You are on page 1of 160

CGI

1.

Full form of CGI
a.
b.
c.
d.

2.

The different ways to send data to the CGI program
a.
b.
c.
d.

3.

Forms
Status
Location
Gateways

Virtual Documents
`Dynamic document
Both of these
None if these

_____________ environment variable specifies the name of the web server host:
a.
b.
c.
d.

9.

cgi-debug
cgi-bin
cgi-jdk
cgi-jdbc

__________ are created dynamically in response to user request:
a.
b.
c.
d.

8.

.PL
.BL
.DL
PL

___________ works as an intermediary between the user and the server where direct access of information from the server
in not readable by the user
a.
b.
c.
d.

7.

CGI,
CGI,
CGI,
CGI,

Earlier, servers that were supporting CGI had provided a common directory named ___________ to store CGI program
a.
b.
c.
d.

6.

Interface between web server
External programs on the web server
Both a & b
None of these

The CGI programs are the files with extensions __________ or _________
a.
b.
c.
d.

5.

Arguments of the CGI program
Environment variables
Standard input
All of these

CGI is a set of rules that works as an __________________
a.
b.
c.
d.

4.

Computer Graphics Interface
Common Gateway Interface
Common Graphics Interface
Computer Gateway Interface

SERVER_NAME
WEB_SERVER
WEB_BROWSER
ALL OF THESE

CGI complete its program processing it passes the resultant data to the ___________;
a.
b.
c.
d.

Web browser
Web server
Server
All of these

10.

The web server then responds back to the _____________ accordingly:
a.
b.
c.
d.

11.

Web browser
Web server
Server
All of these

The data can be passed to CGI program in one of the following way:
a.
b.
c.
d.

Argument of the CGI program
Environment variable
Standard input
All of these

12. This information is sent to the CGI program in the ___________ environment program:
a.
Query_String
b.
QUERY_STRING
c.
QUERY STRING
d.
ALL OF THESE
13.

It specifies the name of host issuing request:
a.
b.
c.
d.

14.

It specifies the name of user issuing request:
a.
b.
c.
d.

15.

REMOTE_USER
REMOTE USER
Remote_user
None of these

It specifies the address of the system of the user issue the request:
a.
b.
c.
d.

16.

REMOTE_HOST
REMOTE HOST
Remote_host
None of these

REMOTE ADDR
Remote_Addr
Remote addr
REMOTE_ADDR

It specifies the request method used by the browser:
a.
b.
c.
d.

REQUEST METHOD
REQUEST_METHOD
Request}_method
None of these

17. The server does not mark the and of data with an ____________ character:
e.
COF
f.
BOF
g.
EOF
h.
NONE OF THESE
17.

The CGI program use __________ environment variable to read the data correctly:
a.
b.
c.
d.

18.

CONTENT_LENGTH
CONTENT LENGTH
Content _length
None of these

e.
The CGI output must consist of any of these ____________ header files:
a.
b.
c.

1
5
3

d.

19.

e.
Which are the header types :
a.
b.
c.
d.

20.

Radio button
Text fields
Check boxes
All of these

There is one dynamic information that is:
a.
b.
c.
d.

22.

Content-type
Location
Status
All of these

It contains a number of graphical widgets to get the information fro the user:
a.
b.
c.
d.

21.

4

Adc.com
abc.com
ABC.COM
ADC.COM

Advantages of CGI:
a.
b.
c.
d.

Platform independent
Language independence
Simplicity
All of these

23. CGI program also known as ___________
a.
CGI scripts
b.
Server side web programs

c.
d.

24.

Both of these
None of these

The major application of CGI are forms

b. the command to write recievers mail adress is written with this command a) SEND TO b) RCPT TO c) MAIL TO d) None of the mentioned View Answer . 2) If you have to send multimedia data over SMTP it has to be encoded into a) Binary b) Signal c) ASCII d) None of the mentioned View Answer Answer: c Explanation: None. 1) When the mail server sends mail to other mail servers it becomes _____ ? a) SMTP server b) SMTP client c) Peer d) None of the mentioned View Answer Answer: b Explanation: None. 3) Expansion of SMTP is a) Simple Mail Transfer Protocol b) Simple Message Transfer Protocol c) Simple Mail Transmission Protocol d) Simple Message Transmission Protocol View Answer Answer: a Explanation: None. c. 4) In SMTP. Gateways Dynamic document Both of these None of these SMTP This set of Computer Networks Questions & Answers focuses on “SMTP”. d.a.

5) The underlying Transport layer protocol used by SMTP is a) TCP b) UDP c) Either a or b d) None of the mentioned View Answer Answer: a Explanation: None.Answer: b Explanation: None. 7) Internet mail places each object in a) Separate messages for each object b) One message c) Varies with number of objects d) None of the mentioned View Answer Answer: b Explanation: None. 9) A session may include a) Zero or more SMTP transactions . 8) Typically the TCP port used by SMTP is a) 25 b) 35 c) 50 d) 15 View Answer Answer: a Explanation: None. 6) Choose the statement which is wrong incase of SMTP a) It requires message to be in 7bit ASCII format b) It is a pull protocol c) It transfers files from one mail server to another mail server d) None of the mentioned View Answer Answer: b Explanation: The sending mail server pushes the mail to receiving mail server hence it is push protocol.

a) One MTA b) Two UAs c) Two UAs and one pair of MTAs d) Two UAs and two pairs of MTAs View Answer Answer: d Explanation: None.b) Exactly one SMTP transactions c) Always more than one SMTP transactions d) Number of SMTP transactions cant be determined View Answer Answer: a Explanation: None. International for Organization Standardization . 12) User agent does not support this a) Composing messages b) Reading messages c) Replying messages d) All of the mentioned View Answer Answer: d Explanation: None. International Organization Standardization d. ISO stands for a. we need only ______ . 11) When the sender and the receiver of an email are on different systems. Internet Organization for Standardization c. 10) Example of user agents for e-mail a) Microsoft Outlook b) Apple Mail c) d) All of the mentioned View Answer Answer: d Explanation: None. Data Communication And Networks 03 1. International Organization for Standardization b.

c. c. d. b. d. b. Layering the communications process means breaking down the communication process into______ and _____ to handle interdependent categories a.2. c. c. 3 4 5 6 5. d. c. d. Oldest protocol Not so old protocol Newly established protocol None of these 6. Smaller Easier Both a & b None of these The convention and rules used in such communications are collectively known as a. 8. In layered architecture. b. d. d. c. b. Peer Layer protocol Network None of these . How many layers a Novell Netware protocol stack uses a. b. Separation of responsibility Addition of responsibility Subtraction of responsibility None of these 3. Client Server Both a & b None of these 4. which is used in the OSI model a. b. each layer is responsible for a ________ amount of work a. Infinite Finite Large None of these 7. TCP/IP model is the _______ . The main principle of layered architecture is a. d. c. Which type of network operating system in Novell Netware a. b.

The groups of layers provides information to allows _________. protocols layers Both a & b None of these 12. Network is the term used for a group of a. d. b. b. Hardware implementation Software implementation Both a & b None of these 13. OSI basic reference model b. c. c. c. b. None of these . d. b. For two computers to reliably exchange data. Both a & b d. d. Interface specification Implementation details Both a & b None of these e. compatible implementation of encoding b. 10. 14. d. OSI has two meanings refers to a. c. The information exchanged between two computers is physically carried by means of _________ with the help of certain coding method a. Peer Layer protocol Network None of these e. Protocol that are authorized by ISO c. None of these 10. interpreting data carrying electrical signals c. which correctly obeys the appropriate protocol a. d. Both a & b d. Electronics signal Electrical signal Physical signal Physical circuits 15. Which are never form a part of the architecture because they are not visible from the outside a. c. they must have a a. The entities comprising the corresponding layers on different computers are called ________ which communicate by using layer protocol a.9. b.

this corruption could be in the form of ________________ a. Logical channels c. d. c. c. Desirable bandwidth Immunity to noise Attenuation properties All of these e. 2 3 4 5 21. b. b. c. Error control b. b. b. b. The data communication process allocates memory resources. which is dictated by the a. d. d. Data exchange can take place between any _____ workstations a. the dialog type may be a. The session recovery can be achieved by providing a . c. c. commonly known as___________ for the sake of transmission and reception of data a. 17. Duplex Half duplex Simplex mode All of these 23. In error control. Routing d. Noise Electromagnetic interference Both a & b None of these 20. Protocols should provide at least ______ logical channels per connection a. Transmission media deals with the types of medium used . All of these 19. c. Depending on the nature of the involved application in layered architecture. d. d. b.16. 1 2 3 4 22. Communication buffers Communication media Both a & b None of these ng computer must be capable of distinguishing between information Carrying signal and mere noise a. d.

Which is the point from where services can be accessed . d. Peer entities Entities Service provider SAP 30. Checkpoint Check mechanism Character encoding Terminal emulation 24. b. c. c. This is the entities in the same layers but on different computers a. b. Which function of the layer provides certain services a. Which are the active elements such as processes. d. ASCII EBCDIC Both a & b None of these e. b. d. c. 26.each point is the unique address a. c. d. c. IO chips in every layers a. Peer entities Entities Service provider SAP 27. Peer entities Entities Service provider SAP 28. The check pointing circumvent session recovery requirement by retransmitting only the a. c. Peer entities . 25. b. d. b. b.a. d. d. c. Affected files Saving time Bandwidth All of these e. Peer entities Entities Service provider Service user 29. Which function of the layer uses certain services a. b. Some good examples of presentation problems are the existing incompatibilities between the__________ standard of character encoding a.

d. d. Registered E-mail Junk E-mail Both a & b None of these Which is the unreliable connectionless service without acknowledgement a. 34. e. Protocol Primitives Confirmed service SAP 36. Which is the reliable connectionless service with acknowledgement a. c. Registered E-mail Junk E-mail Both a & b None of these e. Request-reply command is example of connectionless service a. b.b. SAP 31. d. c. d. c. In which model. c. c. A confirmed services is defined with a a. d. b. b. Service provider d. Which are parameters to define conditions a. b. b. 33. connection-oriented connectionless Both a & b None of these 35. b. Client-server model User model Server model None of these Which service is specified by a set of primitives available to a service user to interact with the service provider a. Entities c. Request Confirm Response Indication Primitives All of these g. d. 32. The Service primitives are the part of . 37. c. f.

e. Request Indication Confirm Response Both a & b All of these 39. c. Name Content Function Total no of layers depend on type of network All of these f. b. Protocol Primitives Confirmed service SAP 38. d. d. d. f. b. e. 42. b. c. d. d. An unconfirmed is defined with a a. The characteristic of each layer are as a.a. ________ the protocol can make communication between the two either difficult or impossible a. Protocol to service Service to protocol Service primitives None of these 41. 40. The basic function of each single layer is to provides service to the a. Which are the distinct concepts and are important to release connections between sender and receiver a. Which is provided to the upper layer by an immediate lower layer a. Layer of the top Layer of the bottom Layer above it Layer below it 43. c. b. d. b. c. b. Breaching Branching Broaching Brunching . c. c. c. b. d. Services Protocol Both a & b None of these e.

IBM DEC Both a & b None of these 47. c. b. d. Set of layers Set of protocols Set of machines Both a & b 45. c. Which is similar to postal system where every message contains the complete destination address and is mapped through the system. c. b. Connection-oriented services Connectionless services Both a & b None of these 50. Message sequences Byte streams Both a & b None of these e. Connection-oriented services Connectionless services Both a & b None of these . The network architecture can be termed as a a.44. b. Which is the computers from the same manufacturer it was not possible to run both_______ solution and _______ simultaneously a. d. Which is a reliable connection-oriented service has two subparts a. d. d. b. 1969s 1971s 1970s 1972s 48. c. d. Smaller Easier Simpler design problems All of these 46. c. b. The hectic task of designing the whole network can be distributed in the a. The various types of services provided by the interface to the layers above them are listed as follows a. b. c. b. ISO-OSI reference model these could only be run one at a time by the end__________ a. 49. free of all the others a. d. d. c.

d. Both a & b . The second layer also deals with ________________ a. 1980 1970 1990 1960 54. Both a & b d. d. b. Physical layer b. The seventh and the highest layer is the application layer that deals with the a. 57. Data service c. b. The connectionless services can be further sub-divided into many categories a.51. By the end of _________. Hardware c. c. The first layer deals with the actual ____________ a. b. Unreliable connectionless service can be also termed as a. Signaling b. Hardware implementation d. None of these 57. Hardware of networks b. c. Supporting rules for low-level signaling c. the Open System Interconnection model was developed by the International Organization for Standardization to break the barrier a. User interface Applications Both a & b None of these 56. In moving from layer one to layer seven. c. the level of abstraction ________ a. None of these 53. The specific methods of sending bits from one device to another c. d. d. b. c. Datagram service b. Unreliable datagram Acknowledged datagram Both a & b None of these 52. The first and the lowest layer is called the ___________________________ a. Byte stream service d. All of these 55. Increases Decreases May be increases or decreases None of these e.

4. The seventh layer does not deal with __________ concepts very much a. Hardware Even operating system Both a & b None of these 62.3. The lower layers are implemented by using ______________ with the incidence of hardware ‘reducing’ to software from layer 1 to layer 4 . 1. The basic philosophy of the seven-layer model is that each layer may be defined a.2. 2 3 4 5 64. d.6 65. c.6 5. c.3 1. The upper layers are layers a. Hardware-oriented protocol Software-oriented protocol Both a & b None of these 60. Independently of every other layer c. b. which links the communication process to this _________________ a. c.7 6. b. 5. Dependent on same layer d. d. 59. None of these e. b.6.5.3. None of these 63. c.d. d. d.3. The seven layers of the OSI model are categorized into ________ groupings a. Dependently of every other layer b. The transport layer is the one. The lower layers are layers a.4 1.4. Data Header Both a & b None of these 61. c.7 5. d. b. Which is collectively known as a protocol data unit(PDU) a.2.2.5 2. b. c. d. b.7 66.

69. Horizontal communication c. Networking Network addresses Both a & b None of these e. b. d. Networking Network addresses Both a & b None of these 68. This refers to communication up and down the protocol stack every time any data is sent received across the network a. The bottom four layers take the responsibility of _________________ a.a. d. Which OSI model supports the interconnection of different implementations of various autonomous layers . b. The OSI interface is a process of communication between adjacent layers in which data is passed between a. Software Hardware Both a & b None of these e. b. d. d. Protocols d. Pass control Pass Data information Both a & b None of these 71. c. c. b. c. b. The upper layers are not expected to know anything about ____________ a. c. The layers 3 and 4 interface are used by protocol to _____________ a. b. Which is a communication process running at a particular layer on one host machine can accomplish logical communication with a similar process running at the same layer on another host machine a. Vertical communication b. c. c. Layer n Layer n-1 Layer n+1 All of these 70. OSI interfaces 73. 67. d. Vertical communication Horizontal communication Protocols OSI interfaces 72. d.

The functions of the OSI layer model are 1 2 3 4 5 6 7 Layers Physical Data link Functions It moves bits between devices by using media It tends to assemble packets into bytes and bytes into frames and provides access to media by using MAC address Network It is responsible for providing logical addressing which routers use for path determination and routing Transport It provides reliable or unreliable delivery and performs error correction before retransmit. b. e. c. database and application services 75. Voltage Current Phase or frequency All of these 77. NRZ(non return to zero) transmission by using level signaling c. compression and translation services Application It aims to provide a user interface like file. Open wire circuits Twisted pair cables Coaxial cables Fiber optic cables Wireless All of these 76. b. b. RZ(return to zero) by using pulse signaling b. It is also responsible for end-to-end connection Session It aims to keep different applications data separately and provides dialog control Presentation It provides rules to present data.a. f. The physical layer specifies the representation of each bit as a a. message. handle processing like encryption. A number of transmission media exist. d. print. Manchester encoding by using phase signaling . d. c. c. The physical layer uses four types of bit signaling approaches these are a. 74. Modularity Inter-layer interactions Both a & b None of these e. d. some of them are a.

0 None of these 81. b.0 None of these 82. c. d. Describing hardware specifications b. d. from bit stream to frame and vice versa. Describing hardware specifications Encoding and signaling Data transmission and reception None of these . Bytes Bits Gigabyte Megabyte 80. Which bit stream is to be transmitted with the objective that when the received by the receiving side as 1 bit. 1 0 1. Data transmission and reception d. Asynchronous communications Synchronous communications Both a & b None of these 79. d. c. NRZ-I(non return to zero-invertive) by using bandwidth e. b. to send across the network a. b. All of these 78. d. d. b. Which bit stream is to be transmitted with the objective that when the sending side sends _____ bit a. As well as setting up Maintaining Disconnecting physical links All of these 83. The physical layer supports various encoding and signaling functions to convert data. b. The timing signal identifies the boundaries between the a. Encoding and signaling c. The functions of the physical layer are a. c. c. 1 0 1. It defines the electrical and mechanical aspects of interfacing to a physical medium for transmitting data ________________________________ a. What are the two types of systems that are used to provide timing signal a. c. d. b. not as ___ bit a. All of these 84.d. c.

e. d. Static Dynamic Both a & b None of these e. b. c. d. The functions of the data link layer are a. b. c. Logical addressing Routing Datagram encapsulation Fragmentation and reassembly All of these 91. CSMA/CD for Ethernet b. All of these 88. d. d. Connectionless service . The data link layer also deals with the issue of addressing what is popularly known as a. b. Token passing for the Token Ring network c.85. Connection-oriented b. Logical Link control(LLC) b. RS-323C/D RS-232C/D RS-233C/D RS-322C/D 86. Some of the examples of MAC are a. b. 92. HDLC Ethernet Both a & b None of these 87. Addressing e. The network layer uses which service for delivering packets across the network a. c. Examples of data link layers are a. c. What is an example of a physical layer definition a. Data framing d. b. c. d. The routing of network layer may be a. None of these 90. Both a & b d. Error detection and handling f. Media Access Control(MAC) c. Hardware Address MAC address All of these 89. The functions of the Network layer are a.

d. 95. Network layer Session layer Presentation layer Physical layer 96. Multiplexing and de-multiplexing c. Segmentation. Flow control g. The functions of transport layer are a. c. Process-level addressing b. c. FTP TFTP HTTP TCP/IP 97. Complex Simple Both a & b None of these 94. Connection establishment . The session layer is responsible for _______________ the dialogues between communicating applications a. packaging and reassembly d. b. Establishing Maintaining Arbitrating All of these .the routing problem is ________. d. b. c. so the network layer is often thin or even nonexistent a. b. d. c. In broadcast network .c. None of these 93. Which protocol uses the transport layer a. Both a & b d. d. Software application Hardware application Both a & b None of these e. All of these 98. The transport layer accepts data from the ______ and splits it up into smaller units so that it can be passed to the network layer a. b. d. management and termination e. c. Acknowledgements and retransmission f. e. b. The transport layer provides the necessary function to enable communication between _____________ processes on different computers a.

99.FDDI. The data link layer is also known as a. The session layer provides enhanced useful services in some applications such as a. HDLC Ethernet Both a & b None of these 104. Which enable an application to complete specified high level communications over the network successfully and easily with the help of a standardized set of services a. Link layer Data layer Open layer None of these Some example of data link layers are a. Some examples of APIs are a.11 etc to function a. IEEE802. d. RPCs b. 106. Both a & b d. 105. b. b. Which provides link to many wireless and wired local area networking (LAN) like Ethernet . c. c. link Which layer is responsible for the reliable transfer of data across the physical a. c. Remote login b. 103. b. d. b. d. NetBIOS TCP/IP sockets Remote Procedure Calls (RPCs) All of these 101. APIs c. c. TCP/IP d. d. All of these 102. Remote file transfer c. c. Physical layer Data link layer Transport layer Presentation layer Physical layer Data link layer Transport layer Presentation layer The responsibility of data link layer include functions such as . d. b. None of these 100.

e. c. c. b. c. Which layer performs functions relative to the syntax and semantics of the information transmitted a. f. d. d. g. e. 108. In translation. 110. d. Data flow control Breaking the input data Frame formatting Transmission of the frame sequence Error detection Link management All of these 107. b. b. d. g. d. PCs Macintoshes UNIX systems AS/400 servers All of these Distributed database Electronic mail Resource sharing File transfer Remote file access Network management All of these Which layer provides user interface to communicate with a computer a. Which layer allows the user to use the network a. d. b. c. b. 112. b. c. Translation Compression Encryption All of these 109. Physical layer b. c. different types of computers like _____________in an Internetwork have many distinct characteristics and represent data in different ways a. e. f. Physical layer Data link layer Application layer Presentation layer The application layer provides network-based services to the user are a. Physical layer Data link layer Transport layer Presentation layer The types of data handling issue that presentation layer provides are as follows a.a. 111. Application layer .

Telnet SNMP. c. c. a. b. HTTP. Transport layer d. Presentation layer 113. b. The most popular application layer protocols are a. c. d. c. Physical layer Application layer Transport layer Presentation layer TCP/IP defines a four-layer model consisting of the a. 116. electronic mail(email) and remote login services a. e. b. d. d. FTP SMTP. d. 119. b. c. TCP/IP Reference model SMTP model Telnet model NNTP model e. Most users rely on ______ for the purpose of file transfers. 115. 117. DHCP NFS. the Internet a. POP3 NNTP.c. e. IRC All of these 114. 118. c. d. How many layers TCP/IP model has 2 3 4 5 TCP/IP layer specifies the __________ layer a. b. e. f. Which model is considered the oldest protocol of all computer networks like the ARPANET and its successor. b. d. TCP/IP SMTP DHCP NFS Internet layer Transport layer Application layer Network interface layer All of these TCP/IP architecture is based on the three sets of interdependent processes are .

b. c. IP ICMP RIP BGP All of these Which protocols are found in a Network interface Layer of TCP/IP model a. 126. Application-specific processes Host-specific processes Network-specific processes All of these 120. Point-to-Point Protocol(PPP) c. b. e. b. SMTP . e. FTP b. 122. d. Network protocol Internet protocol OSI protocol None of these Which protocols are found in a Internet Layer of TCP/IP model a. c. c. a. d. b. Both a & b d. 125.a. d. The Internet layer of the TCP/IP matches with the which layer of the OSI model a. d. b. Serial Line Internet Protocol(SLIP) b. None of these 121. 123. d. TFTP c. b. c. d. The Packet format and protocol at internet layer is called a. 124. Which TCP/IP standards define protocols for TCP/IP networks for layer two implementation to fill the gap between the network layer and the physical layer a. c. Network layer Physical layer Session layer Data link layer Ethernet FDDI Token Ring All of these Which protocols are found in a Transport Layer of TCP/IP model TCP UDP FDDI Both a & b Which protocols are found in a Application Layer of TCP/IP model a. c.

None of these The UDP Protocols are a. 130. The Internet has definite standards for FTP that connects to a a. Service Connection type service Connectionless type service None of these 131.d. b. Both a & b ii. b. b. d. a. None of these Which protocols are found in the application layer 128. Both c & d iii. 127. f. b. c. c. To identify the source machine b. Issues of authentication . c. To identify the destination machine c. Numerous UDP TCP IP 129. e. None of these 132. d. d. c. Both a & b d. The basic functions of application layer are _____________ that wish to communicate with one another a. d. NFS TELNET SNMP All of these h. d. c. Reliable Connection-oriented Connectionless Unreliable i. 133. Remote machine Sends an arbitrary file Fetches an arbitrary file All of these FTP addresses the a. g. b. Which other function include __________________and identification of port number a. Sequence control Error recovery and control Flow control All of these TCP layer is a a.

d. c.b. Local host to Local host 136. b. b. Another aspect of the application layer is to __________ . News server News client Web(HTTP)-based protocol for communication on the WWW All of these FTP is among the oldest protocols used in the_____ a. remote host to remote host d. b. ASCII or binary files d. d. OS/2 c. c. there are many other applications such as NNTP enabling communication between a ___________ a. Local host to remote host c. c. All of these 140. 137. Listing of directory contents c. c. Internet Web Both a & b None of these 138. Remote host to local host b. b.this application is called telnet a. d. Login remotely Logout Remotely None of these 135. Similarly. Which dose not require any familiarity with the remote operating system a. b. c. FTP is widely available on almost all-browsers indicating that all computing platforms. d. d. DOS b. Which is a file server access protocol that enables a user to transfer files between two hosts a. TCP connection with another location and then pass keystrokes from the _______ a. All of these 134. UNIX and up to the mainframe level have this service available d. SMTP TCP FTP NNTP . including _________ a. SMTP TCP FTP NNTP 139.

Modern FTP servers known as _______ a. b. b. d. c. d.e. Control connection Data connection Both a & b None of these e. a. d. 143. d. c. TCPD FTPD SMTD CTPD e. b. Which is also an internet service intended for the transfer of files from one computer to another over a network a. FTPD support two different TCP connections namely_______ a. The main function of data connection is to facilitate transfer of file and directory to and from the________ 145. Control connection Data connection Both a & b None of these Which is invoked for the entire duration of transfer of file or FTP session Control connection Data connection Both a & b None of these Which connection is establish as and when it is required a. c. a. b. c. b. 141. 144. 148. 145. d. b. c. TFTP FTP Both a & b None of these TFTP does not provide _____________ . Clients at the server’s request Clients at the client’s request Server at the server’s request Server at the client’s request TFTP stands for a. Transfer file trivial protocol Transfer file transfer protocol Trivial file trivial protocol Trivial file transfer protocol 145. d. c. 142. b. d. c.

d. 153. files and video in a message . b. Which is a software package that transports the message created by a user to destination mailboxes possibly on remote machines a. 150. 151. c. a. MTA distinguishes between local and remote recipients b. d. TFTP is simpler than the ___________ but less capable a. 155. c. d. e. d. b. voice appending documents. d. c. b. b. MTA needs to deliver copies of a message to several machines c. b. c. 149. 152. c. c. d. MTA allows mixing of text. FTP SMTP NNTP FTPD Which is one of the most popular network services a. b. b. d. c. Electronic message Electronic mail Electric mail None of these Electronic mail works like an Post mail Postal mail Post card None of these E-mail has two parts namely a. User agent MTA Both a & b None of these The MTA has to perform more complex jobs than other applications a.a. a. Password protection User directory capability Both a & b None of these User agent Message Transfer agent Both a & b None of these MTA stands for Message Transmission Agent Machine Transfer Agent Message Transfer Agent Mobile Transfer Agent 154.

d. all of them are also not alike but most of the e-mail software have common basic functionality these are a. b. All of these In MTA. An ‘at’ sign(@) c. Attach a file to a mail message g.156. c. All of these 162. All of these . The domain name. E-mail address has three parts a. c. Which refers to an alias for a set of recipients. e-mail address consist of the following components a. that consults an internal database to specify the mail addresses a. b. c. Reply to mail messages f. d. A user identity or name b. Google mail Yahoo mail Hotmail All of these 161. There are a number of e-mail packages available. d. d. Some of them are free like ____________________. In MTA. d. 157. b. MTA handles temporary failures when a destination machine is temporarily unavailable e. c. which basically specifies the address of the user’s mail server d. c. b. d. a. Forward a mail message to other recipients e. 158. Send and receive mail messages b. Mailbox names Symbolic names Group names(mail exploders) All of these User agent MTA Both a & b None of these Which refers to the name of a service rather than a specific user Mailbox names Symbolic names Group names(mail exploders) All of these 159. while some are paid a. Save your messages in a file c. Mailbox names Symbolic names Group names(mail exploders) All of these 160. Which is the user interface to the mail system a. b. Print mail messages d.

c. e. d. c. d. Post Office Protocol . ________ standards were used to encode binary files for transfer through SMTP. b. b. 170. d. which has now become a standard with its varied version a. c.163. d. Postal Office Protocol b. b. 164. 166. 165. c. b. NNTP Telnet service FTPD none of these SMTP can be considered as a complement of ______ a. c. SMTP is the ________ standard for an electronic mail service provider a. b. 167. FTPD FTP MIME UUCP POP3 stands for a. a. c. b. SMTP uses ______ transport for the reliably delivery of mail messages a. c. 168. d. dee facto de facto de fact none of these EBCDIC strings ASCII strings Both a & b None of these MIME stands for Multipurpose Internet Machine Extensions Multiprogramming Internet Machine Extensions Multipurpose Internet Mail Extensions Multipurpose Internet Mail Exchange 169. d. FTP TCP MTA FTPD The SMTP server also allows _____ a. d. b. UUDP UUCP UCCP UCPD SMTP commands consist of human-readable __________ a.

d. d. Post Office Program d. b. User-defined services Well-known services Both a & b None of these 175. c. c. b. Internet Machine Access Protocol Internet Message Access Protocol Internet Multipurpose Access Protocol Inkjet Message Access Protocol Which one is a push kind of protocol a. b. d. 174. 173. 176. e. c. d. c. c. services . c. d. Transfer binary data Support byte macros Emulate graphics terminals Convey information All of these Telnet service is unique in the manner that is ___________ like other TCP/IP 176. b. The name of a computer on which the server runs The protocol port number of the server Both a & b None of these ______________ to support centralized terminal management can support a. Posting of Protocol IMAP stands for a. SMTP POP3 IMAP Both b & c Telnet can also be used to connect other ports serving as _____________ a. SMTP POP3 IMAP All of these 170. c. d. b. b. Which one is a pull kind of protocol a. b. c. d. e. Telnet works as a _____________ model where it establishes a virtual connection by using the TCP transport protocol a.170. 176. User-defined Well-known Client-server All of these The Telnet program requires two arguments a.

d. The rise 1985 saw the rise of Novell NetWare when _____________ were launched a. Platform-specific Not platform-specific Platform-service None of these 0Some of the Telnet commands are as follows Interrupt Process(IP) Abort output(AO) Are You there(AYT) It terminates the running program It refers to discarding of any buffered output This command allows a client to send an out-of-band query to verify whether the remote end is still there Erase character(EC) It refers to the erasing of the previous character Erase line(EL) It deletes the entire current line Synchronize It clears the data path to the remote party Break It is equivalent to the BREAK or ATTENTION key 180. NetWare 286 2. 181.0a b. Both a & b d.a. d. Non-dedicated . Two methods of operation were supported by NetWare 286 2. c. d. b. b. Client type Server type Both a & b None of these 3 layers 4 layers 5 layers 6 layers IPX stands for Internet Packet Exchange Inter-network Packet Exchange Inter-network Protocol Exchange Internet Package Exchange 183. Novell NetWare uses a protocol stack having _____ a. c. 182. Inc a. c. d. b. NVT IPX IP FTP 184. None of these 185. Novell NetWare is a ___________ network operating system that was created by Novell. c. b. d. a. 179. Intel 80.x namely are a. b.286 16-bit processor c. Dedicated b. _______ is a networking protocol used by the Novell NetWare operating systems for performing connectionless communication a. c.

d. 190. Footer Header Standard None of these e. None of these e. c. 192. Beginning with NetWare 3. FTPD 188. e. c. SMTP d. c. a. Protocol Protocol stack Protocol layer None of these According to RFC 1122 the TCP/IP consists of ________ 2 layers 3 layers 4 layers 5 layers The lowest layers of the TCP/IP establishes communication with Upper layer Physical media Next layer Protocol 191.x. a. 189. After the transmission of data in bit form to another machine it travels upward. c. d. FTP c. assistance for _____ protected mode was included. d. removing the 16MB memory limit of NetWare 286 a.c. When data travels downwards from upper the layer in TCP/IP. b. d. A set of protocols used in the communication network can be termed as a. ____________ the header till data reaches the application layer . NLM(NetWare Loadable Module) b. 16-bit 32-bit 64-bit 128-bit 187. b. b. e. each upper layer attaches a a. Which managed all functions and was activated at startup or at the time of requirement a. 186. d. c. b. b. Both a & b d.

c. 1993 1996 1998 2001 In which year. 1993 1996 1998 2001 Every protocol with a certain from of contact is known as Protocol stack Protocol suite Stack Suite 198. Stripping in Stripping off Tackling off Tackling in e. d. Which is a remote terminal protocol that enables a user at one location to establish a TCP connection with another location . d. d. 1993 1996 1998 2001 e. across the network or Internet using TCP a. In which year. 194. FTPD FTP Telnet PPP 199. 1993 1996 1998 2001 In which year. NetWare6 was launched a. 195. c. b. 196. 197. c. In which year. b. c. b. b.11 was launched by Novell a. c. b. Version 4. c. 193.a. NetWare5 was launched in October a. Which is a file server access protocol that enables a user to transfer file between two hosts. d. Netware directory service were added to the Netware version 4 a. b. d. d. c. d. a. b.

Which protocol is used by network computers operating system for sending error messages . FTPD FTP Telnet PPP 200. d. c. b.a.

World wide web World wide website World wide windows Window wide web 10. NSF is stands for: National science foundation National social foundation Network science foundation Network social foundation The concept of web begin which research center: a. d. d. 1969 1990 1972 1995 2. European center national research d. In which year the concept of web are begin: a. c. d. b. b. c. Interconnection Network Both of these None of these 4. Arpanet is stands for: Advanced research projects agency network Apple research projects agency network Apple research protocol agency network Advanced research projects agency net connection In which year NSF created new network of computer: a. c. The word ‘internet’ derived from: a. 1968 1980 1989 1890 . b. c. 8. b. CERN is stand for: a. d. USA IBM Apple 3. d. India Department of defense. d. c. b. c. d. Who founded the internet: a. In which year the internet is founded: a. FTPD FTP Telnet ICMP 1. c. 6. b. d. b. d. b. c. Department of defense. Center European nuclear research c. a. When millions of computers linked worldwide from 200 computers: a. In 1970 In 1980 In 1979 In 1990 5. European center nuclear research b.a. c. None of these 11. a. c. b. d. d. b. c. CERN CARN AOL NSF 9. In 1980 In 1990 In 1995 In 1999 7. b. Www is stand for: a.

b. Some of the popular web portals used today are: a. Computer are also known as: a. Internal modem External modem Both of these None of these 20. d. c. Internet service provider Internal service provider Internet search protocol Internet service protocol 21. c. c. 2 3 4 5 18. c. Yahoo. AOL is stand for: a. ISP is stand for: a. b. URL is stand for: a. which modem are cabled between the computer and phone: a. Name of the modems parts: a.com Rediff. FTP PPP HTTP All of these 15. b. d. c. Internal modem External modem Both of these None of these 19. d. A web browser use which protocol: a. b. c. c. d. ISDN is stand for: .12. Mumbai Telephone Nigam limited b. MTNL is stand for: a. d. b. b. b. VSNL is stand for: a. Uniform research location Uniform research locator Universal research locator None of these e. Mahan agar telephone Nagar limited d.com Indiatimes. d. b. d. Web page Web browser Web servers None of these 16. c. Mahanagar Telephone Nigam limited c. 13. b. Modems parts: a. Videsh Sanchar Nigam Limited Videsh Service Nigam Limited Videsh Sanchar Nagar Limited None of these 23. d.com All of these 17. Australia online America online Both of these None of these 14. b. d. None of these 22. d. c. c.

b. 1 2 3 4 33. d. Types of URL: a. c. Transport Control Protocol b. d. IP is the type of protocol. c. b. a. d. 3.4 kbps to 45mbps None of these 26. Transmission Communication Protocol c. Internet Speed Digital Network 24. Set of devices Set of protocol Set of component All of these 28. c. Integrated Sanchar Digital Network b. Digital Subscriber Line Digital Search Line Digital Search Limited None of these 25. b. d. d. c.4 kbps to 45mbps 1. c. b. What the use of NNTP: a. b. Transmission Computer Protocol 27. d. d. d. Domain Name Source Domain Name System Description Name System None of these 35. c. All of these 32. Mange the news posted on newsgroups d. Transmission Control Protocol d. Internet Service Digital Network d. c. DNS stand for : a. International Protocol Interconnection Protocol Interwork Protocol Internet Protocol 29. ________ facilitates the access of hypertext document : .a. Mange the components of computer c. Unreliable Connectionless Both of these None of these 30. NNTP stand for: Network News Transfer Protocol Netconnection News Transfer Protocol Network Netnews Transfer Protocol Netconnection News Transfer Protocol 31. Leased-line is providing high speed internet access ranging from: a. What is TCP/IP a. TCP is stand for a. b. b.4 kbps to 45mbps 2. Mange the communication b/w client and server b. c. Absolute URL Relative URL Both of these None of these 34. IP stand for a. DSL is stand for: a. c. d. b. Name of the URL types : a. Integrated Service Digital Network c. a. b.

b. c. which are as follows: a. Web browser Website Web pages Index pages 46. Transfer news message from one machine to another c. c. Which of these searches new terms on internet and stores the searched terms in a database? a. c. b. A browser support multimedia data. A homepage is also called: a. Web server Web pages Web browser Www 42. The formal set of rules & convention The formal set of application . d. c. d. c. d. a protocol is referred to as: a. Some of the common security threats are: a. b. c. b. b. A newsgroup is also known as: a. Sending mail from one machine to another b. a. Crawler Indexer Search algorithm None of these 40.a. d. None of these 44. d. S/w application H/w application Both of these None of these 43. d. b. d. SMTP is used for: a. Difficult to remember Difficult to write Both of these None of these 38. b. ________ is transfer file from one system to another. Why we use the domain name: a. c. Web browser is a: a. Transfer file from one to another d. c. d. Password cracking Email spoofing Virus intrusion All of these 41. Telnet USENET NNTP SMTP 45. b. Website is a collection of: a. c. b. NTTP HTTP FTP TCP/IP 37. d. b. b. Native support Plug –ins Helper programs All of these 39. c. d. TCP/IP FTP NNTP HTTP 36.

b. c. c. Both a & b None of these 47. MUA is a program used for: a. Two subsystem of an e-mail system a. Transfer email from one system to another Send receive mails Send. d. Upload files Download files A&b None of these 57. Telnet was developed in: a. c. d. b. Http is based on the concept of : a. c. Mailing list is also called: a. b. MBA and MLA MUA and MTA MNA and MBA MCA and MBA 51. Telecommunication & network Telemail & network Teleline & Networking None of these 48. The unique address of each web page is called as: a. c. 1965 1970 1960 None of these . d. b. d. d.com 52. d. b. b. APL AOL Rediff. d. The first web portal was: a.c. c. b. d. Every machine on the internet is assigned a unique ip address. Linux is a web browser: a. c. receive and manage mails None of these 56.com Yahoo. If ftp has the permission to access remote machine then one cana. c. b. Text based Graphical based Both a & b None of these 53. c. Mailserv Listserv Fileserv Saveserv 49. Telnet is derived from word: a. b. c. b. d. d. URL FTP HTML FIIT 55. d. 16-bit numeric address 32-bit numeric address 64-bit numeric address 8-bit numeric address 50. d. which is a. User server Web server Client server None of these 54. c. b.

c. Network virtual transfer c. Alta-vista Goggle Yahoo All a. The relationship b/w the ip addresses and the domain names is maintained by an internet service called the: . Some popular search engine are: a.’) a. NVT is stand for: a. None of these 61. b. b. Can range from: a. Ftp servers allow user to use a method called: a. Info Error Permission None of these 63. IP address is written as a string of _____ numbers separated by dots(‘. Four Three Two One 60. c. d. d. c. b. d. d. b. Network virtual terminal b. c.58. Anonymous ftp Synonymous ftp Fetch ftp None 64. b. Network virtual telecommunication d. IP address no. d. c. 0 to 64 0 to 255 0 to 289 0 to 169 59.

htm . 6. a.a. d. a. 2.doc Both a &b How many levels of headings are in html: 2 7 6 4 Break element is used to insert : A new line New text A blank line None of these To insert blank lines. 11. ranging from: 1 to7 . 14. a. d. 10. b. 5. c. b. d. which tools are used: Text editor Web browser Both a and b None of these Html document must always be saved with: . c. c. d. b. c. b. c. High transfer markup language Hyper text markup language Html is used for: Hardware programming Software programming Web programming All of these Tags are used to describe: Web page Wed site Web size None of these Html code contains: Tags Attributes Elements All of these To create and view an html document. a. d. d. c. c. 12. b. which tags are used: <p> <bk> <br> <ba> To centralize any text. a. b. a. 13. 15. 9. d. a. a. d. 4. c.html . c. d. b. c. c. c. b. a. b. a. c. Hyper text marker language Hyper tab marker language. d. c. b. d. IP DNS URL None HTML stands for. it is simply enclosed within: <center> <cen> <centr> <cent> Horizontal rule element is used to divide the webpage into: Two sections Separate sections Four sections All sections Text level elements affect the : Size of text Style of text Color of text Appearance of the text Logical elements can be used in the webpage: Only two times Seven times Any number of times None of these Logical elements indicate __________of the webpage Logical description General description Both a &b None of these The size attribute specifies the font size on a scale. a. b. c. d. 1. 7. b. b. d. b. 3. a. a. d. a. b. d. 8. a.

Hrfe c. a. Href 30. a. d. 21. a. a. a. b. Abfg d. c. a. c. b.the background color of the web page is: Black Red Pink White The hexadecimal number of white color: #ffffff #fffeee #fefefe #efefef The hexadecimal number of red color is: #ff0110 #ff0111 #ff0000 #ff1001 To create a link in the same document how many anchor elements are used: Two Three Four Five 29. c. 18. d.b. c. a. 22. c. b. 24. 2 to 11 7 to 16 11 to 21 How many times should basefont element be used in the entire webpage: Once Twice Thrice None of these How many types of lists are supported by html: Two Three Four Five By default. a. 23. d. d. d. b. d. d. b. The second anchor element is specified with: a. a. c. Name b. d. c. d. a. 25. b. Href b. Name . d. a. d. b. c. the value of type attribute is: 1 2 3 None of these Type attribute is used with <ty> <tp> <ol> <op> The type attribute can be used with _________ tag for setting the type for the entire list: <ty> <li> <ol> <ul> It can be used with individual _________ tag to set the type of a particular list item: <ul> <li> <ol> <ty> Image element has only an opening tag: <im> <ima> <img> <image> The align attribute is used to adjust : The size of image Color of image Shape of image Position of the image The default value of border is: 1 2 3 0 By default. d. a. 28. c. c. The first anchor element is specified with which attribute: a. 17. b. Wfhy c. b. 20. d. c. b. 19. c. 27. c. 16. a. b. c. 26. b. d. b.

34. 36. a. d. d.d. c. c. c. b. 33. 38. c. 35. Hghj Frames are used to divide the browser window into: Dependent segments Two dependent segments Four independent segments Various independent segments Web pages created using frames can contain : Table of contents Navigation links Footnotes. b. b.________ element is included in an html document: Frames Frameset Font Html The syntax of the frame element is: <fra> <fram> <frame> <frameset> Web publishing means: Collecting the web pages Publishing the web pages Storing the web pages None of these The most common place for publishing the web page is on the web space provided by: DNS URL ISP All of these Scripting languages can be used to provide: Simple features to the web page Main features to theweb page Dynamic features to the web page None of these Most common scripting language is: Html C C++ JavaScript JavaScript language was developed by: Microsoft Sun Nsf Netscape JavaScript is used for: Client-side applications Data validation Creating interactive forms All of these The default size of the basefont element is: . d. a. b.banners All of these To create a frameset document. b. d. d. 40. b. a. d. a. d. 39. b. a. 31. 37. d. b. a. c. b. a. c. c. d. c. c. d. c. a. 32. 41. a. a. b.

d) Which of the following are true statements about TCP. b) IPv6 addresses are __________________ bytes long. e) In a network. 1 2 3 4 ------------------------------------ 1. (b) A TCP segment with the ACK and FIN bits set to 1. True/False [10 points] 1. g) DNS can use the services of ___________________ on the well-know port 53. (c) TCP segments can only be lost when router queues overflow. (c) COPY. (b) Class B network. (d) None of the above. (a) 8 (b) 16 (c) 32 (d) 128 c) What is usually returned when a request is made to connect to a TCP port at which no server is listening? (a) A TCP segment with the ACK and SYN bits set to 1. Multiple Choice. (c) Declines sharply. 3 f) The HTTP request line contains a ________________ method to get information about a document without retrieving the document itself. d. a) The loopback (IP) address is a member of (a) Class A network.1) Multiple choice questions – each question is worth [1 point]. (d) Declines proportionally with the load. (a) The slow-start algorithm increases a source’s rate of transmission faster than the additive-increase. (b) TCP. . (c) A TCP segment with the ACK and RST bits set to 1. (d) A TCP segment with the ACK and PSH bits set to 1. (b) Setting RTO (retransmission timeout value) to a value less than the measured RTT may lead to unnecessary retransmissions. (b) Increases proportionally with the load.a. (b) POST. (a) Increases sharply. (c) Class C network. c. b. (a) HEAD. (d) TCP connection termination procedure is called two-way handshaking. (c) Either (a) or (b). throughput _________________ . (d) None of the above. after the load reaches and exceeds the capacity. (a) UDP.

(d) More loss. (b) Token bucket. (c) More loss. (d) The CA's private key. b. Latin Contextual DB None of these How many types of data are a. 4. b. d. b. This certificate is signed with: (a) Bob's public key. less interactivity. binding Bob's public key to Bob. i) Suppose we choose a small value for a fixed playout delay for a real-time interactive multimedia application. (b) Less loss. (c) Bob's private key. h) Suppose a Certificate Authority (CA) has Bob's certificate registered with it. higher interactivity. (b) The CA's public key. higher interactivity. d. The word ‘Data’ is derived from a. Qualitative Quantitative . (d) None of the above.(d) None of the above. Data Communication And Networks 01 1. Images Numbers Words All of these 1 2 3 4 The types of data are a. 2. d. less interactivity. Data can be either a. This will result i: (a) Less loss. j) The _____________________ (shaping) algorithm allows idle hosts to accumulate credit for the future transmissions. c. b. c. 3. (c) Early random detection. c. (a) Leaky bucket.

c. b. c. short. rigorous.c. d. better a. tall. Both a & b None of these Qualitative data Quantitative data Both a & b None of these Data type is thought of as a set of a. poor. credible and scientific a. bad. d. 5. d. c. b. 9. 13. 12. 8. b. 7. Highest Middle Lowest None of these Information are taken as ________ level of abstraction a. 6. 10. c. d. Numerical form Non-numerical form Both a & b None of these The qualitative data may be a. Highest Middle Lowest None of these Knowledge are taken as ________ level of abstraction a. d. d. Data are taken as ________ level of abstraction a. b. d. 11. b. c. c. d. Things Words Text None of these Which type of data is hard. b. b. b. Numerical form Non-numerical form Both a & b None of these The qualitative data is expressed in a. good. b. d. c. c. Values Operations on values Both a & b None of these . c. Highest Middle Lowest None of these The quantitative data is expressed in a. d. Qualitative data Quantitative data Both a & b None of these Which data are rich.

b. c. 16. Data type as defined in programming language are a. 21. b. 17. d. d. d. Integers Floating-point numbers Characters Alphanumeric strings All of these A telephone user The telephone network Both a & b None of these A channel is defined as a path between . 0 to 232 -1 -231 to 231-1 231 to 264 -1 0 to 231 -1 A signal is an a. Word Number Bit Byte The machine code unit may be _________ depending on the computer architecture: a. e. None of these In case of PSTN. 23. c. One place to another place b. b. b. 8 bit or 16 bit 16 bit or 32 bit 32 bit or 64 bit 64bit or 128 bit In a 32-bit word it can represent unsigned integer values ranging from a. 0 to 232 -1 -231 to 231-1 0 to 264 -1 0 to 231 -1 In a 32-bit word it can represent signed integer values ranging from a. 19. The smallest addressable unit of data is defined as a group of ___ bits is known as a byte: a. 20. c. c. One system to another system c. 22. Electric current Electromagnetic field Electronic current Both a & b A signal is used to convey data from a. c. d. d.14. b. d. d. 18. c. b. Both a & b d. 15. b. b. c. signaling between a. 4 8 16 32 The unit processed by machine code instructions is called a _______ a. c. d.

d. b. data by affecting communications and files of all types including The noise may be classified as ______________ based upon the sources a. c. In channel a. 32. b. c. e. Images Audio Text Programs Telemetry All of these Electrical form Electromagnetic form Both a & b None of these Internal External Both a & b None of these The noise generated because of electricity or atmospheric disturbances is of the order of a. c. d. f. 26. d. c. c. 25. d. the information may not be Reproduced Reach the receiver at all Both a & b None of these noise. d. Upgrades Degrades Both a & b None of these Information and data may be treated as a signal in either a. b. Physical Logical Both a & b None of these 300kHz 300MHz 300GHz 300Hz The noise generated which is lower than the high frequency range of ____ and may have more interface with the signal of information: a. Hard wired Wireless Both a & b None of these Noise of channel noise___________ the quality of information and data a. b. c. 27. c. 28. b. In channel a. b. d.24. The path of channel may be a. c. b. b. c. d. The path of channel may be a. d. . b. 31. d. 300MHz 300kHz 300GHz 300Hz . 30. 29.

From electrical transformers d. d. Digital signal processing b. c. b. 34. b.33. 36. Channel capacity In other words channel bandwidth may be define it as the volume of information per unit time that a _____________________ a. Channels Receivers Transmitter Both a & b Computer Person Transmission medium can handle All of these Channel Bandwidth is measured in a. From the atmosphere c. c. Channel Data Transmission Rate c. c. Channel noise d. d. 40. Channel Bandwidth b. 39. d. Fiber optics technology c. c. 40. S/N SNR S/M Both a & b The unit of noise is a. d. d. b. All of these Internal noise is generated in the a. c. Higher frequency Low frequency Middle frequency No frequency External noise has _______ effect on higher frequencies a. b. More Less No None of these Internal noise is fairly low in case of a. In the vicinity b. 37. but has a significant effect at: a. 35. External noise is generally picked up from electrical appliances existing ____________________ a. c. b. decibels Hertz Micron bits per second e. decibels Hertz Micron . 38. 42. c. Also from outer space e. d. None of these Noise is measured in terms of the signal to noise ratio a. Internal noise is less dependent on frequency. Both a & b d. ____________ defined as the size of the range of frequencies that can be transmitted through a channel a. b. b.

Channel Data Transmission Rate c. Channel noise d. d. 44. b. b. H. d. c. c.Nyquist in 1934 c. decibels Hertz Micron bits per second Which gave the maximum data rate of a noiseless channel a. b. bandwidth is expressed as the difference between the a. 52. b. b. d. Propagation time Channel Latency Channel Utilization Both a & b Bandwidth Channel noise Bit rate Channel latency Higher the Bandwidth. 49. 47. c. c.________ will be the data transmission rate or throughput . d. b. c. c. d. d.d. bits per second Signal propagation speed Media characteristics Transmission distance All of these _____________ is the amount of time that is needed for the information to propagate from the source to destination through the channel: a. e. Channel capacity Channel Data Transmission Rate is measured in a. 50. Peter Sain in 1932 d. bits characters blocks passing All of these ___________ may be defined as range of frequencies assigned to a channel a. d. c. Highest frequency Lowest frequency Both a & b None of these __________ is determined by the maximum number of bits that can be transmitted per unit time through the physical medium: a. decibels Hertz Micron bits per second In analog systems. 46. 45. 48. Throughput may be defined as the number of _______________ through a data communication system over a period of time: a. None of these Channel latency depends on the a. 51. H. 43. Bandwidth is expressed as data speed in ___________ digital systems: a.Nyquist in 1924 b. b. Channel Bandwidth b.

Bandwidth Channel Distance None of these _________ is the rate over network speed which is used to detect errors while transmitting data a. Baud rate Pass band Band data Pass Higher frequency signal offers _________ bandwidth a. d. 55. d. 60. b. 58. d. c. c. the range of carrier frequencies depends on the a. d. end to end circuit a. c. b. Both a & b ________ may be defined as the range of frequencies being supported by a particular transmission medium a. 62. Requirement of the applications supported c. 57. >1008GHz <1018GHz >1018GHz <1008GHz The most popular method for detecting errors in bit rate is ________ a parity bit alongside the data bit for a character a. Total division multiplex b. Time detect modem d. 56. b. b. c. b. In transmission of a signal. c. b. 53. 61. More Less Medium None of these Deleting Inserting Modifying Updating TDM means a. d. Nature of distance d. d. b. d. c. Bit rate Data rate Baud rate Pass band What is the frequency range of gamma and cosmic rays a. 59. Frequency Frequency spectrum Carrier frequency None of these The actual range of frequencies supporting a given communication is known as a. b. c. 54. Time division modem c. Nature of medium b. Time division multiplex FEC means . c. in the context of a complete.a. Lesser Greater Medium None of these ________ refers to the minimum or maximum spatial separation between devices over a link. d.

d. 68. b. b. The sample uses different number of bits b. Data bit rate Useful bit rate Network bit rate Parity bit The example of net bit rate are a. Prefix layer net bit rate d. TDM FEC Framing Bit All of these The FEC is also refers to a. The fundamentals of Bit rate: 70. The material is sampled at different frequencies d. d. d. None of these The size of the multimedia file is the product of _______ a. b. 63. c. The information is digitally compressed by different algorithms e. b.a. Fixed Uniform Fixed and Uniform None of these The gross bit rate is the number of bits transmitted . d. c. 72. e. 69. 64. d. b. d. b. c. c. b. c. c. c. All of these The bit rate is __________ for a specific network a. 65. a. Physical layer net bit rate c. c. 67. 4 8 12 16 70. b. The net bit rate is also known as a. Pass bit rate Data bit rate Useful bit rate Network bit rate The incorrect bit rate is also known as a. d. d. 66. Logical layer net bit rate b. The data is encoded by different number of bits c. Formal Error Checking Forward Error Checking Forward Error Character Formal Error Character Bit rate in bytes Bit rate in kilobytes Bit rate in gigabytes None of these The size of the multimedia file is the length of recording in seconds divided by: a. TDM FEC Framing Bit All of these The speed of connection of bit rate is determined by a.

74. Donald Murray in 1902 Donald Murray modification took a shape as a. per min by an ideal transistor The bit rate could be as high as a. John-Merry-Emile Baudot in 1894 Character set system was implemented using keyboard having ____ a. Donald Merry in 1902 c. d. 78. d. Jean-Maurice-Emile Baudot in 1885 c. d. Bit rate is used to calculate the speed of time to access the network a. b. 83. Getting error frames c. 80. b. a 5-bit code is . Without getting error format d. Signal Data Symbol None of these Lesser bandwidth is required to move these signal units with _____ bits for an efficient system a. John-Maurice-Emile Baudot in 1864 d. per second by an ideal transistor c. 82. b. Less Large Equal None of these A character set was designed by a. d. d. a. Equal More Equal or more None of these Baud rate determines the bandwidth required to transmit the ______ a. c. c. c. Donald Murray in 1901 b. 8-key 6-key 5-key 9-key Who modified system using keyboard using 5-key a. per min by an ideal transmitter d. 77. 75. c. 1Gbit/s 1Mbit/s 1Mbyte/s 1Gbyte/s ITA 1 ITA 2 ITA 3 ITA 4 In character code system.73. b. Getting error format Bit rate is always ________ to the baud rate a. c. d. b. Jean-Maurice-Emile Baudot in 1874 b. Donald Duck in 1904 d. b. c. 79. Without getting error frames b. per second by an ideal transmitter b. b. 81. 76. c. International Telegraph Alphabet 1 International Telephone Alphabet 1 International Television Alphabet 1 International Telegram Alphabet 1 International Telegraph Alphabet 1 was further developed to a. d.

86. Line Feed Light Feed Line Format None of these The basic idea behind coding was really workable if number of characters it had to handle do not require more than a. 00011 00101 00010 10101 4 8 16 32 e. Binary Coded Decimal(BCD) b. 5B/6B m. 85. 8 characters 16 characters 32 characters 64 characters For covering all the characters of alphabet with special a. 89. e. Other coding technique was needed e. 88. 4B/5B l.a. 8 bits 4 bits 16 bits 32 bits . Unicode e. Non Return to Zero Invertive(NRZ-I) j. f. d. Differential Manchester Encoding(DME) g. b. Manchester Code f. 91. Return to Zero(RZ) h. A 5-bit code is signified a a. b. American Standard Code for Information Interchange(ASCII) d. Characters b. Other control characters d. UTF-7 UTF-8 UTF-16 UTF-32 UTF-EBCDIC All of these Binary Coded Decimal system makes use of a series of _____ to represent a decimal number a. b. 87. b. 84. d. d. Punctuation marks c. Extended Binary Coded Decimal Interchange Code(EBCDIC) c. c. b. Nibble is known as series of ____ a. c. d. b. b. 90. c. c. d. c. c. Non Return to Zero(NRZ) i. Inside computer Outside computer Both a & b None of these The following data techniques are used a. All of these Unicode Examples are a. d. c. MLT-3 k. All of these Encoding is done for data a. d.

d. Parallel to ASCII. d. 96. 94. IBM in 1964 b. 99.92. Zone Digit Byte Bit First nibble represents category to which the __________ a. Zone Digit Byte Bit Second nibble is known as a. Extended Binary Coded Decimal Interchange Code is developed by a. c. b. 8 bit 4 bit 16 bit 32 bit 64 bit 7 bit 16 bit 32 bit e. The first version of Unicode . c. ASCII was published in a. b. d. d. b. c. 1964 1965 1963 1966 100. Unicode is appeared in a. 3 4 2 6 First nibble is known as a. b. b. b. 93. d. 98. Unicode Consortium Unique Consortium Unicode Constant None of these 101. d. IBM in 1974 c. IBM in 1964 EBCDIC is a coding system that uses a. c. c. b. Parallel to ASCII. 1992 1991 1993 1994 102. Parallel to ASCII. A byte in EBCDIC system of coding contained ___ nibbles a. d. c. IBM in 1962 d. c. 97. Parallel to ASCII. Unicode was developed by a. d. Characters belong Integers belong String belong None of these ASCII is a ___ bit coding for representing characters of English alphabets a. c. d. c. 95. b. b.

Anti-Aliasing Aliasing Channel Bandwidth 112. Unicode 1. Graphical Graphemes Graphs None of these 105. c. Unicode mapping methods are of two types.0 appeared in a. ISO 5589-1 ISO 5569-1 ISO 5579-1 ISO 5559-1 106. b. A telephone wire has bandwidth of ______ for short distance a. b. Every communication channel has a ________ which is defined as the frequency range a. The undesirable waveform is known as a. b. The word PCM stands for . The bandwidth is a _________ property of a transmission medium a. d.0 None of these 103. d. c. c. Both a & b d. d.a. UCS(Unicode Character Set) c. d. b. b. Data rate that can be achieved using a channel depends on the _____________ of a channel a. b. In Unicode there were codes for representing characters and their basic graphical representation are known as a. c. c. UTF(Unicode Transformation Format) b. Frequency Bandwidth Data rate Capacity 111. None of these 107. d. Channel Bandwidth Carrier Data rate 108. Unicode version 5.0 Unicode 3. 1M 2M 3M 4M 110. c. b.0 Unicode 2. d. b. c. d. The first 256 code points belong to __________ for conversion to Roman Text a. d. 2005 2006 2007 2004 104. b. Physical Logical Both a & b None of these 109. c. namely are a. c. d.

store or manipulate information are a. Both a & b d. d. Discrete form c. c. Continuous electromagnetic wave form b. b. c. The bandwidth of voice grade channel is approximately a. None of these 116. The word FM stands for a. Analog Modulation Analog Manipulation Amplitude Modulation Analog Modeling 118. b. c. b. store or manipulate information 1 2 3 4 114. The way to communicate. The disadvantages of FM are a. c. b. b. d. d. b.a. d. d. How many a. 2MHz 4MHz 6MHz 8MHz 121. display. c. The analog form of electronic communication represents the information in a. Frequency Modulation Fourier Manipulation Frequency Manipulation Frequency Modeling 119. The bandwidth of CATV video channel is approximately a. b. Much more bandwidth(as much as 20 times as much) More Complicated receiver . Well defined service areas for given transmitter power d. c. d. d. 4000Hz 5000Hz 6000Hz 3000Hz 120. d. Improved signal to noise ratio(about 25dB) b. The digital form of electronic communication represents the information in a. Analog Digital Both a & b None of these 115. The word AM stands for a. b. The advantages of FM over AM are a. 113. c. Continuous electromagnetic wave form Discrete form Both a & b None of these 117. c. Smaller geographical interference between neighboring stations e. display. Less radiated power c. Primary code mapping Pulse code modulation Primary channel modulation None of these way to communicate. b. All of these 122.

b. Asynchronous Synchronous Synchronization None of these 131. b. b.c. SS7 uses voice switches known as a. c. d. SS7 means a. Asynchronous systems b. c. The PSTN provides a _________ path between the destination and source a. Controlling network b. Asynchronous transmission is a _________ method of transmission in which a sign bit is added to the beginning: a. SS7 is a a. All of these 128. d. c. d. d. _____________ refers to correct detection by receiving equipment at the beginning and end of data that was sent from sending equipment a. b. Synchronous systems can be classified into three categories: a. Computer are________ in nature a. d. Character synchronous systems c. b. c. SSWs(Service Switching websites) SSPs(Service Switching Points) SSNs(Service Switching Networks) SSDs(Service Switching Data) 129. d. b. c. 124. All of these 132. Handles the routines decision d. c. 125. c. SSPs uses Query Service Control Point (SCP) database using Packet switches called a. c. The functions of SS7 are a. Set up and tear down the call c. Flag Synchronous systems d. b. Signal Transfer Points(STPs) SSWs(Service Switching websites) SSPs(Service Switching Points) SSNs(Service Switching Networks) 130. Logical Physical Both a & b None of these 127. d. d. Start Stop Start-stop None of these . More complicated transmitter All of these 123. d. b. Analog Digital Both a & b None of these Signal Source7 Signaling source7 Signaling system7 Signal system7 System Source Protocol None of these 126.

d. d. Absence Presence Both a & b None of these 138. SSWs(Service Switching websites) d. SSPs(Service Switching Points) 136. d. d. In DME. c. c. less more either less or more none of these 140.133. c. b. b. c. c. b. MPE(Manchester Phase Encoding) c. MPN(Manchester Phase Network) d. b. Manchester is also known as a.3 135. CDP(Conditioned Diphase Encoding) b. 20MHz 15MHz 10MHz 5MHz e. c. MPW(Manchester Phase Website) 134. d. d. zero between each bit signifies a _____________ a. For 10Mbps Ethernet carrier frequency is a. d. MPD(Manchester Phase Data) c.3 Ethernet standard 802. c. Rest Zero Neutral None of these 141. b. MPE(Manchester Phase Encoding) b. The NRZ-pulses contain ____ energy in comparison to that of a RZ code a.3 Ethernet standard 805. The another name of DME(Differential Manchester Encoding) a. In RZ.3 Encoding standard 805. 136. Manchester coding is used in telecommunication by a. logical values are indicated by _______________ of transitions a. 2 3 4 5 142. b. Encoding standard 802. NRZ has no ___ state a. Rest Condition Neutral Point Both a & b None of these 139. b. Due to four transitions the maximum fundamental frequency requirement is reduced to ____ . MLT-3 is an encoding scheme in which ____ voltage levels are used a.

Linear process Non-linear process Both a & b None of these 151. d. b. None of these 143.5 144.24MHz 32. Block coding Bit coding Byte coding Block character 146. Low frequency to higher frequency c. Low frequency to destination 149. One-fourth of the baud rate b. Special character are called .25MHz 31. d.26MHz 145. c. 4B/5B encoding scheme is also known as a. b. c. Source to higher frequency d. d. Audio Video Music Data All of these 150. Special character Start bit Stop bit None of these 152. In 4B/5B scheme. FDDI uses ANSI X3T9. we need a 125MHz clock for a signal of a. e. The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined _____ bit symbol a. d. Modulation is the technique used to translate a. c. b. c. c. b. ANSI X3T9. The low frequency signal are a. 32.5 for obtaining 100Mbps from a signal of ______ a. c._______ are added a. d. The modulation/demodulation is a a. One-third of the baud rate c. In character synchronous system . b. One-half of the baud rate d. b. Information from source to destination b.a. d. b. d. 5 4 6 3 148. 1000MHz 100MHz 10MHz 99MHz 147.6 ANSI X3T9. b. d.25MHz 31. c.5 ANSI X6T9. Who specified the committee scheme of coding a. c.7 ANSI X5T9.

d. STN SYN SBN SRN 153. 1 0 Both a & b None of these 157. Angular frequency id defined as _______ the frequency of carrier signal a. How many encoding techniques we used today a. b. Modulation/ demodulation is a non linear process where two different sinusoids are _________ a. c. b. e. Once Twice Thrice None of these 161. c. 100MHz 10MHz 1000MHz 10000MHz 156. d. Modulation is the technique used to translate low-frequency(base-band) signals like __________ to a higher frequency a. Lower Higher . 10 100 1000 10000 158. The character string of the SYN character is a. c. The character synchronous system receives _______ as one character a. Audio Music Video Data All of these 159.a. d. c. b. c. b. c. b. b. d. c. d. b. d. d. 2bit 4bit 8bit 16bit 155. 5B/6B creates a data pattern that is placed with equal numbers of a. b. b. The frequencies that comprise the message (base band) are translated into a _________ range of frequencies a. Addition Subtraction Multiplied Division 160. b. d. d. c. c. In the 4B/5B we need a 125MHz clock for a signal of a. 01001111 10001110 00010110 00110011 154.

d. The full form of DSB-SC a. d. b. that is the message frequency a. Can not change Change Either change or not None of these 167. The carrier frequency may be a ___________ a. d. Harmonics are the _________ of the frequency. d. c.c. b. Double Side Band-Suppressed Carrier d. One more kind of analog modulation is called a. Pulse code modulation is a method by which an audio signals are represented as a. c. d. c. Either change or not d. The amplitude of carrier frequency ________ in accordance with the modulated signal a. Modulation also reduces the size of antenna for higher frequencies with ________ frequency a. c. c. d. None of these 168. Even Odd Both a & b None of these 164. Change c. it needs the carrier frequency to be generated or derived at the receiving location known as a. For demodulation. Zero None of these 162. b. c. Double Slide Band-Suppressed Carrier 170. b. Lower Greater Middle None of these 163. d. Direct data Digital data Device data None of these . b. The frequency of the carrier ___________and we get a complex wave a. d. b. Direct Side Base-Suppressed Carrier c. b. d. Addition Subtraction Multiply Division 165. c. Vestigial side band modulation Vestigial side base modulation Vestigial slide band modulation Vestigial slide base modulation 171. does not changed b. Direct Side Band-Suppressed Carrier b. Radio wave Light wave Both a & b None of these 166. The non-linearity results in several ___________ harmonics a. DSB-SC DBS-CS BDS-SC BSD-CS 169. c. b.

c. b. d.172. c. The disadvantages associated with the Delta Modulation PCM is a. b. 2 3 4 1 178. None of these 179. Quantization noise b. b. The main parameters in determining the quality of a PCM system are the a. d. Both a & b d. Smallest possible signal magnitude c. c. b. d. Granular noise c. PCM is a coding scheme used in digital communication because of _____ sensitive to noise a. c. which introduces as the finite number of quantization levels during the conversion to PCM code a. b. Original level Quantized level Both a & b None of these 177. Digital noise d. None of these 182. Telephone lines . The dynamic range is the ratio of the a. the largest voltage amplitude is _______ the smallest voltage amplitude a. 32Kbps 64Kbps 128Kbps 256Kbps 173. In dynamic range. b. d. For a six bits system the dynamic range will be approximately equal to ___ a. d. d. Slope overload b. Largest possible signal magnitude b. 34dB 36dB 40dB 38dB 180. Dynamic range Signal-to-Noise Ratio(SNR) Both a & b None of these 176. None of these 175. 32times 64times 125times 256times 181. Pulse Code Modulation(PCM) requires bandwidth of ________ a. Equalization noise c. b. d. c. The maximum error occurs between the a. c. Less Middle High None of these 174. c. In digital signal the main source of noise is ___________. Both a & b d. The maximum error occurs when the original level falls exactly halfway between ______ quantized levels a. Communication channels like ____________ are usually analog media a.

For a 0. the frequency of the carrier signal is changed according to the data a. c. d. Modulation Data Signals None of these 190. 3000 3300 3100 3330 189. Which is a bandwidth-limited channel a. d. d. a __ degrees phase sine wave is transmitted a. 300Hz to 3300Hz c. d. QPSK-Quadrature Phase Shifted Keying g. the usable bandwidth falls in the range of _______ a. d. c. 33Hz to 3300Hz 185. 0 1 both a & b none of these 186. b. Analog data Digital data Signal data None of these 191.Quadrature Amplitude Modulation h. b. c. d. b. c.b. c. b. b. In the Phase Shift Keying method a sine wave is transmitted and the phase of the sine wave carries the ______ a. b. it is easy to such a. In the case of telephone lines. In the Frequency Shift keying. For a 1. c. d. a __ degrees phase sine wave is transmitted . 30Hz to 3300Hz d. 300Hz to 3000Hz b. Television lines Digital lines None of these 183. Digital information signals have the shape of pulse and represented by a. Digital media Analog media Both a & b None of these 184. The main advantage of this technique. Telephone lines limit amplitude changes to some _________ changes per second a. DPSK-Differential Phase Shift Keying e. c. The following types of modulation are used in modems a. Signals Also to detect them Both a & b None of these 188. FSK-Frequency Shifted Keying c. c. d. QAM. b. 0 45 90 180 192. ASK-Amplitude Shift Keying b. PSK-Phase Shift Keying d. BPSK-Binary Phase Shift Keying f. All of these 187.

the modulation technique is called quadrature PSK(QPSK) a. Binary Phase Shift Keying is measured in a. Decibel Baud Hertz bits per second 200. c. For a 0 the modem shifts the phase of each succeeding signal in a certain number of degrees a. Amplitude Shift Keying Phase Shift Keying Frequency Shift Keying None of these 195. 0 45 90 180 196. where each symbol represents ____. d. The AM is considered as a a. the modulation technique is called a. b. b. b. d. b. QPSK 8PSK 8QAM 8FSK 199. the case of 8 different phase shifts. c. 0 45 90 180 201. d. Differential phase modulation technique is also called a. where each symbol represents ____. In QPSK.a. In the differential phase shift keying. A sub method of the phase modulation is a. None of these 194. b. 0 45 90 180 193. the four angle are usually out of phase by a. Differential phase modulation b. d. d. In binary phase shift keying. b. 2 bits 4 bits 8 bits 16 bits 198. b. the case of 4 different phase shifts. d. d. In binary phase shift keying. c. d. In the differential phase shift keying. b. b. c. c. c. c. 0 90 180 270 197. Linear process Non-linear process Both a & b . Double phase modulation d. c. c. For a 1 the modem shifts the phase of each succeeding signal and a different certain number of degrees a. Direct phase modulation c.

________ signal are normally converted into PCM a. d. d. b. c. Code Division Multiplexing(CDM) d. ________ is a process where multiple analog message signals or digital data streams are combined into one medium over a shared medium a. PCM requires bandwidth of a. c. b. All of these 210. b. Analog Digital Both a & b None of these 207. 205. Amplitude Modulation Frequency Modulation Angle Modulation Pulse Code Modulation 204. b. b. The various ways to multiplex are a. b. Multiplexing Modulation Encoding technique De-multiplexing 209. The FM is considered as a a. Linear process Non-linear process Both a & b None of these 203.d. d. In data communication using computers . Time Division Multiplexing(TDM) c. Multiple channels are combined onto a single aggregate signal for transmission a. c. The phase modulation is similar to the a. b. In PM. c. ________ of the carrier wave changes a. 21Kbps 24Kbps 64Kbps 65Kbps 206. c. The PCM is a coding scheme used in __________ communication because of less sensitive to noise a. Wavelength Division Multiplexing(WDM) e. Frequency Division Multiplexing(FDM) b. d. In FDM . Analog Digital Both a &b None of these 208. c. c. c. Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) 211. d. b. d. Frequency Phase Both a & b None of these e. d. d. None of these 202. channels are separated in the aggregate by their . In which .

In which way of multiplex . b. d. d. d. Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) Both b & c Both a & b Both c & d 214. Statistical TDM Static TDM Dynamic TDM None of these 218. c. a technique known as . c. c. Synchronous TDM Asynchronous TDM Both a & b None of these 217. c. satellite system or a telephone lines a. e. Frequency Division Multiplexing(FDM) b. Frequency Division Multiplexing(FDM) Time Division Multiplexing(TDM) Code Division Multiplexing(CDM) Wavelength Division Multiplexing(WDM) 215. Code Division Multiplexing(CDM) d. The two alternative technologies of multiplexing for digital sources are a. Bandwidth Signal Frequency None of these 212. b. c. b. 216. Synchronous TDM Asynchronous TDM Both a & b None of these e. a single channel is divided into time slots and each transmitting device is assigned for least one of the time slots for its transmission a. The Asynchronous TDM is properly known as a. c. d. Time Division Multiplexing(TDM) c. FDM TDM CDM None of these 220. To overcome the inefficiency of standard TDM.a. _________ was the foremost multiplexing scheme to have the benefits of wide scale network deployment and till today. Which ways of Multiplex are more flexible a. c. d. In which type of TDM . g. d. d. b. f. _______ provides a means for merging data from the varied sources into a single channel to support communication over a microwave system . such systems are still in use and are used with analog transmission a. b. d. c. The TDM are implemented in two ways are a. b. Wavelength Division Multiplexing(WDM) 213. b. b.the whole amount for a certain amount of time is provided to the user and all user uses the same frequency but at different time a. FDM TDM CDM None of these 219.

High-Frequency Ultra-Half-Frequency 222. The main disadvantage of CDM is a.a. 228. In CDMA system . d. 9500 9200 9300 9600 . c. d. If one or more bits are transmitted at the same frequency are called a. d. The spread spectrum technology of CDMA is ___________ than TDMA a. c. Protection from interference b. Different Same Both a & b None of these e. 1963 1989 1979 1958 227. CDM FDM STDM CDMA 221. Ultra -High –Form Ultra –Half-Form Ultra. d. b. b. Frequency doping Frequency hopping Frequency hoping Frequency hipping 225. CDM FDM STDM CDMA 223. Bit rate Data rate Baud rate Chip rate 224. c. More secure Provides higher transmission quality Both a & b None of these e. Tapping as only the receiver know the spreading code d. c. b. The word UHF means a. Tapping as only the sender know the spreading code c. c. c. b. d. The Code Division Multiple Access(CDMA) was widely introduced in a. The number of different frequency per bit are called a. b. b. c.all user transmit in the ______ bandwidth simultaneously a. ________ may be defined as the form of multiplexing where the transmitter encodes the signal using a pseudo random sequence a. d. c. d. b. A CDMA call starts with a standard rate of ___________ bits per second a. b. c. All of these 226. d. 229. b. d.

b. b. 238. d. The pattern of switching from one channel to another channel is known as a. In spread spectrum technique. -1 and1(polar) 0 and 1(non-polar) Both a & b None of these e. d. Higher transmission quality d. ________ time is the time spent on a channel with certain frequency a. d. 234. b. The word FHSS stands for a. b. c.230. Low cross-correlation values b. Unique to every user c. Reduction of multi path affects e. ________ is best known spread spectrum technique in which a pseudo random noise code multiples the signal a. a receiver is only capable of selecting the desired signal if it has the knowledge about the code of the intended a. Privacy due to unknown random codes d. Both a & b 231. c. d. frequency hopping spread spectrum file hopping spread spectrum file hiding spread spectrum frequency hopping special spectrum The word DSSS stands for a. FHSS includes_______ technology a. d. FHSS FCSS DSSS DHSS 237. Low power spectral density b. b. Interference limited operation c. digital sequence spread spectrum direct sequence spread spectrum digital sequence special spectrum direct signal spread spectrum 235. c. A pseudo random noise code is a sequence of chips valued________ with noise-like properties a. Receiver Transmitter Both a & b Signal 232. The major advantage of spread spectrum technique may be enumerated as a. c. c. FDM TDM CDM . The code used with the signal for spreading have a. Hipping Hyping Harping Hopping 236. 239. c. b. d. FDM Dwell Dowel Dowry e. d. All of these 233. c. b. c. b.

Individual channels are a. d. Bell Laboratory Hell Laboratory Dull Laboratory None of these used in Japan North America Both a & b None of these 244. Digital Service-Level 1 c. each of 8 bits a. T-carrier was digital signal 1. b. E1 signifies another carrier system that finds use outside a. c. c. b. 24 channels are also called a. __________ a multi-channel system in which a number of individuals channels are multiplexed for transmission a. c. b. Both a & b e. b. c. System Carrier Carrier system None of these 242. DS-1 conveys the meaning of a. T1 standards is widely a. c. 68Kbit/s 64Kbit/s . b. d. DS0 channel is a ______ that is multiplexed a. 243. T-carrier signaling scheme was developed by a. d. d. b. T1 E1 DS0 DS1 245. c. b. A DS1 circuit comprises ________ . 24 channels 26 channels 28 channels 30 channels 248. Direct Service-Level 1 b. Double Service-Level 1 d. d. Timeslots DS0 Both a & b None of these 249. c. DS1 or DS-1 which is known as a. d. North America Japan South Korea All of these 247. Digital Slide-Level 1 246. c. b. d. Data Audio Video or their combination All of these 241. d. b. 240.d.

20 22 24 26 256. 258.544Mbit/s 1. c. b. Extended Super Frame(ESF) c. Terminal frame Signaling frame Super frame Switching frame .538Kbit/s 1. Super Frame(SF) b. b. 1. d. None of these 253. c. There are _____ contiguous frames of 193-bit each in a Super Frame a. d. c. 2Kbit/s 3Kbit/s 4Kbit/s 6Kbit/s 254. c.555Mbit/s 251. c. b. e. 10 12 14 16 255. Both a & b d. 62Kbit/s 70Kbit/s 250.533Mbit/s 1. One is used for alignment of ________ a. There are _____ contiguous frames of 193-bit each in a Extended Super Frame a. Second is used for alignment of ________ a. 2Kbit/s 4Kbit/s 6Kbit/s 8Kbit/s 257.536Kbit/s 1. Terminal frame Signaling frame Super frame Switching frame e.c.566Mbit/s 1. d. d. 1. c. b. d. d. b. Framing channel has been divided into two each with _______ in Super frame a.539Kbit/s 252. c. d. b. d. By sampling each 8-bit frame for 8000 times per second. DS1 is full-duplex circuit in which the circuit does concurrent transmission and reception at a data rate of ___ a.537Kbit/s 1. Framing schemes are of two types: a. b. b. total bandwidth achieved is ________ a. c. d. Framing channel has been divided into two each with ______ in Super Frame a.

d. Even-number Odd-number Prime-number None of these 260. Alignment of terminal is carried out with frames having _______ in the super frame a. An E1 circuit has been divided into ____ time slots a. b. European Control of Postal Telecommunications d. 1. Alternate Mark Inversion d. c. d. Analog Mark Interchange 264. T1 is recognized by its original ______ line rate a. c. d. Bandwidth Signal Both a & b None of these 265.259. c. A frame having _________ in the super frame is used for signaling alignment of frame a.088Mbps 268. 32 time slots implements an individual communication channel supporting a bit rate of ________ . AMI means a. b. AMI requires less a. d. T1 used the encoding technique _______ a. c. c. 2bits 4bits 8bits 16bits 267. b. Analog Memory Interchange b. c. 2. None of these 266. b. c.533Mbit/s 262. d. d. d. AMI LAN DS1 CEPT 263.555Mbit/s 1. CEPT after ten years of launch of T1 system used _____ for framing known as European E1 a. European Conference of Postal and Telecommunications c. b. b. d. Alternate Memory Interchange c.566Mbit/s 1.084Mbps 2. b. CEPT means a.544Mbit/s 1. Conference European of Postal Telecommunications b. Even-number Odd-number Prime-number None of these 261.048Mbps 2. 30 32 34 36 269.044Mbps 2. c. An E1 carrier carries digital information at ______ a. b.

b. Which was taken by International Telecommunications Union Telecommunication Standardization Sector(ITU-T) a. UK. d. b. d. Canada. c. T-carrier system E-carrier system Both a & b None of these e. T-carrier system E-carrier system E1 system T1 system 274. ITU-T finds wide use all over the world except three nations namely a. 20 15 30 40 277. Plesiochronous Digital Hierarchy Plasma Digital Hierarchy Pointer Double Hard disk Plasma Double Hierarchy 276. b. b. USA. 60Kbps 62Kbps 64Kbps 66Kbps 270. PDH means a. America. c. c. Canada 275. b. d. An E1 frame has a total of _________ a. b. 128bits 256bits 64bits 192bits 271. c. c. only ___ are used two of these are used for framing and signalling call setup a. c. USA. b. c. USA d. 272.a. d. d. d. Latency Capacity Both a & b None of these 278. b. 273. Protocols Frame Relay Cell Relay Both a & b None of these e. In 32 timeslots of E1. CEPT revised and improved the technology adopted by a. c. Japan b. Which is used to exchange information over the E1 carriers that connect remote zones a. Japan. TS16 TS15 TS14 TS13 . d. c. America. d. High quality of call is ensured since transmission takes place with a constant a. b. Japan c. d. Japan. Another timeslot is reserved for signalling purposes a.

d. Physical conductor Guide to bind the signal Logical conductor Both a & b 285. Copper Glass Both a & b None of these e. __________ are bounded media a. b. Wireless transmission systems do not make use of a a. b.279. d. 4bits 8bits 16bits 32bits 281. c. Both a & b d. Twisted pair Coaxial cable Fibre optic cables All of these 283. _______ is the one example of long distance communication a. Radio TV Cellular phones All of these 288. c. There are two general categories of transmission media a. Unbounded(unguided) media c. Which are used in radio transmission in one form or another a. b. c. Which is controlled some standard protocols in the field of telecommunications a. b. all of these 284. The RF(Radio Frequency) is divided in different ranges starting from . Teardown Call setup Both a & b None of these 280. c. which has no boundaries d. b. Microwave Satellite Infrared All of the above 287. b. ________ are known as unbounded transmission a. d. c. Energy travels through the air rather than a. c. Satellite signal Satellite relay Analog signal Digital signal 289. The transmission systems addressed under this category include a. both travel through the air c. E1 is different from earlier T-carrier systems since all ___ of every sampling are available for every call a. Bounded(guided) media b. d. b. d. d. 286. c. d. None of these 282. d. microwave and satellite transmission b. c. b.

a.
b.
c.
d.

290.

Very low frequency(VLF)
Extremely high frequency(EHF)
Both a & b
None of these
Two transmitters cannot share the same frequency band because of

a.
b.
c.
d.

Mutual interference
Band usage is regulated
Both a & b
None of these

291. PDAs means
a.
Personal Digital Assistants
b.
Personal Double Assistants
c.
Personal Digital Analogs
d.
Power Digital Assistants
292. ADSL means
a.
b.
c.
d.

Analogs Digital Subscriber Lines
Asymmetric Digital Subscriber Lines
Assistants Digital Subscriber Lines
Asymmetric Digital Subscriber language

293. A pair of copper wires twisted together and wrapped with a plastic coating as a twisted pair and which has a diameter of
____:
a.
b.
c.
d.

0.2-0.6
0.4-0.7
0.2-0.8
0.4-0.8

294. ______ are the substances used for insulation purposes
a.
b.
c.
d.
e.

Teflon(r)
Flouropolymer resin
Polyvinyl chloride
Polyethylene
All of these

f.
295. In modem data rate is restricted to approximately____:
a.
b.
c.
d.

24Kbps
28Kbps
30Kbps
32Kbps

e.
296. _______ was first used in telephone system by Alexander Graham Bell
a.
b.
c.
d.

Copper medium
Copper signal
Copper set up
None of these

e.
297. The unshielded twisted pair states the link between the end in the communication closet and the outlet which is further
restricted to
a.
b.
c.
d.

60metres
90metres
100metres
190metres

298. A UTP cable contains __________ twisted pairs
a.
b.

2 to 240
2 to 4200

c.
d.

2 to 2400
None of these

299. The major disadvantage of UTP is
a.
Bandwidth is lower
b.
Bandwidth is higher
c.
Bandwidth is limited
d.
Bandwidth is dynamic
300. STP stands for
a.
b.
c.
d.

Shielded twisted pair
Signal transmission pair
Shielding twisted process
Shielded transmission pair

301. 150Ohms STP contains ________IBM connector or RJ45
a.
b.
c.
d.

1 pair
2 pairs
3 pairs
4 pairs

302. 100Ohm UTP contains _________ and 8-pin modular connector(ISDN)
a.
b.
c.
d.

2 pairs
3 pairs
4 pairs
5 pairs

303. ________ contains multi-mode fibre
a.
b.
c.
d.

52.5/125
72.5/125
62.5/125
82.5/125

304. What are the biggest advantage of UTP
a.
Flexibility
b.
Cost-effective media
c.
Usability of both data communication and voice
d.
All of these
305. LED means
a.
b.
c.
d.

Light Emitting Device
Light Emitting Diode
Light Exchange Device
Light Exchange Diode

306. The effective capacity of coaxial cable depends on the
a.
b.
c.
d.
e.

Spacing of amplifiers
The length of the circuit
The gauge of the centre conductor
Other intermediate devices
All of these

307. LANs function over coaxial cable to the __________ specifications
a.
b.
c.
d.

10BASE5
10BASE2
10BASET
All of these

308. Coaxial cables are of two types
a.
b.
c.

Baseband
Broadband
Both a & b

d.

None of these

309. The gauge of coaxial cable is _____ than the twisted pair
a.
b.
c.
d.

Thicker
Thinner
Heavy
Bulky

310. Traditional coaxial cable is quite ________ of which Ethernet LAN 10Base5 is an example
a.
b.
c.
d.

Thick
Heavy
Bulky
All of these

311. Twin axial cables contains _____ such configurations within a single cable sheath
a.
b.
c.
d.

2
3
4
5

312. The mechanical protections cover the _________
a.
b.
c.
d.

Secondary buffer coating
Primary buffer coating
Both a & b
None of these

313. The bandwidth is typically ________ over a length of one kilometer of fibre expressed as ‘MHz-Km’
a.
b.
c.
d.

10 to 20
20 to 30
30 to 40
40 to 50

314. In which multimode fibre, light is refracted by an increasing amount as it moves away from the core
a.
Single mode fibre
b.
Step index multimode fibre
c.
Graded index multimode fibre
d.
All of these
315. The actual bandwidth of graded index multimode fibre depends on
a.
b.
c.
d.

How well a particular fibre’s index profile minimizes model dispersion
The wavelength of light launched into the fibre
Both a & b
None of these

316. The typical bandwidth of graded index multimode fibre range from
a.
b.
c.
d.

100MHz-Km to over 1GHz-Km
200 MHz-Km to over 1GHz-Km
300 MHz-Km to over 1GHz-Km
150 MHz-Km to over 1GHz-Km

317. Which multimode fibre has a thinner inner core
a.
b.
c.
d.

Single mode fibre/ Monomode fibre
Step index multimode fibre
Graded index multimode fibre
All of these

318. In which multimode fibre , different wavelength of light travel at a different speeds
a.

Single mode fibre

EMI/RFI means a. Bounded Media Comparison Chart Media Twisted pair cable Advantages Inexpensive. b. c. d. Computer aided distribution b. c. e. b. The single mode fibers have the a. high security. long distances. 250Km 350Km 225Km 325Km 325. None of these 324. Electro Magnetic Interference / Radio Frequency Interference b. long distances Optical fibre cable Very High bandwidth. Monomode fibre optic systems routinely are capable of transmitting signal over distances in excess of a. ______ are opto-electric devices a.b. Very broadest bandwidth Lowest cost Lowest attenuation of any optical fibre All of these 320. b. limited bandwidth. Small size and light weight Large bandwidth Flexibility and high strength Secure against signal leakage and interference No short circuit problems All of these 321. Repeater EMI RMI RFI 323. noise immunity security is better in pair cable Connections. c. In data communication the signal has to travel through the transmission media that may be . d. d. Computer application design c. Computer aided design d. small size Disadvantage Sensitive to noise. c. b. CAD means a. short distances. Step index multimode fibre Graded index multimode fibre All of these 319. c. d. The advantage of single mode fibre are a. d. easy to add nodes Coaxial cable (in comparison to twisted) High bandwidth. The fibre optic systems consists of a a. In a fiber optic system. d. f. noise immunity. well established . None of these 326. Light sources Cables Light detectors All of these 322. c. Electronics Magnetic Interference/Redundancy Frequency Interference c. b. security hazard because of easy interception Physical dimensions. Electro Minute Intrinsically/ Radio Fibre Interference d. cost 327.

Relative power of two signals at the same point c. A negative value of decibel indicates _______ of signal strength a. b. b. d. None of these 332. d. Loss Gain Either loss or gain None of these e. d. c. c. Loss Gain Either loss or gain None of these 333. b. Created Inserted Modified Deleted 337. Signal at two different points b. Data processing and transmission systems experience errors due to several reasons . Attenuation Distortion Noise None of these 330. Hertz Micro decibel Kilometer 331. There exist three causes of impairment in transmission errors a. d. 334. d. Attenuation Distortion Noise All of these ___________ is the loss of the signal power while traversing a transmission media including electronic circuitry a. c. c. d. Both a & b d. e. Distortion is calculated as the ratio of the a.a. c. c. The attenuation includes a number of factors like a. Attenuation is measured in terms of a. Distortion Transmitting and receiving antennas Transmitter powers Modulation techniques Frequency of the transmission Atmospheric conditions All of these is proportional to the square of the _________ a. c. b. b. Equalizing Atmospheric conditions Modulation techniques Operating frequency Operating system devices are ________ at intermediate points to keep the shape of the signal intact a. d. 334. 334. Wired Wireless Both a & b None of these 328. c. b. A positive value of decibel indicates _______ of signal strength a. 329. b. b. f. d. d. c. b.

Resistance to current in a cable can be caused due to attenuation d. Causes the amplitude of the signal to reduce and therefore loss of power Distort the shape of a signal Both a & b None of these 346. lead to distortion c. loss in transmission due to leakages. The digital signals do not suffer from ___________ but they are susceptible to dropouts a. impulses from static in the atmosphere. double error detection 342. b. The resistance tends to a. etc. 347. Inductance Capacitance Resistance All of these 344. All of these 338. They should be re-inverted so that the original data is restored d. c.a. Distort the shape of a signal c. The main constraints are due to the physical medium that produces a. Single error correction. Single Bit Errors Burst Errors Both a & b None of these e. b. c. double error detection Single error character. b. Burst errors Single bit errors Both a & b None of these e. Which type of error corrupt the single bits of transmission a. The types of errors are a. The inductance and capacitance tends to a. c. Both a & b d. d. Help to detect any error b. A transmission cable has a. c. double exchange detection Single error code. d. Causes the amplitude of the signal to reduce b. b. c. d. e. The use of several parity bits are a. b. Find if any bits are inverted c. c. d. d. Electrostatic interference can be caused from circuits or machines lying close by Inductance and capacitance. SECDEC means a. c. d. double error detection Single exchange correction. None of these 345. d. All of these 341. b. b. Noise Distortion Both a & b None of these 340. 343. Which type of error corrupt the multiple bits of transmission . b. Noise Distortion Attenuation Dropouts All of these 339.

ENQ means a. BER stands for a. d. Checksum Rail Check d. c. c. d. c. correction of errors detection of errors Redundancy check All of these 353. d. Duration of the noise Transmission time of the no of bits of the transmitted packet Both a & b None of these 352. Which redundancy process can detect the more than 95 per cent of all errors a. d. b. Burst errors Single bit errors Both a & b None of these 348. c. Byte Enquiry Rate Bit Error Rate Burst Enquiry resistance Burst Error Rate 350. b. CRC means a. CRC Parity check Checksum All of these e. d. b.a. b. c. Cyclic Redundancy Check c. The No of bits that get affected in burst errors depends upon the a. d. d. Enquiry Encryptions Enquire None of these 349. c. The redundant bit enables a. c. c. __________ is the technique of providing a data string that is added to information packets used to detect errors in data packets a. None of these 357. NAK means a. The Two-dimensional parity check method can not . CRC Parity check Checksum All of these 356. The types of redundancy processes are a. Circuit Redundancy Check b. d. Noise Acknowledge c. Network Acknowledgement 351. 355. Parity check Cyclic redundancy check Checksum All of these e. b. b. 354. None Acknowledge b. b. Negative Acknowledgement d. b.

Signal attenuation Signal bandwidth Frequency Data rate 359. d.a. Correct the errors Detect the errors Correct and detect the errors None of these 358. b. this is called a. 1 2 3 4 . b. The CRC is validated by using _______ conditions a. c. b. c. d. When signal amplitude degrades along a transmission medium . c. d.

d. a. The two conditions of CRC are It should possess exactly one bit less than the divisor When CRC is appended to the end of the data stream Both a & b None of these Data Communication And Networks 02 A computer network permits sharing of Resources Information Both a & b None of these The first operational computer network in the world was the _________ for the United States Department of Defense ARPANET ERNET SKYNET DARPANET ATM stands for Automatic taller machine Automated teller machine Automatic transfer machine Automated transfer machine _______ is the technology that connects the machines and people within a site in a small area LAN MAN WAN None of these ______ is a network that covers geographic areas that are larger.360. such as districts or cities LAN MAN . b. c.

WAN None of these ______ is a network that this technology connects sites that are in diverse locations LAN MAN WAN None of these ______ is a collection of point-to-point links that may form a circle LAN MAN WAN Ring topology ______ refers to tone signals used for various control purposes via the telephone network SMS DTMF GSM None of these LAN is a network that is restricted to a relatively Small area Large area Both a & b None of these The components used by LANs can be categorized into Hardware Cabling protocols Standards All of these .

overview and relationship among the various IEEE standards IEEE 802.3 or CSMA/CD bus IEEE 802.6 or MAN protocol All of these When compared with the OSI reference model.4 or token bus IEEE 802. the committee issued a set of ___ standards 2 3 4 5 ISO revised these standards and reintroduced them as ISO 8802 standards during ____ 1977 1987 1997 1999 The following are the important standards proposed by IEEE IEEE 802.The various LAN protocols are Ethernet Token ring Both a & b None of these The Institute of Electrical and Electronics Engineers established a project named IEEE project 802 during the year _____ 1990 1970 1980 1960 In 1985. the IEEE standard contains the following layers: Physical layer .1.5 or token ring IEEE 802.

which are Unacknowledged Connectionless Both a & b None of these The ________ follows the ring topology IBM of LAN LAN of IBM Both a & b None of these In a token ring.2 compatible interfaces provide two major types of services.Medium access control(MAC) equivalent to the lower part of the OSI data link layer Logical link layer(LAC) equivalent to the upper part of the data link layer Network layer. the OSI network layer. the stations are connected to the __________ Logical ring Physical ring Both a & b None of these A _________ preamble is used to synchronize the receiver’s clock Four-byte Three-byte Two-byte One-byte Start of frame and end of frame are used to _______ the frame boundaries Mark Modify . that performs some of the higher order layer functions All of these The 802.

4 or token bus IEEE 802.5 or token ring IEEE 802.6 or MAN protocol Info field is used to ________ Send messages Send data Delete data Create data The maximum length of this field is _______ when the address is _______ 8182 & 2 bits 8182 & 2 bytes 8182 & 4 bits 8182 & 4 bytes The maximum length of this field is _______ when the address is _______ 8174 bytes & 6 bits 8174 bytes & 6 bytes 8174 bytes & 8 bytes 8174 bits & 6 bytes Check sum is used for Error correction .3 or CSMA/CD bus IEEE 802.Delete Find Frame control is also used to specify the ________ Frame technique Frame type Both a & b None of these The destination address and source address field is similar to IEEE 802.

different LANs are connected through a local _______ Telephone exchange Computer wires Both a & b None of these Some of the widely used protocols for MAN are RS-232 X.25 Frame relay .Error detection Both a & b None of these Solicit-successor frame contains the address of the Sending station Successor Both a & b None of these Government agencies and local libraries often use a MAN to connect to private Industries Citizens Both a & b None of these The geographical limit of a MAN may Not span a city Span a city Either span or not None of these In MAN.

Asynchronous transfer mode(ATM) ISDN OC-3lines(155 Mbps) ADSL(asymmetric digital subscriber line) All of the above MAN stands for Machine area network Metropolitan area network Metropolitan asynchronous network Machine asynchronous network WAN technologies function at the lower three layers of the OSI reference model Physical layer Data link layer Network layer All of these WAN also uses switching technology provided by ____________ Local exchange Long distance carrier Both a & b Small distance carrier Packet switching technologies such as _____________ are used to implement WAN along with statistical multiplexing ATM Frame relay Switched multimeagabit data service X.25 All of these MAN uses only a Long exchange .

Local carrier Both a & b None of these In MAN. a network is accomplished using components Hardware Protocols Both a & b None of these In MAN. a network is accomplished using basic components Hardware Protocols(software) Applications(useful software) All of the above The Internet(internetworking) ha become a potent tool for Education Productivity Enlightenment All of these The Government of India had set up ERNET in ______ to provide TCP/IP connections for education and research communities in India 1976 1986 1996 1999 The liberalized policies encouraged many private players like DISHNET JAINTV Mantra online .

single city WAN-country. Leased line Dial Up connection VSAT Radio link All of the above The networks can be broadly divided into three categories namely LAN for a single building MAN. education portal or e-commerce. etc………….All of these The other government organizations like _______________ to enter this field to bring the Internet to common people NIC VSNL MTNL All of the above The major network infrastructure available in the country has two types of WAN Terrestrial WAN VSAT WAN Both a & b None of these Following are different options for setting up the Intranet. continent and planet All of the above The host to terminal connection is a conventional type of connection between Main frame Dumb terminals Both a & b None of these .

25 are as follows Control packet Data packet Both a & b None of these A terminal controller may be used to integrate two or more terminals for connection with a Low speed line High speed line Single WAN line Both a & b ISDN stands for Integrated Service Digital Network Interaction System Digital Network Inexpensive System Digital Network None of these For LAN to LAN connection. which are mainly used ISDN Leased Line .TC means Terminal Computer Terminal Controller Technical Computer None of these A collection of interconnected networks is known as Internetwork Internet Network None of these The type of packet format supported by X.

Frame relay All of these Which function allows selection of the appropriate route based on IP header information and sends packets through this route Forwarding function Filtering function Both a & b None of these Which function allows dumping of invalid packets for a specific network instead of forwarding Forwarding function Filtering function Both a & b None of these Routing in the same network may be termed as Local routing Static routing Dynamic routing Distributing routing The routing table possessed by a router includes Combination of destination address Next hops that corresponds to that address Both a & b None of these If there is a fixed route information to each router. is called Fixed routing Dynamic routing Both a & b Distributed routing If routing information is automatically updated by routers when changes are made to the network configuration are called .

to eliminate this problem._____ are used MAC messages ICMP messages INDP messages IMCP messages If two or more routers are available in distributed routing. the cost for a single link is usually set at ___ 1 .Fixed routing Dynamic routing Both a & b Distributed routing The processing required to transferring a packet from the source host to the destination host or to the relaying router are called Fixed routing Dynamic routing Local routing Distributed routing ARP stands for Address Resolution Protocol Address Routing Protocol Address Routing Packet Address Routing Program If two or more routers are connected to the same subnet.. the network administration determines which of the routers the messages should be sent to. which route should be selected High possible cost Least possible cost Link cost Both b & c If there is no any specific intention.

2
3
4
Multi-path routing can be achieved in
Distance-vector type
Link-state type
Both a & b
None of these
If there are two or more routes to reach the same destination at the same cost, which method is applicable to determine how to
select this route
Round robin method
Random selection method
Mixed method
All of these
The Mixed method remains _________ for the amount of processing required
Effective
Ineffective
Both a & b
None of these
A set of networks interconnected by routers within a specific area using the same routing protocol is called
Domain
Backbone
Inter-domain router
All of these
A network composed of inter-domain router is called
Domain
Backbone
Inter-domain router
All of these
A router within a specific domain is called

Domain
Backbone
Inter-domain router
All of these
Two or more domains may be further combined to form a
Domain
Backbone
Inter-domain router
Higher-order domain
Each domain is also called
Operation domain
Backbone
Inter-domain
All of these

Routing protocol in such an internet system can be broadly divided into two types named
Intra- domain routing
Inter- domain routing
Both a & b
None of these
To communication between two or more domains, which are used
Intra- domain routing
Inter- domain routing
Both a & b
None of these
Some Intra-domain protocols are
RIP(Routing Information Protocol)
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System )

All of these
________ are the algorithms are available to update contents of routing tables
Distance-Vector Protocol
Link-State Protocol
Both a & b
None of these
Distance vector protocols are
RIP
IGRP(Interior Gateway Routing Protocol )
Both a & b
None of these
RIP stands for
Routing Information Protocol
Routing Intra Protocol
Route Intermediate Protocol
Resolution Information Protocol
The Link state protocol are
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System)
Both a & b
None of these
In link state protocol, the load on router will be
Small
Large
Medium
None of these

For large load on router, the processing is
Complex

Simple Both a & b None of these Which protocol are used in link state type routing protocol developed for use in large scale network OSPF(Open Shortest Path First) IS-IS(Intermediate System to Intermediate System) Both a & b None of these The common part of OSPF packet format is Packet type Packet length Router ID Area ID Authentication type Authentication data Version Checksum Individual information part All of these The router may be classified into three types named Domain border router Internal router Area border router All of these OSPF is a hierarchical routing composed of Intra-area routing Inter-area routing Inter-domain routing All of these .

The word SLIP stands for Serial Line IP Standard Line IP Serial Link IP Standard Link IP The word PPP stands for Point to Point Protocol Packet to Packet Protocol Point to Packet Protocol Packet to Point Protocol ________ is used mainly for connection between LANs that are remotely located from one another SLIP PPP Both a & b None of these _________ is used for connection between routers or equipment that must be highly reliable SLIP PPP Both a & b None of these The wireless LANs offers the obvious advantage of Avoidance of cabling cost Provide LAN capabilities in temporary quarters Both a & b None of these The bandwidth of wireless radio LAN is 24Mbps 2 Mbps .

11a .4 Mbps 8 Mbps The frequency range of wireless LAN is 900 MHz bands 2GHz bands 5 GHz bands All of these A hub antennae is located at a _________ from where line-of-sight can be established with the various terminal antennae. Highest point Lowest point Central point None of these The effective throughput is more in the range of _________ per hub 1 to 2 Mbps 2 to 3 Mbps 3 to 4 Mbps 4 to 5 Mbps PDA stands for Personal Device Assistant Pointer Description Assistant Personal Digital Assistant Personal Description Analog USB stands for University System Bus Universal System Board University System Board University Serial Bus _______ are wireless network standard with a data rate of only 2Mbps IEEE802.

11a IEEE803.4GHz ________ technology allows speeds up to 54Mbps IEEE802.11b uses _____ band 1.11b _______ are wireless network standard with a data rate of only11Mbps IEEE802.11a and IEEE802.11g IEEE803.11b have a distance limitation up to _____ from the access point router 1000feet 100feet 101feet 110feet IEEE802.4GHz 2.11b IEEE802.11b IEEE803.11a IEEE803.11a IEEE803.11b IEEE803.11a IEEE802.11b IEEE802.IEEE802.11a ________ allows the movement of device with or without user User mobility Device portability Both a & b None of these .11a and IEEE802.4GHz 4.4GHz 3.

which has Receiver . Low cost microprocessor Digital switching Both a & b None of these Cellular radio has another popular names as Cellular mobile Cellular phone Both a & b None of these Radio is basically a device.A user can access to the same or similar telecommunication services at different places User mobility Device portability Both a & b None of these A number of mobile and wireless device are Sensor Mobile-phone PDA Embedded controller Pager Palmtop Notebook All of these The availability of _________ made the wireless communication popular among the masses.

Transmitter Both a & b None of these Wireless communication can be carried out Use of radio Without using radio Both a & b Without use of video The term radio may be defined as consisting of ______________ of the signal Modulation Radiation Both a & b None of these A transmitter and an antenna are used to ____________ the modulated signal within radio spectrum Modulate Radiate Both a & b None of these In telephone system as we know that a voice with bandwidth of approximately ____ modulates the current of a telephone line 2kHz 3 kHz 4 kHz 5 kHz Wireless ca be defined as the ____________________ by means of high frequency electrical waves without a connecting wire Radio transmission Reception of signals Both a & b .

None of these The frequency of a cell may be ________ after the interference zone Reused Used Not be used Not be reused PSTN stands for Public Switched Transport Network Public System Transport Network Public System Transfer Network Public Switched Telephone Network The radii of a cell may vary from ___________ in a building to a city One of meters to tens of kilometers Tens of meters to tens of kilometers Hundreds of meters to tens of kilometers Hundreds of meters to hundreds of kilometers The shape of cell mat not be a ___________ and depends up on the environment Hexagon Circle Pentagon Both a & b SDM stands for System Division Multiple System Division Multiplexing Space Division Multiplexing System Double Multiplexing Frequencies for communication may vary from very high frequency to ________ Medium range Microwave range .

adjacent-channel All of these The important issues on wireless communication are Cell sizing .Digital range None of these The signal may be analog or digital with _______ Amplitude Frequency Phase modulation All of these The multiplexing and access techniques are SDM(Space Division Multiplexing) FDM(Frequency Division Multiplexing) TDM(Time Division Multiplexing) CDM(Code Division Multiplexing) All of these The advantages of mobile communication may be looked into Higher capacity Higher number of users Less transmission power needed More robust Decentralized base station deals with interference Transmission area All of these The disadvantages of mobile communication are Fixed network needed for the base stations Handover(changing from one cell to another) necessary Interference with other cells such as co-channel.

6kbps 9.6kbps . analog cellular telephone systems were developing in ___________ USA UK Europe Japan The proposed system was expected to meet certain as mentioned as Good subjective speech quality Low terminal and service cost Support for international terminals Spectral efficiency ISDN compatibility All of these ETSI stands for European Telecommunication Standards Institute European Telephone Standards Institute European Telecommunication Systems Institute European Telecom Standards Institute GSM(Global System for Mobile Communication) is a _______ digital mobile telephones standard using a combination Time Division Multiple Access(TDMA) and FDMA(Frequency Division Multiple Access) First generation Second generation Third generation None of these GSM provides only _______ data connection 8.Frequency reuse planning Channel allocation strategies All of these In the beginning around 1980.

7.6kbps
8.8kbps
The uplink and downlink frequencies for GSM are different and therefore a channel has a pair of frequencies _______ apart
70MHz
80MHz
90MHz
60MHz
The separation between uplink and downlink frequencies are called
Duplex distance
Double distance
Triplex distance
None of these
In a channel the separation between adjacent carrier frequencies is known as channel separation which is _______ in case of GSM
100kHz
200 kHz
300 kHz
400 kHz
The services supported by GSM are
Telephony
Fax and SMS
Call forwarding
Caller ID
Call waiting
All of these
GSM supports data at rates up to 9.6kbps on
POTS(Plain Old Telephone Service)
ISDN
Packet Switched Public Data Networks
Circuit Switched Public Data Networks

All of these
The access methods and protocols for GSM may be from
X.25
X.32
Both a & b
None of these
There are basic types of services offered through GSM are
Telephony or teleservices
Data or bearer services
Supplementary services
All of these
The supplementary services are used to enhance the features of
Bearer
Teleservices
Both a & b
None of these

Dual tone signals are used for various control purposes via the
Telephone network
Different from dual pulses
Both a & b
None of these
SMS(Short Message Service) is a message consisting of a maximum of ______ alphanumeric characters
150
160
170
180
GSM supports ______ Group 3 facsimile
CCIIT

CCITT
CCCIT
CCTTI
Call forwarding is a ________________
Telephony or teleservices
Data or bearer services
Supplementary services
All of these
The other services of call forwarding are
Cell broadcast, voice mail, fax mail
Barring of outgoing and incoming calls conditionally
Call hold, call waiting, conferencing
Closed user groups
All of these
GSM consists of many subsystems, such as the
Mobile station(MS)
Base station subsystem(BSS)
Network and Switching subsystem(NSS)
Operation subsystem(OSS)
All of these
Which forms a radio subsystem
Mobile station
Base station subsystem
Both a & b
None of these
The generic GSM network architecture which is composed of three subsystem are__________
Radio subsystem (RSS)
Network and switching subsystem
Operation subsystem

All of these The RSS is basically consisting of radio specific equipment such as ____________ to control the radio link Mobile station(MS) Base station subsystem(BSS) Both a & b None of these The chief components of RSS are BSS Cellular layout Base station controller(BSC) All of these SIM stands for System Identity Module Subscriber Identity Module Subscriber Identity Modem Subscriber Input Modem MS contains a SIM card in the form of a very _______ inside the equipment Large chip Small chip Both a & b None of these Cell site is defined as the location where _______________ are placed Base station Antennas Both a & b None of these Cells are the basic constituents of a cellular layouts with ________ Cell sites .

Cell systems Cell forwarding None of these A cell is simply represented by simple ____________ Pentagon Hexagon Both a & b None of these The size of cells in case of GSM and Personal Communication Service(PCS) are much smaller in the range of _______ 5Kms 10Kms 15Kms 20Kms The portions covered by the antenna are called Portions Sectors Cell sector None of these The BTS or Base Transceiver Station is also called RBS PCS GSM SIM BTS are housed with all radio equipments such as Antennas Signal processors Amplifiers All of these .

with the towers at the corners Red Blue Red and blue None of these Antenna always transmits inward to each cell and area served depends on Topography Population Traffic All of these Network and switching subsystem is composed of the ________________ Mobile Services Switching Center(MSC) Home Location Register(HLR) Visitor Location Register(VLR) All of these The mobile stations(MS) communicates only via the BTS BSS BSC Um A BTS is connected to a mobile station via the BTS BSS .Base station may also be placed near center of cell and known as Excited cell Center excited cell Center cell None of these The actual cell is the _____ hexagon.

377ms 0.Abis interface with BSC Um interface Both c & d The Um interface basically consists of _________ for wireless transmission FDMA TDMA CDMA All of these The FDMA involves the division up to the maximum of _______ bandwidth into 124 carrier frequencies spaced 200 kHz apart 25MHz 35MHz 24MHz 20MHz The FDMA channel are further divided in time with a burst period of approximately _______ using a TDMA technique 0.477ms 0.277ms 0.577ms The eight burst period are grouped into a TDMA frame which forms the basic unit for definition of Physical channel Logical channel Both a & b None of these One _______ is one burst period per TDMA frame Physical channel Logical channel Both a & b None of these The more channel increases the .

GSM No of base station No of mobile station Transmitter power The more channel decreases the GSM No of base station No of mobile station Transmitter power The other popular name for MSC(Mobile Switching Center ) is BS(Base Station) MS(Mobile Switch) MTSO(Mobile Telecommunication Switching Office) Both b & c MSC is connected to a ____________ at one end Mobile station Base station Transmitter station None of these MSC is connected to a ____________ at other end MSCs PSTN ISDN None of these MSCs acts as a __________ Switching Local Switching exchange Remote Switching exchange None of these .

The MSC also provides all the functionality such as Registration Handover Authentication Location updating Call routing to a roaming subscriber All of these The MSC provided to establish link with other fixed networks termed as Local MSC Router MSC Gateway MSC Remote MSC The main task of MSC are entrusted upon as Interworking function(IWF) Mobility management operations Data service unit(DSU) SS7 All of these Name the two chief databases Home location register(HLR) Visitor location register(VLR) Both a & b None of these Which has its main task as associated with MSC Home location register Visitor location register Both a & b None of these .

IMEI stands for International mobile equipment identity International mobile equipment information Interworking mobile equipment information Interworking management equipment information Subscriber’s all administrative information along with the current location in GSM network including in database of HLR are IMEI number Directory number Current city Last visited area The class of service subscriber All of these HLR keeps the ____________ of each mobile that belongs to the MSC to which it is interacting Last location First location Current location None of these HLR performs the functions such as _____________ to subscribers at their current locations by using user profile information Delivery of calls Information and messages Both a & b None of these HLR maintains user information in the form of Static information Dynamic information Both a & b None of these The static information is the International Mobile Subscriber Identity .

Service subscription information authentication key Account status All of these The dynamic information is the _________ area of the mobile subscriber which is the identity of the currently serving VLR Last location First location Current location None of these The HLR handles SS7 transactions with both MSCs VLR nodes Both a & b None of these VLR main tasks are association with MSC IMSI TMSI Roaming All of these In nutshell we can say that both the ___________work together to provide local connections as well as roaming outside the local service area HLR VLR Both a & b None of these The operations and Maintenance Center oversees the all important for__________ Proper operation Setup of the network .

Provides Telecommunication Management Network(TMN) All of these Operation Subsystem also provides interface NSS via O-Interface that may be __________ X.32 interface X.23 interface None of these Authentications Center(AuC) is used for Authentication Security by generating authentication algorithms Cryptographic codes All of these AuC is responsible for maintaining all data needed to authenticate a call and to encrypt __________________ Voice traffic Signaling messages Both a & b None of these EIR stands for Equipment Identification Register Equipment Identification Remote Equipment Information Remote Equipment Information Register EIR fulfills the ______________ requirement of GSM Security Authentication Both a & b None of these SIM card has a secret key for ________________ over the radio channel .25 interface X.

890-901MHz 890-911MHz GSM 900 operates on a frequency range of _________ for downlink .Authentication Encryption Both a & b None of these GSM network checks the __________________ of a mobile device through EIR database Type Serial number Both a & b None of these EIR maintains a database of ______________ Manufacturing devices Malfunctioning devices Functioning devices None of these Um is the link between a Mobile station Base station Both a & b None of these GSM 900 operates on a frequency range of _________ for uplink 890-910MHz 890-915MHz.

935-960MHz 940-970MHz 945-950MHz 925-960MHz FDM is used to ___________ the available frequency band in GSM Addition Divide Both a & b None of these The GSM has many burst types such as Normal burst Access burst Synchronization burst Frequency correction burst Dummy burst All of these The normal burst period lasts Approximately 577ms or 15/26ms Approximately 572ms Approximately 567ms Approximately 578ms Which is provided to avoid overlap with other burst Frequency space Guard space Information space Bandwidth space Which is a dedicated time slots within a data or bit stream which repeats after a certain period of time Frequency Amplitude .

615ms constitute a _______ channel which can be split into several logical channel Logical Physical Both a & b None of these TDMA is used to split carrier frequency of 200kHz into_______ time slots 4 8 16 24 GSM 900 has _____ physical full duplex channels 125 124 248 247 GSM 900 has _____ physical half duplex channels .Channel Normal burst The channel can be further divided into Dedicated channel Common channel Both a & b None of these Both the dedicated and common channel are allocated to a Base station Mobile station Mobile switch All of these When a slot repeated every 4.

4kb/s All of these The length of 24 TDMA frames are kept 120ms 130ms 150ms 160ms How many frames are included for traffic in 26TDMA frames 1 24 25 16 How many frames are included for Slow Associated Control Channel(SACCH) in 26TDMA frames 1 24 .6kb/s 4.8kb/s 2.125 124 248 247 Time slot is also known as Logical channel Physical channel Both a & b None of these A Traffic Channel(TCH) is defined for speech and data at a rates of 9.

they are categorized in Broadcast Control Channels(BCCH) Common Control Channels(CCCH) Dedicated Control Channels(DCCH) All of these The different control channel are accessed by Idle mode Dedicated mode mobile Both a & b None of these Which is a unidirectional downlink point to multi-point signaling channel from BTS to MS BCCH CCCH DCCH All of these Which is bi-directional point to multi-point signaling channel that exchanges the signaling information for network access management and transport information regarding connection setup between MS and BTS .25 16 How many frames are included for currently unused in 26TDMA frames 1 24 25 16 Which are basically used to control the logical channels CCHs TCH Both a & b None of these Depending upon the task performed by the Control Channels(CCHs).

615ms 4.156ms 4.BCCH CCCH DCCH All of these Which is bidirectional and are multiplexed on a standard channel for registration. location updating and authentication in order to set up a call or TCH BCCH CCCH DCCH All of these GSM specifies a multiplexing scheme to integrate several frames where a periodic pattern of 26 slots occurs in all TDM frames with a TCH .5ms . the combination of these frames are called Multiframe Traffic-multiframe Multiprogramming None of these Out of 26 frames. one is used for the __________ and one is currently unused SACCH(Slow Associated Control Channel) FACCH(Fast Associated Control Channel) BCCH CCCH GSM is already mentioned that the duration of one TDMA frame is 4.165ms Control multiframe comprises of 51 TDMA frame with a duration of ________ 234. 24 are used for traffic.5ms 233.516ms 4.

3ms 2048 superframes constitute a ________ hyperframe lowerframe strongerframe none of these GSM has three functional layers Physical layer Data link layer Layer three in correspondence with OSI model All of these In OSI model. the lower three layers usually terminate in the ______ but it is not true in case of GSM Another node Same node Two nodes None of these In protocols.235. the RR part of layer three is spread over the MS BTS BSC MSC All of these Physical layer is the ___________ which provides transfer of bit streams over the physical radio links through U m interface Lowest layer Highest layer First layer None of these .4ms 235.

error detection and correction Quality control on the downlink All of these The digital modulation and security related issues such as encryption of digital data are carried over the radio interface between ____________ MS BTS Both a & b None of these The communication on Abis interface between _____ and BSC is established by using the standard LAPD MS BTS MTS None of these A reliable data link service is provided between _________ through Message Transfer Part of SS7 BSC MSC Both a & b None of these The layer three chiefly comprises of _____________ RR(radio resource management) MM(Mobility management) CM(call control management) All of these .Physical layer handles all radio specific functions such as ________________ Creation of bursts Multiplexing of bursts into TDMA frame Synchronization with BTS Channel coding.

What are the functions of mobility management Location update Authentication Temporary Mobile Subscriber Identity Reallocation All of these CM performs Establishment Maintenance Termination of a circuit-switched call All of these CM performs other supporting Supplementary service(SS) Short Message Service(SMS) Both a & b None of these The radio resource management sublayer terminates at the BSC BSS MSC MTS The radio resource management is used to establish physical connections over the call-related signaling and traffic channels between the ______________ BSC BSS MS Both b & c The RR layer is the part of RR layer is implemented in the BTS to provide functions between the ___________ .

BTS BSC MSC Both a & b The __________ is also responsibility of the layers Handover Handoff Both a & b None of these Which uses signal strength measurements and cell congestion information to determine when a handoff should occur MSC BSS BSC Both a & b Handoff notifications are sent to respective ____ which in turn forward them to HLRs VLRs VLCs VCDs LCDs The mobility management sublayer on the _____ of the RR is terminated at the MSC Low Top Center First MM is used to Establish Maintain Release connections between the MS a The network MSC .

All of these The Communication Management protocol controls __________ call establishment first-to-end end-to-end end-to-first first-to-first CM protocols are used in GSM network. these are Transaction Capabilities Application Part(TCAP) protocol Mobile Application Part(MAP) protocol Both a & b None of these MAP is used between _________in the form of query and response messages MSC VLR HLR AuC All of these ____________ Together with the MSC. Provide the call routing and roaming capabilities of GSM where a subscriber can roam nationally and even internationally HLR VLR CLR Both a & b MSISDN stands for Mobile Subscriber ISDN Number Mobile Station ISDN Number Mobile Switching ISDN Number Mobile Standard ISDN Number Which number caller used to reach a mobile subscriber MSISDN number .

which can be carried out anywhere and can be used in any MS MSISDN Number IMSI Number TMSI Number MSRN The IMSI number consists of MCC(Mobile Country Code consisting of three digits) MNC(Mobile Network Code consisting of two digits) MSIN(Mobile Subscriber Identity Number consisting of ten digits) All of these Which is used in the place of the IMSI for the definite identification and addressing of the mobile station .IMSI number TMSI number MSRN MSISDN number consists of Country code(such as 91 for India) National subscriber destination code Subscriber number All of these Which number of MSISDN is the address of the GSM provider Country code(such as 91 for India) National subscriber destination code Subscriber number All of these Which is a unique identification number allocated to each mobile subscriber MSISDN Number IMSI Number TMSI Number MSRN It sits inside SIM card.

MSISDN Number IMSI Number TMSI Number MSRN In TMSI nobody can determine the identity of the subscriber by listening to the __________ Video channel Radio channel Audio channel None of these GSM used the _______ byte TMSI for local subscriber identification 2 4 6 8 Which is a temporary location-dependent ISDN number assigned by the locally responsible VLR to each mobile station in its area MSISDN Number IMSI Number TMSI Number MSRN The MSRN consists of VCC(Visitor country code) VNDC(Visitor national destination code) The identification of the current MSC along with the subscriber number(SN) All of these GSM call may be classified into two types namely MTC(Mobile Terminated Call) MOC(Mobile Originated Call) Both a & b .

None of these
___________ becomes necessary when mobile moves from area of one BSC into another area of the same or into another BSC
Handoff
Handover
Haddon
Handwork
Handover involves a number of procedures depending upon the location are
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
All of these
Which involve the transfer of connections from one channel to another channel on the same BTS
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
Which involve the transfer of the connection from one BTS to another BTS on the same BSC
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
The connections is transferred between BTS belonging to two different BSCs within one MSC is called
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
Which involve the transfer of a connection to a BTS between two cells within another MSC
Intra-cell handover

Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
A collection of interconnected networks is known as
Internet
Internetwork
Network
Internetworking
The process of interconnecting different network is called
Internet
Internetwork
Network
Internetworking
The internetworking protocol is known as
SMTP
PPP
TCP/IP
NNTP
The Network element that connects individual network is known as
Gateway
Router
TCP/IP
Both a & b
If single computer network is divided into segments and router are added between them it forms an
Internet
Internetwork
Network
Internetworking
Which was used as original term for an internetwork which meant a method for connecting networks with disparate technologies

Catenet
Bridge
PANs
Novell netware
The computer network are of different types…some are
PANs(Personal Area Networks)
Novell Netware
Both a & b
None of these
The word Internet and internet are
Different
Same
Dependent on each other
None of these
Which signifies the specific network model
internet
Internet
Both a & b
None of these
Which means generic interconnection of networks
internet
Internet
Both a & b
None of these

Which protocol provides a reliable data transfer
TCP
UDP
IP

e-mail etc Application Layer Protocol .Both a & b Which protocol provides a unreliable data transfer TCP UDP IP Both a & b Every computer has a unique address called IP UDP TCP None of these The IP address lies between 0 to 245 0 to 254 0 to 255 0 to 265 DHCP stands for Dynamic Host Configuration Protocol Digital Host Communication Provider Digital Host Communication Protocol Dynamic Host Configuration Provider __________ is used for every computer needs one protocol stack for communicating on the Internet Protocol stack Protocol Transmission protocol None of these Which protocol layer uses the protocols are WWW. HTTP. SMTP. FTP.

Transport Layer Protocol Internet Layer Protocol Hardware Layer Which protocol uses TCP routes to an application on a computer by use of a port number Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer Which protocol moves IP packets to a specific computer by use of an IP address Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer Which contains network interface cards. modems for phones or wireless lines for converting binary packet data to network signals and vice versa Application Layer Protocol Transport Layer Protocol Internet Layer Protocol Hardware Layer Hardware layer handle raw Bytes of data Bits of data Both a & b None of these Where is the TCP layer is situated in the application layer in the protocol stack Below Top Center None of these TCP uses port number to route correct application on the ___________ .

Source computer Destination computer Both a & b None of these TCP is __________ in nature Textual Not textual None of these TCP also contains a ___ checksum 16bit 16byte 32bit 32byte What is the port number of the HTTP 80 25 23 20/21 What is the port number of the SMTP 25 23 20/21 27960 What is the port number of the Telnet 25 23 20/21 27960 .

What is the port number of the FTP 25 23 20/21 27960 What is the port number of the Quake III Arena 25 23 20/21 27960 TCP is ______________ Connection-oriented Reliable Both a & b None of these IP is ___________ Connectionless Unreliable Both a & b None of these IP does not ensure movement of a packet to its destination and have no knowledge of __________ Port numbers Connections Both a & b None of these IP packets ________ arrive in the order in which it is sent .

4 IEEE 802. the service follows IEEE 802. connectionless public data service that extends Local Area Network Metropolitan Area Network Wide Area Network All of these In SMDS.2 SMDS is capable of variety of technologies including DQDB(Distributed Queue Dual Bus) Broadband ISDN(B-ISDN) Both a & b .May May not May or may not None of these SMDS stands for Switched Multiple Data Services Switched Multimegabit Data Services Switched Multiple Double Services Switched Multiple Data Subscriber SMDS is a packet switched.5 DQDB(Distributed Queue Dual Bus) IEEE 802.5 IEEE 802.6 DQDB(Distributed Queue Dual Bus) IEEE 802. high speed.6 DQDB(Distributed Queue Dual Bus) The SMDS is defined for MAN under_______ standard IEEE 802.4 DQDB(Distributed Queue Dual Bus) IEEE 803.6 IEEE 802.

6Mbit/s 46Mbit/s North American implementation uses DQDB with DS3 at a data rate of 1.None of these North American implementation uses DQDB with DS1 at a data rate of 1.5Mbit/s 45Mbits/s 155Mbit/s 1.5Mbit/s 45Mbits/s 1.9Mbit/s SMDS is a Data service Telephone service Frame service Video service SMDS is a Technology Protocol Both a & b None of these The word CPE means .6Mbit/s 46Mbit/s SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of 1.5Mbit/s 45Mbits/s 1.

12 decimal digits 16 decimal digits 15 decimal digits . the telephone number consists of Country code Area code Subscriber code All of these The SMDS can serve Only area Only nationally Internationally None of these Address of source and destination in SMDS both consists of 4 bit code followed by a telephone no of max.Customer Premises Equipment Computer Premises Equipment Customer Packet Equipment Customer Protocol Equipment The SMDS is designed to handle Continuous traffic Finite traffic Bursty traffic All of these The telephone service is designed to handle Continuous traffic Finite traffic Bursty traffic All of these In SMDS .

000 bytes/sec 100. with a tick every 10msec user can send_________ on the average 100.000 bytes/sec 10.000.5 FDDI All of these SMDS make use of Copper Fiber media Both a & b None of these In SMDS.3 IEEE802.20 decimal digits The SMDS is similar to which transfer mode Synchronous transfer mode Asynchronous transfer mode Both a & b None of these SMDS make use of cell relay with _______ per cell 53 octets 56 octets 58 octets 55 octets The data unit of SMDS can encapsulate frames of IEEE802.0000 bytes/sec 100.00 bytes/sec Which means the network can expand with minimal investment .

defined by IETF(Internet Engineering Task Force) SNMP Scalability Screening Multicasting The user can have access to high speed lines ______ connected to MAN 32Mbits/s 33Mbits/s 34Mbits/s 35Mbits/s The user can having access capacity of ______ connected to MAN 151Mbits/s 152Mbits/s 154Mbits/s 155Mbits/s The backbones of MAN has working data rate of ________ 139Mbits/s 140Mbits/s 155Mbits/s 134Mbits/s User is charged for maximum rate of __________ bandwidth 34Mbits/s 4Mbits/s .SNMP Scalability Screening Simple Which is a network protocol that is based on UDP and is a component of the component of the Internet Protocol Suite.

10Mbits/s 16Mbits/s 25Mbits/s Except (a) all are answers SMDS was primarily used for connecting LAN MAN WAN PAN In SMDS. MAN interconnect Ethernet Token ring networks Both a & b None of these SMDS networks have many underlying devices for supporting high-speed service are Subscriber network interface(SNI) Carrier equipment Customer Premises Equipment (CPE) All of these CPE may be devices such as PCs(Personal computers) Intermediate nodes Terminals All of these Which are intermediate nodes provided by SMDS carrier Multiplexers Modems Routers .

25 provides a virtual high-quality digital network at Low cost High cost .All of these PDUs contain Source address Destination address Both a & b None of these Addressing in SMDS has provision for Group addressing Security features Both a & b None of these In SMDS.25. it was developed for computer connections used for Timesharing connection Terminal connection Both a & b None of these X. there are two useful security features. namely Source address validation Address screening Both a & b None of these CCITT stands for Consultative Committee International for Telegraphy and Telephony International Consultative Committee for Telegraphy and Telephony International Consultative Committee for Telephony and Telegraphy Consultative Committee International for Telephony and Telegraphy X.

25 rules.25 Speed Matching Speed matching None of these In X. how many logical channel can be set on a single physical line 256 16 4096 2556 To enable control of 4096 logical channels in X.2kbps 20.25.2kbps 22.2kbps In X.Medium cost All of these Which is another useful characteristics of X.25 DTEs are not required to use the same line speed because of the Store Forward nature of packet switching Excellent flow control All of these In X. there are ____ channel groups . A host connected at 56kbps and communicating with numerous remote sites can be linked with cheaper______ lines 18.25 defines the protocols from Layer 2 to Layer 3 Layer 1 to Layer 2 Layer 1 to Layer 3 Layer 3 to Layer 2 Based on X.2kbps 19.25.

25 is a Protocol Data service Telephone service Technology X.25 protocol was recommended by CCITT in 1975 1976 1977 1978 X.25 protocol exchanged the data control information between A node A user device Both a & b None of these .25 are known as Logical channel group number(LCGN) Logical channel number(LCN) Both a & b None of these X.256 16 4096 2556 Each logical channel group is divided into ____ logical channels 256 16 4096 2556 The channel grouping in X.

25 supports two types of packet format named Control packet Data packet Both a & b .25 Same Different Both a & b None of these X.25 make use of _______ service Connectionless Connection-oriented Both a & b None of these PAD stands for Packet Assembly and Disassembly Procedure Assembly and Disassembly Permanent Assembly and Disassembly Package Assembly and Disassembly X.The user device and node are properly referred to as DTE DCE Both a & b None of these A terminal of 1.2kbit/s can communicate with host computer at _______ through the packet switched network 9600bits/s 8600bits/s 7600bits/s 6600bits/s The transmission speed of sender should be ___________ as that of receiver in the X.

25 packet make up the ______ of an HDLC frame Frame field Data field Information field Both b and c are same Maximum packet sizes in X.25 vary from 64bytes to 128bytes 64bytes to 4096 bytes 64bytes to 256bytes 32bytes to 64bytes A X.25 protocol use Store and forward method Stop and wait method Store and stop method None of these The advantage of X.25 are Was developed to recover errors Packet switching eases compatibility problems in communications between PCs Packet switching cannot waste bandwidth All of these Frame relay constitutes of the OSI _____ layer First Second Third Fourth Logical channels are identified by a number referred by DLCI(Data Link Connection Identifier) .None of these A X.

VLCI(Very Large Connection Identifier) HDLC(High Level Data Link Control ) QLLC DLCI can have a value between 0 and 1025 0 and 125 0 and 256 0 and 1023 The device which splits data into frames as well as combines frames into data is referred as FRAD(Frame relay and Disassembly) FDLC HDLC DLCI Frame relay indicates network congestion using two flags namely ________ bits in data frames Forward Explicit Congestion Notification(FECN) Backward Explicit Congestion Notification(BECN) Both a & b None of these Cell relay is data transmission services that uses transmission technology referred to as ATM(Asynchronous Transfer Mode) BTM STM DTM The data transmission is a fixed length of data known as Cell Frame Relay Cell relay .

Advantages of cell relay are High-speed transmission Multiplexing transmission Both a & b None of these Disadvantages of cell relay are Cell discarding occurs with congestion High cost Both a & b None of these The cell relay protocol corresponds to first ____ layer of OSI One Two Three Four The part that corresponds to second layer. data link layer is referred to as DLC layer ATM layer STM layer Protocol layer In cell relay these logical channels are represented as Virtual Channels(VCs) Virtual Paths(VPs) Both a & b None of these A VC is a virtual channel composed of Frames Cells Relay . that is.

Protocol VP is a bundle of VCs VCM VCI VIP Identifiers are called ___________________ are used to identify VPS and VCs VCIs VIPs Both a & b None of these In cell relay communication performed between Two VP Two VC VP and VC VP and VCI ATM is an International Telecommunication International Telecommunication-Union International Telecommunication Union-Telecommunication Standardization Sector(ITU-T) International Telecommunication Union-Telecommunication ATM networks are Connectionless Interconnected Connection oriented None of these In today ATM. separate networks are used to carry _________ information mostly Voice Video .

Data All of these Data traffic in ATM tend to be Continuous Bursty Discontinuous None of these ATM cell has a fixed length of __________ 52bytes 53bytes 54bytes 55bytes Which is a portion carries the actual information Payload(48bytes) Payment Payroll None of these The purpose of ATM is to provide High speed Low-delay multiplexing Switching networks All of these ATM is specifically designed as ________ technology for voice. video. and data Single Double Multiple None of these ATM can support Different speeds .

as also other media CCITT ITU Both a & b None of these . video and data All of these Narrow band ISDN provides for the following services Circuit-switched voice Circuit-switched data Low-speed packet High-speed packet All of these The cell relay is considered to be the __________ of the future Transmission service Transport service Transfer service None of these ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines. The small cell size allows a variety of applications to run on ATM networks including voice.Traffic types Quality of service attached to applications All of these ATM cells coming from a user are guaranteed delivery at the other end with a High probability Low delay Both a & b None of these The characteristics of ATM are as follows The transport speeds of most ATM applications are most often 155Mbps and 622Mbps ATM is a flexible service made possible by the size of the packets (cells).

544Mbps 1.Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less 1.555Mbps 1.552Mbps The range of speeds for the broadband ISDN services usually range from ______ to the Gigabit range 24Mbs 25Mbs 26Mbs 27Mbs BRA stands for Basic Rate Access Basic Random Assembly Bit Rate Assembly Bursty Rate Assembly BRA affords an ISDN user with simultaneous access to two _____ data channels 32kbps 64kbps 128kbps 256kbps The ISDN Internetworking Equipment devices are Terminal Adapters(TAs) ISDN Bridges ISDN Routers All of these Advantages of ISDN internetworking are Quality Economy .533Mbps 1.

Availability All of these ISDN connections mat be seen as very _______ digital conduits High rate-of-error Low rate-of-error Both a & b None of these Each channel in BRA is referred to as A-channel B-channel C-channel F-channel The B-channel is capable of carrying both Voice Data Both a & b None of these The Another channel in BRA(Basic Rate Access) is referred as D-channel Functions at 12Kbps 14Kbps 16Kbps 18Kbps The D-channel in BRA is used for sending and receiving signal between User devices ISDN Both a & b None of these .

as per CCITT I.422 I.420 I.421 I.430 I. as per CCITT I.450 Which service provide up to thirty independent 64kbps B channels and a separate 64kbps D channel to carried the signaling Basic rate access Primary rate access Both a & b None of these Primary rate access is also known as __________.423 The CCITT eventually was reformed in to the group which is now called the ________ ITU-T UIT-T TIU-T TUI-T The two standards ISDN connectors are RJ-45 type plug and socket uses unshielded twisted pair cable One for accessing primary rate ISDN through a coaxial cable Both a & b .420 I.The total transmission rate of BRA workout to a combined total of 144kbit/s 145kbit/s 146kbit/s 147kbit/s BRA is also known as ____________.440 I.

two Two. three Two. ________ lines of data or voice channels . one(may be written as 2B+D) Three. two BRI providing data transmission speed of 62kbps 63kbps 64kbps 65kbps PRI is popularly referred to as ____________ due to the number of channels as per CCITT 20+D 30+D 40+D 50+D PRI can carry up to 30 independent.None of these ISDN can be accessed as per CCITT by using two service called BRI(Basic Rate Interface) PRI(Primary Rate Interface) Both a & b None of these BRI includes ______ B channels and ________ D channel One .

62kbps 63kbps 64kbps 65kbps .