MC0075,MCA-3,Computer Networks
1. In
this mode datacan be transmitted in either direction, but not at the same time.
(a)
Simplex
(b) Half
Duplex
(c) Full
Duplex
(d) None
2. Turing
the lime around needs special________ in the computer software and in the
terminal and computer interface hardware.
(a)
Mechanism
(b)
Function
(c)
Interfaces
(d) None
3.
Systems which uses satellite communication mostly use the __________ mode of
data
transmission.
(a)
Simplex
(b) Half
Duplex
(c) Full
Duplex
(d) Any
one of these
4. When
data is send as electrical signals, the speed of the system is expressed
numerically as the reciprocal of the _____________ of the shortest signal
element.
(a) No.
of bits
(b)
Duration in seconds
(c) BPS
(d) None
5. BPS
represent the ___________ capacity of the system
(a)
Logical
(b)
Physical
(c)
Numerical
(d)
Electrical
6. The
main advantage of asynchronous serial transmission is that the character is
self-contained
with all
the information , & that the two ends (source & destination) of the
link need not be_____
(a)
asynchronous
(b)
synchronized
(c)
attached
(d) None
7. CTS
stands for
(a)
Clear-to-submit
(b)
Clear-to-support
(c)
Clear-to-send
(d)
Clear-to-system
8. __________ switching, it is required to set
up an end to end path before any data can be sent.
(a)
Circuit
(b)
Message
(c)
Packet
(d) All
of these
9. _________ switching technology,an upper limit
for block size is kept.
(e)
Circuit
(f)
Message
(g)
Packet
(h) All
of these
10. The
objective of a network include
(a) Centralized
Management
(b)
Provide distribution processing
(c)
Modular enhancement of resources
(d) All
of these
11. In
____________ switching becomes useless for interactive traffic.
(i)
Circuit
(j)
Message
(k)
Packet
(l) All
of these
12. A MAN
can support
(a) Data
(b) Voice
(c) Both
(d) None
13.
Topology is a term used to describe the ________ way in which connected in a
network
(a)physical
(b)logical
(c)
electrical
(d)mechanical
14. In
this topology each machine manager both information processing and distribution
of data files
(a)linear
bus
(c)star
(b)ring
(d)all of
these
15. This
topology used to connect computers in any order.
(a) Mesh
(c) Tree
(b)
Hybrid
(d) Star
16. Thus
topology is most difficult topology to implement as the number of computers increases.
(a) Mesh
(c) tree
(b)
Hybrid
(d) star
17. Thick
coax is over a___________ 7 in diameter.
(a)Micro
meter
(c)
Millimeter
(b)
Centimeter
(d)Inch
18. Thin
coax is of
(a) 100
Base 5
(b) 10
Base 2
(c) 10
Base T
(d) 10
Base FL
19. Level
3 UTP cables can support upto
(a)
100Mbps
(b)
58Mbps
(c)
20Mbps
(d)
16Mbps
20. If
you are using coaxial cable for your network, you will not need the __________
(a) Hub
(b)
Rooter
(c)
Gateway
(d)
Subnet
21. ALOHA
was developed by
(e)
Norman Abramson
(f)
Normin Abramson
(g)
Abrenhim Normin
(h)
Abrenhim Norman
22. Cable
laying plan provide good quality of ________________ sockets near the location
of each computer.
(a) RJ54
(b) RJ55
(c) RJ44
(d) RJ45
23. The
network layer is concerned with controlling the operation of the ___________
(a)
Subnet
(b)
Datalink layer
(c)
Transport layer
(d)
Network Layer
24. This
layer make possible a faster host to communicate with a slower host.
(a)
Network
(b)
Transport
(c)
Session
(d)
Presentation
25.The
network layer is concerned with controlling the operation of the __________
(a)
Subnet (c) Transport layer
(b)
Datalink layer (d) network layer
26. This
layer make possible a faster host to communicate with a slower host.
(a)
Network (c) session
(b)
Transport (d) Presentation
27. The
function of the layer includes accessing remote files, accessing remote
databases, electronic mail etc.
(a)
Application (c) Session
(b)
Presentation (d) Transport
28. These
2 layers are not present in the TCP/IP
(a)
Application & Presentation (c) Session & Transport
(b)
Presentation & Session (d) Physical& data link layer
29. UDP
works at _________ layer
(a)
Physical (c) Transport
(b)
Network (d) Application
30. CCP
stands for
(a)Control
Communication Processor (c) Central Communication Processor
(b) Communication
Control Processor (d) Central Control Processor
31. RARP
& RIP works at _______ layer
(a)
Physical (c) Session
(b) Data
link (d) Presentation
32. BSC
is a _______ oriented protcol
(a) Bet
(c) Frame
(b) byte (d) Packet
33. Data
transmission can be basically divided into following 5 phases.
1.
Release data link
2.
Establish Data link
3.
Disconnect from Transmission line
4.
Connect to transmission line
5.
Transmit information
Arrange
the steps in the order.
(a) 12345
(c) 14253
(b) 42513
(d) 41253
34. SDLC
was developed by _________ in the mid 1970s
(a) IBM
(c) Apple
(b)
Microsoft (d) Macintosh
35. In a
non procedure communication between PCs. The _________ code is generally used
as the delimiter.
(a) ASCII
(b) EBCDIC
(c)
Carriage Return (d) all of these.
36. This
control code denotes conclusion of one or more transmissions.
(a) ETX
(b) EOT
(c) ENQ
(d) ETB
37. Basic
control procedure is not suitable for transmission of __________
(a) short
amount of data at high speed (b) large amount of data at high speed
(c) short
amount of data at low speed (d) large amount of data at low speed
38. In
the basic control procedure, transmission code consists of _________ block.
(a) 1 (b)
2
(c) 3 (d)
4
39. In
HDLC, data is sent in the form of ________
(a) bit
(b) bytes
(c) packets (d) frames
40.
Arrange the order of fields in the supervisory frame.
1. Flag
2. FCS
3.
Control
4.
Address
5. Flag
(a) 12345
(b) 14325
(c) 12435
(d) 14325
41. The
flag bit pattern in frame format of HDLC is ______________
(a) 0111110
(b) 01111111
(c)
01111110 (d) 11111111
42.
Framing, addressing & error control are the functions of __________ layer.
(a) LLC
(b) MAC
(c)
Physical (d) Data Link
43. A
token bus is a logically ordered group of communicating nodes which access the
medium in a ____________ fashion.
(a) first
come first serve (b) last in first out
(c) Round
Robin (d) last in last out
44. This
standard is used with ring structured LAN with star topology.
(a) IEEE
802.2 (b) IEEE 802.3
(c) IEEE
802.4 (d) IEEE 802.5
45. This
standard deals with the network management aspects.
(a)
80201:A (b) 80201:C
(c)
80201:B (d) All of these
46. The
American National Standards Institute Convened the ______ committee in an
effort to develop standard for high speed LANS.
(a)X3T9.5
(b)T3X9.5
(c)T9X3.5
(d)T3X9.5
47. FDDI
can be used in the same way as IEEE______LANS
(a)801
(b)802
(c)803
(d)804
48. FDDI
uses ______ as transmission medium.
(a)twisted
pair (b)co axial pair
(c)optical
fiber (d)none of these
(1)They
do not require filtering.
(2)They
propagate signals through the network.
(3)They
amplify signals.
49. These
are the properties of
(a)repeaters
(b)hub
(c)routers
(d)bridges
50. Tick
the wrong statement
(a)using
repeater it is not possible to attach a large number of nodes to the network
(b)hub
can filter the network traffic
(c)bridges
operate at large (d)all of these
51. Pick
the wrong statement
(a)bridges
control broadcasts to the network (b)bridges operate at layer 2.
(c)bridge
filter network traffic by looking at the MAC address
(d)none
of these
52. For
rooting to be successful, each network must have a unique network number, this
unique network number is incorporated into the _______ assigned to
(a)MAC
address (b)IP address
(c)NIC
(d)none
53. ________
cannot filter network traffic.
(a)hub
(b)bridges
(c)routers
(d)gateway
54. The
length of IP address is
(a)8 bit
(b)64 bit
(c)16 bit
(d)32 bit
55. Subnet
address help you to determine the class of ________.
(a)MAC
address (b)IP address
(c)NIC
(d)none
56. A IP
address consists of _______ parts
(a)1 (b)2
(c)3 (d)4
57. If
the starting bits of am IP address are 1110, then it is a _________ network
address
(a)class
A (b)class B
(c)class
C (d)class D
58. In IP
address, the values ______ are not used in the first octet for networking
purposes
(a)255
(b)223 to 255
(c)224 to
255 (d)none
59. 172.12.0.2
is a ______ network IP address
(a)class
A (b)class B
(c)class
C (d)class D
60. A
subnet address includes
(a)subnet
number, network, host number (b)subnet number, host number, network number
(c)network
number, host number, subnet number
(d)network
number, subnet number, host number
61. In
the class C network, if 2 bits are borrowed from the host field, the number of
bits that can be used for host address declines to ________
(a)8 (b)7
(c)6 (d)5
62. IP
address 128.0.0.0 to 191.255.255.255 belongs to _________
(a)class
A (b)class B
(c)class
C (d)class D
63. To
ensure that the APR request packet will be seen by all the devices on the
network, the source uses a _________ MAC address
(a)braad
cast (b)point to point
(c)multicast
(d)peer to peer
64. For
physical address 00-04-A2-05-09-89, IP address will be
(a)192.168.0.2
(b)192.168.0.1
(c)192.168.0.3
(d)192.168.0.5
65. ARP
is used to map __________.
(a)IP
address to MAC address (b)MAC address to IP address
(c)IP
address to NIC (d)MAC address NIC
66. Using
________ protocol source machine gets it’s own IP address
(a)ARP
(b)RARP
(c)MAC
(d)RARP server
67. The
distance limitation imposed by the physical layer, multiplied by the number of
devices, dictate the maximum size of a --------
(a)LAN
(b)WAN
(c)multicast
point (d)topology
68. A
second tier ring ______ can be used to inter connect all the user level rings
& to provide aggregated access to the WAN
(a)to ken
bus (b)HDDL
(c)to ken
ring (d)star
69. In a
hierarchical combination topology, an ATM backbone is used to interconnect the
user- level hubs. This ATM stands for
(a)asynchronous
transfer machine (b) automatic transfer machine
(c)
asynchronous transfer mode (d)automatic transfer mode
70. The
LAN’s connection to the ________ provides WAN connectivity
(a)routers
(b)bridges
(c)gateway
(d)all of these
71. A
collapsed backbone topology features centralized _______ that interconnected
all the LAN segments in a building
(a)routers
(b)bridges
(c)gateway
(d)none of these
72. A
building’s PBX room usually server as the center of its ______ .
(a)LAN
(b)ring topology
(c) bus
topology (d) wiring topology
73. Pick
the odd one out
(a)
identification (b) authentication
(c)
actions (d) fire walls
74. Finger
prints, voice print, hand size, signature are a type of ________
(a)
remembered information (b)processed objects
(c)
personal characteristics (d)all of these
75. In
list oriented approach each resource has _________
(a)access
control list (b)ticket & list
(c)verification
control list (d)authentication list
76. The
variables maintained by the agent in the respective managed nodes in SNMP
literature is called ______.
(a)identifiers
(b)class
(c)objects
(d)keyboards
77. In
this type of threat, the attacker can pose as a real host and communicate with
another host to acquire data or
service
(a)message
stream modification (b)denial of message service
(c)masquerade
(d)Trojan horse
No comments:
Post a Comment