This action might not be possible to undo. Are you sure you want to continue?
1. Residential LAN network is called ______________. A. HOME network B. LAN connection C. WAN D. Wireless 2. If the packets are sent to only a subset or group of machines on the network, then it is called ___________. A. Broadcast links B. Point-to-point links C. Multicasting D. Internetwork 3. Which of the following is interconnecting the various components and mobile device using short range wireless links? A. System interconnection B. Wireless LANs C. Wireless WANs D. Home networks 4. _______________ Can be based on static table that are wired into the network and rarely changed. A. Routes B. Layer C. Control D. Session 5. __________________ is a main protocol at this layer which provides a single service, namely, best-effort connectionless packet transfer. A. User datagram protocol B. Transmission control protocol C. Arpanet protocol D. Internet packet 6. Cd stands for _____________. A. Compac disk B. Compact disk C. Committee draft D. Committee date 7. ______________ can be handled by just imagining that it repeats the entire pattern over and over forever. A. Data signal B. ASCII code C. Binary code D. Fourier signal
Network computing D. Circuit switching C. Radio transmission 11. Absence of light C. Pulse of light B. Transmission D. Wired B. Low earth orbit B. Wavelength B. Bandwidth C. Which of the following contains a nodal computer called the server and all the other computers are connected to the server and are called its clients? A. Wireless C. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on. Silica boundary 12. Harmonics 9. Geostationary orbit D. Compression schemes 15. Hertz B. Peer-to-peer LAN C. Free space D. ______________ orbit has the altitude 36000km above earth surface. Synchronous transmission 10. Information systems B. A. Middle earth orbit C. __________________ looked like the long. Air boundary D. The range of frequencies transmitted without being strongly attenuated is called ________________.term winner. Single fibre D. Frequency C. A. Multiplexing D. A. A. A. Wavelength D. Highly elliptical orbit 14. ____________ indicates a 1 bit. A.8. Optical communication B. Packet switching B. Operating system (OS) . The number of oscillations per second of a wave is called ____________. Terrestrial fibre connections C. Bandwidth 13. A. _____________ are those that provide a conduit from one device to another. It is known as ____________.
Transparent B. In which of the following type of topology the devices are connected in the form of a closed loop? A. and occasional commentary on. A. AT & T 17. aspects of the architecture for the network protocols and procedures used by the internet? A. A. Bridges 20. LPAD . The data signals are bound by the __________ system in guided transmission media.921 also called __________. LAN C. Linear bus B. LDAP C. Static D. Ethernet 18. Switch 22. A. Source route C. Antenna B. Under unguided media. Which of the following provides oversight of. For dss1 signalling. Switches 19. Segment 23. the d channel layer 2 protocol is q. Which of the following is the most commonly used standard for a local area network? A. A. Cabling D. Routers B. Bridge B.16. IAB B. called ______________. Which of the following is a device that allocates traffic from one network segment to certain lines which connect the segment to another network segment? A. Servers C. Router D. transmission and reception are achieved by means of ______________. Topology B. Star D. Mesh 21. NIST D. Gateway C. LADP B. LAPD D. Tower C. Information systems D. IEEE C. The bridge is linked to several local area networks. Ring C. Routers D.
SMTP B. Flag B. Exterior gateways perform protocol functions between ________________ networks. A. 16-bit D. __________________ layer architecture is compared with the seven-layer OSI reference model. HTTP D. A. Static B. A. Protocols 26. Network topology B. 8-bit C.24. CSMA D. Address C. Network architecture 25. HDLC C. A. ALOHA B.oriented protocol? A. Layer D. Independent B. Inert 27. Network termination C. 24-bit 29. Dynamic D. Interface B. A. The design of a communications network is what is basically known as ___________________. Each socket has a socket number consisting of the ip address of the host and a ___________number local to that host. A. TCP/IP 30. Connection release D. Ip routing protocols are _________________. Unreliable 28. __________ indicates the beginning of the isdn data-link layer frame fields. 32. FTP C. Reliant D. OSI 31. A. Which of the following is a classical bit.bit B. CSMA/CD . Terminal adapter D. Protocol C. Stagnant C. called a port. Dependent C. ____________ is an agreement between the communicating parties on how communication is to proceed.
Dotted periods D. Smtp 35. Frame header C. Webpage D. Header field B. E-mailers C. Version field C. ICANN 37. Which of the following is an architectural framework for accessing linked documents spread out over millions of machines all over the internet? A. Dotted quad notation is also called as _________. User agents for electronic mail are sometimes called as ____________. _______________ protocol is faster convergence than distance vector protocol. Path vector B. ___________ keeps track of which version of the protocol the datagram belongs to. _______________ transmits segments consisting of an 8-byte header followed by the payload. Path vector algorithm 34. Duration field D. Dotted lines C. WWW C. Link state C. A. Tcp/ip B. A.32. RARP 38. ________________ field tells how long the frame and its acknowledgement will occupy the Ethernet. Dynamic vector D. The type field D. Portal . Internet B. Congestion B. Mail readers 39. A. A. ___________________ is the part of network layer software which is responsible for deciding which output line an incoming packet should be transmitted on. A. Tcp C. Dot address B. Link state algorithm D. Data field B. A. Routing vector 36. Udp D. Routing algorithm C. Recipients D. Mailers B. Sequence field 33. A.
Flow control and routing D. HTTP Part B 41 Which of the following are the two types of services which the layer can offer? A. HEO B. A. Hal-duplex and full-duplex 44 Which of the following are the techniques to spread the bandwidth? A. A. TCP and UDP 43 _____________ and _____________ are the methods of multiplexing. CDMA . FHSS and DSSS C. Connection oriented and connectionless B. Multiplexing and de-multiplexing C. A. FDM AND TDM B. TCP/IP B. Short wave and UHF D. Fax B. Frame relays C. LEO C. MEO D. Protocols and peers 42 _____________ and _______________ are the protocols of transport layer. IRC B. DNS and RTP C. Super computer D. HTTP and SMTP B. Suspension bridge 47 Identify one among the following that is not a packet switching protocol A. GEO 46 Which of the following is not a network device? A.40. Circuit and message C. Plotter C. Gopher D. Banyan vines D. Cryptography C. THF and IHF B. A. Synchronous and asynchronous D. VHF and UHF 45 Inmarsal is an example of ______________. ________________ IS A FORM OF SYNCHRONOUS CONFERENCING. IP and RTP D.
B.48 Microwave radio frequencies are used to transmit messages between _______________ and___________. Computers and networks C. antenna. 50. Bearer. Guided and unguided media. clear The technology for B-ISDN was asynchronous transfer mode (ATM). Which of the following are the types of methods which the bridges use to determine the network segment a MAC address belong to? A B C D 51 Transparent and source route Circuit and message Packet and static Static and distance vector protocols B channel also known as ________ channel is a telecommunications term which refers to the ISDN channel which carries the primary data or ________ communication. A Wireless transmission. Best. Asynchronous Synchronous. dish D Radio frequency. 49 Cable television is a system of providing television to consumers via ________________ signals transmitted to televisions through fixed optical fibres or coaxial cables as opposed to the over-the-air method used in traditional television broadcasting in which a television __________ is required. Adjacent. Computers and walky talkies D. Unsystematic Synchronous. network Opposite. quick D. A. dish B Electromagnetic spectrum. internet Adjacent. Bearer. which carried both ____________ voice and __________ data services on the same transport. internet 52 A B C D 53 A B C D . Systematic. voice B. A. clear C. Unsystematic Systematic. Asynchronous The gateway computer reads the destination address and forwards the packet to an ___________ gateway that in turn reads the destination address and so forth across the __________ until one gateway recognizes the packet as belonging to a computer within its immediate neighbourhood or domain. network Opposite. antenna C Microwave transmission. Ground-based stations and satellite communications systems. Beta.
Link state and path vector C. _________ maps physical address to IP address. Flags and fragment offset G. transmits 56 State whether the following statement are true or falsea When the load offered to any network is more than it can handle. Persistent and non-persistent CSMA protocols C. Flags and protocol H. bT B aF. Protocol and source address F. E. transmits D Services. Congestion and distance vector D. bF 57 _____________ and ________________ are clearly an improvement over ALOHA because they ensure that no station begins to transmit when it senses the channel busy. Ethernet and connection oriented protocols B. which allows the destination IP process to property reconstruct the original datagram. A. RARP and ARP D. Path vector and distance vector B. services B Operations. Fragment offset and protocol 55 The interface defines which primitive _________________ and ___________ the lower layer makes available to the upper end. packets get lost when a router is overloaded. The scheme and standard for email security standards are ______________ and __________. SMTP and UDP 58 Routing algorithm can be classified as ________________ and ________________. A. b In the Internet.54 While ______________ consist of a 3-bit field of which the two low order bits control fragmentation. _________________ indicates the position of the fragment’s data relative to the beginning of the data in the original datagram. A Operations. bF D aT. ARP and Inverse ARP C. bT C aF. A B C D Pretty Good Privacy and privacy enhanced mail SIMME and XML security Digital signatures and cryptographic techniques Data encryption standard and digital signatures . A. Inverse ARP and RARP 60. ARP and RARP B. repairs C Operations. A aT. Non adaptive and adaptive 59 While ________________ are designed for frame relay networks. TCP and UDP D. congestion builds up.
SERVER Connection oriented services interactions. 2a. 2b. header & user data (Payload) . Connection oriented service interactions. DNS & RTP d. 4c 1c. C. 3b. connection number & packet reg. 2d. ROUTER Connectionless service interactions. HTTP & SMTP b. + acknowledg. 2d. B. RECEIVE 62 1 2 3 4 A. D. CLIENT Connection less service interactions. D. c. C. 3a.Part C 61 Identify the above diagram from the following option and find out what is the missing component in the diagram A. B.no. 3d. Match the following X.25 packet number format ATM cell format TCP in TCP/IP protocol suite UDP in TCP/IP protocol suite 1b. 4b 1d. 4c 1c. 4a a. 3a. No.
LEO a. synchronous transmission b. C. 4a 1b. 3d. 3b. 2->Insulating material. 4b 1d. Fixed antenna positions no adjustment required 2. 1->Wire mesh conductor. MEO c. 3a. 1c. 2a. special antennas for small footprint is needed A. C. 4c 1b. 2c. Microsoft and Netscape were fighting for violations in which space? Browsers Search Engines Artificial Intelligence Word processors . A. 4c D. 2a. 2c. 1->Copper core. 3d. 2a. 3->protective Plastic covering. 1->Conductor. 2->Wire mesh conductor. Name the parts of the figure. D. 4b B. 4->Insulating material 65 Match the following 1. Isochronous transmission c. 64 Match the following Real-time audio and video String into bytes Information transfer on patterns The transmission of data to and from hard disk 1c. 2->Insulating material. 1b. 1b. Global radio coverage is possible 3. Apogee and Perigee 4.63 1 2 3 4 A. 1d. 3->protective plastic covering. 2d. GEO b. 4a C. 4->Cladding glass D. 3->protective plastic covering. 3d. 2a. 2->Insulating material. Asynchronous transmission The above figure is diagram of coaxial cable. 1->Copper core. 3d. B. B. 3d. 2a. 4->Wire mesh conductor B. 4d 66 A. 4->Cladding glass C. 3c. HEO d. D. 4c a. 3->Protective Plastic covering. Half duplex mode d.
4c. 2c. Source route A. a. 2a. 2d. 3a. HUB b. Broadcast Radio b. 4a. 3c. this encoding scheme is less prone to DC bias than a unipolar line code. 2b. 4a. 2 2. 3d. 4d. 4 A ____________ satellite is an artificial satellite stationed in space for the purposes of telecommunications. 3 The presence of an _________ voltage for all signal states means the line state is easily determined. 3a. 3a. Balanced A 1d. 1d. Bridge c. 4b.____________ is a wireless transmission medium that sends data over long distances at up to 2 megabits per second 3 Transmission of voice and data through the atmosphere as super high-frequency radio waves called ___________. Switch a. making it fairly ___________. 4a C. allocates traffic from one network segment to certain lines 3. 3d. 2a. D 1a. 3b. 4b. B 1c. 2a. central connection point 2. 4b D. 2c. 4 The bit rate for 2B1Q Signalling is twice the baud. D 1d. 2c. B 1b. 3d. distance vector protocols 4. 2d. C 1c. . Self-clocking d. Active c. 1c. 2 Four distinct signal levels being present it would seem to make this code more likely to be ______________. Efficient b. Infrared-light waves d. 2c. Microwaves A 1a. 4d B. 2b. 4c 69 Match the following2B1Q Signalling has the following characteristics: 1 Polarity of the four signals being __________. C 1b. 3b. 4c. 3b. 3b. 1b. a. Communications c. 3c. 1d. 4d.67 Fill up the blanks with suitable answer 1 ___________________ are at a frequency too low for human eyes to receive and interpret. 2a. Routers d. 68 Match the following 1.
bF. in Video conferencing. A aT. 3d. 3a. mobile stations use it to connect themselves to base station 4. but a set of protocols. In e-Mail the delay must be ____________. Re-association c.cF. cF. 2-low. 2d. 1-high. bF. cT. 2-low. Physical layer ensures complete data transfer. dF D aT. the reliability is ____________. dF B aF. 1-low. 3-high. Transport layer provides the hardware means of sending and receiving data on a carrier. cF. Distribution d. An IP address consists of 64 bits. 1b. 4. 1-high. cd. 3-high. 2. bT. 4-high B. 2c. dT aF. IP addressing supports five different address classes.bT. 2-high. A. Mention true or false a b c d A B C D The minimum value for an octet is 1. bT. dF C aT. 3-high. Association a. 2-high. 1-low. 3b. 4a C. 4b D. 3. bF. bT. the bandwidth must be ___________. dT 71. 4-medium D. a stations may change its preferred base station A. 4-medium . dF 72. 2a. in File transfer. 1c. station should use this service before shutting down 2. 1c. dT aF. cT. 4b 73. Match the applications with their QOS parameters 1. State whether the following statements are true or false a b c d TCP/IP is not really a protocol. determines how to route frames sent to the base station 3. 2c. The network layer does routing and forwarding. Match the following 1. cF. 4-high C. Disassociation b. 3-low. aT. cT. cT.70. The maximum value for an octet is 255. 4a B.dT aF. 1d. In Audio-on –demand the jitter must be ____________. bF.
3b. his public and private key. 2c. PGP software and hardware devices to support. 4c 1d. and his signature of the document dB (d). document and Bhatra’s digital signatures. ask a machine if it is alive d. Match the following 1. 3d. 2a. Bhatra writes a mail to Ms. 3a. 3a. non-forgeable and non repudiable manner. A Symmetric key cryptography. _____________ and _________. He wants his document to be in verifiable. I am alive 75. Mr. Mr. invalid header field c. Sweety receives the mail by pretty good privacy (PGP) method and uses _________. Bhatra’s digital signature. D. Bhatra has a document d. Hypertext and Mark up language C Symmetric key cryptography. 2a. GOPHER and Veronica. choke packet b. ____________. yes. public-key cryptography. 4. B. his public key and private key. Echo Echo reply Source quench Parameter problem 1b. sender authentication and message integrity B Paired key technique. IRC technology. 4b 1c. A. 3. When Ms.74. hash function and a digital signature to provide secrecy. 2. _____________ and _______________. Sweety. C. 4b 1d. D Paired key technique. 2d. HTML tags. paired key technique. . 4c a.