mca-3 ( Computer Networks)
Subject Name : Computer Networks
1. In this mode data can be transmitted in either direction, but not at the same time.
(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) None
2. Turing the lime around needs special________ in the computer software and in the terminal and computer interface hardware.
(a) Mechanism
(b) Function
(c) Interfaces
(d) None
3. Systems which uses satellite communication mostly use the __________ mode of data
transmission.
(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) Any one of these
4. When data is send as electrical signals, the speed of the system is expressed numerically as the reciprocal of the _____________ of the shortest signal element.
(a) No. of bits
(b) Duration in seconds
(c) BPS
(d) None
5. BPS represent the ___________ capacity of the system
(a) Logical
(b) Physical
(c) Numerical
(d) Electrical
6. The main advantage of asynchronous serial transmission is that the character is self-contained
with all the information , & that the two ends (source & destination) of the link need not be_____
(a) asynchronous
(b) synchronized
(c) attached
(d) None
7. CTS stands for
(a) Clear-to-submit
(b) Clear-to-support
(c) Clear-to-send
(d) Clear-to-system
8. __________ switching, it is required to set up an end to end path before any data can be sent.
(a) Circuit
(b) Message
(c) Packet
(d) All of these
9. _________ switching technology,an upper limit for block size is kept.
(e) Circuit
(f) Message
(g) Packet
(h) All of these
10. The objective of a network include
(a) Centralized Management
(b) Provide distribution processing
(c) Modular enhancement of resources
(d) All of these
11. In ____________ switching becomes useless for interactive traffic.
(i) Circuit
(j) Message
(k) Packet
(l) All of these
12. A MAN can support
(a) Data
(b) Voice
(c) Both
(d) None
13. Topology is a term used to describe the ________ way in which connected in a network
(a)physical
(b)logical
(c) electrical
(d)mechanical
14. In this topology each machine manager both information processing and distribution of data files
(a)linear bus
(c)star
(b)ring
(d)all of these
15. This topology used to connect computers in any order.
(a) Mesh
(c) Tree
(b) Hybrid
(d) Star
16. Thus topology is most difficult topology to implement as the number of computers increases.
(a) Mesh
(c) tree
(b) Hybrid
(d) star
17. Thick coax is over a___________ 7 in diameter.
(a)Micro meter
(c) Millimeter
(b) Centimeter
(d)Inch
18. Thin coax is of
(a) 100 Base 5
(b) 10 Base 2
(c) 10 Base T
(d) 10 Base FL
19. Level 3 UTP cables can support upto
(a) 100Mbps
(b) 58Mbps
(c) 20Mbps
(d) 16Mbps
20. If you are using coaxial cable for your network, you will not need the __________
(a) Hub
(b) Rooter
(c) Gateway
(d) Subnet
21. ALOHA was developed by
(e) Norman Abramson
(f) Normin Abramson
(g) Abrenhim Normin
(h) Abrenhim Norman
22. Cable laying plan provide good quality of ________________ sockets near the location of each computer.
(a) RJ54
(b) RJ55
(c) RJ44
(d) RJ45
23. The network layer is concerned with controlling the operation of the ___________
(a) Subnet
(b) Datalink layer
(c) Transport layer
(d) Network Layer
24. This layer make possible a faster host to communicate with a slower host.
(a) Network
(b) Transport
(c) Session
(d) Presentation
25.The network layer is concerned with controlling the operation of the __________
(a) Subnet (c) Transport layer
(b) Datalink layer (d) network layer
26. This layer make possible a faster host to communicate with a slower host.
(a) Network (c) session
(b) Transport (d) Presentation
27. The function of the layer includes accessing remote files, accessing remote databases, electronic mail etc.
(a) Application (c) Session
(b) Presentation (d) Transport
28. These 2 layers are not present in the TCP/IP
(a) Application & Presentation (c) Session & Transport
(b) Presentation & Session (d) Physical& data link layer
29. UDP works at _________ layer
(a) Physical (c) Transport
(b) Network (d) Application
30. CCP stands for
(a)Control Communication Processor (c) Central Communication Processor
(b) Communication Control Processor (d) Central Control Processor
31. RARP & RIP works at _______ layer
(a) Physical (c) Session
(b) Data link (d) Presentation
32. BSC is a _______ oriented protcol
(a) Bet (c) Frame
(b) byte (d) Packet
33. Data transmission can be basically divided into following 5 phases.
1. Release data link
2. Establish Data link
3. Disconnect from Transmission line
4. Connect to transmission line
5. Transmit information
Arrange the steps in the order.
(a) 12345 (c) 14253
(b) 42513 (d) 41253
34. SDLC was developed by _________ in the mid 1970s
(a) IBM (c) Apple
(b) Microsoft (d) Macintosh
35. In a non procedure communication between PCs. The _________ code is generally used as the delimiter.
(a) ASCII (b) EBCDIC
(c) Carriage Return (d) all of these.
36. This control code denotes conclusion of one or more transmissions.
(a) ETX (b) EOT
(c) ENQ (d) ETB
37. Basic control procedure is not suitable for transmission of __________
(a) short amount of data at high speed (b) large amount of data at high speed
(c) short amount of data at low speed (d) large amount of data at low speed
38. In the basic control procedure, transmission code consists of _________ block.
(a) 1 (b) 2
(c) 3 (d) 4
39. In HDLC, data is sent in the form of ________
(a) bit (b) bytes
(c) packets (d) frames
40. Arrange the order of fields in the supervisory frame.
1. Flag
2. FCS
3. Control
4. Address
5. Flag
(a) 12345 (b) 14325
(c) 12435 (d) 14325
41. The flag bit pattern in frame format of HDLC is ______________
(a) 0111110 (b) 01111111
(c) 01111110 (d) 11111111
42. Framing, addressing & error control are the functions of __________ layer.
(a) LLC (b) MAC
(c) Physical (d) Data Link
43. A token bus is a logically ordered group of communicating nodes which access the medium in a ____________ fashion.
(a) first come first serve (b) last in first out
(c) Round Robin (d) last in last out
44. This standard is used with ring structured LAN with star topology.
(a) IEEE 802.2 (b) IEEE 802.3
(c) IEEE 802.4 (d) IEEE 802.5
45. This standard deals with the network management aspects.
(a) 80201:A (b) 80201:C
(c) 80201:B (d) All of these
46. The American National Standards Institute Convened the ______ committee in an effort to develop standard for high speed LANS.
(a)X3T9.5 (b)T3X9.5
(c)T9X3.5 (d)T3X9.5
47. FDDI can be used in the same way as IEEE______LANS
(a)801 (b)802
(c)803 (d)804
48. FDDI uses ______ as transmission medium.
(a)twisted pair (b)co axial pair
(c)optical fiber (d)none of these
(1)They do not require filtering.
(2)They propagate signals through the network.
(3)They amplify signals.
49. These are the properties of
(a)repeaters (b)hub
(c)routers (d)bridges
50. Tick the wrong statement
(a)using repeater it is not possible to attach a large number of nodes to the network
(b)hub can filter the network traffic
(c)bridges operate at large (d)all of these
51. Pick the wrong statement
(a)bridges control broadcasts to the network (b)bridges operate at layer 2.
(c)bridge filter network traffic by looking at the MAC address
(d)none of these
52. For rooting to be successful, each network must have a unique network number, this unique network number is incorporated into the _______ assigned to
(a)MAC address (b)IP address
(c)NIC (d)none
53. ________ cannot filter network traffic.
(a)hub (b)bridges
(c)routers (d)gateway
54. The length of IP address is
(a)8 bit (b)64 bit
(c)16 bit (d)32 bit
55. Subnet address help you to determine the class of ________.
(a)MAC address (b)IP address
(c)NIC (d)none
56. A IP address consists of _______ parts
(a)1 (b)2
(c)3 (d)4
57. If the starting bits of am IP address are 1110, then it is a _________ network address
(a)class A (b)class B
(c)class C (d)class D
58. In IP address, the values ______ are not used in the first octet for networking purposes
(a)255 (b)223 to 255
(c)224 to 255 (d)none
59. 172.12.0.2 is a ______ network IP address
(a)class A (b)class B
(c)class C (d)class D
60. A subnet address includes
(a)subnet number, network, host number (b)subnet number, host number, network number
(c)network number, host number, subnet number
(d)network number, subnet number, host number
61. In the class C network, if 2 bits are borrowed from the host field, the number of bits that can be used for host address declines to ________
(a)8 (b)7
(c)6 (d)5
62. IP address 128.0.0.0 to 191.255.255.255 belongs to _________
(a)class A (b)class B
(c)class C (d)class D
63. To ensure that the APR request packet will be seen by all the devices on the network, the source uses a _________ MAC address
(a)braad cast (b)point to point
(c)multicast (d)peer to peer
64. For physical address 00-04-A2-05-09-89, IP address will be
(a)192.168.0.2 (b)192.168.0.1
(c)192.168.0.3 (d)192.168.0.5
65. ARP is used to map __________.
(a)IP address to MAC address (b)MAC address to IP address
(c)IP address to NIC (d)MAC address NIC
66. Using ________ protocol source machine gets it’s own IP address
(a)ARP (b)RARP
(c)MAC (d)RARP server
67. The distance limitation imposed by the physical layer, multiplied by the number of devices, dictate the maximum size of a --------
(a)LAN (b)WAN
(c)multicast point (d)topology
68. A second tier ring ______ can be used to inter connect all the user level rings & to provide aggregated access to the WAN
(a)to ken bus (b)HDDL
(c)to ken ring (d)star
69. In a hierarchical combination topology, an ATM backbone is used to interconnect the user- level hubs. This ATM stands for
(a)asynchronous transfer machine (b) automatic transfer machine
(c) asynchronous transfer mode (d)automatic transfer mode
70. The LAN’s connection to the ________ provides WAN connectivity
(a)routers (b)bridges
(c)gateway (d)all of these
71. A collapsed backbone topology features centralized _______ that interconnected all the LAN segments in a building
(a)routers (b)bridges
(c)gateway (d)none of these
72. A building’s PBX room usually server as the center of its ______ .
(a)LAN (b)ring topology
(c) bus topology (d) wiring topology
73. Pick the odd one out
(a) identification (b) authentication
(c) actions (d) fire walls
74. Finger prints, voice print, hand size, signature are a type of ________
(a) remembered information (b)processed objects
(c) personal characteristics (d)all of these
75. In list oriented approach each resource has _________
(a)access control list (b)ticket & list
(c)verification control list (d)authentication list
76. The variables maintained by the agent in the respective managed nodes in SNMP literature is called ______.
(a)identifiers (b)class
(c)objects (d)keyboards
77. In this type of threat, the attacker can pose as a real host and communicate with another host to acquire data or
service
(a)message stream modification (b)denial of message service
(c)masquerade (d)Trojan horse
1. In this mode data can be transmitted in either direction, but not at the same time.
(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) None
2. Turing the lime around needs special________ in the computer software and in the terminal and computer interface hardware.
(a) Mechanism
(b) Function
(c) Interfaces
(d) None
3. Systems which uses satellite communication mostly use the __________ mode of data
transmission.
(a) Simplex
(b) Half Duplex
(c) Full Duplex
(d) Any one of these
4. When data is send as electrical signals, the speed of the system is expressed numerically as the reciprocal of the _____________ of the shortest signal element.
(a) No. of bits
(b) Duration in seconds
(c) BPS
(d) None
5. BPS represent the ___________ capacity of the system
(a) Logical
(b) Physical
(c) Numerical
(d) Electrical
6. The main advantage of asynchronous serial transmission is that the character is self-contained
with all the information , & that the two ends (source & destination) of the link need not be_____
(a) asynchronous
(b) synchronized
(c) attached
(d) None
7. CTS stands for
(a) Clear-to-submit
(b) Clear-to-support
(c) Clear-to-send
(d) Clear-to-system
8. __________ switching, it is required to set up an end to end path before any data can be sent.
(a) Circuit
(b) Message
(c) Packet
(d) All of these
9. _________ switching technology,an upper limit for block size is kept.
(e) Circuit
(f) Message
(g) Packet
(h) All of these
10. The objective of a network include
(a) Centralized Management
(b) Provide distribution processing
(c) Modular enhancement of resources
(d) All of these
11. In ____________ switching becomes useless for interactive traffic.
(i) Circuit
(j) Message
(k) Packet
(l) All of these
12. A MAN can support
(a) Data
(b) Voice
(c) Both
(d) None
13. Topology is a term used to describe the ________ way in which connected in a network
(a)physical
(b)logical
(c) electrical
(d)mechanical
14. In this topology each machine manager both information processing and distribution of data files
(a)linear bus
(c)star
(b)ring
(d)all of these
15. This topology used to connect computers in any order.
(a) Mesh
(c) Tree
(b) Hybrid
(d) Star
16. Thus topology is most difficult topology to implement as the number of computers increases.
(a) Mesh
(c) tree
(b) Hybrid
(d) star
17. Thick coax is over a___________ 7 in diameter.
(a)Micro meter
(c) Millimeter
(b) Centimeter
(d)Inch
18. Thin coax is of
(a) 100 Base 5
(b) 10 Base 2
(c) 10 Base T
(d) 10 Base FL
19. Level 3 UTP cables can support upto
(a) 100Mbps
(b) 58Mbps
(c) 20Mbps
(d) 16Mbps
20. If you are using coaxial cable for your network, you will not need the __________
(a) Hub
(b) Rooter
(c) Gateway
(d) Subnet
21. ALOHA was developed by
(e) Norman Abramson
(f) Normin Abramson
(g) Abrenhim Normin
(h) Abrenhim Norman
22. Cable laying plan provide good quality of ________________ sockets near the location of each computer.
(a) RJ54
(b) RJ55
(c) RJ44
(d) RJ45
23. The network layer is concerned with controlling the operation of the ___________
(a) Subnet
(b) Datalink layer
(c) Transport layer
(d) Network Layer
24. This layer make possible a faster host to communicate with a slower host.
(a) Network
(b) Transport
(c) Session
(d) Presentation
25.The network layer is concerned with controlling the operation of the __________
(a) Subnet (c) Transport layer
(b) Datalink layer (d) network layer
26. This layer make possible a faster host to communicate with a slower host.
(a) Network (c) session
(b) Transport (d) Presentation
27. The function of the layer includes accessing remote files, accessing remote databases, electronic mail etc.
(a) Application (c) Session
(b) Presentation (d) Transport
28. These 2 layers are not present in the TCP/IP
(a) Application & Presentation (c) Session & Transport
(b) Presentation & Session (d) Physical& data link layer
29. UDP works at _________ layer
(a) Physical (c) Transport
(b) Network (d) Application
30. CCP stands for
(a)Control Communication Processor (c) Central Communication Processor
(b) Communication Control Processor (d) Central Control Processor
31. RARP & RIP works at _______ layer
(a) Physical (c) Session
(b) Data link (d) Presentation
32. BSC is a _______ oriented protcol
(a) Bet (c) Frame
(b) byte (d) Packet
33. Data transmission can be basically divided into following 5 phases.
1. Release data link
2. Establish Data link
3. Disconnect from Transmission line
4. Connect to transmission line
5. Transmit information
Arrange the steps in the order.
(a) 12345 (c) 14253
(b) 42513 (d) 41253
34. SDLC was developed by _________ in the mid 1970s
(a) IBM (c) Apple
(b) Microsoft (d) Macintosh
35. In a non procedure communication between PCs. The _________ code is generally used as the delimiter.
(a) ASCII (b) EBCDIC
(c) Carriage Return (d) all of these.
36. This control code denotes conclusion of one or more transmissions.
(a) ETX (b) EOT
(c) ENQ (d) ETB
37. Basic control procedure is not suitable for transmission of __________
(a) short amount of data at high speed (b) large amount of data at high speed
(c) short amount of data at low speed (d) large amount of data at low speed
38. In the basic control procedure, transmission code consists of _________ block.
(a) 1 (b) 2
(c) 3 (d) 4
39. In HDLC, data is sent in the form of ________
(a) bit (b) bytes
(c) packets (d) frames
40. Arrange the order of fields in the supervisory frame.
1. Flag
2. FCS
3. Control
4. Address
5. Flag
(a) 12345 (b) 14325
(c) 12435 (d) 14325
41. The flag bit pattern in frame format of HDLC is ______________
(a) 0111110 (b) 01111111
(c) 01111110 (d) 11111111
42. Framing, addressing & error control are the functions of __________ layer.
(a) LLC (b) MAC
(c) Physical (d) Data Link
43. A token bus is a logically ordered group of communicating nodes which access the medium in a ____________ fashion.
(a) first come first serve (b) last in first out
(c) Round Robin (d) last in last out
44. This standard is used with ring structured LAN with star topology.
(a) IEEE 802.2 (b) IEEE 802.3
(c) IEEE 802.4 (d) IEEE 802.5
45. This standard deals with the network management aspects.
(a) 80201:A (b) 80201:C
(c) 80201:B (d) All of these
46. The American National Standards Institute Convened the ______ committee in an effort to develop standard for high speed LANS.
(a)X3T9.5 (b)T3X9.5
(c)T9X3.5 (d)T3X9.5
47. FDDI can be used in the same way as IEEE______LANS
(a)801 (b)802
(c)803 (d)804
48. FDDI uses ______ as transmission medium.
(a)twisted pair (b)co axial pair
(c)optical fiber (d)none of these
(1)They do not require filtering.
(2)They propagate signals through the network.
(3)They amplify signals.
49. These are the properties of
(a)repeaters (b)hub
(c)routers (d)bridges
50. Tick the wrong statement
(a)using repeater it is not possible to attach a large number of nodes to the network
(b)hub can filter the network traffic
(c)bridges operate at large (d)all of these
51. Pick the wrong statement
(a)bridges control broadcasts to the network (b)bridges operate at layer 2.
(c)bridge filter network traffic by looking at the MAC address
(d)none of these
52. For rooting to be successful, each network must have a unique network number, this unique network number is incorporated into the _______ assigned to
(a)MAC address (b)IP address
(c)NIC (d)none
53. ________ cannot filter network traffic.
(a)hub (b)bridges
(c)routers (d)gateway
54. The length of IP address is
(a)8 bit (b)64 bit
(c)16 bit (d)32 bit
55. Subnet address help you to determine the class of ________.
(a)MAC address (b)IP address
(c)NIC (d)none
56. A IP address consists of _______ parts
(a)1 (b)2
(c)3 (d)4
57. If the starting bits of am IP address are 1110, then it is a _________ network address
(a)class A (b)class B
(c)class C (d)class D
58. In IP address, the values ______ are not used in the first octet for networking purposes
(a)255 (b)223 to 255
(c)224 to 255 (d)none
59. 172.12.0.2 is a ______ network IP address
(a)class A (b)class B
(c)class C (d)class D
60. A subnet address includes
(a)subnet number, network, host number (b)subnet number, host number, network number
(c)network number, host number, subnet number
(d)network number, subnet number, host number
61. In the class C network, if 2 bits are borrowed from the host field, the number of bits that can be used for host address declines to ________
(a)8 (b)7
(c)6 (d)5
62. IP address 128.0.0.0 to 191.255.255.255 belongs to _________
(a)class A (b)class B
(c)class C (d)class D
63. To ensure that the APR request packet will be seen by all the devices on the network, the source uses a _________ MAC address
(a)braad cast (b)point to point
(c)multicast (d)peer to peer
64. For physical address 00-04-A2-05-09-89, IP address will be
(a)192.168.0.2 (b)192.168.0.1
(c)192.168.0.3 (d)192.168.0.5
65. ARP is used to map __________.
(a)IP address to MAC address (b)MAC address to IP address
(c)IP address to NIC (d)MAC address NIC
66. Using ________ protocol source machine gets it’s own IP address
(a)ARP (b)RARP
(c)MAC (d)RARP server
67. The distance limitation imposed by the physical layer, multiplied by the number of devices, dictate the maximum size of a --------
(a)LAN (b)WAN
(c)multicast point (d)topology
68. A second tier ring ______ can be used to inter connect all the user level rings & to provide aggregated access to the WAN
(a)to ken bus (b)HDDL
(c)to ken ring (d)star
69. In a hierarchical combination topology, an ATM backbone is used to interconnect the user- level hubs. This ATM stands for
(a)asynchronous transfer machine (b) automatic transfer machine
(c) asynchronous transfer mode (d)automatic transfer mode
70. The LAN’s connection to the ________ provides WAN connectivity
(a)routers (b)bridges
(c)gateway (d)all of these
71. A collapsed backbone topology features centralized _______ that interconnected all the LAN segments in a building
(a)routers (b)bridges
(c)gateway (d)none of these
72. A building’s PBX room usually server as the center of its ______ .
(a)LAN (b)ring topology
(c) bus topology (d) wiring topology
73. Pick the odd one out
(a) identification (b) authentication
(c) actions (d) fire walls
74. Finger prints, voice print, hand size, signature are a type of ________
(a) remembered information (b)processed objects
(c) personal characteristics (d)all of these
75. In list oriented approach each resource has _________
(a)access control list (b)ticket & list
(c)verification control list (d)authentication list
76. The variables maintained by the agent in the respective managed nodes in SNMP literature is called ______.
(a)identifiers (b)class
(c)objects (d)keyboards
77. In this type of threat, the attacker can pose as a real host and communicate with another host to acquire data or
service
(a)message stream modification (b)denial of message service
(c)masquerade (d)Trojan horse
Comments
Post a Comment