Wednesday 1 August 2012

MC0075,MCA-3,Computer Networks



MC0075,MCA-3,Computer Networks

1. In this mode datacan be transmitted in either direction, but not   at the same time.
(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) None
2. Turing the lime around needs special________ in the computer software and in the terminal and computer interface hardware.

(a) Mechanism
(b) Function
(c) Interfaces
(d) None

3. Systems which uses satellite communication mostly use the __________ mode of data
transmission.

(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) Any one of these

4. When data is send as electrical signals, the speed of the system is expressed numerically as the reciprocal of the _____________ of the shortest signal element.

(a) No. of bits
(b) Duration in seconds
(c) BPS
(d) None

5. BPS represent the ___________ capacity of the system
(a) Logical
(b) Physical
(c) Numerical
(d) Electrical

6. The main advantage of asynchronous serial transmission is that the character is self-contained
with all the information , & that the two ends (source & destination) of the link need not be_____

(a) asynchronous
(b) synchronized
(c) attached
(d) None

7. CTS stands for
(a) Clear-to-submit
(b) Clear-to-support
(c) Clear-to-send
(d) Clear-to-system

8.  __________ switching, it is required to set up an end to end path before any data can be sent.
(a) Circuit
(b) Message
(c) Packet
(d) All of these

9.  _________ switching technology,an upper limit for block size is kept.
(e) Circuit
(f) Message
(g) Packet
(h) All of these

10. The objective of a network include
(a) Centralized Management
(b) Provide distribution processing
(c) Modular enhancement of resources
(d) All of these

11. In ____________ switching becomes useless for interactive traffic.
(i) Circuit
(j) Message
(k) Packet
(l) All of these

12. A MAN can support
(a) Data
(b) Voice
(c) Both
(d) None

13. Topology is a term used to describe the ________ way in which connected in a network
(a)physical
(b)logical
(c) electrical
(d)mechanical

14. In this topology each machine manager both information processing and distribution of data files
(a)linear bus
(c)star
(b)ring
(d)all of these

15. This topology used to connect computers in any order.
(a) Mesh
(c) Tree
(b) Hybrid
(d) Star

16. Thus topology is most difficult topology to implement as the number of computers increases.
(a) Mesh
(c) tree
(b) Hybrid
(d) star

17. Thick coax is over a___________  7 in diameter.
(a)Micro meter
(c) Millimeter
(b) Centimeter
(d)Inch

18. Thin coax is of
(a) 100 Base 5
(b) 10 Base 2
(c) 10 Base T
(d) 10 Base FL

19. Level 3 UTP cables can support upto
(a) 100Mbps
(b) 58Mbps
(c) 20Mbps
(d) 16Mbps

20. If you are using coaxial cable for your network, you will not need the __________
(a) Hub
(b) Rooter
(c) Gateway
(d) Subnet

21. ALOHA was developed by
(e) Norman Abramson
(f) Normin Abramson
(g) Abrenhim Normin
(h) Abrenhim Norman

22. Cable laying plan provide good quality of ________________ sockets near the location of each computer.
(a) RJ54
(b) RJ55
(c) RJ44
(d) RJ45

23. The network layer is concerned with controlling the operation of the ___________
(a) Subnet
(b) Datalink layer
(c) Transport layer
(d) Network Layer

24. This layer make possible a faster host to communicate with a slower host.
(a) Network
(b) Transport
(c) Session
(d) Presentation

25.The network layer is concerned with controlling the operation of the __________

(a) Subnet (c) Transport layer
(b) Datalink layer (d) network layer

26. This layer make possible a faster host to communicate with a slower host.
(a) Network (c) session
(b) Transport (d) Presentation

27. The function of the layer includes accessing remote files, accessing remote databases, electronic mail etc.
(a) Application (c) Session
(b) Presentation (d) Transport

28. These 2 layers are not present in the TCP/IP
(a) Application & Presentation (c) Session & Transport
(b) Presentation & Session (d) Physical& data link layer

29. UDP works at _________ layer
(a) Physical (c) Transport
(b) Network (d) Application

30. CCP stands for
(a)Control Communication Processor (c) Central Communication Processor
(b) Communication Control Processor (d) Central Control Processor

31. RARP & RIP works at _______ layer
(a) Physical (c) Session
(b) Data link (d) Presentation

32. BSC is a _______ oriented protcol
(a) Bet (c) Frame
 (b) byte (d) Packet

33. Data transmission can be basically divided into following 5 phases.
1. Release data link
2. Establish Data link
3. Disconnect from Transmission line
4. Connect to transmission line
5. Transmit information

Arrange the steps in the order.
(a) 12345 (c) 14253
(b) 42513 (d) 41253

34. SDLC was developed by _________ in the mid 1970s
(a) IBM (c) Apple
(b) Microsoft (d) Macintosh

35. In a non procedure communication between PCs. The _________ code is generally used as the delimiter.
(a) ASCII (b) EBCDIC
(c) Carriage Return (d) all of these.

36. This control code denotes conclusion of one or more transmissions.
(a) ETX (b) EOT
(c) ENQ (d) ETB

37. Basic control procedure is not suitable for transmission of __________
(a) short amount of data at high speed (b) large amount of data at high speed
(c) short amount of data at low speed (d) large amount of data at low speed

38. In the basic control procedure, transmission code consists of _________ block.
(a) 1 (b) 2
(c) 3 (d) 4

39. In HDLC, data is sent in the form of ________
(a) bit (b) bytes
 (c) packets (d) frames

40. Arrange the order of fields in the supervisory frame.
1. Flag
2. FCS
3. Control
4. Address
5. Flag

(a) 12345 (b) 14325
(c) 12435 (d) 14325

41. The flag bit pattern in frame format of HDLC is ______________
(a) 0111110 (b) 01111111
(c) 01111110 (d) 11111111

42. Framing, addressing & error control are the functions of __________ layer.
(a) LLC (b) MAC
(c) Physical (d) Data Link

43. A token bus is a logically ordered group of communicating nodes which access the medium in a ____________ fashion.
(a) first come first serve (b) last in first out
(c) Round Robin (d) last in last out

44. This standard is used with ring structured LAN with star topology.
(a) IEEE 802.2 (b) IEEE 802.3
(c) IEEE 802.4 (d) IEEE 802.5

45. This standard deals with the network management aspects.
(a) 80201:A (b) 80201:C
(c) 80201:B (d) All of these

46. The American National Standards Institute Convened the ______ committee in an effort to develop standard for high speed LANS.
(a)X3T9.5 (b)T3X9.5
(c)T9X3.5 (d)T3X9.5

47. FDDI can be used in the same way as IEEE______LANS
(a)801 (b)802
(c)803 (d)804

48. FDDI uses ______ as transmission medium.
(a)twisted pair (b)co axial pair
(c)optical fiber (d)none of these



(1)They do not require filtering.
(2)They propagate signals through the network.
(3)They amplify signals.
49. These are the properties of
(a)repeaters (b)hub
(c)routers (d)bridges

50. Tick the wrong statement
(a)using repeater it is not possible to attach a large number of nodes to the network
(b)hub can filter the network traffic
(c)bridges operate at large  (d)all of these

51. Pick the wrong statement
(a)bridges control broadcasts to the network (b)bridges operate at layer 2.
(c)bridge filter network traffic by looking at the MAC address
(d)none of these

52. For rooting to be successful, each network must have a unique network number, this unique network number is incorporated into the _______ assigned to
(a)MAC address (b)IP address
(c)NIC (d)none

53. ________ cannot filter network traffic.
(a)hub (b)bridges
(c)routers (d)gateway

54. The length of IP address is
(a)8 bit (b)64 bit
(c)16 bit (d)32 bit

55. Subnet address help you to determine the class of ________.
(a)MAC address (b)IP address
(c)NIC (d)none

56. A IP address consists of _______ parts
(a)1 (b)2
(c)3 (d)4

57. If the starting bits of am IP address are 1110, then it is a _________ network address
(a)class A (b)class B
(c)class C (d)class D

58. In IP address, the values ______ are not used in the first octet for networking purposes
(a)255 (b)223 to 255
(c)224 to 255 (d)none

59. 172.12.0.2 is a ______ network IP address
(a)class A (b)class B
(c)class C (d)class D

60. A subnet address includes
(a)subnet number, network, host number (b)subnet number, host number, network number
(c)network number, host number, subnet number
(d)network number, subnet number, host number

61. In the class C network, if 2 bits are borrowed from the host field, the number of bits that can be used for host address declines to ________
(a)8 (b)7
(c)6 (d)5

62. IP address 128.0.0.0 to 191.255.255.255 belongs to _________
(a)class A (b)class B
(c)class C (d)class D

63. To ensure that the APR request packet will be seen by all the devices on the network, the source uses a _________ MAC address
(a)braad cast (b)point to point
(c)multicast (d)peer to peer

64. For physical address 00-04-A2-05-09-89, IP address will be
(a)192.168.0.2 (b)192.168.0.1
(c)192.168.0.3 (d)192.168.0.5

65. ARP is used to map __________.
(a)IP address to MAC address (b)MAC address to IP address
(c)IP address to NIC (d)MAC address NIC

66. Using ________ protocol source machine gets it’s own IP address
(a)ARP (b)RARP
(c)MAC (d)RARP server

67. The distance limitation imposed by the physical layer, multiplied by the number of devices, dictate the maximum size of a --------
(a)LAN (b)WAN
(c)multicast point (d)topology

68. A second tier ring ______ can be used to inter connect all the user level rings & to provide aggregated access to the WAN
(a)to ken bus (b)HDDL
(c)to ken ring (d)star

69. In a hierarchical combination topology, an ATM backbone is used to interconnect the user- level hubs. This ATM stands for
(a)asynchronous transfer machine (b) automatic transfer machine
(c) asynchronous transfer mode (d)automatic transfer mode

70. The LAN’s connection to the ________ provides WAN connectivity
(a)routers (b)bridges
(c)gateway (d)all of these

71. A collapsed backbone topology features centralized _______ that interconnected all the LAN segments in a building
(a)routers (b)bridges
(c)gateway (d)none of these

72. A building’s PBX room usually server as the center of its ______ .
(a)LAN (b)ring topology
(c) bus topology (d) wiring topology

73. Pick the odd one out
(a) identification (b) authentication
(c) actions (d) fire walls

74. Finger prints, voice print, hand size, signature are a type of ________
(a) remembered information (b)processed objects
(c) personal characteristics (d)all of these

75. In list oriented approach each resource has _________
(a)access control list (b)ticket & list
(c)verification control list (d)authentication list

76. The variables maintained by the agent in the respective managed nodes in SNMP literature is called ______.
(a)identifiers (b)class
(c)objects (d)keyboards

77. In this type of threat, the attacker can pose as a real host and communicate with another host to acquire data or
service
(a)message stream modification (b)denial of message service
(c)masquerade (d)Trojan horse

No comments:

Post a Comment