Vous êtes sur la page 1sur 13

Model Question Paper MI0035Computer Networks PART A 1 mark questions

1. Residential LAN network is called ______________. A. HOME network B. LAN connection C. WAN D. Wireless 2. If the packets are sent to only a subset or group of machines on the network, then it is called ___________. A. Broadcast links B. Point-to-point links C. Multicasting D. Internetwork 3. Which of the following is interconnecting the various components and mobile device using short range wireless links? A. System interconnection B. Wireless LANs C. Wireless WANs D. Home networks 4. _______________ Can be based on static table that are wired into the network and rarely changed. A. Routes B. Layer C. Control D. Session 5. __________________ is a main protocol at this layer which provides a single service, namely, best-effort connectionless packet transfer. A. User datagram protocol B. Transmission control protocol C. Arpanet protocol D. Internet packet 6. Cd stands for _____________. A. Compac disk B. Compact disk C. Committee draft D. Committee date 7. ______________ can be handled by just imagining that it repeats the entire pattern over and over forever. A. Data signal B. ASCII code C. Binary code D. Fourier signal

8. The range of frequencies transmitted without being strongly attenuated is called ________________. A. Wavelength B. Bandwidth C. Transmission D. Harmonics 9. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on. It is known as ____________. A. Packet switching B. Circuit switching C. Multiplexing D. Synchronous transmission 10. _____________ are those that provide a conduit from one device to another. A. Wired B. Wireless C. Free space D. Radio transmission 11. ____________ indicates a 1 bit. A. Pulse of light B. Absence of light C. Air boundary D. Silica boundary 12. The number of oscillations per second of a wave is called ____________. A. Hertz B. Frequency C. Wavelength D. Bandwidth 13. ______________ orbit has the altitude 36000km above earth surface. A. Low earth orbit B. Middle earth orbit C. Geostationary orbit D. Highly elliptical orbit 14. __________________ looked like the long- term winner. A. Optical communication B. Terrestrial fibre connections C. Single fibre D. Compression schemes 15. Which of the following contains a nodal computer called the server and all the other computers are connected to the server and are called its clients? A. Information systems B. Peer-to-peer LAN C. Network computing D. Operating system (OS)

16. Which of the following provides oversight of, and occasional commentary on, aspects of the architecture for the network protocols and procedures used by the internet? A. IAB B. IEEE C. NIST D. AT & T 17. Which of the following is the most commonly used standard for a local area network? A. Topology B. LAN C. Information systems D. Ethernet 18. Under unguided media, transmission and reception are achieved by means of ______________. A. Antenna B. Tower C. Routers D. Switches 19. The data signals are bound by the __________ system in guided transmission media. A. Routers B. Servers C. Cabling D. Bridges 20. In which of the following type of topology the devices are connected in the form of a closed loop? A. Linear bus B. Ring C. Star D. Mesh 21. Which of the following is a device that allocates traffic from one network segment to certain lines which connect the segment to another network segment? A. Bridge B. Gateway C. Router D. Switch 22. The bridge is linked to several local area networks, called ______________. A. Transparent B. Source route C. Static D. Segment 23. For dss1 signalling, the d channel layer 2 protocol is q.921 also called __________. A. LADP B. LDAP C. LAPD D. LPAD

24. The design of a communications network is what is basically known as ___________________. A. Network topology B. Network termination C. Terminal adapter D. Network architecture 25. __________ indicates the beginning of the isdn data-link layer frame fields. A. Flag B. Address C. Layer D. Protocols 26. Ip routing protocols are _________________. A. Static B. Stagnant C. Dynamic D. Inert 27. Exterior gateways perform protocol functions between ________________ networks. A. Independent B. Dependent C. Reliant D. Unreliable 28. Each socket has a socket number consisting of the ip address of the host and a ___________number local to that host, called a port. A. 32- bit B. 8-bit C. 16-bit D. 24-bit 29. __________________ layer architecture is compared with the seven-layer OSI reference model. A. SMTP B. FTP C. HTTP D. TCP/IP 30. ____________ is an agreement between the communicating parties on how communication is to proceed. A. Interface B. Protocol C. Connection release D. OSI 31. Which of the following is a classical bit- oriented protocol? A. ALOHA B. HDLC C. CSMA D. CSMA/CD

32. ________________ field tells how long the frame and its acknowledgement will occupy the Ethernet. A. Data field B. Frame header C. Duration field D. Sequence field 33. ___________________ is the part of network layer software which is responsible for deciding which output line an incoming packet should be transmitted on. A. Congestion B. Routing algorithm C. Link state algorithm D. Path vector algorithm 34. _______________ transmits segments consisting of an 8-byte header followed by the payload. A. Tcp/ip B. Tcp C. Udp D. Smtp 35. _______________ protocol is faster convergence than distance vector protocol. A. Path vector B. Link state C. Dynamic vector D. Routing vector 36. Dotted quad notation is also called as _________. A. Dot address B. Dotted lines C. Dotted periods D. ICANN 37. ___________ keeps track of which version of the protocol the datagram belongs to. A. Header field B. Version field C. The type field D. RARP 38. User agents for electronic mail are sometimes called as ____________. A. Mailers B. E-mailers C. Recipients D. Mail readers 39. Which of the following is an architectural framework for accessing linked documents spread out over millions of machines all over the internet? A. Internet B. WWW C. Webpage D. Portal

40. ________________ IS A FORM OF SYNCHRONOUS CONFERENCING. A. IRC B. Cryptography C. Gopher D. HTTP Part B 41 Which of the following are the two types of services which the layer can offer? A. Connection oriented and connectionless B. Multiplexing and de-multiplexing C. Flow control and routing D. Protocols and peers 42 _____________ and _______________ are the protocols of transport layer. A. HTTP and SMTP B. DNS and RTP C. IP and RTP D. TCP and UDP 43 _____________ and _____________ are the methods of multiplexing. A. FDM AND TDM B. Circuit and message C. Synchronous and asynchronous D. Hal-duplex and full-duplex 44 Which of the following are the techniques to spread the bandwidth? A. THF and IHF B. FHSS and DSSS C. Short wave and UHF D. VHF and UHF 45 Inmarsal is an example of ______________. A. HEO B. LEO C. MEO D. GEO 46 Which of the following is not a network device? A. Fax B. Plotter C. Super computer D. Suspension bridge 47 Identify one among the following that is not a packet switching protocol A. TCP/IP B. Frame relays C. Banyan vines D. CDMA

48 Microwave radio frequencies are used to transmit messages between _______________ and___________. A. Guided and unguided media. B. Computers and networks C. Computers and walky talkies D. Ground-based stations and satellite communications systems. 49 Cable television is a system of providing television to consumers via ________________ signals transmitted to televisions through fixed optical fibres or coaxial cables as opposed to the over-the-air method used in traditional television broadcasting in which a television __________ is required. A Wireless transmission, dish B Electromagnetic spectrum, antenna C Microwave transmission, dish D Radio frequency, antenna. 50. Which of the following are the types of methods which the bridges use to determine the network segment a MAC address belong to? A B C D 51 Transparent and source route Circuit and message Packet and static Static and distance vector protocols B channel also known as ________ channel is a telecommunications term which refers to the ISDN channel which carries the primary data or ________ communication. A. Bearer, voice B. Beta, clear C. Best, quick D. Bearer, clear The technology for B-ISDN was asynchronous transfer mode (ATM), which carried both ____________ voice and __________ data services on the same transport. Systematic, Unsystematic Systematic, Asynchronous Synchronous, Unsystematic Synchronous, Asynchronous The gateway computer reads the destination address and forwards the packet to an ___________ gateway that in turn reads the destination address and so forth across the __________ until one gateway recognizes the packet as belonging to a computer within its immediate neighbourhood or domain. Adjacent, network Opposite, network Opposite, internet Adjacent, internet

52 A B C D 53

A B C D

54 While ______________ consist of a 3-bit field of which the two low order bits control fragmentation, _________________ indicates the position of the fragments data relative to the beginning of the data in the original datagram, which allows the destination IP process to property reconstruct the original datagram. E. Protocol and source address F. Flags and fragment offset G. Flags and protocol H. Fragment offset and protocol 55 The interface defines which primitive _________________ and ___________ the lower layer makes available to the upper end. A Operations, services B Operations, repairs C Operations, transmits D Services, transmits 56 State whether the following statement are true or falsea When the load offered to any network is more than it can handle, congestion builds up. b In the Internet, packets get lost when a router is overloaded. A aT, bT B aF, bT C aF, bF D aT, bF 57 _____________ and ________________ are clearly an improvement over ALOHA because they ensure that no station begins to transmit when it senses the channel busy. A. Ethernet and connection oriented protocols B. Persistent and non-persistent CSMA protocols C. TCP and UDP D. SMTP and UDP 58 Routing algorithm can be classified as ________________ and ________________. A. Path vector and distance vector B. Link state and path vector C. Congestion and distance vector D. Non adaptive and adaptive 59 While ________________ are designed for frame relay networks, _________ maps physical address to IP address. A. ARP and RARP B. ARP and Inverse ARP C. RARP and ARP D. Inverse ARP and RARP 60. The scheme and standard for email security standards are ______________ and __________. A B C D Pretty Good Privacy and privacy enhanced mail SIMME and XML security Digital signatures and cryptographic techniques Data encryption standard and digital signatures

Part C 61

Identify the above diagram from the following option and find out what is the missing component in the diagram A. B. C. D. Connection oriented service interactions, CLIENT Connection less service interactions, ROUTER Connectionless service interactions, SERVER Connection oriented services interactions, RECEIVE

62 1 2 3 4 A. B. C. D.

Match the following X.25 packet number format ATM cell format TCP in TCP/IP protocol suite UDP in TCP/IP protocol suite 1b, 2d, 3a, 4c 1c, 2a, 3d, 4b 1d, 2b, 3a, 4c 1c, 2d, 3b, 4a

a. HTTP & SMTP b. connection number & packet reg.no. + acknowledg. No. c. DNS & RTP d. header & user data (Payload)

63 1 2 3 4 A. B. C. D. 64

Match the following Real-time audio and video String into bytes Information transfer on patterns The transmission of data to and from hard disk 1c, 2a, 3d, 4b 1d, 2a, 3b, 4c 1b, 2c, 3d, 4a 1b, 2a, 3d, 4c

a. synchronous transmission b. Isochronous transmission c. Half duplex mode d. Asynchronous transmission

The above figure is diagram of coaxial cable. Name the parts of the figure. A. 1->Copper core, 2->Insulating material, 3->protective plastic covering, 4->Wire mesh conductor B. 1->Conductor, 2->Insulating material, 3->protective plastic covering, 4->Cladding glass C. 1->Wire mesh conductor, 2->Insulating material, 3->Protective Plastic covering, 4->Cladding glass D. 1->Copper core, 2->Wire mesh conductor, 3->protective Plastic covering, 4->Insulating material 65 Match the following 1. LEO a. Fixed antenna positions no adjustment required 2. GEO b. Global radio coverage is possible 3. MEO c. Apogee and Perigee 4. HEO d. special antennas for small footprint is needed A. 1c, 2d, 3a, 4b B. 1b, 2c, 3d, 4a C. 1b, 2a, 3d, 4c D. 1d, 2a, 3c, 4d 66 A. B. C. D. Microsoft and Netscape were fighting for violations in which space? Browsers Search Engines Artificial Intelligence Word processors

67 Fill up the blanks with suitable answer 1 ___________________ are at a frequency too low for human eyes to receive and interpret. 2 2.____________ is a wireless transmission medium that sends data over long distances at up to 2 megabits per second 3 Transmission of voice and data through the atmosphere as super high-frequency radio waves called ___________. 4 A ____________ satellite is an artificial satellite stationed in space for the purposes of telecommunications. a. Broadcast Radio b. Communications c. Infrared-light waves d. Microwaves A 1a, 2c, 3b, 4d. B 1b, 2d, 3a, 4c. C 1c, 2a, 3d, 4b. D 1d, 2b, 3c, 4a. 68 Match the following 1. Switch a. central connection point 2. HUB b. allocates traffic from one network segment to certain lines 3. Bridge c. distance vector protocols 4. Routers d. Source route A. 1c, 2a, 3b, 4d B. 1d, 2c, 3b, 4a C. 1d, 2c, 3a, 4b D. 1b, 2a, 3d, 4c 69 Match the following2B1Q Signalling has the following characteristics: 1 Polarity of the four signals being __________, this encoding scheme is less prone to DC bias than a unipolar line code. 2 Four distinct signal levels being present it would seem to make this code more likely to be ______________. 3 The presence of an _________ voltage for all signal states means the line state is easily determined. 4 The bit rate for 2B1Q Signalling is twice the baud, making it fairly ___________. a. Efficient b. Active c. Self-clocking d. Balanced A 1d, 2c, 3b, 4a. B 1c, 2b, 3a, 4d. C 1b, 2a, 3d, 4c. D 1a, 2d, 3c, 4b.

70. Mention true or false a b c d A B C D The minimum value for an octet is 1. The maximum value for an octet is 255. An IP address consists of 64 bits. IP addressing supports five different address classes. aT.bT,cF,dT aF, bT, cT, dT aF, bT, cF, dT aF, bF, cF, dT

71. State whether the following statements are true or false a b c d TCP/IP is not really a protocol, but a set of protocols. Physical layer ensures complete data transfer. The network layer does routing and forwarding. Transport layer provides the hardware means of sending and receiving data on a carrier.

A aT, bT, cT, dF B aF, bF, cT, dF C aT, bF, cT, dF D aT, bF, cF, dF 72. Match the following 1. Association a. station should use this service before shutting down 2. Disassociation b. determines how to route frames sent to the base station 3. Re-association c. mobile stations use it to connect themselves to base station 4. Distribution d. a stations may change its preferred base station A. 1d, 2c, 3b, 4a B. 1b, 2c, 3d, 4a C. 1c, 2d, 3a, 4b D. 1c, 2a, cd, 4b 73. Match the applications with their QOS parameters 1. In e-Mail the delay must be ____________. 2. In Audio-on demand the jitter must be ____________. 3. in Video conferencing, the bandwidth must be ___________. 4. in File transfer, the reliability is ____________. A. 1-high, 2-high, 3-low, 4-high B. 1-low, 2-low, 3-high, 4-high C. 1-high, 2-low, 3-high, 4-medium D. 1-low, 2-high, 3-high, 4-medium

74. Match the following 1. 2. 3. 4. A. B. C. D. Echo Echo reply Source quench Parameter problem 1b, 2a, 3d, 4c 1d, 2c, 3a, 4b 1c, 2d, 3a, 4b 1d, 2a, 3b, 4c a. choke packet b. invalid header field c. ask a machine if it is alive d. yes, I am alive

75. Mr. Bhatra writes a mail to Ms. Sweety. He wants his document to be in verifiable, non-forgeable and non repudiable manner. Mr. Bhatra has a document d, and his signature of the document dB (d). When Ms. Sweety receives the mail by pretty good privacy (PGP) method and uses _________, ____________, _____________ and _______________, _____________ and _________. A Symmetric key cryptography, public-key cryptography, hash function and a digital signature to provide secrecy, sender authentication and message integrity B Paired key technique, IRC technology, GOPHER and Veronica, Hypertext and Mark up language C Symmetric key cryptography, paired key technique, HTML tags, document and Bhatras digital signatures, his public key and private key. D Paired key technique, Bhatras digital signature, his public and private key, PGP software and hardware devices to support.

Vous aimerez peut-être aussi