch?
(4mks)
Explain the following switching techniques
Message switching
Packet switching
Circuit switching
(6mks)
Differentiate between thinnet and thicket coaxial cables. (4mks)
With the help of a network diagram, highlight the functions of the following devices: a switch, a router, a hub, a NK and a modem.
(10mks)


Question Two
Compare the OSI model with the TCP/IP protocol suite.
(8mks)
Distinguish between congestion control and flow control as used in computer networks.
(3mks)
How is performance improved in CSMA/CD protocol compared to CSMP/CA protocols.
(5mks)
Distinguish between UDP and TCP. Protocols.
(8mks)


Question Three
Identify the errors that arise during computer network communication.
(10mks)
Identify three logical protocols used in computer networking. (6mks)
What are the main advantages of infrared as a medium of communication.
(4mks)

Question Four
Identify the computer networking elements and briefly describe them.
(6mks)
User data gram protocol is used for particular communication. Justify the use of these protocol.
(4mks)
Why is framing necessary? Explain five framing techniques.
(10mks)






More Question Papers


Popular Exams


Mid Term Exams

End Term 1 Exams

End Term 3 Exams

Opener Exams

Full Set Exams



Return to Question Papers