You are on page 1of 20

BSNL TTA (JE) COMPUTER 200 EXPECTED QUESTIONS

(WWW.ALLEXAMREVIEW.COM) PART ONE


ANSWER KEY-Correct answer is indicated by symbol (V) in options.
HINTS-In some questions options E-HINTS is indicating the hints of answer.
1) Which of the following services use TCP?
A [ ]) SMTP
B [ ]) HTTP
C [ ]) FTP
D [v]) all above

2) What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
A [ ]) Application
B [v]) Host-to-Host
C [ ]) Internet
D [ ]) Network Access

3) Which of the following allows a router to respond to an ARP request that is intended for
a remote host?
A [ ]) Gateway DP
B [ ]) Reverse ARP (RARP)
C [v]) Proxy ARP
D [ ]) Inverse ARP (IARP)

4) The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD
model is equivalent to the Network layer of the OSI model?
A [ ]) Application
B [ ]) Host-to-Host
C [v]) Internet
D [ ]) Network Access

5) Which class of IP address provides a maximum of only 254 host addresses per network
ID?
A [v]) Class C
B [ ]) Class A

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 1


C [ ]) Class B
D [ ]) Class D

6) Which of the following services use UDP?


A [ ]) DHCP
B [ ]) SNMP
C [ ]) TFTP
D [v]) all of above

7) If you use either Telnet or FTP, which is the highest layer you are using to transmit data?
A [ ]) Application
B [v]) Presentation
C [ ]) Session
D [ ]) Transport

8) Which of the following is private IP address?


A [ ]) 12.0.0.1
B [ ]) 168.172.19.39
C [ ]) 172.15.14.36
D [v]) 192.168.24.43

9) Which of the following are layers in the TCP/IP model?


A [ ]) Application
B [ ]) Transport
C [ ]) Internet
D [v]) all of above

10) Which layer 4 protocol is used for a Telnet connection?


A [ ]) IP
B [v]) TCP
C [ ]) TCP/IP
D [ ]) UDP

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 2


11) Which of the following are TCP/IP protocols used at the Application layer of the OSI
model?
A [ ]) Telnet
B [ ]) FTP
C [ ]) TFTP
D [v]) all of these

12) What protocol is used to find the hardware address of a local device?
A [ ]) RARP
B [v]) ARP
C [ ]) IP
D [ ]) ICMP

13) Which of the following protocols uses both TCP and UDP?
A [ ]) FTP
B [ ]) SMTP
C [ ]) Telnet
D [v]) DNS

14) What is the address range of a Class B network address in binary?


A [ ]) 01xxxxxx
B [v]) 0xxxxxxx
C [ ]) 10xxxxxx
D [ ]) 110xxxxx

15) A _____ is a device that forwards packets between networks by processing the routing
information included in the packet.
A [ ]) bridge
B [ ]) firewall
C [v]) router
D [ ]) all of the mentioned

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 3


16) A list of protocols used by a system, one protocol per layer, is called:
A [ ]) protocol architecture
B [v]) protocol stack
C [ ]) protocol suit
D [ ]) none of the mentioned

17) Network congestion occurs:


A [v]) in case of traffic overloading
B [ ]) when a system terminates
C [ ]) when connection between two nodes terminates
D [ ]) none of the mentioned

18) Which one of the following extends a private network across public networks?
A [ ]) local area network
B [v]) virtual private network
C [ ]) enterprise private network
D [ ]) storage area network

19) In the layer hierarchy as the data packet moves from the upper to the lower layers,
headers are:
A [v]) Added
B [ ]) Removed
C [ ]) Rearranged
D [ ]) Modified

20) The structure or format of data is called:


A [v]) Syntax
B [ ]) Semantics
C [ ]) Struct
D [ ]) None of the mentioned

21) Communication between a computer and a keyboard involves ______________


transmission.

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 4


A [ ]) Automatic
B [ ]) Half-duplex
C [ ]) Full-duplex
D [v]) Simplex

22) The first Network:


A [ ]) CNNET
B [ ]) NSFNET
C [ ]) ASAPNET
D [v]) ARPANET

23) A set of rules that governs data communication:


A [v]) Protocols
B [ ]) Standards
C [ ]) RFCs
D [ ]) None of the mentioned

24) The data link layer takes the packets from _____ and encapsulates them into frames for
transmission.
A [v]) network layer
B [ ]) physical layer
C [ ]) transport layer
D [ ]) application layer

25) Which one of the following task is not done by data link layer?
A [ ]) framing
B [ ]) error control
C [ ]) flow control
D [v]) channel coding

26) Which sublayer of the data link layer performs data link functions that depend upon the
type of medium?
A [ ]) logical link control sublayer

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 5


B [v]) media access control sublayer
C [ ]) network interface control sublayer
D [ ]) none of the mentioned

27) Header of a frame generally contains:


A [ ]) synchronization bytes
B [ ]) addresses
C [ ]) frame identifier
D [v]) all of the mentioned

28) Automatic repeat request error management mechanism is provided by:


A [ ]) logical link control sublayer
B [v]) network interface control sublayer
C [ ]) media access control sublayer
D [ ]) none of the mentioned

29) When 2 or more bits in a data unit has been changed during the transmission, the error
is called:
A [ ]) random error
B [v]) burst error
C [ ]) inverted error
D [ ]) none of the mentioned

30) CRC stands for:


A [v]) cyclic redundancy check
B [ ]) code repeat check
C [ ]) code redundancy check
D [ ]) cyclic repeat check

31) Which one of the following is a data link protocol?


A [ ]) ethernet
B [ ]) point to point protocol
C [ ]) HDLC

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 6


D [v]) all of the mentioned

32) Which one of the following is the multiple access protocol for channel access control?
A [ ]) CSMA/CD
B [ ]) CSMA/CA
C [v]) both (a) and (b)
D [ ]) none of the mentioned

33) The technique of temporarily delaying outgoing outgoing acknowledgements so that


they can be hooked onto the next outgoing data frame is called:
A [v]) piggybacking
B [ ]) cyclic redundancy check
C [ ]) fletcher’s checksum
D [ ]) none of the mentioned

34) The network layer concerns with:


A [ ]) bits
B [ ]) frames
C [v]) packets
D [ ]) none of the mentioned

35) Which one of the following is not a function of network layer?


A [ ]) routing
B [ ]) inter-networking
C [ ]) congestion control
D [v]) none of the mentioned

36) The 4 byte IP address consists of:


A [ ]) network address
B [ ]) host address
C [v]) both (a) and (b)
D [ ]) none of the mentioned

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 7


37) In virtual circuit network each packet contains:
A [ ]) full source and destination address
B [v]) a short VC number
C [ ]) both (a) and (b)
D [ ]) none of the mentioned

38) Which one of the following routing algorithm can be used for network layer design?
A [ ]) shortest path algorithm
B [ ]) distance vector routing
C [ ]) link state routing
D [v]) all of the mentioned

39) Multidestination routing:


A [ ]) is same as broadcast routing
B [ ]) contains the list of all destinations
C [v]) data is not sent by packets
D [ ]) none of the mentioned

40) A subset of a network that includes all the routers but contains no loops is called:
A [v]) spanning tree
B [ ]) spider structure
C [ ]) spider tree
D [ ]) none of the mentioned

41) Which one of the following algorithm is not used for congestion control?
A [ ]) traffic aware routing
B [ ]) admission control
C [ ]) load shedding
D [v]) none of the mentioned

42) The network layer protocol of internet is:

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 8


A [ ]) ethernet
B [v]) internet protocol
C [ ]) hypertext transfer protocol
D [ ]) none of the mentioned

43) Property which allows to produce different executable for different platforms in C is
called?
A [ ]) File inclusion
B [ ]) Selective inclusion
C [v]) Conditional compilation
D [ ]) Recursive macros

44) #include is called


A [v]) Preprocessor directive
B [ ]) Inclusion directive
C [ ]) File inclusion directive
D [ ]) None of the mentioned

45) Preprocessor feature that supply line numbers and file names to compiler is called?
A [ ]) Selective inclusion
B [ ]) macro substitution
C [ ]) Concatenation
D [v]) Line control

46) The C-preprocessors are specified with _________symbol.


A [v]) #
B [ ]) $
C [ ]) " "
D [ ]) None of the mentioned.

47) The format identifier ‘%i’ is also used for _____ data type?
A [ ]) char
B [v]) int

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 9


C [ ]) float
D [ ]) double

48) Which of the datatypes have size that is variable?


A [ ]) int
B [v]) struct
C [ ]) float
D [ ]) double

49) Which of the following declaration is not supported by C?


A [v]) String str;
B [ ]) char *str;
C [ ]) float str = 3e2;
D [ ]) Both (a) and (c)

50) Which keyword is used to prevent any changes in the variable within a C program?
A [ ]) immutable
B [ ]) mutable
C [v]) const
D [ ]) volatile

51) Which of the following is not a pointer declaration?


A [ ]) char a[10];
B [ ]) char a[] = {’1', ’2', ’3', ’4'};
C [ ]) char *str;
D [v]) char a;

52) For binary files, a ___ must be appended to the mode string.
A [ ]) Nothing
B [v]) “b”
C [ ]) “binary”
D [ ]) “01?

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 10


53) Which type of files can’t be opened using fopen()?
A [ ]) .txt
B [ ]) .bin
C [ ]) .c
D [v]) None of the mentioned

54) stdout, stdin and stderr are?


A [v]) File pointer
B [ ]) File desciptors
C [ ]) Streams
D [ ]) Structure

55) Which is an indirection operator among the following?


A [ ]) &
B [v]) *
C [ ]) ->
D [ ]) .

56) Which of the following are correct syntaxes to send an array as a parameter to
function:
A [v]) func(&array);
B [ ]) func(array);
C [ ]) func(*array);
D [ ]) func(array[size]);

57) For a typical program, the input is taken using.


A [ ]) scanf
B [ ]) Files
C [ ]) Command-line
D [v]) None of the mentioned.

58) The value of EOF is_____.

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 11


A [v]) -1
B [ ]) 0
C [ ]) 1
D [ ]) 10

59) The function ____ obtains block of memory dynamically.


A [ ]) calloc
B [ ]) malloc
C [v]) Both a & b
D [ ]) free

60) Memory allocation using malloc() is done in?


A [ ]) Static area
B [ ]) Stack area
C [v]) Heap area
D [ ]) Both b & c

61) Which one is used during memory deallocation in C?


A [ ]) remove(p);
B [ ]) delete(p);
C [v]) free(p);
D [ ]) terminate(p);

62) Which of the following is not a valid variable name declaration?


A [ ]) int _a3;
B [ ]) int a_3;
C [v]) int 3_a;
D [ ]) int _3a

63) All keywords in C are in?


A [v]) Lower Case letters
B [ ]) Upper Case letters

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 12


C [ ]) Camel Case letters
D [ ]) None

64) Which of the following cannot be a variable name in C?


A [v]) Volatile
B [ ]) True
C [ ]) friend

65) User-defined data type can be derived by___________.

66) Which of the following cannot be a structure member?


A [ ]) Another structure
B [v]) Function
C [ ]) Array
D [ ]) None of the mentioned

67) what is the default return type if it is not specified in function definition?
A [ ]) void
B [v]) int
C [ ]) double
D [ ]) short int

68) Functions in C are ALWAYS:


A [ ]) Internal
B [v]) External
C [ ]) Both Internal and External
D [ ]) External and Internal are not valid terms for functions

69) Automatic variables are stored in:


A [v]) stack
B [ ]) data segment
C [ ]) register

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 13


D [ ]) heap

70) Frames from one LAN can be transmitted to another LAN via the device
A [ ]) Router
B [v]) Bridge
C [ ]) Repeater
D [ ]) Modem

71) Which of the following condition is used to transmit two packets over a medium at the
same time?
A [ ]) Contention
B [v]) Collision
C [ ]) Synchronous
D [ ]) Asynchronous

72) What are the most commonly used transmission speeds in BPS used in data
communication?
A [ ]) 300
B [ ]) 1200
C [ ]) 2400
D [v]) 9600

73) Which of the following is used for modulation and demodulation?


A [v]) modem
B [ ]) protocols
C [ ]) gateway
D [ ]) multiplexer

74) Your company has a LAN in its downtown office and has now set up a LAN in the
manufacturing plant in the suburbs. To enable everyone to share data and resources
between the two LANs, what type of device(s) are needed to connect them? Choose the
most correct answer.
A [ ]) Modem
B [ ]) Cable

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 14


C [ ]) Hub
D [v]) Router

75) How many hosts are attached to each of the local area networks at your site?
A [ ]) 128
B [v]) 254
C [ ]) 256
D [ ]) 64

76) Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
A [ ]) FTP
B [ ]) SNMP
C [v]) SMTP
D [ ]) RPC

77) Contention is
A [ ]) One or more conductors that serve as a common connection for a related group of devices
B [ ]) a continuous frequency capable of being modulated or impressed with a second signal
C [v]) the condition when two or more stations attempt to use the same channel at the same time
D [ ]) None of the above

78) Which of the following device is used to connect two systems, especially if the systems
use different protocols?
A [ ]) hub
B [ ]) bridge
C [v]) gateway
D [ ]) repeater

79) The synchronous modems are more costly than the asynchronous modems because
A [ ]) they produce large volume of data
B [v]) they contain clock recovery circuits
C [ ]) they transmit the data with stop and start bits.

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 15


D [ ]) they operate with a larger bandwidth

80) A distributed network configuration in which all data/information pass through a central
computer is
A [ ]) bus network
B [v]) star network
C [ ]) ring network
D [ ]) Point-to-point network

81) Which of the following TCP/IP protocol allows an application program on one machine
to send a datagram to an application program on another machine?
A [v]) UDP
B [ ]) VMTP
C [ ]) X.25
D [ ]) SMTP

82) A remote batch-processing operation in which data is solely input to a central


computer would require a:
A [ ]) telegraph line
B [v]) simplex lines
C [ ]) mixedband channel
D [ ]) All the above

83) ICMP (Internet Control Message Protocol) is


A [ ]) a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical
hardware address
B [ ]) a protocol used to monitor computers
C [ ]) a TCP/IP high level protocol for transferring files from one machine to another
D [v]) a protocol that handles error and control messages

84) The slowest transmission speeds are those of


A [v]) twisted-pair wire
B [ ]) coaxial cable
C [ ]) fiber-optic cable

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 16


D [ ]) microwaves

85) What can greatly reduce TCP/IP configuration problems?


A [ ]) WINS Server
B [ ]) WINS Proxy
C [v]) DHCP Server
D [ ]) PDC

86) A front-end processor is


A [ ]) a user computer system
B [ ]) a processor in a large-scale computer that executes operating system instructions
C [v]) a minicomputer that relieves main-frame computers at a computer centre of
communications control functions
D [ ]) preliminary processor of batch jobs.

87) What is the port number for NNTP?


A [v]) 119
B [ ]) 80
C [ ]) 79
D [ ]) 70

88) Internet-like networks within an enterprise.


A [v]) Intranets
B [ ]) Switching alternating
C [ ]) Inter organizational networks
D [ ]) Extranets

89) How many bits internet address is assigned to each host on a TCP/IP internet which is
used in all communications with the host?
A [ ]) 16 - bits
B [v]) 32 - bits
C [ ]) 48 - bits
D [ ]) 64 - bits

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 17


90) Which of the following does not allow multiple users or devices to share one
communications line?
A [v]) demultiplexer
B [ ]) multipplexer
C [ ]) concentrator
D [ ]) controller

91) The _____ houses the switches in token ring.


A [ ]) transceiver
B [ ]) nine-pin connector
C [ ]) MAU
D [v]) NIC

92) What device separates a single network into two segments but lets the two segments
appear as one to higher protocols?
A [ ]) Switch
B [v]) Bridge
C [ ]) Gateway
D [ ]) Router

93) Which of the following summation operations is performed on the bits to check an error
-detecting code?
A [ ]) Codec
B [ ]) Coder-decoder
C [v]) Checksum
D [ ]) Attenuation

94) An error-detecting code inserted as a field in a block of data to be transmitted is known


as
A [v]) Frame check sequence
B [ ]) Error detecting code
C [ ]) Checksum
D [ ]) flow control

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 18


95) The cheapest modems can transmit
A [v]) 300 bits per second
B [ ]) 1,200 bits per second
C [ ]) 2,400 bits per second
D [ ]) 4,800 bits per second

96) Computers cannot communicate with each other directly over telephone lines because
they use digital pulses whereas telephone lines use analog sound frequencies. What is the
name of the device which permits digital to analog conversion at the start of a long
distance transmission?
A [ ]) Interface
B [v]) Modem
C [ ]) Attenuation
D [ ]) Teleprocessor

97) What is the usual number of bits transmitted simultaneously in parallel data
transmission used by microcomputers?
A [ ]) 16
B [v]) 9
C [ ]) 8
D [ ]) 4

98) The receive equalizer reduces delay distortions using a


A [v]) tapped delay lines
B [ ]) gearshift
C [ ]) descrambler
D [ ]) difference engine

99) What is the name of the software package that allows people to send electronic mail
along a network of computers and workstations?
A [ ]) Memory resident package
B [ ]) Project management package
C [v]) Data communication package

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 19


D [ ]) Electronic mail package

100) The communication mode that supports two-way traffic but only one direction at a
time is
A [ ]) simplex
B [ ]) duplex
C [v]) half duplex
D [ ]) multiplex

15/09/2016 This quiz was created with QuizFaber 3.1 build 2 20

You might also like