• No results found

computer networks online bits

N/A
N/A
Protected

Academic year: 2021

Share "computer networks online bits"

Copied!
34
0
0

Loading.... (view fulltext now)

Full text

(1)

JNTU ONLINE

JNTU ONLINE EXAMINATIONS

EXAMINATIONS

[Mid 1 - cn]

[Mid 1 - cn]

1. A file is being transferred. The time required actually is 6- hours. The 1. A file is being transferred. The time required actually is 6- hours. The

mean time between crashes is 2- hours. The time required for the mean time between crashes is 2- hours. The time required for the transfer is _ _ _ _ _ _ _ _ hours if synchronization is not provided. transfer is _ _ _ _ _ _ _ _ hours if synchronization is not provided. [01D01] [01D01] a. 12 hours a. 12 hours . 3 hours . 3 hours c. Zero hours c. Zero hours d. Infinite d. Infinite 2. The inform

2. The information relatation related to multi-ed to multi- rogrammed hrogrammed hosts is placed in theosts is placed in the header of _ _ _ _ _ _ _ Layer [01D02] header of _ _ _ _ _ _ _ Layer [01D02] a. Application layer  a. Application layer  . Transport Layer . Transport Layer c. Session layer  c. Session layer  d. Network Layer. d. Network Layer.

3. The _ _ _ _ _ _ _ _ _ _ Layer is a true end to end layer , from source to 3. The _ _ _ _ _ _ _ _ _ _ Layer is a true end to end layer , from source to

destination. [01G01] destination. [01G01] a. Network Layer. a. Network Layer. . Data Link Layer  . Data Link Layer  c. Data Layer  c. Data Layer  d. Transport Layer d. Transport Layer

4. The operation of subnet is controlled by _ _ _ _ _ _ _ _ [01G02] 4. The operation of subnet is controlled by _ _ _ _ _ _ _ _ [01G02]

a. Network Layer. a. Network Layer. . Data Link Layer  . Data Link Layer  c. Data Layer  c. Data Layer  d. Transport Layer  d. Transport Layer 

5. Accounting Functions are the responsibility of _ _ _ _ _ _ _ _ _ _ Layer 5. Accounting Functions are the responsibility of _ _ _ _ _ _ _ _ _ _ Layer

[01M01] [01M01]

a. Network Layer. a. Network Layer. . Data Link Layer  . Data Link Layer  c. Data Layer  c. Data Layer  d. Transport Layer  d. Transport Layer 

6. Which one of the following is correct?? [01M02] 6. Which one of the following is correct?? [01M02] a. Character - represented by One's Complement a. Character - represented by One's Complement . Character - represented by Two's Complement . Character - represented by Two's Complement c. Integer - represented by ASCII

c. Integer - represented by ASCII d. Character - represented by Unicode d. Character - represented by Unicode

7. Multiplexing and Demultiplexing of Network connections is by _ _ _ _ _ _  7. Multiplexing and Demultiplexing of Network connections is by _ _ _ _ _ _ 

Layer [01M03] Layer [01M03] a. Network Layer. a. Network Layer. . Data Layer  . Data Layer  c. Data Link Layer  c. Data Link Layer  d. Transport Layer d. Transport Layer

8. Two sides cannot attempt the same operation at the same time. This 8. Two sides cannot attempt the same operation at the same time. This

roperty is accomplished by _ _ _ _ _ _ _ _ _ _ Layer [01M04] roperty is accomplished by _ _ _ _ _ _ _ _ _ _ Layer [01M04] a. Session Layer a. Session Layer . Transport Layer  . Transport Layer  c. Physical Layer  c. Physical Layer 

(2)

d. Network Layer  d. Network Layer 

9. The number of layers in the OSI model is _ _ _ _ _ _ _ _ [01S01] 9. The number of layers in the OSI model is _ _ _ _ _ _ _ _ [01S01]

a. 5 a. 5 . 4 . 4 c. 7 c. 7 d. 8 d. 8

10._ _ _ _ _ _ _ Layer contains network virtual terminal [01S02] 10._ _ _ _ _ _ _ Layer contains network virtual terminal [01S02]

a. Application layer a. Application layer . Session layer  . Session layer  c. Presentation layer  c. Presentation layer  d. Data Link Layer  d. Data Link Layer 

11.Presentation Layer is concerned with _ _ _ _ _ _ _ _ _ _ [01S03] 11.Presentation Layer is concerned with _ _ _ _ _ _ _ _ _ _ [01S03]

a. Synchronization a. Synchronization . Flow Control . Flow Control c. Syntax and Semantics c. Syntax and Semantics d. File Transfer.

d. File Transfer.

12.Frame boundaries are recognized and created by _ _ _ _ _ _ _ _ _ Layer. 12.Frame boundaries are recognized and created by _ _ _ _ _ _ _ _ _ Layer.

[01S04] [01S04]

a. Application layer  a. Application layer  . Data Link Layer  . Data Link Layer  c. Session layer c. Session layer d. Network Layer. d. Network Layer.

13.Token Management is the function of _ _ _ _ _ _ _ _ _ _ _ _ Layer. 13.Token Management is the function of _ _ _ _ _ _ _ _ _ _ _ _ Layer.

[01S05] [01S05]

a. Application layer  a. Application layer  . Data Link Layer  . Data Link Layer  c. Session layer  c. Session layer  d. Network Layer. d. Network Layer.

14.The function of Physical Layer is _ _ _ _ _ _ _ _ _ _ _ [01S06] 14.The function of Physical Layer is _ _ _ _ _ _ _ _ _ _ _ [01S06]

a. Error correction and Detection a. Error correction and Detection

. Piggybacking . Piggybacking c. Flow Control c. Flow Control

d. Determine number of volts to represent 1 or 0. d. Determine number of volts to represent 1 or 0.

15.Security and privacy are less of an issue for devices in a _ _ _ _ _ _ _ _  15.Security and privacy are less of an issue for devices in a _ _ _ _ _ _ _ _ 

topology [02D01] topology [02D01] a. bus a. bus . mesh . mesh c. star  c. star  d. tree d. tree

16.A network that contains multiple hubs is most likely configured in a _ _ _  16.A network that contains multiple hubs is most likely configured in a _ _ _ 

 _ _ _ _ topology [02D02]  _ _ _ _ topology [02D02] a. bus a. bus . mesh . mesh c. star  c. star  d. tree d. tree

17.In a network with 25 computers, which topology would require the most 17.In a network with 25 computers, which topology would require the most

extensive cabling. [02D03] extensive cabling. [02D03] a. bus a. bus . mesh . mesh

(3)

c. star  c. star  d. tree d. tree

18.A television broadcast is an example of _ _ _ _ _ _ _ _ _ _ transmission 18.A television broadcast is an example of _ _ _ _ _ _ _ _ _ _ transmission

[02M01] [02M01] a. Simplex a. Simplex . half-duplex . half-duplex c. full-duplex c. full-duplex d. automatic d. automatic 19.Wh

19.Which topology feaich topology features a point-to-tures a point-to- oint line configuoint line configuration? [02M02]ration? [02M02] a. mesh a. mesh . star  . star  c. bus c. bus d. ring d. ring

20.In a mesh topology, the relationship between one device and another is _  20.In a mesh topology, the relationship between one device and another is _ 

 _ _ _ _ _ _ _ _ [02M03]  _ _ _ _ _ _ _ _ [02M03] a. primary-to-peer  a. primary-to-peer  . peer-to-primary . peer-to-primary c. primary-to-secondary c. primary-to-secondary d.

d. pepeer-er-to-to- eereer

21.A cable break in a _ _ _ _ _ _ _ _ _ topology stops all transmission 21.A cable break in a _ _ _ _ _ _ _ _ _ topology stops all transmission

[02M04] [02M04] a. bus a. bus . mesh . mesh c. star  c. star  d. primary d. primary

22.Which topology requires a central controller or hub? [02S01] 22.Which topology requires a central controller or hub? [02S01]

a. mesh a. mesh . star . star c. bus c. bus d. ring d. ring

23.Which topology requires a multipoint connection? [02S02] 23.Which topology requires a multipoint connection? [02S02]

a. mesh a. mesh . star  . star  c. bus c. bus d. ring d. ring

24.Communication between a computer and a keyboard involves _ _ _ _ _ _  24.Communication between a computer and a keyboard involves _ _ _ _ _ _ 

 _ _ _ transmission [02S03]  _ _ _ transmission [02S03] a. Simplex a. Simplex . half-duplex . half-duplex c. full-duplex c. full-duplex d. automatic d. automatic

25.A tree topology is a variation of a _ _ _ _ _ _ _ _ _ topology. [02S04] 25.A tree topology is a variation of a _ _ _ _ _ _ _ _ _ topology. [02S04]

a. mesh a. mesh . star . star c. bus c. bus d. ring d. ring

26.In a _ _ _ _ _ _ _ _ _ _ _ _ topology, if there are n devices in anetwork, 26.In a _ _ _ _ _ _ _ _ _ _ _ _ topology, if there are n devices in anetwork,

each device has n-1 port for cables [02S05] each device has n-1 port for cables [02S05] a. mesh

(4)

. star  . star  c. bus c. bus d. ring d. ring

27.A _ _ _ _ _ _ _ _ _ _ _ connection provides a dedicated link between two 27.A _ _ _ _ _ _ _ _ _ _ _ connection provides a dedicated link between two

devices. [02S06] devices. [02S06] a. p

a. point oint - - to - to - ointoint . multipoint . multipoint c. primary c. primary d. Secondary d. Secondary

28.In a _ _ _ _ _ _ _ _ _ _ connection, more than two devices can share a 28.In a _ _ _ _ _ _ _ _ _ _ connection, more than two devices can share a

single link. [02S07] single link. [02S07] a. p

a. point oint - - to - to - ointoint . multipoint . multipoint c. primary c. primary d. Secondary d. Secondary

29.In _ _ _ _ _ _ _ _ _ _ _ transmission, the channel capacity is shared by 29.In _ _ _ _ _ _ _ _ _ _ _ transmission, the channel capacity is shared by

oth communicating devices at all times. [02S08] oth communicating devices at all times. [02S08] a. Simplex a. Simplex . half-duplex . half-duplex c. full-duplex c. full-duplex d. automatic d. automatic

30.Which Protocol is used for electronic mail ? [03D01] 30.Which Protocol is used for electronic mail ? [03D01]

a. TELNET a. TELNET . NNTP . NNTP c. HTTP c. HTTP d. SMTP d. SMTP

31.The TCP/IP model has connection less communication in _ _ _ _ _ _ _ _ _  31.The TCP/IP model has connection less communication in _ _ _ _ _ _ _ _ _ 

 _ Layer [03D02]  _ Layer [03D02] a. Transport Layer  a. Transport Layer  . Internet layer . Internet layer c. Presentation Layer  c. Presentation Layer  d. Application Layer  d. Application Layer 

32.The functions of internet Layer in TCP/IP are [03M01] 32.The functions of internet Layer in TCP/IP are [03M01]

a. Flow Control and Error Control a. Flow Control and Error Control

. Congestion Control and Flow Control . Congestion Control and Flow Control c. Packet Routing and Flow Control c. Packet Routing and Flow Control

d. Congestion Control and Packet Routing d. Congestion Control and Packet Routing

33.The protocols used in Host to network layer of TCP/IP model are 33.The protocols used in Host to network layer of TCP/IP model are

[03M02] [03M02]

a. TEL NET and LAN a. TEL NET and LAN

. ARPA NET and SAT NET . ARPA NET and SAT NET c. PACKET RADIO and IP c. PACKET RADIO and IP d. LAN and IP

d. LAN and IP

34.HTTP is acronym of [03M03] 34.HTTP is acronym of [03M03]

a. Hyper Text Transfer Protocol a. Hyper Text Transfer Protocol

. Hyper Test Transfer Protocol . Hyper Test Transfer Protocol c. Hyper Text Transport Protocol c. Hyper Text Transport Protocol d. Hyper Text Transport Program d. Hyper Text Transport Program

35.The number of layers in TCP/IP model is _ _ _ _ _ _ _ _ _ [03S01] 35.The number of layers in TCP/IP model is _ _ _ _ _ _ _ _ _ [03S01]

(5)

a. 5 a. 5 . 4 . 4 c. 6 c. 6 d. 7 d. 7

36.Internet Layer in TCP/IP is _ _ _ _ _ _ _ _ _ _ [03S02] 36.Internet Layer in TCP/IP is _ _ _ _ _ _ _ _ _ _ [03S02]

a. Connection Oriented a. Connection Oriented

. Can be Connection Oriented and connection less . Can be Connection Oriented and connection less c. Connection less

c. Connection less

d. Client Server type request d. Client Server type request

37.The protocol defined by internet layer in TCP/IP is _ _ _ _ _ _ _ _  37.The protocol defined by internet layer in TCP/IP is _ _ _ _ _ _ _ _ 

[03S03] [03S03] a. TCP Protocol a. TCP Protocol . UDP Protocol . UDP Protocol c. SMTP c. SMTP d. IP P rotocol d. IP P rotocol

38.Two protocols defined in Transport Layer of TCP/IP are _ _ _ _ _ _ _ _ _  38.Two protocols defined in Transport Layer of TCP/IP are _ _ _ _ _ _ _ _ _ 

 _ _ [03S04]  _ _ [03S04] a. TCP and IP a. TCP and IP . TCP and UDP . TCP and UDP c. UDP and IP c. UDP and IP d. TCP only d. TCP only

39.Which of the following is/are a connection oriented protocol(s)?? _ _ _ _  39.Which of the following is/are a connection oriented protocol(s)?? _ _ _ _ 

 _ _ _ _ _ _ [03S05]  _ _ _ _ _ _ [03S05] a. TCP a. TCP . UDP . UDP c. TCP and UDP c. TCP and UDP d. Neither TCP nor UDP d. Neither TCP nor UDP

40.UDP has the following properties [03S06] 40.UDP has the following properties [03S06]

a. Connection oriented and reliable a. Connection oriented and reliable

. Connection Less and reliable . Connection Less and reliable c. Connection less and Unreliable c. Connection less and Unreliable d. Connection Oriented and Unreliable d. Connection Oriented and Unreliable

41.Which of the following is the Layers of TCP/IP model?? [03S07] 41.Which of the following is the Layers of TCP/IP model?? [03S07]

a. Physical, Network, Transport, Application a. Physical, Network, Transport, Application

. Host to Network, Network, Presentation, Application . Host to Network, Network, Presentation, Application c. Host to Network, Internet, Transport, Application c. Host to Network, Internet, Transport, Application d. Physical, Internet, Session, Application

d. Physical, Internet, Session, Application

42.Which Layer contains High-level protocols in TCP/IP model?? [03S08] 42.Which Layer contains High-level protocols in TCP/IP model?? [03S08]

a. Application a. Application . Presentation . Presentation c. Transport c. Transport d. Internet d. Internet

43.The IP in TCP/IP uses _ _ _ _ _ _ _ _ bit addresses but IPX in Novell 43.The IP in TCP/IP uses _ _ _ _ _ _ _ _ bit addresses but IPX in Novell

Netware uses _ _ _ _ _ _ _ bit addresses [04D01] Netware uses _ _ _ _ _ _ _ bit addresses [04D01] a. 4, 12 a. 4, 12 . 12, 4 . 12, 4 c. 8, 16 c. 8, 16 d. 16, 8 d. 16, 8

44.In the earlier ARPA NET each node of network consisted [04D02] 44.In the earlier ARPA NET each node of network consisted [04D02]

(6)

a. TIP & a host a. TIP & a host . BBN & a host . BBN & a host c. IMP & a host c. IMP & a host d. SAP & a host d. SAP & a host

45.Novell Netware is based on _ _ _ _ _ _ _ _ _ _ _ [04M01] 45.Novell Netware is based on _ _ _ _ _ _ _ _ _ _ _ [04M01]

a. XNS a. XNS . OSI . OSI c. TCP/IP c. TCP/IP d. TIP d. TIP

46.The protocols used in Transport layer of Novell Netware _ _ _ _ _ _ _ _ _  46.The protocols used in Transport layer of Novell Netware _ _ _ _ _ _ _ _ _ 

[04M02] [04M02] a. NCP & SAP a. NCP & SAP . NCP & IPX . NCP & IPX c. NCP & SPX c. NCP & SPX d. NCP & TIP d. NCP & TIP

47.IPX in Novell Netware is functionally similar to _ _ _ _ _ _ _ _ _ _  47.IPX in Novell Netware is functionally similar to _ _ _ _ _ _ _ _ _ _ 

Protocol [04M03] Protocol [04M03] a. TCP a. TCP . IP . IP c. UDP c. UDP d. SAP d. SAP

48.The address in Novell Netware contains [04M04] 48.The address in Novell Netware contains [04M04]

a.

a. 32- 32- it it Network Network NumbNumber, 4er, 48-8- it it MachiMachine ne NumbNumber er & 1& 16-6- it it LocalLocal address

address . 16-

. 16- it it NetwoNetwork Numrk Number, 32-ber, 32- it it Machine Machine NumbeNumber & r & 48-48- it it Local Local addressaddress c. 48-

c. 48- it it NetwoNetwork Numrk Number, 16-ber, 16- it it MachiMachine Nne Number umber & & 32-32- it Lit Local ocal addressaddress d. 16-

d. 16- it it NetwoNetwork Numrk Number, 48-ber, 48- it it Machine Machine NumbeNumber & r & 32-32- it it Local Local addressaddress 49.The physical layer of Novell Netware consists of _ _ _ _ _ _ _ _ _ _ _  49.The physical layer of Novell Netware consists of _ _ _ _ _ _ _ _ _ _ _ 

rotocol [04S01] rotocol [04S01] a. IPX a. IPX . NCP . NCP c. SAP c. SAP d. ARC NET d. ARC NET

50.The connection oriented transport protocol in Novell Netware is _ _ _ _ _  50.The connection oriented transport protocol in Novell Netware is _ _ _ _ _ 

 _ _ _ _ _ [04S02]  _ _ _ _ _ [04S02] a. NCP a. NCP . IPX . IPX c. SAP c. SAP d. Ethernet d. Ethernet

51.IPX is used in _ _ _ _ _ _ _ _ _ _ layer of Novell Netware [04S03] 51.IPX is used in _ _ _ _ _ _ _ _ _ _ layer of Novell Netware [04S03]

a. Application a. Application . Transport . Transport c. Network  c. Network  d. Physical d. Physical

52.Expand SAP in Novell Netware [04S04] 52.Expand SAP in Novell Netware [04S04]

a. Service access point a. Service access point . Special Access Point . Special Access Point c. Service access protocol c. Service access protocol d. Service Advertising Protocol d. Service Advertising Protocol

53.Minicomputers in ARPANET are called [04S05] 53.Minicomputers in ARPANET are called [04S05]

(7)

a. ARPA Computers a. ARPA Computers . IMP . IMP c. BBN c. BBN d. DARPA Computers d. DARPA Computers

54.Expand TIP in ARPA NET [04S06] 54.Expand TIP in ARPA NET [04S06]

a. Touch Interest protocol a. Touch Interest protocol

. Terminal Interface protocol . Terminal Interface protocol c. Transport International Protocol c. Transport International Protocol d. Terminal Interface protocol d. Terminal Interface protocol

55._ _ _ _ _ _ _ _ _ _ was created to organize machines into Domains and 55._ _ _ _ _ _ _ _ _ _ was created to organize machines into Domains and

map hostnames into IP addresses. [04S07] map hostnames into IP addresses. [04S07] a. BBN a. BBN . IMP . IMP c. TIP c. TIP d. DNS d. DNS

56.Internet is based on _ _ _ _ _ _ _ _ _ protocol stack. [04S08] 56.Internet is based on _ _ _ _ _ _ _ _ _ protocol stack. [04S08]

a. XNS a. XNS . IMP . IMP c. TCP/IP c. TCP/IP d. SAP d. SAP

57.The topology not used in LAN is _ _ _ _ _ _ _ _ _ [05D01] 57.The topology not used in LAN is _ _ _ _ _ _ _ _ _ [05D01]

a. Ring a. Ring . Star  . Star  c. Bus c. Bus d. Mesh d. Mesh

58.When packets are small and all are equal sized then they are called _ _ _  58.When packets are small and all are equal sized then they are called _ _ _ 

 _ _ _ _ _ _ [05D02]  _ _ _ _ _ _ [05D02] a. Frames a. Frames . Small Packets . Small Packets c. Cells c. Cells d. Atoms d. Atoms

59.Irregular topologies are used in _ _ _ _ _ _ _ _ _ _ [05D03] 59.Irregular topologies are used in _ _ _ _ _ _ _ _ _ _ [05D03]

a. LAN a. LAN . WAN . WAN c. MAN c. MAN d. Broadcast Networks d. Broadcast Networks

60.Traditional LANs run at the speed of [05M01] 60.Traditional LANs run at the speed of [05M01]

a. 100 to 1000 MBPS a. 100 to 1000 MBPS . 1000 to 10000 MBPS . 1000 to 10000 MBPS c. 10 to 100 MBPS c. 10 to 100 MBPS d. 10 to 100 GBPS d. 10 to 100 GBPS

61.Which of the following is not a characteristic of LAN [05M02] 61.Which of the following is not a characteristic of LAN [05M02]

a. Size a. Size . Transmission Technology . Transmission Technology c. Topology c. Topology d. Routers d. Routers

62.In static allocation of channel in LAN Broadcast Networks _ _ _ _ _ _ _ _  62.In static allocation of channel in LAN Broadcast Networks _ _ _ _ _ _ _ _ 

 _ _ algorithm is used [05M03]  _ _ algorithm is used [05M03]

a. FCFS a. FCFS

(8)

. Round Robin . Round Robin c. Shortest Frame first c. Shortest Frame first d. High priority first d. High priority first

63.In _ _ _ _ _ _ _ _ _ Network, there is a broadcast medium to which all 63.In _ _ _ _ _ _ _ _ _ Network, there is a broadcast medium to which all

computers are attached [05M04] computers are attached [05M04] a. MAN a. MAN . LAN . LAN c. WAN c. WAN d. Broadcast Networks d. Broadcast Networks

64.Privately owned networks are _ _ _ _ _ _ _ _ [05S01] 64.Privately owned networks are _ _ _ _ _ _ _ _ [05S01]

a. MAN a. MAN . LAN . LAN c. WAN c. WAN d. Broadcast Networks d. Broadcast Networks

65.Worst-case time is bounded in _ _ _ _ _ _ _ _ _ _ [05S02] 65.Worst-case time is bounded in _ _ _ _ _ _ _ _ _ _ [05S02]

a. LAN a. LAN . MAN . MAN c. WAN c. WAN d. Broadcast Networks d. Broadcast Networks

66._ _ _ _ _ _ Broadcast Networks can be divided into Static and dynamic 66._ _ _ _ _ _ Broadcast Networks can be divided into Static and dynamic

depending on channel allocation [05S03] depending on channel allocation [05S03] a. MAN a. MAN . LAN . LAN c. Broadcast Networks c. Broadcast Networks d. WAN d. WAN

67.Local Cable TV Network is an example for _ _ _ _ _ _ _ _ _ _ [05S04] 67.Local Cable TV Network is an example for _ _ _ _ _ _ _ _ _ _ [05S04]

a. WAN a. WAN . Broadcast . Broadcast c. LAN c. LAN d. MAN d. MAN

68.The IEEE standard for DQDB is _ _ _ _ _ _ _ [05S05] 68.The IEEE standard for DQDB is _ _ _ _ _ _ _ [05S05]

a. 802.3 a. 802.3 . 802.4 . 802.4 c. 802.6 c. 802.6 d. 802.5 d. 802.5

69.Hosts in WAN are connected by _ _ _ _ _ _ _ _ _ _ _ _ [05S06] 69.Hosts in WAN are connected by _ _ _ _ _ _ _ _ _ _ _ _ [05S06]

a. Communication Line a. Communication Line . Subnet . Subnet c. Router  c. Router 

d. Another host Computer  d. Another host Computer 

70.Which one is not a transmission line? [05S07] 70.Which one is not a transmission line? [05S07]

a. Circuits a. Circuits . Channels . Channels c. Trunks c. Trunks d. Paths d. Paths

71.Satellite or ground radio is an example for _ _ _ _ _ _ _ [05S08] 71.Satellite or ground radio is an example for _ _ _ _ _ _ _ [05S08]

a. WAN a. WAN . MAN . MAN c. LAN c. LAN

(9)

d. Broadcast Networks d. Broadcast Networks

72.LASERs face a inhibition on [06D01] 72.LASERs face a inhibition on [06D01]

a. sunny day a. sunny day . dry day . dry day c. windy day c. windy day d. rainy day d. rainy day

73._ _ _ _ _ _ _ _ transmission has more suitable for indoor wireless LANs 73._ _ _ _ _ _ _ _ transmission has more suitable for indoor wireless LANs

[06D02] [06D02] a. radio a. radio . micro wave . micro wave c. infra red c. infra red d. light wave d. light wave

74._ _ _ _ _ _ _ _ _ category twisted pairs are called as unshielded twisted 74._ _ _ _ _ _ _ _ _ category twisted pairs are called as unshielded twisted

air [06D03] air [06D03] a. Category 1 a. Category 1 . Category 3 . Category 3 c. Category 5 c. Category 5

d. Category 3 & Category 5 d. Category 3 & Category 5

75.Which of the following is not considered an important use of microwaves 75.Which of the following is not considered an important use of microwaves

[06D04] [06D04] a. Industrial bands a. Industrial bands . scientific bands . scientific bands c. medical bands c. medical bands d. entertainment bands d. entertainment bands

76.The number of oscillations per second of anelectromagnetic wave is 76.The number of oscillations per second of anelectromagnetic wave is

called its _ _ _ _ _ _ _ and is measured in _ _ _ _ _ _ _ _ [06M01] called its _ _ _ _ _ _ _ and is measured in _ _ _ _ _ _ _ _ [06M01] a. wave length ,mts a. wave length ,mts . frequency,Hz . frequency,Hz c. amplitude, mts c. amplitude, mts d. time period, secs d. time period, secs

77.The mode of transmission most suitable is _ _ _ _ _ _ _ [06M02] 77.The mode of transmission most suitable is _ _ _ _ _ _ _ [06M02]

a. twisted pair  a. twisted pair  . fibre optics . fibre optics c. wireless c. wireless d. coax d. coax

78.A modern application to connect the LANs in two buildings is through _ _  78.A modern application to connect the LANs in two buildings is through _ _ 

 _ _ _ _ _ _ transmission [06M03]  _ _ _ _ _ _ transmission [06M03] a. radio a. radio . micro wave . micro wave c. infra red c. infra red d. light wave d. light wave

79.What is advantage of twists for a wire _ _ _ _ _ _ _ [06M04] 79.What is advantage of twists for a wire _ _ _ _ _ _ _ [06M04]

a. Data lose a. Data lose . Noise reduction . Noise reduction c. No noise c. No noise d. Added noise d. Added noise

80.In fiber optics a pulse of light indicates _ _ _ _ _ _ [06S01] 80.In fiber optics a pulse of light indicates _ _ _ _ _ _ [06S01]

a. 1 bit a. 1 bit . 0 bit . 0 bit

(10)

c. 1 byte c. 1 byte d. 8 bits d. 8 bits

81._ _ _ _ _ _ kind of coaxial cable is used for analog transmission [06S02] 81._ _ _ _ _ _ kind of coaxial cable is used for analog transmission [06S02]

a. Base band a. Base band . Broad band . Broad band c. Category 3 c. Category 3 d. Fiber  d. Fiber  82.As we go fr

82.As we go from long-om long- ave radiave radio towards visio towards visible lighble light, the waves beht, the waves behaveave more and more like _ _ _ _ _ _ and less and less like _ _ _ _ _ _ _ _  more and more like _ _ _ _ _ _ and less and less like _ _ _ _ _ _ _ _  [06S03] [06S03] a. radio, light a. radio, light . light., radio . light., radio c. radio , micro wave c. radio , micro wave d. micro wave, light d. micro wave, light

83.Multipath fading _ _ _ _ _ _ _ _ the signal [06S04] 83.Multipath fading _ _ _ _ _ _ _ _ the signal [06S04]

a. enhances a. enhances . adds to . adds to c. cancels c. cancels d. maximizes d. maximizes

84.In micro wave transmission concentrating all the energy into a small 84.In micro wave transmission concentrating all the energy into a small eam using a parabolic antenna gives a _ _ _ _ _ _ _ _ signal to noise eam using a parabolic antenna gives a _ _ _ _ _ _ _ _ signal to noise ratio [06S05] ratio [06S05] a. lower  a. lower  . higher . higher c. degraded c. degraded d. subtle d. subtle

85.Radio waves are _ _ _ _ _ _ _ _ _ [06S06] 85.Radio waves are _ _ _ _ _ _ _ _ _ [06S06]

a. uni directional a. uni directional . bi directional . bi directional c. multidirectional c. multidirectional d. omnidirectional d. omnidirectional

86.The fundamental relation between frequency (f), wave length (l) and 86.The fundamental relation between frequency (f), wave length (l) and

speed(c) [06S07] speed(c) [06S07] a. f*c=l a. f*c=l . f/l=c . f/l=c c. l*c=f  c. l*c=f  d. f*l=c d. f*l=c 87.Speed of light is [06S08] 87.Speed of light is [06S08]

a.

a.

33**1100 88 mm//ss

 b.

 b.

33**1100 88 ccmm//sseecc

c.

c.

33**1100 99 mm//ss

d.

d.

33**1100 99 ccmm//sseecc

88.In transparent Bridges, all the decisions are made by looking into _ _ _ _  88.In transparent Bridges, all the decisions are made by looking into _ _ _ _ 

 _ _ _ _ _ [07D01]  _ _ _ _ _ [07D01] a. Advertisement Tables a. Advertisement Tables . Description Tables . Description Tables c. Hash Tables c. Hash Tables d. Fragment Tables d. Fragment Tables

(11)

89.If destination LAN is unknown in Transparent Bridges then we use _ _ _ _  89.If destination LAN is unknown in Transparent Bridges then we use _ _ _ _ 

 _ _ _ _ _ _ [07D02]  _ _ _ _ _ _ [07D02] a. Link State Routing a. Link State Routing

. Flooding . Flooding

c. Shortest Path Routing c. Shortest Path Routing d. Flow Based Routing d. Flow Based Routing

90.Which among the below of source routing bridges is complex? [07D03] 90.Which among the below of source routing bridges is complex? [07D03]

a. Hardware a. Hardware . Software . Software c. Hybrid c. Hybrid d. Remote d. Remote 91.Configuration of _ _ _ _ _ _ _ _ _ _ _ _ is manual [07D04] 91.Configuration of _ _ _ _ _ _ _ _ _ _ _ _ is manual [07D04] a. Transparent a. Transparent . Spanning Tree . Spanning Tree c. Remote c. Remote d. Source Routing d. Source Routing

92.In LAN with token ring topology, _ _ _ _ _ _ _ _ _ _ _ are used [07D05] 92.In LAN with token ring topology, _ _ _ _ _ _ _ _ _ _ _ are used [07D05]

a. Transparent a. Transparent . Spanning Tree . Spanning Tree c. Remote c. Remote d. Source Routing d. Source Routing

93.A configuration of N LANs is linearly connected by 4 bridges. By the time 93.A configuration of N LANs is linearly connected by 4 bridges. By the time e reach the Nth LAN how many discovery frames will be circulating? e reach the Nth LAN how many discovery frames will be circulating? [07D06] [07D06]

a.

a.

 N N44

 b.

 b.

44

c.

c.

44 N N

d.

d.

 N N

94.Which of the following is not an internetworking device? [07M01] 94.Which of the following is not an internetworking device? [07M01]

a. Bridge a. Bridge . Repeater  . Repeater  c. Router  c. Router  d. Cable d. Cable

95.What type of bridge must have its address table entered manually? 95.What type of bridge must have its address table entered manually?

[07M02] [07M02] a. Simple a. Simple . Transparent . Transparent c. Multi port c. Multi port d. Source routing d. Source routing

96.A bridge has access to the _ _ _ _ _ _ _ _ _ _ _ address of a station on 96.A bridge has access to the _ _ _ _ _ _ _ _ _ _ _ address of a station on

the same network. [07M03] the same network. [07M03] a. Physical

a. Physical . Network  . Network 

c. Service access point c. Service access point d. Logical

d. Logical

97.In source routing bridges _ _ _ _ _ _ _ _ _ frame is used to discover the 97.In source routing bridges _ _ _ _ _ _ _ _ _ frame is used to discover the

destination [07M04] destination [07M04]

(12)

a. Discovery a. Discovery . Control . Control c. Data c. Data d. Acknowledgement d. Acknowledgement

98.LAN's can be connected by a device called _ _ _ _ _ _ _ _ _ _ [07M05] 98.LAN's can be connected by a device called _ _ _ _ _ _ _ _ _ _ [07M05]

a. Routers a. Routers . Modems . Modems c. Ethernet card c. Ethernet card d. Bridges d. Bridges

99.In _ _ _ _ _ _ _ _ all frames are given to the computer, not to those 99.In _ _ _ _ _ _ _ _ all frames are given to the computer, not to those

addressed [07M06] addressed [07M06] a. Promiscuous mode a. Promiscuous mode . Miscues mode . Miscues mode c. Normal mode c. Normal mode d. Special Mode d. Special Mode

100._ _ _ _ _ _ Algorithm is used in transparent bridges [07S01] 100._ _ _ _ _ _ Algorithm is used in transparent bridges [07S01]

a. Forward Learning a. Forward Learning

. Backward Learning . Backward Learning c. Reverse Backward Learning c. Reverse Backward Learning d. Reverse Forward Learning d. Reverse Forward Learning 101.In trans

101.In trans arent bridges the failuarent bridges the failures are handled bres are handled by _ _ y _ _ _ _ _ _ _ _ _ [07S02]_ [07S02] a. Host a. Host . Bridge . Bridge c. Network layer  c. Network layer  d. Router  d. Router 

102.CSMA/CD and token bus user choose _ _ _ _ _ _ bridge [07S03] 102.CSMA/CD and token bus user choose _ _ _ _ _ _ bridge [07S03]

a. Source routing bridge a. Source routing bridge . Transparent bridge . Transparent bridge c. Remote bridge c. Remote bridge d. Selective Bridges d. Selective Bridges

103._ _ _ _ _ _ bridge operates in promiscuous mode [07S04] 103._ _ _ _ _ _ bridge operates in promiscuous mode [07S04]

a. Transparent bridge a. Transparent bridge . Selective flooding . Selective flooding c. Source Routing c. Source Routing d. Remote Bridges d. Remote Bridges

104.In source routing bridges each LAN has a unique _ _ _ _ _ _ bit no. 104.In source routing bridges each LAN has a unique _ _ _ _ _ _ bit no.

[07S05] [07S05] a. 10 a. 10 . 8 . 8 c. 16 c. 16 d. 12 d. 12

105.Source routing bridges in the same LANs must have _ _ _ _ _ _ _ _  105.Source routing bridges in the same LANs must have _ _ _ _ _ _ _ _ 

ridge Number [07S06] ridge Number [07S06] a. Same a. Same . Different . Different c. Source c. Source d. Destination d. Destination

106.Repeater function in the _ _ _ _ _ _ _ _ _ layer [07S07] 106.Repeater function in the _ _ _ _ _ _ _ _ _ layer [07S07]

a. Physical a. Physical

(13)

. Data link  . Data link  c. Network  c. Network  d. Transport d. Transport

107.Bridges function in the _ _ _ _ _ _ _ layer. [07S08] 107.Bridges function in the _ _ _ _ _ _ _ layer. [07S08]

a. Physical a. Physical . Data link  . Data link  c. Network  c. Network  d. Transport d. Transport

108.A repeater takes a weakened or corrupted signal and _ _ _ _ _ _ _ _ _ _  108.A repeater takes a weakened or corrupted signal and _ _ _ _ _ _ _ _ _ _ 

it [07S09] it [07S09] a. Amplifies a. Amplifies . Regenerates . Regenerates c. Resample c. Resample d. Reroute d. Reroute

109.The PSTN is an example of _ _ _ _ _ _ _ network [08D01] 109.The PSTN is an example of _ _ _ _ _ _ _ network [08D01]

a. packet-switched a. packet-switched . circuit-switched . circuit-switched c. message-switched c. message-switched d. TSI d. TSI

110.In _ _ _ _ _ _ _ _, each packet of a message follows the same path from 110.In _ _ _ _ _ _ _ _, each packet of a message follows the same path from

sender to receiver [08D02] sender to receiver [08D02] a. Circuit switching a. Circuit switching . message switching . message switching

c. a virtual approach to packet switching c. a virtual approach to packet switching d. The datagram approach to packet switching d. The datagram approach to packet switching

111.In a time division switch, a _ _ _ _ _ _ _ governs the destination of a 111.In a time division switch, a _ _ _ _ _ _ _ governs the destination of a

acket stored in RAM [08D03] acket stored in RAM [08D03] a. TDM bus a. TDM bus . cross bar  . cross bar  c. cross point c. cross point d. control unit d. control unit

112.How many cross points are needed in a single stage switch with 40 112.How many cross points are needed in a single stage switch with 40

inputs and 50 outputs [08M01] inputs and 50 outputs [08M01] a. 40 a. 40 . 50 . 50 c. 90 c. 90 d. 2000 d. 2000

113.The _ _ _ _ _ _ _ _ _ of A TSI controls the order of delivering of slot 113.The _ _ _ _ _ _ _ _ _ of A TSI controls the order of delivering of slot

alues that are stored in RAM [08M02] alues that are stored in RAM [08M02] a. cross bar  a. cross bar  . cross point . cross point c. control unit c. control unit d. transreceiver d. transreceiver

114.In _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data is delayed 114.In _ _ _ _ _ _ _ _ _ _ circuit switching, delivery of data is delayed ecause data must be stored and retrieved from RAM. [08M03] ecause data must be stored and retrieved from RAM. [08M03] a. Space-division a. Space-division . time-division . time-division c. virtual c. virtual d. packet d. packet

115.To create a _ _ _ _ _ _ _, combine crossbar switches in stages [08M04] 115.To create a _ _ _ _ _ _ _, combine crossbar switches in stages [08M04]

(14)

a. Multistage switch a. Multistage switch . cross point . cross point c. packet switch c. packet switch d. TSI d. TSI

116.In _ _ _ _ _ _ _ _ _ each packet of a message need not follow the same 116.In _ _ _ _ _ _ _ _ _ each packet of a message need not follow the same

ath From sender to receiver [08M05] ath From sender to receiver [08M05] a. Circuit switching

a. Circuit switching . message switching . message switching

c. a virtual approach to packet switching c. a virtual approach to packet switching

d. The datagram approach to packet switching d. The datagram approach to packet switching

117.An important property of circuit switching is the need to setup an 117.An important property of circuit switching is the need to setup an

end-to-end path _ _ _ _ _ _ _ _ any data can be sent [08S01] to-end path _ _ _ _ _ _ _ _ any data can be sent [08S01] a. after 

a. after  . before . before

c. along with which c. along with which d. avoiding which d. avoiding which 118.The elapsed

118.The elapsed time time etween the end of etween the end of dialing and dialing and the start of the start of ringing canringing can e a minimum of _ _ _ _ _ _ _ _ _ [08S02] e a minimum of _ _ _ _ _ _ _ _ _ [08S02] a. 1sec a. 1sec . 10sec . 10sec c. 100sec c. 100sec d. 1000sec d. 1000sec

119.A network using message switching is called _ _ _ _ _ _ [08S03] 119.A network using message switching is called _ _ _ _ _ _ [08S03]

a. store-and-forward a. store-and-forward . forward-and-store . forward-and-store c. store-and-send c. store-and-send d. send-and-store d. send-and-store

120._ _ _ _ _ _ _ _ Networks place a tight upper limit on block size, allowing 120._ _ _ _ _ _ _ _ Networks place a tight upper limit on block size, allowing

ackets to be buffered in router main memory instead of on disk. [08S04] ackets to be buffered in router main memory instead of on disk. [08S04] a. Message switching a. Message switching . circuit switching . circuit switching c. packet switching c. packet switching d. store-and-forward d. store-and-forward

121.Which type of switching uses the entire capacity of a dedicated link? 121.Which type of switching uses the entire capacity of a dedicated link?

[08S05] [08S05]

a. Circuit switching a. Circuit switching

. datagram packet switching . datagram packet switching c. virtual circuit packet switching c. virtual circuit packet switching d. Message switching

d. Message switching

122.The _ _ _ _ _ _ is a device that connects n inputs to m outputs [08S06] 122.The _ _ _ _ _ _ is a device that connects n inputs to m outputs [08S06]

a. Cross point a. Cross point . cross bar . cross bar c. modem c. modem d. RAM d. RAM

123.In which type of switching do all the datagrams of a message follow the 123.In which type of switching do all the datagrams of a message follow the

same channels of a path [08S07] same channels of a path [08S07] a. Circuit switching

a. Circuit switching

. datagram packet switching . datagram packet switching c. virtual circuit packet switching c. virtual circuit packet switching d. message switching

(15)

124.which ISDN plane is associated with signaling another D channel 124.which ISDN plane is associated with signaling another D channel

[09D01] [09D01] a. user a. user . control . control c. management c. management d. supervise d. supervise

125.When you store and forward messages in B-ISDN, you are using _ _ _ _  125.When you store and forward messages in B-ISDN, you are using _ _ _ _ 

 _ _ _ _ services [09D02]  _ _ _ _ services [09D02] a. Conversational a. Conversational . messaging . messaging c. retrieval c. retrieval d. distributive d. distributive 126.Commercial TV is an example of [09D03] 126.Commercial TV is an example of [09D03] a. messaging services a. messaging services . Conversational services . Conversational services

c. distributional services without user control c. distributional services without user control d. distributional services with user control d. distributional services with user control

127.The normal user interface to an ISDN is PRI or _ _ _ _ _ _ _ _ _ [09D04] 127.The normal user interface to an ISDN is PRI or _ _ _ _ _ _ _ _ _ [09D04]

a. Bit Rate Interface a. Bit Rate Interface . Basic Rate Interface . Basic Rate Interface c. Byte Rate Interface c. Byte Rate Interface d. Broad Rate Interface d. Broad Rate Interface

128.The reference point U is a specification for connecting the ISDN office 128.The reference point U is a specification for connecting the ISDN office

ith _ _ _ _ _ _ _ _ _ _ [09M01] ith _ _ _ _ _ _ _ _ _ _ [09M01] a. NT1 a. NT1 . NT2 . NT2 c. TE1 c. TE1 d. TE2 d. TE2

129.A banyan switch parsers the output line number from _ _ _ _ _ _ _ _  129.A banyan switch parsers the output line number from _ _ _ _ _ _ _ _ 

[09M02] [09M02] a. snake-like a. snake-like . left to right . left to right c. right to left c. right to left d. top to bottom d. top to bottom

130.For n line, the complexity of a batcher switch grows like _ _ _ _ _ _ _ _ _  130.For n line, the complexity of a batcher switch grows like _ _ _ _ _ _ _ _ _ 

[09M03] [09M03] a. Log n a. Log n

 b.

 b.

nn22 c. n log n c. n log n

d.

d.

n n lloogg 22nn

131.The ISDN equivalent of DTE is [09M04] 131.The ISDN equivalent of DTE is [09M04]

a. TE1 a. TE1 . TE2 . TE2 c. NT1 c. NT1 d. TA d. TA

132.ISDN is an acronym for _ _ _ _ _ _ _ _. [09S01] 132.ISDN is an acronym for _ _ _ _ _ _ _ _. [09S01]

a. Information Services for Digital Networks a. Information Services for Digital Networks

. Internetwork System for Data Networks . Internetwork System for Data Networks c. Integrated Services Digital Network  c. Integrated Services Digital Network 

(16)

d. Integrated Signals Digital Network  d. Integrated Signals Digital Network 

133.Which of the following channel types is not standardized [09S02] 133.Which of the following channel types is not standardized [09S02]

a. 4 kHz analog telephone channel a. 4 kHz analog telephone channel

. 64kbps digital PCM channel for voice or data . 64kbps digital PCM channel for voice or data c. 16 kbps digital channel

c. 16 kbps digital channel d. 16 kbps analog channel d. 16 kbps analog channel

134.Equipment that performs functions related to the OSI model's layers 1, 2 134.Equipment that performs functions related to the OSI model's layers 1, 2

& 3 is called _ _ _ _ _ _ _ _. [09S03] & 3 is called _ _ _ _ _ _ _ _. [09S03] a. NT1 a. NT1 . NT2 . NT2 c. NT3 c. NT3 d. NT4 d. NT4

135.The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual 135.The key idea behind ISDN is that of the _ _ _ _ _ _ _ _ _, a conceptual ipe between the customer and the carrier through which bits flow ipe between the customer and the carrier through which bits flow [09S04]

[09S04]

a. digital byte pipe a. digital byte pipe . analog bit pipe . analog bit pipe c. digital pipe c. digital pipe d. digital bit pipe d. digital bit pipe

136.The digital bit pipe can support multiple independent channels by _ _ _  136.The digital bit pipe can support multiple independent channels by _ _ _ 

 _ _ _ _ _ _ of the bit stream. [09S05]  _ _ _ _ _ _ of the bit stream. [09S05]

a. time division multiplexing a. time division multiplexing . space division multiplexing . space division multiplexing c. frequency division multiplexing c. frequency division multiplexing d. amplitude division multiplexing d. amplitude division multiplexing 137.What is PBX [09S06]

137.What is PBX [09S06] a. Public Branch eXchange a. Public Branch eXchange

. Public Band exchange . Public Band exchange c. Private Branch eXchange c. Private Branch eXchange d. Public Band eXchange d. Public Band eXchange

138.A _ _ _ _ _ _ _ _ _ provides a connection or a set of connection between 138.A _ _ _ _ _ _ _ _ _ provides a connection or a set of connection between

switches. [10D01] switches. [10D01] a. Transmission path a. Transmission path . Virtual path . Virtual path c. Virtual circuit c. Virtual circuit d. Virtual connection d. Virtual connection

139.A _ _ _ _ _ _ _ _ _ _ is the physical connection between an end point 139.A _ _ _ _ _ _ _ _ _ _ is the physical connection between an end point

and a switch or between two switches. [10D02] and a switch or between two switches. [10D02] a. Transmission path a. Transmission path . Virtual path . Virtual path c. Virtual circuit c. Virtual circuit d. Virtual connection d. Virtual connection

140.The VPI of a UNI is _ _ _ _ _ _ _ _ _ _ _ _ bits in length [10D03] 140.The VPI of a UNI is _ _ _ _ _ _ _ _ _ _ _ _ bits in length [10D03]

a. 8 a. 8 . 12 . 12 c. 16 c. 16 d. 24 d. 24

141.The VPI of a NNI is _ _ _ _ _ _ _ _ _ bits in length [10D04] 141.The VPI of a NNI is _ _ _ _ _ _ _ _ _ bits in length [10D04]

a. 8 a. 8

(17)

. 12 . 12 c. 16 c. 16 d. 24 d. 24

142.In a VP switch the _ _ _ _ _ _ _ _ does not change while the _ _ _ _ _ _  142.In a VP switch the _ _ _ _ _ _ _ _ does not change while the _ _ _ _ _ _ 

 _ _ can change . [10D05]  _ _ can change . [10D05] a. VPI, VCI a. VPI, VCI . VCI, VPI . VCI, VPI c. VP, VPC c. VP, VPC d. VPC, VP d. VPC, VP

143.In a _ _ _ _ _ _ _ switch, both the VPI and VCI can changes [10D06] 143.In a _ _ _ _ _ _ _ switch, both the VPI and VCI can changes [10D06]

a. VP a. VP . VPC . VPC c. VPI c. VPI d. VCI d. VCI

144.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header and 2 144.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header and 2

ytes of trailer

ytes of trailer are added are added to a 45- to a 45- yte payload. [10M01]yte payload. [10M01] a. AAL1 a. AAL1 . AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

145.In the SAR sublayer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and 145.In the SAR sublayer of _ _ _ _ _ _ _ _ _ , the payload is 48 bytes and

there is no added header or trailer. [10M02] there is no added header or trailer. [10M02] a. AAL1 a. AAL1 . AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

146.A _ _ _ _ _ _ _ _ _ field on a UNI cell header is used for connection 146.A _ _ _ _ _ _ _ _ _ field on a UNI cell header is used for connection

urposes. [10M03] urposes. [10M03]

a. VPI ( Virtual path identifier) a. VPI ( Virtual path identifier)

. VCI (Virtual circuit identifier ) . VCI (Virtual circuit identifier ) c. CLP(Cell loss priority)

c. CLP(Cell loss priority) d. GFC(generic flow constant) d. GFC(generic flow constant)

147.A _ _ _ _ _ _ _ _ _ _ _ field on a cell header in the ATM layer determines 147.A _ _ _ _ _ _ _ _ _ _ _ field on a cell header in the ATM layer determines

hether a cell can be dropped. [10M04] hether a cell can be dropped. [10M04] a. VPI ( Virtual path identifier)

a. VPI ( Virtual path identifier) . VCI (Virtual circuit identifier ) . VCI (Virtual circuit identifier ) c. CLP(Cell loss priority) c. CLP(Cell loss priority) d. GFC(generic flow constant) d. GFC(generic flow constant)

148.ATM multiplexes cells using _ _ _ _ _ _ _ _ _ _ [10M05] 148.ATM multiplexes cells using _ _ _ _ _ _ _ _ _ _ [10M05]

a. Asynchronous FDM a. Asynchronous FDM . Synchronous FDM . Synchronous FDM c. Asynchronous TDM c. Asynchronous TDM d. Synchronous TDM d. Synchronous TDM

149.In an ATM network, all cells belonging to a single message follow the 149.In an ATM network, all cells belonging to a single message follow the same _ _ _ _ _ _ _ and remain in their original order until they reach same _ _ _ _ _ _ _ and remain in their original order until they reach their destination. [10M06] their destination. [10M06] a. Transmission path a. Transmission path . Virtual path . Virtual path c. Virtual circuit c. Virtual circuit d. Virtual connection d. Virtual connection

(18)

150.The ATM _ _ _ _ _ _ _ _ _ _ _ _ _ _ sub layer is concerned with getting 150.The ATM _ _ _ _ _ _ _ _ _ _ _ _ _ _ sub layer is concerned with getting

the bits on and off the wire [10S01] the bits on and off the wire [10S01] a. Physical Layer a. Physical Layer . ATM Layer  . ATM Layer  c. AAL1 c. AAL1 d. AAL2 d. AAL2

151.In data communications, ATM is an acronym for [10S02] 151.In data communications, ATM is an acronym for [10S02]

a. Automated Transfer Mode a. Automated Transfer Mode

. Automatic Transfer Modulation . Automatic Transfer Modulation c. Automatic Transport Mode c. Automatic Transport Mode d. Asynchronous Transfer Mode d. Asynchronous Transfer Mode

152.Because ATM _ _ _ _ _ _ _ _ _ _ , which means that cells follow the 152.Because ATM _ _ _ _ _ _ _ _ _ _ , which means that cells follow the

same path, the cells do not usually arrive out of order. [10S03] same path, the cells do not usually arrive out of order. [10S03] a. is asynchronous a. is asynchronous . is multiplexed . is multiplexed c. is a network  c. is a network 

d. uses virtual circuit routing d. uses virtual circuit routing

153.Which layer in ATM protocol reformats the data received from other 153.Which layer in ATM protocol reformats the data received from other

networks? [10S04] networks? [10S04] a. Physical a. Physical . ATM . ATM c. Application adaptation c. Application adaptation d. Data adaptation d. Data adaptation 154.Which layer in

154.Which layer in ATM protocol haATM protocol has a 53-s a 53- yte cell as yte cell as an end an end productproduct [10S05] [10S05] a. Physical a. Physical . ATM . ATM c. Application adaptation c. Application adaptation d. Data adaptation d. Data adaptation

155.Which AAL type can best process a data stream having a nonconstant bit 155.Which AAL type can best process a data stream having a nonconstant bit

rate? [10S06] rate? [10S06] a. AAL1 a. AAL1 . AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

156.Which AAL type is designed to support a data stream that has a constant 156.Which AAL type is designed to support a data stream that has a constant

it rate? [10S07] it rate? [10S07] a. AAL1 a. AAL1 . AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

157.Which AAL type is designed to support conventional packet switching 157.Which AAL type is designed to support conventional packet switching

that uses the virtual circuit approach? [10S08] that uses the virtual circuit approach? [10S08] a. AAL1 a. AAL1 . AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

158.Which AAL type is designed to support SEAL ? [10S09] 158.Which AAL type is designed to support SEAL ? [10S09]

a. AAL1 a. AAL1

(19)

. AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

159.The end product of the SAR is a data packet that is _ _ _ _ _ _ _ _ _ _  159.The end product of the SAR is a data packet that is _ _ _ _ _ _ _ _ _ _ 

[10S10] [10S10] a. Variable in length a. Variable in length . 48 bytes long . 48 bytes long c. 44 to 48 bytes long c. 44 to 48 bytes long d. greater than 48 bytes long d. greater than 48 bytes long

160.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header is added to 160.In the SAR sublayer of _ _ _ _ _ _ _ _ _ _ _ , 1 byte of header is added to

47 bytes of data. [10S11] 47 bytes of data. [10S11] a. AAL1 a. AAL1 . AAL2 . AAL2 c. AAL3/4 c. AAL3/4 d. AAL5 d. AAL5

161.In ALOHA, the throughput is a maximized by dividing time into _ _ _ _ _  161.In ALOHA, the throughput is a maximized by dividing time into _ _ _ _ _ 

 _ _ _ intervals. [11D01]  _ _ _ intervals. [11D01] a. Variable a. Variable . Unique . Unique c. Discrete c. Discrete d. Continuous d. Continuous

162.In adaptive tree walk protocol, each node at level I has a fraction _ _ _  162.In adaptive tree walk protocol, each node at level I has a fraction _ _ _ 

 _ _ _ _ of the station below it [11D02]  _ _ _ _ of the station below it [11D02]

a. 2I a. 2I . I2 . I2 c. 2 - I c. 2 - I d. I - 2 d. I - 2

163.In _ _ _ _ _ _ _ _ _ protocol the station transmits with a probability of 1 163.In _ _ _ _ _ _ _ _ _ protocol the station transmits with a probability of 1

henever it finds the channel idle [11M01] henever it finds the channel idle [11M01] a.

a. 1 1 - - ersistent ersistent CSMACSMA . p - persistent CSMA . p - persistent CSMA c. non - persistent CSMA c. non - persistent CSMA d. ALOHA.

d. ALOHA.

164.The channel efficiency of bit-map protocol at low load is _ _ _ _ _ _ _ _  164.The channel efficiency of bit-map protocol at low load is _ _ _ _ _ _ _ _ 

[11M02] [11M02] a. d/(N+d) a. d/(N+d) . d/(d+1) . d/(d+1) c. d/(d+log2N) c. d/(d+log2N) d. N/(d+log2d) d. N/(d+log2d)

165.The channel efficiency of bit-map protocol at high load is _ _ _ _ _ _ _ _  165.The channel efficiency of bit-map protocol at high load is _ _ _ _ _ _ _ _ 

[11M03] [11M03] a. d/(N+d) a. d/(N+d) . d/(d+1) . d/(d+1) c. d/(d+log2N) c. d/(d+log2N) d. N/(d+log2d) d. N/(d+log2d)

166.The channel efficiency of binary-countdown protocol is _ _ _ _ _ _  166.The channel efficiency of binary-countdown protocol is _ _ _ _ _ _ 

[11M04] [11M04] a. d/(N+d) a. d/(N+d) . d/(d+1) . d/(d+1) c. d/(d+log2N) c. d/(d+log2N)

(20)

d. N/(d+log2d) d. N/(d+log2d)

167._ _ _ _ _ _ _ protocol is widely used on LAN in the MAC sub layer 167._ _ _ _ _ _ _ protocol is widely used on LAN in the MAC sub layer

[11S01] [11S01] a. CSMA a. CSMA . TCP . TCP c. CSMA/CD c. CSMA/CD d. GSM d. GSM

168.The first collision free protocol is _ _ _ _ _ _ _ _ _ _ [11S02] 168.The first collision free protocol is _ _ _ _ _ _ _ _ _ _ [11S02]

a. Binary countdown a. Binary countdown . Basic bitmap . Basic bitmap c. Reservation protocol c. Reservation protocol d. SAP d. SAP

169.In binary count down protocol each station address bits are _ _ _ _ _ _ _  169.In binary count down protocol each station address bits are _ _ _ _ _ _ _ 

[11S03] [11S03] a. ANDed a. ANDed . Ex - Ored . Ex - Ored c. Ored c. Ored d. NORed d. NORed

170.Multiple users share a common channel is called _ _ _ _ _ _ _ _ _  170.Multiple users share a common channel is called _ _ _ _ _ _ _ _ _ 

[11S04] [11S04] a. LAN a. LAN . WAN . WAN c. Contention c. Contention d. CSMA/CD d. CSMA/CD

171.

171.

 _ _ _ _ _ _ _ _ _ _system is used for ground based radio broadcasting. _ _ _ _ _ _ _ _ _ _system is used for ground based radio broadcasting.

[11S05] [11S05]

a. Static channel allocation a. Static channel allocation

. Dynamic channel allocation . Dynamic channel allocation c. ALOHA

c. ALOHA d. CSMA d. CSMA

172.The mean delay of static channel allocation in LANS and MANS using 172.The mean delay of static channel allocation in LANS and MANS using

FDM is _ _ _ _ _ _ _ [11S06] FDM is _ _ _ _ _ _ _ [11S06] a. T=1/ a. T=1/ . T=1/µc . T=1/µc c. T = 1/(µc c. T = 1/(µc- )- ) d. T=1/µ d. T=1/µ

173.The maximum through put of pure ALOHA system is _ _ _ _ _ _ _  173.The maximum through put of pure ALOHA system is _ _ _ _ _ _ _ 

[11S07] [11S07] a. 18.4 % a. 18.4 % . 36.8 % . 36.8 % c. 17.4 % c. 17.4 % d. 34.8 % d. 34.8 %

174.The maximum through put of slotted ALOHA is _ _ _ _ _ _ _ _ _ [11S08] 174.The maximum through put of slotted ALOHA is _ _ _ _ _ _ _ _ _ [11S08]

a. 18.4 % a. 18.4 % . 36.8 % . 36.8 % c. 17.4 % c. 17.4 % d. 34.8 % d. 34.8 %

175.

175.

Collision Detection is a/an _ _ _ _ _ _ _ _ _ _ process [12D01]Collision Detection is a/an _ _ _ _ _ _ _ _ _ _ process [12D01]

a. Digital a. Digital

(21)

. Analog . Analog c. Discrete c. Discrete d. Continuous d. Continuous

176.In CSMA/CD the time taken for a station to be sure that it has seized the 176.In CSMA/CD the time taken for a station to be sure that it has seized the

channel in worst case is _ _ _ _ _ _ _ _  channel in worst case is _ _ _ _ _ _ _ _ 

here t = time for signal to propagate between 2 stations [12D02] here t = time for signal to propagate between 2 stations [12D02] a. 2t - e a. 2t - e . 2 + t . 2 + t c. 2t c. 2t d. 2e - t d. 2e - t

177.The problem of a station not being able to detect a potential competitor 177.The problem of a station not being able to detect a potential competitor for the medium because competitor is far away is called _ _ _ _ _ _ _ _ _  for the medium because competitor is far away is called _ _ _ _ _ _ _ _ _   _ [12M01]

 _ [12M01]

a. Exposed Station Problem a. Exposed Station Problem

. Collision Avoidance Problem . Collision Avoidance Problem c. Hidden Station Problem c. Hidden Station Problem d. Access Grant Problem d. Access Grant Problem

178.The problem of a station not being able to detect a potential competitor 178.The problem of a station not being able to detect a potential competitor for the medium because it thinks that there is activity between them is for the medium because it thinks that there is activity between them is called _ _ _ _ _ _ _ _ _ _ _ [12M02]

called _ _ _ _ _ _ _ _ _ _ _ [12M02] a. Exposed Station Problem a. Exposed Station Problem

. Collision Avoidance Problem . Collision Avoidance Problem c. Hidden Station Problem c. Hidden Station Problem d. Access Grant Problem d. Access Grant Problem

179.Protocols in which stations listen for a carrier and act accordingly are _  179.Protocols in which stations listen for a carrier and act accordingly are _ 

 _ _ _ _ _ _ _ [12S01]  _ _ _ _ _ _ _ [12S01] a. ALOHA a. ALOHA . Multiple access . Multiple access c. Station Model c. Station Model d. CSMA d. CSMA

180.Busy Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _ [12S02] 180.Busy Waiting is found in _ _ _ _ _ _ _ _ _ _ _ _ [12S02]

a. ALOHA a. ALOHA

. Slotted ALOHA . Slotted ALOHA c. 1

c. 1-- ersiersistenstent CSt CSMAMA d. non-persistent CSMA d. non-persistent CSMA

181.Contention Slots are not found in _ _ _ _ _ _ _ _ _ [12S03] 181.Contention Slots are not found in _ _ _ _ _ _ _ _ _ [12S03]

a. n

a. non-on- ersiersistenstent CSMt CSMAA . CSMA/CD . CSMA/CD c. Bitmap c. Bitmap d. Binary Countdown d. Binary Countdown

182.A problem with Bitmap protocols is an overhead of _ _ _ _ _ _ _ _ bit(s) 182.A problem with Bitmap protocols is an overhead of _ _ _ _ _ _ _ _ bit(s)

er station [12S04] er station [12S04] a. 0 a. 0 . 1 . 1 c. 2 c. 2 d. 3 d. 3

183.In adaptive tree walk protocol we use _ _ _ _ _ _ and _ _ _ _ _ _ _ _ _  183.In adaptive tree walk protocol we use _ _ _ _ _ _ and _ _ _ _ _ _ _ _ _ 

searching [12S05] searching [12S05] a. Graph and Breadth First a. Graph and Breadth First . Tree and Breadth First . Tree and Breadth First

(22)

c. Graph and Depth First c. Graph and Depth First d. Tree and Depth First d. Tree and Depth First

184.An early protocol for wireless LANs is _ _ _ _ _ _ _ _ _ _ _ [12S06] 184.An early protocol for wireless LANs is _ _ _ _ _ _ _ _ _ _ _ [12S06]

a. MACA a. MACA . ALOHA . ALOHA c. CSMA/CD c. CSMA/CD d. Collision Free d. Collision Free

185.A hub is used in _ _ _ _ _ _ _ _ _ _ _ Ethernet [13D01] 185.A hub is used in _ _ _ _ _ _ _ _ _ _ _ Ethernet [13D01]

a. 10Base 5 a. 10Base 5 . 10Base 2 . 10Base 2 c. 10Base - T c. 10Base - T d. 10Base - F d. 10Base - F

186.A transceiver cable is used in _ _ _ _ _ _ _ _ _ _ Ethernet [13D02] 186.A transceiver cable is used in _ _ _ _ _ _ _ _ _ _ Ethernet [13D02]

a. 10Base 5 a. 10Base 5 . 10Base 2 . 10Base 2 c. 10Base - T c. 10Base - T d. 10Base - F d. 10Base - F

187.The protocol used in ETHERNET is [13D03] 187.The protocol used in ETHERNET is [13D03]

a. ALOHA a. ALOHA

. Binary Count down . Binary Count down c. CSMA/CD c. CSMA/CD

d. Multiple Access Protocol d. Multiple Access Protocol

188.10 base 5 cabling is called _ _ _ _ _ _ _ Ethernet. [13M01] 188.10 base 5 cabling is called _ _ _ _ _ _ _ Ethernet. [13M01]

a. Thick  a. Thick  . Thin . Thin c. Twisted pair  c. Twisted pair  d. Fiber optics d. Fiber optics

189.In token ring, the length of the token is _ _ _ _ _ _ _ _ [13M02] 189.In token ring, the length of the token is _ _ _ _ _ _ _ _ [13M02]

a. 4 bytes a. 4 bytes . 3 bytes . 3 bytes c. 1 bytes c. 1 bytes d. 2 bytes d. 2 bytes

190.The protocol in which, after I collisions, a random number between 0 190.The protocol in which, after I collisions, a random number between 0 and 2i - 1 number of slots is skipped is called _ _ _ _ _ _ _ _ [13M03] and 2i - 1 number of slots is skipped is called _ _ _ _ _ _ _ _ [13M03] a. Exponential a. Exponential . Binary countdown . Binary countdown c. Backoff  c. Backoff 

d. Binary exponential backoff  d. Binary exponential backoff 

191.In switched 802.3 LANS, each card forms its own _ _ _ _ _ _ _  191.In switched 802.3 LANS, each card forms its own _ _ _ _ _ _ _ 

independents of the others [13M04] independents of the others [13M04] a. Domain a. Domain . Area . Area c. Collision Area c. Collision Area d. Collision domain d. Collision domain

192.10 base 2 cabling is called _ _ _ _ _ _ _ _ Ethernet. [13S01] 192.10 base 2 cabling is called _ _ _ _ _ _ _ _ Ethernet. [13S01]

a. Thick  a. Thick  . Thin . Thin c. Twisted pair  c. Twisted pair  d. Fiber optics d. Fiber optics

(23)

193.802.3 base band systems use _ _ _ _ _ _ _ _ encoding. [13S02] 193.802.3 base band systems use _ _ _ _ _ _ _ _ encoding. [13S02]

a. Manchester a. Manchester . RZ . RZ c. NRZ c. NRZ d. RZ or NRZ d. RZ or NRZ

194.In 802.3, each frame starts with a _ _ _ _ _ _ _ _ of 7 bytes [13S03] 194.In 802.3, each frame starts with a _ _ _ _ _ _ _ _ of 7 bytes [13S03]

a. SD a. SD . Preamble . Preamble c. ED c. ED d. pad d. pad

195.In 802.3, the high order bit of the destination address is a '0' for _ _ _ _  195.In 802.3, the high order bit of the destination address is a '0' for _ _ _ _ 

 _ _ _ addresses [13S04]  _ _ _ addresses [13S04] a. Ordinary a. Ordinary . Group . Group c. Broadcast c. Broadcast d. Unicast d. Unicast

196.In 802.3, the address consisting of all 1 bits is reserved for _ _ _ _ _ _ _  196.In 802.3, the address consisting of all 1 bits is reserved for _ _ _ _ _ _ _ 

 _ [13S05]  _ [13S05] a. Unicast a. Unicast . Multicast . Multicast c. Broadcast c. Broadcast d. Ordinary d. Ordinary

197.The _ _ _ _ _ _ _ _ standard describes the upper part of the data link  197.The _ _ _ _ _ _ _ _ standard describes the upper part of the data link 

layer. [13S06] layer. [13S06] a. IEEE 802.2 a. IEEE 802.2 . IEEE 802.3 . IEEE 802.3 c. IEEE 802.4 c. IEEE 802.4 d. IEEE 802.5 d. IEEE 802.5

198.The _ _ _ _ _ _ _ _ standard describes the CSMA/CD protocol [13S07] 198.The _ _ _ _ _ _ _ _ standard describes the CSMA/CD protocol [13S07]

a. IEEE 802.2 a. IEEE 802.2 . IEEE 802.3 . IEEE 802.3 c. IEEE 802.4 c. IEEE 802.4 d. IEEE 802.5 d. IEEE 802.5

199.Which IEEE 802 standard does not provide for a collision-free protocol? 199.Which IEEE 802 standard does not provide for a collision-free protocol?

[14D01] [14D01] a. 802.2 a. 802.2 . Bit map . Bit map c. 802.4 c. 802.4 d. 802.5 d. 802.5

200.In token bus, how does a station transmit data to the destination node? 200.In token bus, how does a station transmit data to the destination node?

[14D02] [14D02] a. By seizing token a. By seizing token . By generating token . By generating token c. By releasing token c. By releasing token d. By releasing frame d. By releasing frame

201.In token ring, which sub station gets the token first? [14D03] 201.In token ring, which sub station gets the token first? [14D03]

a. Priority 0 station a. Priority 0 station . Priority 2 station . Priority 2 station c. Priority 4 station c. Priority 4 station

(24)

d. Priority 6 station d. Priority 6 station

202._ _ _ _ _ _ _ _ _ _ _ IEEE standard describe the token ring [14M01] 202._ _ _ _ _ _ _ _ _ _ _ IEEE standard describe the token ring [14M01]

a. 802.2 a. 802.2 . 892.3 . 892.3 c. 802.4 c. 802.4 d. 802.5 d. 802.5

203.Which IEEE 802 standard provides for a collision-free protocol? [14M02] 203.Which IEEE 802 standard provides for a collision-free protocol? [14M02]

a. 802.2 a. 802.2 . 892.3 . 892.3 c. 802.1 c. 802.1 d. 802.5 d. 802.5

204.FDDI is an acronym for _ _ _ _ _ _ _ _ _ [14M03] 204.FDDI is an acronym for _ _ _ _ _ _ _ _ _ [14M03]

a. Fast data delivery interface a. Fast data delivery interface

. Fiber distributed data interface . Fiber distributed data interface c. Fiber distributed digital interface c. Fiber distributed digital interface d. fast distributed data interface d. fast distributed data interface

205.In Token Ring, Which of the following is not a transceiver function ? 205.In Token Ring, Which of the following is not a transceiver function ?

[14S01] [14S01]

a. Transmission and receipt of data a. Transmission and receipt of data

. Checking of line voltages . Checking of line voltages

c. Addition and subtraction of header c. Addition and subtraction of header d. Collision

d. Collision

206.In token Ring , when a frame reaches its destination station, which of  206.In token Ring , when a frame reaches its destination station, which of 

the following occurs? [14S02] the following occurs? [14S02] a. the message is copied a. the message is copied

. four bits in the packet are not changed . four bits in the packet are not changed

c. the message is take off the ring and replaced by the token c. the message is take off the ring and replaced by the token d. the message is removed from the buffer 

d. the message is removed from the buffer 

207.In token ring , Where is the token when a data frame is in circulation? 207.In token ring , Where is the token when a data frame is in circulation?

[14S03] [14S03]

a. at the receiving station a. at the receiving station . at the sending station . at the sending station c. at the intermediate node c. at the intermediate node d. circulating in the ring d. circulating in the ring

208.Which is not happen at a Token Ring station? [14S04] 208.Which is not happen at a Token Ring station? [14S04]

a. examination of the destination address a. examination of the destination address

. regeneration of the token . regeneration of the token

c. passing of the frame to the next station c. passing of the frame to the next station d. correcting error

d. correcting error

209._ _ _ _ _ _ _ _ _ _ IEEE standard describe the token bus [14S05] 209._ _ _ _ _ _ _ _ _ _ IEEE standard describe the token bus [14S05]

a. 802.2 a. 802.2 . 892.3 . 892.3 c. 802.4 c. 802.4 d. 802.5 d. 802.5

210.The DLL at receiving end _ _ _ _ _ _ _ _ the DLE before data are given to 210.The DLL at receiving end _ _ _ _ _ _ _ _ the DLE before data are given to

network layer [15D01] network layer [15D01] a. Adds a. Adds . Putts . Putts c. Gets c. Gets

(25)

d. Removes d. Removes

211.The DLL service is to provide data from network layer on the source 211.The DLL service is to provide data from network layer on the source

machine to _ _ _ _ _ _ _ _ machine [15D02] machine to _ _ _ _ _ _ _ _ machine [15D02] a. Destination a. Destination . Object . Object c. Source c. Source d. Server  d. Server 

212.Whenever the sender's data link layer encounter five consecutive ones 212.Whenever the sender's data link layer encounter five consecutive ones in the data, it automatically stuffs a 0 bit into the out going bit stream is in the data, it automatically stuffs a 0 bit into the out going bit stream is called _ _ _ _ _ _ _ _ [15D03] called _ _ _ _ _ _ _ _ [15D03] a. Character stuffing a. Character stuffing . Character count . Character count c. Bit stuffing c. Bit stuffing d. Coding violation d. Coding violation

213.If a flag byte is given as 0111 1110, and when bit stuffing is applied 213.If a flag byte is given as 0111 1110, and when bit stuffing is applied than the outgoing bit stream will look like _ _ _ _ _ _ _ _ [15D04] than the outgoing bit stream will look like _ _ _ _ _ _ _ _ [15D04] a. 101111110 a. 101111110 . 001111110 . 001111110 c. 011111010 c. 011111010 d. 011111101 d. 011111101

214.In _ _ _ _ _ _ _ process sender's DLL insert DLE before each accidental 214.In _ _ _ _ _ _ _ process sender's DLL insert DLE before each accidental

DLE character in data [15G01] DLE character in data [15G01] a. Character stuffing a. Character stuffing . Bit stuffing . Bit stuffing c. Symbol stuffing c. Symbol stuffing d. None d. None

215.An acknowledged connectionless service is useful over unreliable 215.An acknowledged connectionless service is useful over unreliable

channels such as _ _ _ _ _ _ _ _ systems [15M01] channels such as _ _ _ _ _ _ _ _ systems [15M01] a. Wireless a. Wireless . Wired . Wired c. Double wired c. Double wired d. Synthetic d. Synthetic

216.When connection - oriented service is used, transfers have distinct 216.When connection - oriented service is used, transfers have distinct

hases [15M02] hases [15M02] a. One a. One . Two . Two c. Three c. Three d. Four  d. Four 

217.The approach for DLL to break the bit stream up into discrete parts is _  217.The approach for DLL to break the bit stream up into discrete parts is _ 

 _ _ _ _ _ _ _ [15M03]  _ _ _ _ _ _ _ [15M03] a. Naming a. Naming . Claiming . Claiming c. Charging c. Charging d. Framing d. Framing

218.Data link layer provides service to _ _ _ _ _ _ _ _ _ _ layer [15S01] 218.Data link layer provides service to _ _ _ _ _ _ _ _ _ _ layer [15S01]

a. Transport a. Transport . Application . Application c. Session c. Session d. Network  d. Network 

(26)

219.Unacknowledged connection less service is adopted when _ _ _ _ _ _  219.Unacknowledged connection less service is adopted when _ _ _ _ _ _ 

[15S02] [15S02]

a. Error rate is very low a. Error rate is very low . Error rate is very high . Error rate is very high c. Long length is required c. Long length is required d. short length is required d. short length is required

220.Each frame begins and ends with a special bit pattern called _ _ _ _ _ _  220.Each frame begins and ends with a special bit pattern called _ _ _ _ _ _ 

 _ _ [15S03]  _ _ [15S03] a. Char stuffing a. Char stuffing . Flag . Flag c. Bit stuffing c. Bit stuffing d. Char count d. Char count

221.The data link layer must use the service provided to it by the _ _ _ _ _ _  221.The data link layer must use the service provided to it by the _ _ _ _ _ _ 

 _ _ layer [15S04]  _ _ layer [15S04] a. Data link  a. Data link  . Physical . Physical c. Transport c. Transport d. Session d. Session

222.In the data link layer, each frame begins and ends with a special bit 222.In the data link layer, each frame begins and ends with a special bit

attern _ _ _ _ _ _ _ _, called a flag byte [15S05] attern _ _ _ _ _ _ _ _, called a flag byte [15S05] a. 01110110 a. 01110110 . 01111110 . 01111110 c. 01011010 c. 01011010 d. 10101010 d. 10101010

223.When the receiver sees five consecutive incoming '1' bits followed by a 223.When the receiver sees five consecutive incoming '1' bits followed by a '0' bit it automatically destuffs _ _ _ _ _ _ _ _ _ in bit stuffing. [15S06] '0' bit it automatically destuffs _ _ _ _ _ _ _ _ _ in bit stuffing. [15S06] a. '1' bit a. '1' bit . '0' bit . '0' bit c. '01' bit c. '01' bit d. '10' bit d. '10' bit

224.A path which connects DLL and Network layer on source to DLL and 224.A path which connects DLL and Network layer on source to DLL and

Network layer on the destination is _ _ _ _ _ _ _ _ _ _ path [15S07] Network layer on the destination is _ _ _ _ _ _ _ _ _ _ path [15S07] a. Actual a. Actual . Critical . Critical c. Vertical c. Vertical d. Virtual d. Virtual

225.If source machine sends independent frames to destination machine 225.If source machine sends independent frames to destination machine

ithou

ithout havint having acknog ackno ledgmledgment, this servent, this service is _ _ _ _ _ _ _ _ ice is _ _ _ _ _ _ _ _ _ [15S08]_ [15S08] a. Unacknowledged connection oriented

a. Unacknowledged connection oriented . Unacknowledged connection less . Unacknowledged connection less c. Acknowledged connection oriented c. Acknowledged connection oriented d. Acknowledged connection less d. Acknowledged connection less

226.If the data unit is 111111, the divisor 1010, and the reminder 110, what 226.If the data unit is 111111, the divisor 1010, and the reminder 110, what

is the dividend at the receiver? [16D01] is the dividend at the receiver? [16D01] a. 111111011 a. 111111011 . 111111110 . 111111110 c. 1010110 c. 1010110 d. 110111111 d. 110111111

227.If the data unit is 111111,the divisor 1010,what is the dividend a the 227.If the data unit is 111111,the divisor 1010,what is the dividend a the

transmitter? [16D02] transmitter? [16D02]

(27)

a. 111111000 a. 111111000 . 1111110000 . 1111110000 c. 111111 c. 111111 d. 1111111010 d. 1111111010

228.If odd parity is used for ASCII error detection, the number of 0's per 8 228.If odd parity is used for ASCII error detection, the number of 0's per 8

-it symbol is [16D03] it symbol is [16D03] a. even a. even . odd . odd c. indeterminate c. indeterminate d. 42 d. 42

229.Which error detection method cannot detect a burst error? [16D04] 229.Which error detection method cannot detect a burst error? [16D04]

a. VRC a. VRC . LRC . LRC c. CRC c. CRC d. Hamming code d. Hamming code

230.The number of bit positions in which two code words differ is called 230.The number of bit positions in which two code words differ is called

[16M01] [16M01] a. Checksum distance a. Checksum distance . Hamming distance . Hamming distance c. CRC distance c. CRC distance d. Parity distance d. Parity distance

231.Computation of checksum is implemented in hardware using [16M02] 231.Computation of checksum is implemented in hardware using [16M02]

a. Shift register a. Shift register . AND register  . AND register  c. OR register  c. OR register  d. EX - OR register  d. EX - OR register 

232.If the ASCII character G is sent and D is received, what type of error is 232.If the ASCII character G is sent and D is received, what type of error is

this [16M03] this [16M03] a. Single bit a. Single bit . Multiple bit . Multiple bit c. Burst c. Burst d. Recoverable d. Recoverable

233.If the ASCII character H is sent and I is received, what type of error is 233.If the ASCII character H is sent and I is received, what type of error is

this [16M04] this [16M04] a. Single bit a. Single bit . Multiple bit . Multiple bit c. Burst c. Burst d. Recoverable d. Recoverable

234.In cyclic redundancy checking, what is the CRC? [16S01] 234.In cyclic redundancy checking, what is the CRC? [16S01]

a. The divisor  a. The divisor  . The quotient . The quotient c. The dividend c. The dividend d. The remainder d. The remainder

235.In CRC there is no error if the remainder at the receiver is _ _ _ _ _ _ _ _  235.In CRC there is no error if the remainder at the receiver is _ _ _ _ _ _ _ _ 

 _ _ _ _. [16S02]  _ _ _ _. [16S02]

a. Equal to the remainder at the sender  a. Equal to the remainder at the sender 

. Zero . Zero c. Non - zero c. Non - zero

d. The quotient at the sender  d. The quotient at the sender 

References

Related documents

The restorative justice movement—and “new lawyer” practices such as holistic lawyering, collaborative lawyering and therapeutic justice—all seek to build compassion

224 Ecospace Artists of Color Incubator Project (the Incubator) : The Incubator is a capacity building program implemented by 224 Ecospace (a social enterprise arm of parent

– Line switching is used in the telephone network – Packet switching is mainly used in computer networks. Line or

Once you've used this course, you quickly become confident in English speaking, which opens many doors: new job interview, better jobs, promotions, simple confidence, and more

Example: If each server has two licenses of Windows Server 2012 Standard, and the second server is already running three instances of Windows Server 2012 Standard in virtual OSEs,

In terms of launching a mobile initiative, phone numbers are easier and faster to set up, whereas short codes require a campaign approval process by the carriers, which may take up

Network Classification by Switching Type Communication Networks Circuit Switched Broadcast Networks Switched Networks Packet Switched SONET Ethernet Ethernet IP.. • There is

The HRQOL scores of manual workers are higher than those of mental workers and the unemployed; women's HRQOL scores are lower than men's; HRQOL scores of those who have a