45
COMPUTER NETWORKS MULTIPLE CHOICE QUESTIONS AND ANSWERS 1. If a computer on the network shares resources for others to use, it is called ____ a. Server b. Client c. Mainframe Answer : a 2. Terminators are used in ______ topology. a. Bus b. Star Answer : a 3. In _____ topology, if a computer’s network cable is broken, whole network goes down. a. Bus b. Star Answer : a 4. For large networks, _______ topology is used. a. Bus b. Star c. Ring Answer : b 5. ISO stands for a. International Standard Organization b. International Student Organization c. Integrated Services Organization Answer : a 6. ISO OSI model is used in a. Stand alone PC b. Network environment Answer : b

cn-bits

Embed Size (px)

Citation preview

Page 1: cn-bits

COMPUTER NETWORKS MULTIPLE CHOICE QUESTIONS AND ANSWERS

1. If a computer on the network shares resources for others to use, it is called ____a. Serverb. Clientc. MainframeAnswer : a

2. Terminators are used in ______ topology.a. Busb. StarAnswer : a

3. In _____ topology, if a computer’s network cable is broken, whole network goes down.a. Busb. StarAnswer : a

4. For large networks, _______ topology is used.a. Busb. Starc. RingAnswer : b

5. ISO stands fora. International Standard Organizationb. International Student Organizationc. Integrated Services OrganizationAnswer : a

6. ISO OSI model is used ina. Stand alone PCb. Network environmentAnswer : b7. Network cable lies on _____ layera. Applicationb. Networkc. PhysicalAnswer : c8. ____ layer decides which physical pathway the data should take.a. Applicationb. Networkc. Physical

Page 2: cn-bits

Answer : c

9. ISDN is an example of ______ networka. Circuit switchedb. Packet switchedAnswer : a

10. X.25 is an example of ______ networka. Circuit switchedb. Packet switchedAnswer : b

11. _____________ allows LAN users to share computer programs and data.a. Communication serverb. Print serverc. File serverAnswer : c

12. Print server uses ________ which is a buffer that holds data before it is send to the printer.a. Queueb. Spoolc. NodeAnswer : b

13. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of____a. LAN intrinsic softwareb. LAN aware softwarec. Groupwared. LAN ignorant softwareAnswer : a

14. The ______ portion of LAN management software restricts access, records user activities and audit data etc.a. Configuration managementb. Security managementc. Performance managementAnswer : b

15. What is the max cable length of STP?a. 100 ftb. 200 ftc. 100 md. 200 mAnswer : d

Page 3: cn-bits

16. What is the max data capacity of STP?a. 10 mbpsb. 100 mbpsc. 1000 mbpsd. 10000 mbpsAnswer : b

17. Which connector STP uses?a. BNCb. RJ-11c. RJ-45d. RJ-69Answer : c

18. What is the central device in star topology?a. STP serverb. Hub/switchc. PDCd. RouterAnswer : b

19. What is max data capacity for optical fiber cable?a. 10 mbpsb. 100 mbpsc. 1000 mbpsd. 10000 mbpsAnswer : c

20. Which of the following architecture uses CSMA/CD access method?a. ARCnetb. EthernetAnswer : b

21. In OSI network architecture, the dialogue control and token management are responsibility of

a. session layer

b. network layer

c. transport layer

d. data link layer

e. none of above

Answer: a

 

Page 4: cn-bits

22. In OSI network architecture, the routing is performed by

a. network layer

b. data link layer

c. transport layer

d. session layer

e. none of above

 Answer : a

23. Which of the following performs modulation and demodulation?

a. fiber optics

b. satellite

c. coaxial cable

d. modem

e. none of the above

 Answer: d

24.The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as:

a. modulation

b. demodulation

c. synchronizing

d. digitising

 Answer: d

25.How many OSI layers are covered in the X.25 standard?

a. Two

b. Three

c. Seven

d. Six

e. None of above

Answer: b

Page 5: cn-bits

 

26.Layer one of the OSI model is

a. physical layer

b. link layer

c. transport layer

d. internet work layer

e. none of above

 Answer: a

27.The x.25 standard specifies a 

a. technique for start-stop data

b. technique for dial access

c. DTE/DCE interface

d. data bit rate

e. none of above

Answer: c

 

28.Which of the following communication modes support two-way traffic but in only one direction at a time?

a. simplex

b. half duplex

c. three-quarters duplex

d. all of the above

e. none of the above

Answer: b

 

Page 6: cn-bits

29.Which of the following might be used by a company to satisfy its growing communications

needs?

a. front end processor

b. multiplexer

c. controller

d. concentrator

e. all of the above

 Answer: e

30. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard?

a. 4

b. 2

c. 6

d. 3

e. none of the above

Answer: d

31. The interactive transmission of data within a time sharing system may be best suited to 

a. simplex lines

b. half-duplex lines

c. full duplex lines

d. biflex-lines

Answer: b

 

32.Which of the following statement is incorrect?

Page 7: cn-bits

a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission.

b. Half duplex line is a communication line in which data can move in two directions, but not at the same time.

c. Teleprocessing combines telecommunications and DP techniques in online activities

d. Batch processing is the prefered processing mode for telecommunication operation.

 Answer: d

33.Which of hte following is considered a broad band communication channel?

a. coaxial cable

b. fiber optics cable

c. microwave circuits

d. all of above

 Answer: d

Question 4:

34.Which of the following is not a transmission medium?

a. telephone lines

b. coaxial cables

c. modem

d. microwave systems

Answer: c

 

35.Which of the following does not allow multiple uses or devices to share one communication line?

a. doubleplexer

Page 8: cn-bits

b. multiplexer

c. concentrator

d. controller

 Answer: a

36.Which of the following signal is not standard RS-232-C signal?

a. VDR

b. RTS

c. CTS

d. DSR

Answer:  a

37.Which of the following statement is incorrect?

a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line

b. HDLC is a standard synchronous communication protocol.

c. RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data

d. RTS/CTS is the way the terminal indicates ringing

 Answer: d

38.Which of the following is an advantage to using fiber optics data transmission?

a. resistance to data theft

b. fast data transmission rate

c. low noise level

d. all of above

 Answer: d

39.Which of the following is required to communicate between two computers?

a. communications software

b. protocol

c. communication hardware

Page 9: cn-bits

d. all of above including access to transmission medium

 Answer: d

40.The transmission signal coding method of TI carrier is called

a. Bipolar

b. NRZ

c. Manchester

d. Binary

 Answer: a

41. Which data communication method is used to transmit the data over a serial communication link?

a. simplex

b. half-duplex

c. full-duplex

d. b and c

e. None of above

 Answer: c

42.What is the minimum number of wires needed to send data over a serial communication link layer?

a. 1

b. 2

c. 4

d. 6

e. none of above

Answer: b

 

43.Which of the following types of channels moves data relatively slowly?

a. wide band channel

b. voice band challen

Page 10: cn-bits

c. narrow band channel

Answer: c

 

44.Most data communications involving telegraph lines use:

a. simplex lines

b. wideband channel

c. narrowband channel

d. dialed service

Answer: c

 

45.A communications device that combines transmissions from several I/O devices into one line is a 

a. concentrator

b. modifier

c. multiplexer

d. full-duplex line

Answer: c

 

46.How much power (roughly) a light emitting diode can couple into an optical fiber?

a. 100 microwatts

b. 440 microwatts

c. 100 picowatts

d. 10 miliwatts

 Answer: a

47.The synchronous modems are more costly than the asynchronous modems because

Page 11: cn-bits

a. they produce large volume of data

b. they contain clock recovery circuits

c. they transmit the data with stop and start bits

d. they operate with a larger bandwidth

e. none of above

Answer: b

 

48.Which of the following statement is correct?

a. terminal section of a synchronous modem contains the scrambler

b. receiver section of a synchronous modem contains the scrambler

c. transmission section of a synchronous modem contains the scrambler

d. control section of a synchronous modem contains the scrambler

e. none of the above

 Answer: c

49.In a synchronous modem, the digital-to-analog converter transmits signal to the 

a. equilizer

b. modulator

c. demodulator

d. terminal

e. none of aobve

 Answer: a

50.Which of the following communications lines is best suited to interactive processing applications?

a. narrow band channel

b. simplex lines

c. full duplex lines

d. mixed band channels

Page 12: cn-bits

  Answer: c

51. A remote batch-processing operation in which data is solely input to a central computer would require

a. telegraphp line

b. simplex lines

c. mixed bad channel

d. all of above

 Answer: b

52.A band is always equivalent to 

a. a byte

b. a bit

c. 100 bits

d. none of above

 Answer: d

53.The loss in signal power as light travels down the fiber is called

a. attenuation

b. progragation

c. scattering

d. interruption

 Answer: a

54.Avalanche photodiode receivers can detect bits of transmitted data by receiving

a. 100 photons

b. 200 photons

c. 2000 photons

d. 300 photons

 Answer: b

Page 13: cn-bits

55.Communiction circuits that transmit data in both directions but not at the same time are operating in

a. a simplex mode

b. a half duplex mode

c. a full duplex mode

d. an asynchronous mode

 Answer: b

56.An example of a medium speed, switched communications service is

a. series 1000

b. data phone 50

c. DDD

d. All of the above

Answer: c

 57.In communication satellite, multiple repeaters are known as

a. detector

b. modulator

c. stations

d. transponders

 Answer: d

58.While transmitting odd-parity coded symbols, the number of zeros in each symbol is

a. odd

b. even

c. a and b both

d. unknown

 Answer: d

59.Data communications monitors available on the software marked include

a. ENVIRON/1

Page 14: cn-bits

b. TOTAL

c. BPL

d. Telnet

Answer: a

 

60.An example of an analog communication method is

a. laser beam

b. microwave

c. voice grade telephone line

d. all of the above

Answer: d

 

61.Number of bits per symbol used in Baudot code is

a. 7

b. 5

c. 8

d. 9

 Answer: b

62.What is the main difference between DDCMP and SDLC?

a. DDCMP does not need special hardware to final the beginning of a message

b. DDCMP has a message header

c. SDLC has a IP address

d. SDLC does not use CRC

 Answer: a

63.An example of digital, rather than analog, communication is

Page 15: cn-bits

a. DDD

b. DDS

c. WATS

d. DDT

 Answer: b

64.Terminals are required for 

a. real-time, batch processing & time-sharing

b. real time, time-sharing & distributed message processing

c. real time, distributed processing & manager inquiry

d. real-time,  time sharing & message switching

 Answer: d

65.The receive equilizer reduces delay distortions using a

a. tapped delay lines

b. gearshift

c. descrambler

d. difference engine

 Answer: a

66.Ina synchronous modem, the receive equilizer is known as

a. adaptive equilizer

b. impariment equilizer

c. statistical equilizer

d. compromise equilizer 

 Answer: a

67.The channel in the data communication model can be

a. postal mail services

b. telephone lines

c. radio lines

d. any of the above

 Answer: d

68.A data terminal serves as an

a. Effector

b. sensor

c. both a and b

d. neither a nor b

Page 16: cn-bits

 Answer: c

69.Which of the following transmission systems provide the highest data rate to in individual device?

a. computer bus

b. telephone lines

c. voice and mode

d. lease lines

 Answer: a

70.A protocol is a set of rules governing a time sequence of events that must take place

a. between peers

b. between an interface

c. between modems

d. across an interface

 Answer: a

71.The model that shows how the network function of a computer ought to be organised?a.ITU-Tb.OSIc.ISOd.ANSIAns:b

72.The OSI model consists of how many layers?a.threeb.fivec.sevend.eightAns:c

73.which layer decides the location of synchronization points?a.transportb.sessionc.presentationd.applicationAns:b

74.The end-to-end delivery of the entire message is the responsibility of which layer?a.networkb.transportc.sessiond.presentationAns:b

Page 17: cn-bits

75.Which layer is the layer closest to the transmission medium?a.physicalb.data linkc.networkd.transportAns:a

76.In which layer the data unit is called a frame?a.physicalb.datalinkc.networkd.transport Ans:b

77.Decryption and encryption of data are the responsibility of which layer?a.physicalb.datalinkc.presentationd.sessionAns:c

78.Dialog control is a function of which layer?a.transportb.sessionc.presentationd.applicationAns:b

79.Mail services and directory services are available to network users through which layer?a.datalinkb.sessionc.transportd.applicationAns:d

80.Node-to-node delivery of the data unit is the responsibility of which layer?a.physicalb.datalinkc.transportd.networkAns:b

81.As the data packet moves from the lower to the upper layers then headers are?a.addedb.subtracted

Page 18: cn-bits

c.rearrangedd.modifiedAns:a

82.As the data packet moves from the upper to the lower then headers are?a.addedb.removedc.rearrangedd.modifiedAns:b

83.which layer lies between the network and the session layer?a.physicalb.datalinkc.transportd.presentationAns:c

84.layer2 lies between the physical layer and which layer?a.networkb.datalinkc.transportd.presentationAns:a

85.when data are transmitted from device A to device B,the header from A'slayer 5 is read by B's which layer?a.physicalb.transportc.sessiond.presentationAns:c

86.In which layer ,translations from one character code to another occur?a.transportb.sessionc.presentationd.applicationAns:c

87.which layer changes bits into electromagnetic signals?a.physicalb.datalinkc.transportd.presentationAns:a

Page 19: cn-bits

88.which layer can use the trailer of the frame for error detection?a.physicalb.datalinkc.transportd.presentationAns:b

89.why was OSI model was developed?a.Manufactures disliked the TCP/IP protocol suiteb.The rate of data transfer was increasing exponentiallyc.standards were needed to allow any two systems to communicated.none of the aboveAns:c

90.which physical layer is concerned with the transmission over the physical medium?a.programs b.dialogsc.protocolsd.bitsAns:d

91.which layer functions as a liaison between user support layers and network support layers?a.network layerb.physical layerc.transport layerd.session layerAns:c

92.what is the main function of the transport layer?a.node-to-node deliveryb.end-to-end message deliveryc.synchronizationd.updating and maintenance of routing tablesAns:b

93.session layer checkpoints?a.allow just a portion of a file to be resentb.detect and recover errorsc.control and addition of headersd.are involved in dialog controlAns:a

94.which of the following is an application layer service?a.network virual terminalb.file transfer,access,and management

Page 20: cn-bits

c.mail serviced.all of the aboveAns:d UNIT-2

95.In CSMA/CD,the number of collisions is how much that in MAa.greater thanb.less thanc.equal tod.twiceAns:b

96.In Ethernet,the source address field in the MAC frame is which address?a.the original sender's physicalb.the previous station's physicalc.the next destination's physicald.the original sender's service portAns:a

97.which uses a physical star topology?a.10base5b.10base2c.10baseTd.none of the aboveAns:c

98.10Base2 and 10Base5 uses which cable?a.thick coaxial,thin coaxialb.twisted-pair,thick coaxialc.thin coaxial,thick coaxialD.fiber-optic,thin coaxialAns:c

99.10Base2 and 10Base5 have different ?a.signal band typesb.fields on the 802.3 framec.maximum segment lengthsd.maximum data ratesAns:c

100.which specifies a star topology featuring a central hub and daisy chaininig?a.10Base5b.10Base2c.10Base-Td.1Base5

Page 21: cn-bits

Ans:c

101.which of the following is not a transceiver function?a.transmission and receipt of datab.checking of line voltagesc.addition and subtraction of headersd.collision detectionAns:c

102.The collision domain is the what distance that data travels between two stations?a.minimumb.maximumc.virtuald.a and bAns:b

103.The collision domain of traditional Ethernet and Fast Ethernet is how much meters?a.250,250b.250,2500c.2500,250d.2500,2500Ans:c

104.In an Ethernet network,if the round-trip time rate is how much such that the collision domain is how much?a.increases,decreasesb.decreases,decreasesc.decreases,increasesd.none of the aboveAns:b

105.The station-to-hub distance is 2000 meters in what?a.100Base-TXb.100Base-FXc.100Base-T4d.100Base-T1Ans:b

106.which uses an 8B/6T encoding schemea.100Base-TXb.100Base-FXc.100Base-T4d.100Base-T1Ans:c

Page 22: cn-bits

107.Gigabit Ethernet has a what data rate than Fast Ethernet and which collision domain?a.higher,higherb.lower,lowerc.lower,lowerd.lower,higherAns:b

108.100Base-x differs from 100Base-T4 in?a.the data transmission rateb.topologyc.the frame formatd.the number of cables between the station and the hubAns:a

109. .Which of the following is not an internetworking device?

a. Bridge

b. Repeater c. Router

d. Cable

110. LAN's can be connected by a device called _ _ _ _ _ _ _ _ _

a. Routers b. Modems

c. Ethernet card

d. Bridges

111. A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2- hours. The time required for the transfer is _ _ _ _ _ _ _ _ hours if synchronization is not provided

a. 12 hours

b. 3 hours

c. Zero hours

d. Infinite

112. The information related to multi-programmed hosts is placed in the header of _ _ _ _ _ _ _ Layer

a. Application layer b. Transport Layer

Page 23: cn-bits

c. Session layer d. Network Layer.

113. The _ _ _ _ _ _ _ _ _ _ Layer is a true end to end layer , from source to destination.

a. Network Layer.

b. Data Link Layer

c. Data Layer

d. Transport Layer

114. The operation of subnet is controlled by _ _ _ _ _ _ _

a. Network Layer.

b. Data Link Layer

c. Data Layer

d. Transport Layer

115. Accounting Functions are the responsibility

of _ _ _ _ _ _ _ _ _ _ Layer

a. Network Layer.

b. Data Link Layer

c. Data Layer

d. Transport Layer

116. Which one of the following is correct??

a. Character - represented by One's Complement

b. Character - represented by Two's Complement c. Integer - represented by ASCII

d. Character - represented by Unicode

117. Multiplexing and Demultiplexing of Network connections is by _ _ _ _ _ _ Layer

a. Network Layer. b. Data Layer

Page 24: cn-bits

c. Data Link Layer

d. Transport Layer

118. Two sides cannot attempt the same operation at the same time. This property is accomplished by _ _ _ _ _ _ _ _ _ _ Layer

a. Session Layer b. Transport Layer c. Physical Layer d. Network Layer

119. The number of layers in the OSI model is _ _ _ _ _ _ _

a. 5 b. 4 c. 7 d. 8

120._ _ _ _ _ _ _ Layer contains network virtual terminal

a. Application layer

b. Session layer

c. Presentation layer d. Data Link Layer

121.A cable break in a _ _ _ _ _ _ _ _ _ topology stops all

transmission

a. bus

b. mesh c. star

d. primary

122.Which topology requires a central controller or hub?

a. mesh b. star c. bus

d. ring

123.Which topology requires a multipoint connection?

a. mesh b. star

Page 25: cn-bits

c. bus

d. ring

124.Communication between a computer and a

keyboard involves _ _ _ _ _ _ _ _ _ transmission

a. Simplex

b. half-duplex

c. full-duplex

d. automatic

125.A tree topology is a variation of a _ _ _ _ _ _ _ _ _ topology.

a. mesh

b. star

c. bus

d. ring

126.In a _ _ _ _ _ _ _ _ _ _ _ _ topology, if there are n devices in anetwork, each device has n-1 port for cables

a. mesh

b. star

c. bus d. ring

127.A _ _ _ _ _ _ _ _ _ _ _ connection provides a

dedicated link between two devices.

a. point - to - point

b. multipoint

c. primary

d. Secondary

128.In a _ _ _ _ _ _ _ _ _ _ connection, more than two devices can share a single link.

Page 26: cn-bits

a. point - to - point

b. multipoint c. primary

d. Secondary

129.In _ _ _ _ _ _ _ _ _ _ _ transmission, the channel capacity is shared by both communicating devices at all times. a. Simplex

b. half-duplex

c. full-duplex

d. automatic

130.Which Protocol is used for electronic mail ?

a. TELNET

b. NNTP c. HTTP

d. SMTP

131.Which of the following is the Layers of TCP/IP model??

a. Physical, Network, Transport, Application

b. Host to Network, Network, Presentation, Application

c. Host to Network, Internet, Transport, Application

d. Physical, Internet, Session, Application

132.Which Layer contains High-level protocols in TCP/IP model??

a. Application

b. Presentation

c. Transport

d. Internet

133.The IP in TCP/IP uses _ _ _ _ _ _ _ _ bit

addresses but IPX in Novell Netware uses _ _ _

bit addresses

Page 27: cn-bits

a. 4, 12

b. 12, 4

c. 8, 16

d. 16, 8

134.In the earlier ARPA NET each node of network consisted

a. TIP & a host

b. BBN & a host

c. IMP & a host

d. SAP & a host

135.Novell Netware is based on _ _ _ _ _ _ _ _ _ _ a. XNS

b. OSI

c. TCP/IP

d. TIP

136.The protocols used in Transport layer of Novell Netware _ _ _ _ _ _ _ _

a. NCP & SAP b. NCP & IPX c. NCP & SPX d. NCP & TIP

137.IPX in Novell Netware is functionally

similar to _ _ _ _ _ _ _ _ _ _ Protocol

a. TCP

b. IP

c. UDP

d. SAP

138.The address in Novell Netware contains

a. 32- bit Network Number, 48-bit Machine Number & 16-bit Local address

b. 16- bit Network Number, 32-bit Machine Number & 48-bit Local address

Page 28: cn-bits

c. 48- bit Network number, 16-bit Machine Number & 32-bit Local address d. 16- bit Network Number, 48-bit Machine Number & 32-bit Local address

139.The physical layer of Novell Netware

consists of _ _ _ _ _ _ _ _ _ _ _ protocol

a. IPX

b. NCP

c. SAP

d. ARC NET

140.The connection oriented transport protocol in

Novell Netware is _ _ _ _ _ _ _ _ _

a. NCP

b. IPX

c. SAP

d. Ethernet

141.Which of the following is not a characteristic of LAN

a. Size

b. Transmission Technology c. Topology

d. Routers

142.In static allocation of channel in LAN

Broadcast Networks _ _ _ _ _ _ _ _ _ _ algorithm is

used

a. FCFS

b. Round Robin

c. Shortest Frame first d. High priority first

143.In _ _ _ _ _ _ _ _ _ Network, there is a

Page 29: cn-bits

broadcast medium to which all computers are

attached

a. MAN

b. LAN

c. WAN d. Broadcast Networks

144.Privately owned networks are _ _ _ _ _ _ _ _

a. MAN b. LAN c. WAN

d. Broadcast Networks

145.Worst-case time is bounded in _ _ _ _ _ _ _ _ _ _

a. LAN b. MAN c. WAN

d. Broadcast Networks

146._ _ _ _ _ _ Broadcast Networks can be divided into Static and dynamic depending on channel allocation

a. MAN

b. LAN

c. Broadcast Networks d. WAN

147.Local Cable TV Network is an example for _ _ _ _ _ _ _ _ _ _

a. WAN

b. Broadcast c. LAN

d. MAN

148.The IEEE standard for DQDB is _ _ _ _ _ _

a. 802.3

Page 30: cn-bits

b. 802.4

c. 802.6

d. 802.5

149.Hosts in WAN are connected by _ _ _ _ _ _ _ _ _ _ _

a. Communication Line

b. Subnet

c. Router

d. Another host Computer

150.Which one is not a transmission line

a. Circuits

b. Channels c. Trunks d. Paths

151._ _ _ _ _ _ kind of coaxial cable is used for analog transmission

a. Base band

b. Broad band

c. Category 3

d. Fiber

152.As we go from long-wave radio towards visible

light, the waves behave

more and more like _ _ _ _ _ _ and less and less like

_ _ _ _ _ _ _ _

a. radio, light

b. light., radio

c. radio , micro wave d. micro wave, light

Page 31: cn-bits

153.Multipath fading _ _ _ _ _ _ _ _ the signal

a. enhances

b. adds to

c. cancels

d. maximizes

154.In micro wave transmission concentrating all the energy into a small beam using a parabolic antenna gives a _ _ _ _ _ _ _ _ signal to noise ratio

a. lower

b. higher

c. degraded d. subtle

155.Radio waves are _ _ _ _ _ _ _ _

a. uni directional

b. bi directional

c. multidirectional

d. omnidirectional

156.The fundamental relation between frequency (f), wave length (l) and speed(c)

a. f*c=l

b. f/l=c c. l*c=f d. f*l=c

157.Speed of light is

a. 3*10 8 m/s

b. 3*10 8 cm/sec

c. 3*10 9 m/s

d. 3*10 9 cm/sec

Page 32: cn-bits

158.In transparent Bridges, all the decisions are made by looking into _ _ _ __ _ _ _ _

a. Advertisement Table

b. Description Tables

c. Hash Tables d. Fragment Tables

159.If destination LAN is unknown in Transparent

Bridges then we use _ _ _ _ _ _ _ _ _ _

a. Link State Routing

b. Flooding

c. Shortest Path Routing d. Flow Based Routing

160.Which among the below of source routing bridges is complex?

a. Hardware

b. Software

c. Hybrid

d. Remote

161.A _ _ _ _ _ _ _ _ _ _ _ field on a cell header in the ATM layer determines whether a cell can be dropped.

a. VPI ( Virtual path identifier)

b. VCI (Virtual circuit identifier )

c. CLP(Cell loss priority)

d. GFC(generic flow constant)

162.ATM multiplexes cells using _ _ _ _ _

a. Asynchronous FDM

b. Synchronous FDM

c. Asynchronous TDM

Page 33: cn-bits

d. Synchronous TDM

163.In an ATM network, all cells belonging to a single message follow the same _ _ _ _ _ _ _ and remain in their original order until they reach

their destination.

a. Transmission path

b. Virtual path

c. Virtual circuit

d. Virtual connection

164.The ATM _ _ _ _ _ _ _ _ _ _ _ _ _ _ sub layer is concerned with getting the bits on and off the wire

a. Physical Layer

b. ATM Layer c. AAL1

d. AAL2

165.In data communications, ATM is an acronym for

a. Automated Transfer Mode

b. Automatic Transfer Modulation c. Automatic Transport Mode

d. Asynchronous Transfer Mode

166.Because ATM _ _ _ _ _ _ _ _ _ _ , which means that cells follow the same path, the cells do not usually arrive out of order.

a. is asynchronous

b. is multiplexed

c. is a network

d. uses virtual circuit routing

167.Which layer in ATM protocol reformats the data received from other networks?

a. Physical

Page 34: cn-bits

b. ATM

c. Application adaptation

d. Data adaptation

168.Which layer in ATM protocol has a 53-byte

cell as an end product

a. Physical

b. ATM c. Application adaptation d. Data adaptation

169.Which AAL type can best process a data stream

having a nonconstant bit rate?

a. AAL1

b. AAL2

c. AAL3/4

d. AAL5

170.Which AAL type is designed to support a data

stream that has a constant bit rate?

a. AAL1

b. AAL2

c. AAL3/4

d. AAL5

171.Which AAL type is designed to support

conventional packet switching that uses the virtual

circuit approach?

a. AAL1

b. AAL2

c. AAL3/4

Page 35: cn-bits

d. AAL5

172.Which AAL type is designed to support SEAL ?

a. AAL1

b. AAL2

c. AAL3/4

d. AAL5

173.The end product of the SAR is a data packet that is _ _ _ _ _ _ _ _ _ _

a. Variable in length

b. 48 bytes long

c. 44 to 48 bytes long

d. greater than 48 bytes long

174.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1

byte of header is added to 47 bytes of data. a. AAL1

b. AAL2

c. AAL3/4 d. AAL5

175.In ALOHA, the throughput is a maximized by

dividing time into _ _ _ _ _ _ _ _ intervals

a. Variable

b. Unique

c. Discrete

d. Continuous

176.In adaptive tree walk protocol, each node at

level I has a fraction _ _ _ _ _ _ _ of the station

below it

Page 36: cn-bits

a. 2I

b. I2

c. 2 - I

d. I - 2

177.In _ _ _ _ _ _ _ _ _ protocol the station transmits with a probability of 1 whenever it finds the channel idle

a. 1 - persistent CSMA

b. p - persistent CSMA

c. non - persistent CSMA

d. ALOHA.

178.The channel efficiency of bit-map protocol at low load is _ _ _ _ _ _ _

a. d/(N+d)

b. d/(d+1)

c. d/(d+log2N)

d. N/(d+log2d)

179.The channel efficiency of bit-map protocol at high load is _ _ _ _ _ _ _ _

a. d/(N+d)

b. d/(d+1)

c. d/(d+log2N)

d. N/(d+log2d)

180.The channel efficiency of binary-countdown protocol is _ _ _ _ _

a. d/(N+d)

b. d/(d+1)

c. d/(d+log2N)

d. N/(d+log2d)

181._ _ _ _ _ _ _ protocol is widely used on LAN

Page 37: cn-bits

in the MAC sub layer

a. CSMA b. TCP

c. CSMA/CD

d. GSM

182.The first collision free protocol is _ _ _ _ _ _ _ _ _

a. Binary countdown

b. Basic bitmap

c. Reservation protocol

d. SAP

183.In binary count down protocol each station address bits are _ _ _ _ _ _ _

a. ANDed

b. Ex - Ored

c. Ored

d. NORed

184.Multiple users share a common channel is called _ _ _ _ _ _ _ _

a. LAN

b. WAN

c. Contention

d. CSMA/CD

185._ _ _ _ _ _ _ _ _ _system is used for ground based radio broadcasting

a. Static channel allocation

b. Dynamic channel allocation

c. ALOHA

d. CSMA

Page 38: cn-bits

186.The problem of a station not being able to detect a potential competitor for the medium because competitor is far away is called _ _ _ _ _ _ _ _ _

a. Exposed Station Problem

b. Collision Avoidance Problem

c. Hidden Station Problem

d. Access Grant Problem

187.The problem of a station not being able to detect a potential competitor for the medium because it thinks that there is activity between them is called _ _ _ _ _ _ _ _ _ _ _

a. Exposed Station Problem

b. Collision Avoidance Problem

c. Hidden Station Problem

d. Access Grant Problem

188.Protocols in which stations listen for a carrier

and act accordingly are _ _ _ _ _ _ _

a. ALOHA

b. Multiple access c. Station Model

d. CSMA

189.Busy Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _

a. ALOHA

b. Slotted ALOHA

c. 1-persistent CSMA

d. non-persistent CSMA

190.Contention Slots are not found in _ _ _ _ _ _ _

a. non-persistent CSMA

Page 39: cn-bits

b. CSMA/CD

c. Bitmap

d. Binary Countdown

191.A problem with Bitmap protocols is an overhead of _ _ _ _ _ _ _ _ bit(s)

per station

a. 0

b. 1

c. 2

d. 3

192.In adaptive tree walk protocol we use _ _ _ _

_ _ and _ _ _ _ _ _ _ _ _ searching

a. Graph and Breadth First

b. Tree and Breadth First

c. Graph and Depth First

d. Tree and Depth First

193.An early protocol for wireless LANs is _ _ _ _ _ _ _ _ _ _ _

a. MACA

b. ALOHA

c. CSMA/CD

d. Collision Free

194.A hub is used in _ _ _ _ _ _ _ _ _ _ _ Ethernet

a. 10Base 5

b. 10Base 2

c. 10Base - T

d. 10Base - F

195.A transceiver cable is used in _ _ _ _ _ _ _ _ _ _ Ethernet

Page 40: cn-bits

a. 10Base 5

b. 10Base 2

c. 10Base - T

d. 10Base - F

196.The protocol used in ETHERNET is

a. ALOHA

b. Binary Count down

c. CSMA/CD

d. Multiple Access Protocol

197.10 base 5 cabling is called _ _ _ _ _ _ _ Ethernet. a. Thick b. Thin c. Twisted pair

d. Fiber optics

198.In token ring, the length of the token is _ _ _ _ _ _ _ _

a. 4 bytes

b. 3 bytes

c. 1 bytes

d. 2 bytes

199.The protocol in which, after I collisions, a

random number between 0 and 2i - 1 number of

slots is skipped is called _ _ _ _ _ _ _ _

a. Exponential

b. Binary countdown c. Backoff

d. Binary exponential backoff

200.In switched 802.3 LANS, each card

Page 41: cn-bits

forms its own _ _ _ _ _ _ _ independents of

the others

a. Domain

b. Area

c. Collision Area

d. Collision domain

201.10 base 2 cabling is called _ _ _ _ _ _ _ _ Ethernet.

a. Thick b. Thin c. Twisted pair d. Fiber optics