MCQs Related to Data Communication & Networks PDF

Summary

This document contains multiple choice questions (MCQs) covering various aspects of data communication and computer networks. It features questions on network basics, access networks, reference models, and the physical layer.

Full Transcript

1 MCQs Related to Data Communication & Networks Network Basics: 1. The IETF standards documents are called ________ a) RFC b) RCF c) ID d) DFC 2. In the layer hier...

1 MCQs Related to Data Communication & Networks Network Basics: 1. The IETF standards documents are called ________ a) RFC b) RCF c) ID d) DFC 2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ________ a) Added b) Removed c) Rearranged d) Modified 3. The structure or format of data is called ___________ a) Syntax b) Semantics c) Struct d) Formatting 4. Communication between a computer and a keyboard involves ______________ transmission. a) Automatic b) Half-duplex c) Full-duplex d) Simplex 5. The first Network was called ________ a) CNNET b) NSFNET c) ASAPNET d) ARPANET 6. A _______ is the physical path over which a message travels. a) Path b) Medium c) Protocol d) Route 7. Which organization has authority over interstate and international commerce in the communications field? a) ITU-T b) IEEE c) FCC d) ISOC 8. Which of this is not a network edge device? a) PC b) Smartphones c) Servers d) Switch 9. A _________ set of rules that governs data communication. a) Protocols b) Standards c) RFCs d) Servers Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 2 10. Three or more devices share a link in ________ connection. a) Unipoint b) Multipoint c) Point to point d) Simplex 1. When collection of various computers seems a single coherent system to its client, then it is called _________ a) computer network b) distributed system c) networking system d) mail system 2. Two devices are in network if __________ a) a process in one device is able to exchange information with a process in another device b) a process is running on both devices c) PIDs of the processes running of different devices are same d) a process is active and another is inactive 3. Which of the following computer networks is built on the top of another network? a) prior network b) chief network c) prime network d) overlay network 4. In computer network nodes are _________ a) the computer that originates the data b) the computer that routes the data c) the computer that terminates the data d) all of the mentioned 5. Communication channel is shared by all the machines on the network in ________ a) broadcast network b) unicast network c) multicast network d) anycast network 6. Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network 7. A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub 8. A list of protocols used by a system, one protocol per layer, is called ________ a) protocol architecture b) protocol stack c) protocol suite d) protocol system Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 3 9. Network congestion occurs _________ a) in case of traffic overloading b) when a system terminates c) when connection between two nodes terminates d) in case of transfer failure 10. Which of the following networks extends a private network across public networks? a) local area network b) virtual private network c) enterprise private network d) storage area network Access Network: (96) Which of this is not a constituent of residential telephone line? (a) A high-speed downstream channel (b) A medium-speed downstream channel (c) A low-speed downstream channel (d) An ultra-high speed downstream channel () DSL telcos provide which of the following services? (a) Wired phone access (b) ISP (c) Wired phone access and ISP (d) Network routing and ISP () The function of DSLAM is to __________ (a) Convert analog signals into digital signals (b) Convert digital signals into analog signals (c) Amplify digital signals (d) De-amplify digital signals () Which of the following terms is not associated with DSL? (a) DSLAM (b) CO (c) Splitter (d) Cable modem termination system (CMTS) () HFC contains _______ (a) Fibre cable (b) Coaxial cable (c) A combination of Fibre cable and Coaxial cable (d) Twisted Pair Cable () Which of the following statements is not applicable for cable internet access? (a) It is a shared broadcast medium (b) It includes HFCs (c) Cable modem connects home PC to Ethernet port (d) Analog signal is converted to digital signal in DSLAM () Among the optical-distribution architectures that are essentially switched Ethernet is __________ (a) AON (b) PON (c) NON (d) MON () StarBand provides __________ (a) FTTH internet access Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 4 (b) Cable access (c) Telephone access (d) Satellite access () Home Internet Access is provided by __________ (a) DSL (b) FTTP (c) Cable (d) All of the mentioned () ONT is connected to splitter using _________ (a) High speed fibre cable (b) HFC (c) Optical cable (d) Twisted pair cable () Which of the following factors affect transmission rate in DSL? (a) The gauge of the twisted-pair line (b) Degree of electrical interference (c) Shadow fading (d) The gauge of the twisted-pair line and degree of electrical interference Reference Models: () How many layers are present in the Internet protocol stack (TCP/IP model)? (a) 5 (b) 7 (c) 6 (d) 10 () The number of layers in ISO OSI reference model is __________ (a) 5 (b) 7 (c) 6 (d) 10 () Which of the following layers is an addition to OSI model when compared with TCP IP model? (a) Application layer (b) Presentation layer (c) Session layer (d) Session and Presentation layer () Application layer is implemented in ____________ (a) End system (b) NIC (c) Ethernet (d) Packet transport () Transport layer is implemented in ______________ (a) End system (b) NIC (c) Ethernet (d) Signal transmission () The functionalities of the presentation layer include ____________ (a) Data compression (b) Data encryption (c) Data description Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 5 (d) All of the mentioned () Delimiting and synchronization of data exchange is provided by __________ (a) Application layer (b) Session layer (c) Transport layer (d) Link layer () In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ (a) Application layer (b) Transport layer (c) Link layer (d) Session layer () In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ (a) Application layer (b) Transport layer (c) Link layer (d) Session layer () In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______ (a) Added (b) Removed (c) Rearranged (d) Randomized () Which of the following statements can be associated with OSI model? (a) A structured way to discuss and easier update system components (b) One layer may duplicate lower layer functionality (c) Functionality at one layer no way requires information from another layer (d) It is an application specific network model () OSI stands for __________ (a) open system interconnection (b) operating system interface (c) optical service implementation (d) open service Internet () The number of layers in ISO OSI reference model is __________ (a) 4 (b) 5 (c) 6 (d) 7 () TCP/IP model does not have ______ layer but OSI model have this layer. (a) session layer (b) transport layer (c) application layer (d) network layer () Which layer is used to link the network support layers and user support layers? (a) session layer (b) data link layer (c) transport layer Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 6 (d) network layer () Which address is used on the internet for employing the TCP/IP protocols? (a) physical address and logical address (b) port address (c) specific address (d) all of the mentioned () TCP/IP model was developed _____ the OSI model. (a) prior to (b) after (c) simultaneous to (d) with no link to () Which layer is responsible for process to process delivery in a general network model? (a) network layer (b) transport layer (c) session layer (d) data link layer () Which address is used to identify a process on a host by the transport layer? (a) physical address (b) logical address (c) port address (d) specific address () Which layer provides the services to user? (a) application layer (b) session layer (c) presentation layer (d) physical layer () Transmission data rate is decided by ____________ (a) network layer (b) physical layer (c) data link layer (d) transport layer Physical Layer: () The physical layer is concerned with ___________ (a) bit-by-bit delivery (b) process to process delivery (c) application to application delivery (d) port to port delivery () Which transmission media provides the highest transmission speed in a network? (a) coaxial cable (b) twisted pair cable (c) optical fiber (d) electrical cable () Bits can be sent over guided and unguided media as analog signal by ___________ (a) digital modulation (b) amplitude modulation (c) frequency modulation (d) phase modulation Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 7 () The portion of physical layer that interfaces with the media access control sublayer is called __________ (a) physical signaling sublayer (b) physical data sublayer (c) physical address sublayer (d) physical transport sublayer () The physical layer provides __________ (a) mechanical specifications of electrical connectors and cables (b) electrical specification of transmission line signal level (c) specification for IR over optical fiber (d) all of the mentioned () In asynchronous serial communication the physical layer provides ___________ (a) start and stop signaling (b) flow control (c) both start & stop signaling and flow control (d) only start signaling () The physical layer is responsible for __________ (a) line coding (b) channel coding (c) modulation (d) all of the mentioned () The physical layer translates logical communication requests from the ______ into hardware specific operations. (a) data link layer (b) network layer (c) trasnport layer (d) application layer () A single channel is shared by multiple signals by ____________ (a) analog modulation (b) digital modulation (c) multiplexing (d) phase modulation () Wireless transmission of signals can be done via ___________ (a) radio waves (b) microwaves (c) infrared (d) all of the mentioned Data Link Layer: () The data link layer takes the packets from _________ and encapsulates them into frames for transmission. (a) network layer (b) physical layer (c) transport layer (d) application layer () Which of the following tasks is not done by data link layer? (a) framing (b) error control (c) flow control (d) channel coding Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 8 () Which sublayer of the data link layer performs data link functions that depend upon the type of medium? (a) logical link control sublayer (b) media access control sublayer (c) network interface control sublayer (d) error control sublayer () Header of a frame generally contains ______________ (a) synchronization bytes (b) addresses (c) frame identifier (d) all of the mentioned () Automatic repeat request error management mechanism is provided by ________ (a) logical link control sublayer (b) media access control sublayer (c) network interface control sublayer (d) application access control sublayer () When 2 or more bits in a data unit has been changed during the transmission, the error is called _______. (a) random error (b) burst error (c) inverted error (d) double error () CRC stands for __________ (a) cyclic redundancy check (b) code repeat check (c) code redundancy check (d) cyclic repeat check () Which of the following is a data link protocol? (a) ethernet (b) point to point protocol (c) hdlc (d) all of the mentioned () Which of the following is the multiple access protocol for channel access control? (a) CSMA/CD (b) CSMA/CA (c) Both CSMA/CD & CSMA/CA (d) HDLC () The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________ (a) piggybacking (b) cyclic redundancy check (c) fletcher’s checksum (d) parity check Transport Layer: () Transport layer aggregates data from different applications into a single stream before passing it to _____. (a) network layer (b) data link layer (c) application layer (d) physical layer Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 9 () Which of the following are transport layer protocols used in networking? (a) TCP and FTP (b) UDP and HTTP (c) TCP and UDP (d) HTTP and FTP () User datagram protocol is called connectionless because _____________ (a) all UDP packets are treated independently by transport layer (b) it sends data as a stream of related packets (c) it is received in the same order as sent order (d) it sends data very quickly () Transmission control protocol ___________ (a) is a connection-oriented protocol (b) uses a three way handshake to establish a connection (c) receives data from application as a single stream (d) all of the mentioned () An endpoint of an inter-process communication flow across a computer network is called __________ (a) socket (b) pipe (c) port (d) machine () Socket-style API for windows is called ____________ (a) wsock (b) winsock (c) wins (d) sockwi () Which one of the following is a version of UDP with congestion control? (a) datagram congestion control protocol (b) stream control transmission protocol (c) structured stream transport (d) user congestion control protocol () A _____ is a TCP name for a transport service access point. (a) port (b) pipe (c) node (d) protocol () Transport layer protocols deals with ____________ (a) application to application communication (b) process to process communication (c) node to node communication (d) man to man communication () Which of the following is a transport layer protocol? (a) stream control transmission protocol (b) internet control message protocol (c) neighbor discovery protocol (d) dynamic host configuration protocol Network Layer: Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 10 () The network layer is concerned with __________ of data. (a) bits (b) frames (c) packets (d) bytes () Which one of the following is not a function of network layer? (a) routing (b) inter-networking (c) congestion control (d) error control () A 4 byte IP address consists of __________ (a) only network address (b) only host address (c) network address & host address (d) network address & MAC address () In virtual circuit network each packet contains ___________ (a) full source and destination address (b) a short VC number (c) only source address (d) only destination address () Which of the following routing algorithms can be used for network layer design? (a) shortest path algorithm (b) distance vector routing (c) link state routing (d) all of the mentioned () Which of the following is not correct in relation to multi-destination routing? (a) is same as broadcast routing (b) contains the list of all destinations (c) data is not sent by packets (d) there are multiple receivers () A subset of a network that includes all the routers but contains no loops is called ________ (a) spanning tree (b) spider structure (c) spider tree (d) special tree () Which one of the following algorithm is not used for congestion control? (a) traffic aware routing (b) admission control (c) load shedding (d) routing information protocol () The network layer protocol for internet is __________ (a) ethernet (b) internet protocol (c) hypertext transfer protocol (d) file transfer protocol () ICMP is primarily used for __________ (a) error and diagnostic functions (b) addressing Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 11 (c) forwarding (d) routing Multiplexing: () The sharing of a medium and its link by two or more devices is called _________ (a) Fully duplexing (b) Multiplexing (c) Micropleixng (d) Duplexing () Multiplexing is used in _______ (a) Packet switching (b) Circuit switching (c) Data switching (d) Packet & Circuit switching () Which multiplexing technique used to transmit digital signals? (a) FDM (b) TDM (c) WDM (d) FDM & WDM () If there are n signal sources of same data rate, then the TDM link has _______ slots. (a) n (b) n/2 (c) n*2 (d) 2n () The state when dedicated signals are idle are called __________ (a) Death period (b) Poison period (c) Silent period (d) Stop period () Multiplexing provides _________ (a) Efficiency (b) Privacy (c) Anti jamming (d) Both Efficiency & Privacy () In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources. (a) Greater than (b) Lesser than (c) Equal to (d) Equal to or greater than () In TDM, slots are further divided into _________ (a) Seconds (b) Frames (c) Packets (d) Bits Topology: Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 12 () Physical or logical arrangement of network is __________ (a) Topology (b) Routing (c) Networking (d) Control () Which network topology requires a central controller or hub? (a) Star (b) Mesh (c) Ring (d) Bus () _______ topology requires a multipoint connection. (a) Star (b) Mesh (c) Ring (d) Bus () Data communication system spanning states, countries, or the whole world is ________ (a) LAN (b) WAN (c) MAN (d) PAN () Data communication system within a building or campus is________ (a) LAN (b) WAN (c) MAN (d) PAN () WAN stands for __________ (a) World area network (b) Wide area network (c) Web area network (d) Web access network () In TDM, slots are further divided into __________ (a) Seconds (b) Frames (c) Packets (d) Bits () _____ is the multiplexing technique that shifts each signal to a different carrier frequency. (a) FDM (b) TDM (c) Both FDM & TDM (d) PDM Delays & Loss: () Which of the following delay is faced by the packet in travelling from one end system to another? (a) Propagation delay (b) Queuing delay (c) Transmission delay (d) All of the mentioned Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 13 () The time required to examine the packet’s header and determine where to direct the packet is part of __________ (a) Processing delay (b) Queuing delay (c) Transmission delay (d) Propagation delay () Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by ____________ (a) La/R (b) LR/a (c) R/La (d) Ra/L () If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is? (a) N/2 (b) N (c) N-1 (d) 2N () The total nodal delay is given by ____________ (a) dnodal = dproc – dqueue + dtrans + dprop (b) dnodal = dproc + dtrans – dqueue (c) dnodal = dproc + dqueue + dtrans + dprop (d) dnodal = dproc + dqueue – dtrans – dprop () In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero? (a) Propagation delay (b) Queuing delay (c) Transmission delay (d) Processing delay () Transmission delay does not depend on _____________ (a) Packet length (b) Distance between the routers (c) Transmission rate (d) Bandwidth of medium () Propagation delay depends on ___________ (a) Packet length (b) Transmission rate (c) Distance between the routers (d) Speed of the CPU Network Attacks: 1. The attacker using a network of compromised devices is known as _____________ a) Internet b) Botnet c) Telnet d) D-net 2. Which of the following is a form of DoS attack? a) Vulnerability attack b) Bandwidth flooding Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 14 c) Connection flooding d) All of the mentioned 3. The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________ a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) UDP flooding 4. The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________ a) Vulnerability attack b) Bandwidth flooding c) Connection flooding d) UDP flooding 5. Packet sniffers involve ____________ a) Active receiver b) Passive receiver c) Legal receiver d) Partially-active receiver 6. Sniffers can be prevented by using _______________ a) Wired environment b) WiFi c) Ethernet LAN d) Switched network 7. Firewalls are often configured to block ___________ a) UDP traffic b) TCP traffic c) Sensitive traffic d) Best-effort traffic 8. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero? a) Propagation delay b) Queuing delay c) Transmission delay d) Processing delay Shielded Twisted Pair Cables: () _____________ allows LAN users to share computer programs and data. (a) Communication server (b) Print server (c) File server (d) Network () With respect to physical media, STP cables stands for _________ (a) Shielded Twisted Pair Cable (b) Spanning Tree Protocol Cable (c) Static Transport Protocol Cable (d) Shielded Two Power Cable () A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of ___________ Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 15 (a) LAN intrinsic software (b) LAN aware software (c) Groupware (d) LAN ignorant software () The __________ portion of LAN management software restricts access, records user activities and audit data, etc. (a) Configuration management (b) Security management (c) Performance management (d) Recovery management () What is the max length of the Shielded twisted pair cable? (a) 100 ft (b) 200 ft (c) 100 m (d) 200 m () What is the max data transfer rate of STP cables? (a) 10 Mbps (b) 100 Mbps (c) 1000 Mbps (d) 10000 Mbps () Which connector does the STP cable use? (a) BNC (b) RJ-11 (c) RJ-45 (d) RJ-69 () What is the central device in star topology? (a) STP server (b) Hub/switch (c) PDC (d) Router () What is the max data transfer rate for optical fiber cable? (a) 10 Mbps (b) 100 Mbps (c) 1000 Mbps (d) 10000 Mbps () Which of the following architecture uses the CSMA/CD access method? (a) ARC net (b) Ethernet (c) Router (d) STP server Physical Media: 1. Which of this is not a guided media? a) Fiber optical cable b) Coaxial cable c) Wireless LAN d) Copper wire Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 16 2. UTP is commonly used in __________ a) DSL b) FTTP c) HTTP d) None of the mentioned 3. Coaxial cable consists of _______ concentric copper conductors. a) 1 b) 2 c) 3 d) 4 4. Fiber optics possess following properties __________ a) Immune electromagnetic interference b) Very less signal attenuation c) Very hard to tap d) All of the mentioned 5. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) __________ a) n*39.8 b) n*51.8 c) 2n*51.8 d) None of the mentioned 6. Terrestrial radio channels are broadly classified into _____ groups. a) 2 b) 3 c) 4 d) 1 7. Radio channels are attractive medium because __________ a) Can penetrate walls b) Connectivity can be given to mobile user c) Can carry signals for long distance d) All of the mentioned 8. Geostationary satellites ___________ a) Are placed at a fixed point above the earth b) Rotate the earth about a fixed axis c) Rotate the earth about a varying axis d) All of the mentioned Packet and Circuit Switching 1. A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched 2. Most packet switches use this principle ____________ a) Stop and wait b) Store and forward c) Store and wait d) Stop and forward Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 17 3. If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ______________ a) N b) (N*L)/R c) (2N*L)/R d) L/R 4. What are the Methods to move data through a network of links and switches? a) Packet switching and Line switching b) Circuit switching and Line switching c) Line switching and bit switching d) Packet switching and Circuit switching 5. The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method. a) Packet switching b) Circuit switching c) Line switching d) Frequency switching 6. As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved. a) authentication b) guaranteed constant rate c) reliability d) store and forward 7. In _________ systems, resources are allocated on demand. a) packet switching b) circuit switching c) line switching d) frequency switching 8. Which of the following is not an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) Error control Application Layer: 1. Which is not an application layer protocol? a) HTTP b) SMTP c) FTP d) TCP 2. The packet of information at the application layer is called __________ a) Packet b) Message c) Segment d) Frame 3. Which one of the following is an architecture paradigms? a) Peer to peer b) Client-server c) HTTP Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 18 d) Both Peer-to-Peer & Client-Server 4. Application developer has permission to decide the following on transport layer side a) Transport layer protocol b) Maximum buffer size c) Both Transport layer protocol and Maximum buffer size d) None of the mentioned 5. Application layer offers _______ service. a) End to end b) Process to process c) Both End to end and Process to process d) None of the mentioned 6. E-mail is _________ a) Loss-tolerant application b) Bandwidth-sensitive application c) Elastic application d) None of the mentioned 7. Pick the odd one out. a) File transfer b) File download c) E-mail d) Interactive games 8. Which of the following is an application layer service? a) Network virtual terminal b) File transfer, access, and management c) Mail service d) All of the mentioned 9. To deliver a message to the correct application program running on a host, the _______ address must be consulted. a) IP b) MAC c) Port d) None of the mentioned 10. Which is a time-sensitive service? a) File transfer b) File download c) E-mail d) Internet telephony 11. Transport services available to applications in one or another form _________ a) Reliable data transfer b) Timing c) Security d) All of the mentioned 12. Electronic mail uses which Application layer protocol? a) SMTP b) HTTP c) FTP d) SIP Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 19 1. The ____________ translates internet domain and host names to IP address. a) domain name system b) routing information protocol c) network time protocol d) internet relay chat 2. Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a) HTTP b) FTP c) Telnet d) TCP 3. Application layer protocol defines ____________ a) types of messages exchanged b) message format, syntax and semantics c) rules for when and how processes send and respond to messages d) all of the mentioned 4. Which one of the following protocol delivers/stores mail to reciever server? a) simple mail transfer protocol b) post office protocol c) internet mail access protocol d) hypertext transfer protocol 5. The ASCII encoding of binary data is called a) base 64 encoding b) base 32 encoding c) base 16 encoding d) base 8 encoding 6. Which one of the following is an internet standard protocol for managing devices on IP network? a) dynamic host configuration protocol b) simple network management protocol c) internet message access protocol d) media gateway protocol 7. Which one of the following is not an application layer protocol? a) media gateway protocol b) dynamic host configuration protocol c) resource reservation protocol d) session initiation protocol 8. Which protocol is a signaling communication protocol used for controlling multimedia communication sessions? a) session initiation protocol b) session modelling protocol c) session maintenance protocol d) resource reservation protocol 9. Which one of the following is not correct? a) Application layer protocols are used by both source and destination devices during a communication session b) HTTP is a session layer protocol c) TCP is an application layer protocol d) All of the mentioned Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 20 10. When displaying a web page, the application layer uses the _____________ a) HTTP protocol b) FTP protocol c) SMTP protocol d) TCP protocol Http: 1. The number of objects in a Web page which consists of 4 jpeg images and HTML text is ________ a) 4 b) 1 c) 5 d) 7 2. The default connection type used by HTTP is _________ a) Persistent b) Non-persistent c) Can be either persistent or non-persistent depending on connection request d) None of the mentioned 3. The time taken by a packet to travel from client to server and then back to the client is called __________ a) STT b) RTT c) PTT d) JTT 4. The HTTP request message is sent in _________ part of three-way handshake. a) First b) Second c) Third d) Fourth 5. In the process of fetching a web page from a server the HTTP request/response takes __________ RTTs. a) 2 b) 1 c) 4 d) 3 6. The first line of HTTP request message is called _____________ a) Request line b) Header line c) Status line d) Entity line 7. The values GET, POST, HEAD etc are specified in ____________ of HTTP message a) Request line b) Header line c) Status line d) Entity body 8. The __________ method when used in the method field, leaves entity body empty. a) POST b) SEND c) GET d) PUT Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 21 9. The HTTP response message leaves out the requested object when ____________ method is used a) GET b) POST c) HEAD d) PUT 10. Find the oddly matched HTTP status codes a) 200 OK b) 400 Bad Request c) 301 Moved permanently d) 304 Not Found 11. Which of the following is not correct? a) Web cache doesnt has its own disk space b) Web cache can act both like server and client c) Web cache might reduce the response time d) Web cache contains copies of recently requested objects 12. The conditional GET mechanism a) Imposes conditions on the objects to be requested b) Limits the number of response from a server c) Helps to keep a cache upto date d) None of the mentioned 13. Which of the following is present in both an HTTP request line and a status line? a) HTTP version number b) URL c) Method d) None of the mentioned 1. Multiple objects can be sent over a TCP connection between client and server in a persistent HTTP connection. a) True b) False (c) May be (d) Not Always 2. HTTP is ________ protocol. a) application layer b) transport layer c) network layer d) data link layer 3. In the network HTTP resources are located by a) uniform resource identifier b) unique resource locator c) unique resource identifier d) union resource locator 4. HTTP client requests by establishing a __________ connection to a particular port on the server. a) user datagram protocol b) transmission control protocol c) border gateway protocol d) domain host control protocol 5. In HTTP pipelining ________________ a) multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 22 responses b) multiple HTTP requests cannot be sent on a single TCP connection c) multiple HTTP requests are sent in a queue on a single TCP connection d) multiple HTTP requests are sent at random on a single TCP connection FTP: 6. FTP server listens for connection on port number ____________ a) 20 b) 21 c) 22 d) 23 7. In FTP protocol, client contacts server using ____ as the transport protocol. a) transmission control protocol b) user datagram protocol c) datagram congestion control protocol d) stream control transmission protocol 8. In Active mode FTP, the client initiates both the control and data connections. a) True b) False (c) May be (d) Not Always 9. The File Transfer Protocol is built on ______________ a) data centric architecture b) service oriented architecture c) client server architecture d) connection oriented architecture 10. In File Transfer Protocol, data transfer cannot be done in ___________ a) stream mode b) block mode c) compressed mode d) message mode 1. Expansion of FTP is __________ a) Fine Transfer Protocol b) File Transfer Protocol c) First Transfer Protocol d) Fast Transfer Protocol 2. FTP is built on _____ architecture. a) Client-server b) P2P c) Data centric d) Service oriented 3. FTP uses _________ parallel TCP connections to transfer a file. a) 1 b) 2 c) 3 d) 4 4. Identify the incorrect statement regarding FTP. a) FTP stands for File Transfer Protocol Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 23 b) FTP uses two parallel TCP connections c) FTP sends its control information in-band d) FTP sends exactly one file over the data connection 5. If 5 files are transferred from server A to client B in the same session. The number of TCP connections between A and B is _______ a) 5 b) 10 c) 2 d) 6 6. FTP server _____________ a) Maintains state information b) Is stateless c) Has single TCP connection for a file transfer d) Has UDP connection for file transfer 7. The commands, from client to server, and replies, from server to client, are sent across the control connection in ________ bit ASCII format. a) 8 b) 7 c) 3 d) 5 8. Find the FTP reply whose message is wrongly matched. a) 331 – Username OK, password required b) 425 – Can’t open data connection c) 452 – Error writing file d) 452 – Can’t open data connection 9. The data transfer mode of FTP, in which all the fragmenting has to be done by TCP is ________ a) Stream mode b) Block mode c) Compressed mode d) Message mode 10. The password is sent to the server using ________ command. a) PASSWD b) PASS c) PASSWORD d) PWORD SMTP: DNS: DHCP: Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 24 IP Security: Virtual Private Networks: SMI: SNMP: Telnet: Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 25 Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 26 (01) The OSI model consists of ___ layers. (a) Five (b) Seven (c) Eight (d) Nine (02) Something which has easily understood instructions is said to be (a) Information (b) Icon (c) Word processing (d) User friendly (03) Each computer have a/an ____, and some ____ (a) Internet Browsers, Document files (b) Operating System, Application Programs (c) Hard Disk, Programming Programs (d) Operating system, Tally (04) Error detection at the data link level is achieved by (a) Equalization (b) Bit stuffing (c) Hamming codes (d) Cyclic redundancy codes (05) Which of the following techniques is used for allocating capacity on a satellite channel using fixed-assignment FDM? (a) Frequency-shift keying (b) Frequency modulation (c) Frequency-division multiple access (d) Amplitude modulation (06) The connection between your computer at home and your local ISP is called _____ (a) The backbone (b) The home page (c) The home stretch (d) The last mile (07) Demodulation is the process of (a) Dividing the high-speed signals into frequency bands (b) Converting digital signals to analog signals (c) Converting analog signals to digital signals (d) Combining many low speed channels into one high speed channel (08) Modulation is the process of (a) Echoing every character that is received (b) Sending a file from one computer to another computer (c) Converting digital signals to analog signals (d) Converting analog signals to digital signals Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 27 (09) Many low-shaped channels are interwoven into one high -speed transmission by (a) Frequency-division multiplexer (b) Time-division multiplexer (c) Both (a) and (b) (d) None of these (10) The synchronous modems are more costly than the asynchronous modems because (a) They operate with a larger bandwidth (b) They produce large volume of data (c) They contain clock recovery circuits (d) They transmit the data with stop and start bits (11) To connect a computer with a device in the same room, you might be likely to use (a) A ground station (b) A dedicated line (c) A coaxial cable (d) All of the above (12) Which of these is a standard interface for serial data transmission? (a) ASCII (b) RS232C (c) bits (d) Centronics (13) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets? (a) Ring (b) Local area (c) Hierarchical (d) Star (14) Which of the following transmission directions listed is not a legitimate channel? (a) Simplex (b) Half Duplex (c) Full Duplex (d) Double Duplex (15) "Parity bits" are used for which of the following purposes? (a) Encryption of data (b) To transmit faster (c) To detect errors (d) To identify the user (16) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences? (a) Unshielded twisted pair (b) Optical fiber (c) Coaxial cable (d) Microwave (17) A collection of hyperlinked documents on the internet forms the __________. (a) World Wide Web (WWW) (b) E-mail system (c) Mailing list (d) Hypertext markup language Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 28 (18) The location of a resource on the internet is given by its? (a) Protocol (b) URL (c) E-mail address (d) ICQ (19) The term HTTP stands for? (a) Hyper terminal tracing program (b) Hypertext tracing protocol (c) Hypertext transfer protocol (d) Hypertext transfer program (20) A proxy server is used as the computer? (a) with external access (b) acting as a backup (c) performing file handling (d) accessing user permissions (21) Which one of the following would breach the integrity of a system? (a) Looking the room to prevent theft (b) Full access rights for all users (c) Fitting the system with an anti-theft device (d) Protecting the device against willful or accidental damage (22) Which software prevents the external access to a system? (a) Firewall (b) Gateway (c) Router (d) Virus checker Software (23) Which one of the following is a valid email address? (a) [email protected] (b) gmail.com (c) [email protected] (d) javatpoint@books (24) Which of the following best describes uploading information? (a) Sorting data on a disk drive (b) Sending information to a host computer (c) Receiving information from a host computer (d) Sorting data on a hard drive (25) Which one of the following is the most common internet protocol? (a) HTML (b) NetBEUI (c) TCP/IP (d) IPX/SPX (26) Software programs that allow you to legally copy files and give them away at no cost are called which of the following? (a) Probe ware (b) Timeshare (c) Shareware (d) Public domain (27) Which one of the following is not a network topology? (a) Star Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 29 (b) Ring (c) Bus (d) Peer to Peer (28) The maximum length (in bytes) of an IPv4 datagram is? (a) 32 (b) 1024 (c) 65535 (d) 512 (29) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement? (a) 255.243.240 (b) 255.255.0.0 (c) 255.255.255.0 (d) 255.255.255 (30) When the mail server sends mail to other mail servers it becomes ___ ? (a) SMTP client (b) SMTP server (c) Peer (d) Master (31) The length of an IPv6 address is? (a) 32 bits (b) 64 bits (c) 128 bits (d) 256 bits (32) Consider the following: 1. Twisted pair cables 2. Microwaves and Satellite Signals 3. Repeaters 4. Analog Transmissions 5. Fiber optics Which of the above is consider as (a) signal transmission medium is data communications? (a) (1) and (5) (b) (1) and (2) (c) (1), (2) and (5) (d) (1), (2), (3) and (5) (33) Which of the following address belongs class A? (a) 121.12.12.248 (b) 130.12.12.248 (c) 128.12.12.248 (d) 129.12.12.248 (34) Which of the following is correct IPv4 address? (a) 124.201.3.1.52 (b) 01.200.128.123 (c) 300.142.210.64 (d) 10110011.32.16.8 (e) 128.64.0.0 (35) Which of the following IP addresses can be used as (a) loop-back addresses? (a) 0.0.0.0 (b) 127.0.0.1 Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 30 (c) 255.255.255.255 (d) 0.255.255.255 (36) The term WAN stands for? (a) Wide Area Net (b) Wide Access Network (c) Wide Area Network (d) Wide Access Net (37) Which of the following cannot be used as a medium for 802.3 ethernet? (a) A thin coaxial cable (b) A twisted pair cable (c) A microwave link (d) A fiber optical cable (38) What IP address class allocates 8 bits for the host identification part? (a) Class A (b) Class B (c) Class C (d) Class D (39) The term IANA stands for? (a) Internet Assigned Numbers Authority (b) Internal Assigned Numbers Authority (c) Internet Associative Numbers Authoritative (d) Internal Associative Numbers Authority (40) How many versions available of IP? (a) 6 version (b) 4 version (c) 2 version (d) 1 version (41) Which layer of the TCP / IP stack corresponds to the OSI model transport layer? (a) Host to host (b) Application (c) Internet (d) Network Access (42) On a simplex data link, which of the following is a possible error recovery technique? (a) Backward error correction (BEC) (b) The use of hamming codes (c) Automatic Repeat Request (ARQ) (d) Downward error correction (DEC) (43) Which of the statement(s) is correct with regard to Time Division Multiplexing (TDM) and its variants? (a) Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the data stream is probabilistic. (b) TDM requires the transmitter and receiver to be synchronized periodically. (c) TDM performs efficiently if the arrival pattern of the data stream is probabilistic. (d) Statistical TDM is efficient if the data stream is deterministic. (44) The term IPv4 stands for? (a) Internet Protocol Version 4 (b) Internet Programming Version 4 (c) International Programming Version 4 (d) None of these Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 31 (45) The term LAN stands for? (a) Local Area Net (b) Local Area Network (c) Local Array Network (d) Local Array Net (46) Which of the through is share the data of two computer? (a) Library (b) Network (c) Grouping (d) Integrated system (47) In specific, if the systems use separate protocols, which one of the following devices is used to link two systems? (a) Repeater (b) Gateway (c) Bridge (d) Hub (48) How many digits of the Data Network Identification Code (DNIC) identify the country? (a) first three (b) first four (c) first five (d) first six (49) Which of the following methods is used to broadcast two packets on the medium at a time? (a) Collision (b) Synchronous (c) Asynchronous (d) None of the above (50) Which of the following is true with regard to the ping command? (a) Ping stands for Packet Internet Generator. (b) The ping command checks the port level connectivity between source destinations end points. (c) Ping summarizes the packet loss and round-trip delay between two IP end points. (d) The ping command activates the RARP protocol of the IP layer. (51) The private key in asymmetric key cryptography is kept by? (a) Sender (b) Receiver (c) Sender and Receiver (d) None of the these (52) Which of the following algorithms is not used in asymmetric-key cryptography? (a) RSA algorithm (b) Diffie-Hellman algorithm (c) Electronic code book algorithm (d) None of the mentioned (53) In the cryptography, the sequence of the letters is rearranged by? (a) Transposition ciphers (b) Substitution ciphers (c) Both a and b (d) None of these Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 32 (54) Which of the following statement is true about error detection techniques used on communications link? (a) Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors. (b) Error detection cannot be used on simplex links. (c) Hamming code can detect up to 3-bit errors. (d) All of the these (55) The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine representation differences with shared access resolution and ASCII test protocol is? (a) Network, Physical, Transport, Data link (b) Network, Physical, Data link, Application (c) Network, Presentation, Data link, Application (d) Network, Presentation, Physical, Transport (56) Which of the following is used to connect one station with another? (a) VPN (b) VLAN (c) RADIUS (d) NAT (57) Which of the following device has File Sharing, and Network Connection the same protection provided? (a) Switch (b) Server (c) Workstation (d) Both B and C (58) Which hardening method is used by a computer for IP address and name? (a) NTFS (b) IFS (c) PKI (d) Access Control List (59) Which device is used to provide security to mobile storage? (a) flash card (b) smart card (c) public key (d) All of the above (60) When the user is banned from downloading software, then what is it called? (a) desktop lockdown (b) desktop lockup (c) both a and b (d) None of these (61) Which of the following are dependable tools? (a) flash cards (b) smart cards (c) memory card (d) masterCard (62) What is a computer network? (a) A device used to display information on a computer screen (b) A collection of interconnected computers and devices that can communicate and share resources (c) A type of software used to create documents and presentations (d) The physical casing that protects a computer’s internal components Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 33 (63) What is internet? (a) A network of interconnected local area networks (b) A collection of unrelated computers (c) Interconnection of wide area networks (d) A single network (64) Which of the following is an example of Bluetooth? (a) wide area network (b) virtual private network (c) local area network (d) personal area network (65) Which of the following computer networks is built on the top of another network? (a) overlay network (b) prime network (c) prior network (d) chief network (66) What is the full form of OSI? (a) optical service implementation (b) open service Internet (c) open system interconnection (d) operating system interface (67) When a collection of various computers appears as a single coherent system to its clients, what is this called? (a) mail system (b) networking system (c) computer network (d) distributed system (68) How many layers are there in the ISO OSI reference model? (a) 7 (b) 5 (c) 4 (d) 6 (69) What are nodes in a computer network? (a) the computer that routes the data (b) the computer that terminates the data (c) the computer that originates the data (d) all of the mentioned (70) Which one of the following is not a function of network layer? (a) congestion control (b) error control (c) routing (d) inter-networking (71) How is a single channel shared by multiple signals in a computer network? (a) multiplexing (b) phase modulation (c) analog modulation (d) digital modulation (72) Which of the following devices forwards packets between networks by processing the routing information included in the packet? Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 34 (a) firewall (b) bridge (c) hub (d) router (73) What is the term for an endpoint of an inter-process communication flow across a computer network? (a) port (b) machine (c) socket (d) pipe (75) How do two devices become part of a network? (a) PIDs of the processes running of different devices are same (b) a process in one device is able to exchange information with a process in another device (c) a process is active and another is inactive (d) a process is running on both devices (76) Which layer does the data link layer take packets from and encapsulate them into frames for transmission? (a) transport layer (b) application layer (c) network layer (d) physical layer (77) Which of this is not a network edge device? (a) Switch (b) PC (c) Smartphones (d) Servers (78) Which type of network shares the communication channel among all the machines? (a) anycast network (b) multicast network (c) unicast network (d) broadcast network (79) Which topology requires a multipoint connection? (a) Ring (b) Bus (c) Star (d) Mesh (80) Which of the following maintains the Domain Name System? (a) a single server (b) a single computer (c) distributed database system (d) none of the mentioned (81) When discussing IDS/IPS, what is a signature? (a) It refers to “normal,” baseline network behavior (b) It is used to authorize the users on a network (c) An electronic signature used to authenticate the identity of a user on the network (d) Attack-definition file (82) Which of the following are Gigabit Ethernets? (a) 1000 BASE-LX (b) 1000 BASE-CX Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 35 (c) 1000 BASE-SX (d) All of the mentioned (83) Which of the following networks extends a private network across public networks? (a) virtual private network (b) local area network (c) storage area network (d) enterprise private network (84) Which layer is responsible for process to process delivery in a general network model? (a) session layer (b) data link layer (c) transport layer (d) network layer (85) What does each packet contain in a virtual circuit network? (a) only source address (b) only destination address (c) full source and destination address (d) a short VC number (86) What is the term for the data communication system within a building or campus? (a) MAN (b) LAN (c) PAN (d) WAN (87) What was the name of the first network? (a) ASAPNET (b) ARPANET (c) CNNET (d) NSFNET (88) Which of the following is the network layer protocol for the internet? (a) hypertext transfer protocol (b) file transfer protocol (c) ethernet (d) internet protocol (89) Which network topology requires a central controller or hub? (a) Ring (b) Bus (c) Star (d) Mesh (90) Which of the following allows LAN users to share computer programs and data? (a) File server (b) Network (c) Communication server (d) Print server (91) What type of transmission is involved in communication between a computer and a keyboard? (a) Half-duplex (b) Full-duplex (c) Simplex (d) Automatic Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 36 (92) Which layer provides the services to user? (a) physical layer (b) presentation layer (c) session layer (d) application layer (93) Which connection is necessary for a computer to join the internet? (a) internet society (b) internet service provider (c) different computer (d) internet architecture board (94) Which of the following allows you to connect and login to a remote computer? (a) SMTP (b) HTTP (c) FTP (d) Telnet (95) Which of the following is used in an attempt to render a computer resource unavailable to its intended users? (a) botnet process (b) worms attack (c) virus attack (d) denial-of-service attack () In which of the following switching methods, the message is divided into small packets? (a) Message switching (b) Packet switching (c) Virtual switching (d) None of these () Which of the following switch methods creates a point-to-point physical connection between two or more computers? (a) Message switching (b) Packet switching (c) Circuit switching (d) None of these () What is the second name of the proxy server? (a) Proxy tools (b) Application proxy (c) Application-level gateway (d) All of these () Which of the following servers allows LAN users to share data? (a) Data server (b) Point server (c) File server (d) Communication server () How many fields are in the SMDS packet? (a) Two (b) Three (c) Four Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 37 (d) Five () What is the maximum data transfer rate of the optical fiber wire? (a) 50 kbps (b) 1000 kbps (c) 1000 Mbps (d) None of these () POTS network works on the principle of ________ (a) Telephone switching (b) Proxy server (c) File system (d) Circuit Switching () Which of the following protocols is the bit-oriented protocol? (a) SSL (b) http (c) HDLC (d) All of these () SLIP stands for _______ (a) System line internet protocol (b) Serial line internet protocol (c) Signal line internet protocol (d) Signal internet protocol () The second port is used to ____________ in the two-port network. (a) Input terminal (b) Output terminal (c) Signal terminal (d) Bandwidth terminal () Which of the following layers does the HTTP protocol work on? (a) Physical layer (b) Data-link layer (c) Application layer (d) None of these () Which of the following statement correct about the cipher in cryptography? (a) It is a method for performing encryption and decryption (b) It is used to establish the network connection (c) It is a message event (d) All of the these () SONET stands for ______________. (a) Signal Operation Network (b) Synchronous Optical Network (c) System Optical Network (d) Signal Optical Network () How many layers does the SONET contain? (a) 2 layers (b) 3 layers (c) 4 layers (d) 5 layers () RAKE receiver designed for _____. Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 38 (a) Multipath fading (b) Signals (c) Data network (d) Network connection () What is the formula of high rate in a linear error-correction zigzag code? (a) J / (J * 1) (b) -Z / (1 + J) (c) Z * (1 + J) (d) J / (J + 1) () What is the size of the sender window in the Go Back N (ARQ) protocol? (a) 0 (b) 1 (c) 10 (d) n () What is the efficiency of the Go back N (ARQ) protocol? (a) N = N / (2a + 2a) (b) N = N / (1 + 2a) (c) N = N * (2a + 2a) (d) N = N * (1 + 2a) () What is the size of the destination port in the UDP protocol? (a) 8 bits (b) 16 bits (c) 20 bits (d) 32 bits () What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages? (a) Ping (b) Route (c) Traceroute (d) Ifconfig () A client of the DNS (Domain Name System) application is called _____. (a) DNS server (b) DNS Name (c) DNS resolver (d) DNS inquirer () How many characters consist of the entire hostname? (a) 511 characters (b) 255 characters (c) 127 characters (d) 31 characters () During normal IP packet forwarding by a router, which of the following fields of the IP header is updated? (a) Repeater (b) Source address (c) Destination address (d) Checksum () Which of the following statements is correct about the DWDM? (a) It can transmit data at very high speeds (b) It can transmit data at very slow speeds (c) DWSM stands for digital wave division multiplexing Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 39 (d) None of these () MAC address is also called ______. (a) Physical address (b) Logical address (c) Source address (d) Destination address () Which of the following addresses is 32-bit? (a) MAC address (b) Virtual address (c) Source address (d) Destination address () EDI stands for ____. (a) Electronic Data Interchange (b) Electronic Digital Internet (c) Electronic Digital Interchange (d) Electronic Data Internet () What is the maximum data transfer rate of the ISDN? (a) 1024 Mbps (b) 64 Mbps (c) 64 kbps (d) 1024 kbps () ARPANET stands for _______. (a) Advanced Recheck Projects Agency Internet (b) Advanced Recheck Projects Agency Network (c) Advanced Research Projects Agency Network (d) Advanced Research Projects Agency Internet () What is the size of the UDP header? (a) 8 bytes (b) 16 bytes (c) 20 bytes (d) 64 bytes () Which of the following protocols is the connection-less protocol? (a) UDP (b) TCP (c) IP (d) All of the these () Wildcard domain name labels begin with a ______. (a). (b) 0 (c) @ (d) * (e) # () What is the maximum length of the STP wire? (a) 20 ft (b) 50 ft (c) 50 meters (d) 100 meters Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 40 () Which network is suitable for a building? (a) WAN (b) LAN (c) MAN (d) PAN () ________ is a 2G mobile telecommunications based on the CDMA. (a) IS-95 (b) ISO 1990 (c) IS-97 (d) None of these () Which of the following statements is correct about IRC? (a) It sends the messages in virtual time (b) It is an application layer protocol (c) It works on the proxy model (d) All of the these () Which of the following devices is not a networking device? (a) Hub (b) Switch (c) Bridge (d) None of these () Which of the following devices does not require power to forward the signals? (a) Active hub (b) Passive hub (c) Repeater (d) Bridge () How many pins does RJ-45 contain? (a) Two (b) Four (c) Eight (d) Ten () What are the advantages of using a firewall for LAN? (a) Helps to access the message (b) Controlling different resources in a disciplined manner (c) Providing Security for the LAN (d) Both b and c () Which media is used to provide protection to Radio Frequency? (a) UTP (b) STP (c) Coax (d) Fibers () On which OSI layer do Pocket Filtering Firewalls work? (a) at the application layer (b) at the transport layer (c) at the network layer (d) both b and c () Which of the following are stateful packets, if a stateful firewall is to filter connection-oriented packets? (a) UDP (b) ICP Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 41 (c) IP (d) ICMP () Which of the following routers use packet filtering? (a) Application layer firewall (b) Packet filtering firewall (c) Router enhance firewall (d) IP Enabled Firewall () Who among the following can be seen as Security John? (a) INRANET (b) INTERNET (c) DMZ (d) None of these () Which device is used to connect the mobile to the network? (a) PDR (b) PDA (c) PAGER (d) Both B and C () Which of the following is the registered port as per IANA? (a) Port 1 to 255 (b) Port 256 to 1024 (c) Port 1024 to 49151 (d) Port 1028 to 68536 () Which is used to pass through the firewall? (a) TCP (b) IP (c) IPX/SPX (d) NET BEUI () Which protocol is used for E-Mail Traffic? (a) ARP (b) DMS (c) SMTP (d) IM () Which media is used for the installation of the local network? (a) Fiber (b) CAT3 (c) CAT5 (d) Thin Net () Which source and security are generally used for connecting pair-to-pair and wiring for LAN devices? (a) SQL Sever (b) Routers (c) Switches (d) Workstations () When independent servers are placed in a group and the group acts as a single server, it is called a? (a) proxy servers (b) SQL Server (c) server array (d) Server Cluster Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 42 () According to IANA which of the following is known as a registered port? (a) port 1 to 255 (b) Port 255 to 1024 (c) Port 1024 to 49151 (d) All of the above () Which of the following statements are true for firewalls? (a) filtering network traffic (b) hardware and software security (c) follow the rules (d) all of the above () Which of the following statements will be true when static packet filtering is used on a router? (a) It provides job security (b) These packet filtering proxy servers are secure (c) It is more secure than dynamic (d) Both b and c () For what work are firewalls designed? (a) Security exposure is limited (b) Logging in to Internet Activity (c) Helping with the organization's security (d) Protect against virus () Which of the following systems run at the application layer using proxy software? (a) Proxy Nat (b) Proxy Client (c) Client 32 (d) Proxy Server () Which of the following firewalls keeps track of the connection state? (a) application layer firewall (b) router enhance firewall (c) stateful packet filtering firewall (d) packet filtering firewall () What is the minimum number of wires needed to send data over it serial communication link layer? (a) 1 (b) 2 (c) 3 (d) 4 () Which data communication method is used to send data over a serial communication link? (a) simplex (b) half duplex (c) full duplex (d) all of these () Which of the following statements is incorrect? (a) teleprocessing combing telecommunication and DP techniques in online activities. (b) Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line. (c) a half-duplex line is a communication line in which data can move in two directions, but not the same time. (d) batch processing is the preferred processing mode for telecommunication operations. () The interactive transmission of data within a time sharing system may be best suited to….. Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 43 (a) simplex line (b) half duplex lines (c) full duplex line (d) bi-flex lines () Teleprinters…. (a) are used for printing at remote locations, not for input. (b) offer both high-speed operation and a variety of formatting controls. (c) have a printer for output and a keyboard for input (d) are same as teletypes. () Which of the following is an example of a bounded medium? (a) coaxial cable (b) wave guide (c) fiber optic cable (d) all of these () Coaxial cable has conductors with…. (a) a common axis (b) equal resistance (c) the same diameter (d) none of these () The area of coverage of a satellite radio beam is called its…. (a) beam width (b) circular polarization (c) footprint (d) identity () The amount of uncertainty in a system of the symbol is called. (a) bandwidth (b) entropy (c) loss (d) quantum () Buffering is…. (a) the process of temporarily storing the data to allow for small variation in device speeds. (b) a method to reduce cross-talks (c) storage of data within the transmitting medium until the receiver is ready to receive (d) a method to reduce the routing overhead () What is the main difference between synchronous and asynchronous transmission? (a) band width required is different. (b) pulse height is different. (c) clocking is derived from the data in synchronous transmission. (d) clocking is mixed with data in asynchronous transmission. () The transmission signal coding method for T, the carrier is called….. (a) NRZ (b) Bipolar (c) Manchester (d) Binary () In a synchronous modem, the digital-to-analog converter sends a signal to the…… (a) transmission line (b) modulator (c) terminal Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 44 (d) equalizer () Which section of a synchronous modem contains the scrambler? (a) Terminal section (b) Receiver section (c) Control section (d) Transmission section () The synchronous modems are more expensive than the asynchronous modems because…. (a) they must contain clock recovery circuits (b) production volume is larger (c) they must operate on a larger bandwidth (d) They are larger () The receive equalizer reduces delay distortions using a….. (a) difference engine (b) tapped delay lines (c) descrambler (d) gear shift () How much power (approximately) a light-emitting diode can couple into an optical fiber? (a) 1 picowatt (b) 100 microwatts (c) 10 milliwatts (d) 10 watts () Avalanche photodiode receiver can detect bits of transmitted data by receiving. (a) 1 Photon (b) 100 photons (c) 10 photons (d) 200 photons () The loss in signal power as light travels down the fiber is called (a) propagation (b) attenuation (c) scattering (d) absorption () Multiple repeaters in communication satellites are called (a) detector (b) modulator (c) transponders (d) stations () how many bits per symbol are used in the Baudot code? (a) 5 (b) 7 (c) 8 (d) 9 () Which of the following transmission systems provides the highest data rate to an individual device? (a) Digital PBX (b) Computer Bus (c) LAN (d) Voiceband modem () One important characteristic of LAN is… Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 45 (a) parallel transmission (b) low cast access for low bandwidth channel (c) unlimited expansion (d) application independent interfaces () Which of the following is possible in a token passing bus network? (a) Unlimited number of stations (b) Unlimited distance (c) In-service expansion (d) Multiple time-division channels () Which of the following is not a characteristic of the hub architecture of Arc net? (a) Directionalized transmission (b) Alternative routing (c) Zero insertion loss amplifier (d) RIM port isolation () A group of packets from a source through an X.25 packet system to sink. (a) arrive in the same order sent for VC, but not for PVC (b) arrive in the same order sent for PVC, but not for VC (c) arrive in the same order sent for both VC and PVC (d) None of these () How many OSI layers are covered in the X.25 standard? (a) three (b) four (c) two (d) seven () A protocol is a rule governing a time sequence of events that must take place. (a) between peers (b) across an interface (c) between non-peers (d) none of these () What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? (a) 2 (b) 3 (c) 4 (d) 7 () Layer one of the OSI model is……. (a) physical layer (b) link layer (c) transport layer (d) network layer () Establishing a virtual connection is functionally equivalent to …… (a) physically connecting a DTE and DCE (b) connecting a virtual memory (c) placing a telephone call prior to a conversation (d) none of these () What is the main purpose of a data link content monitor? (a) measurement of bit error rate. Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 46 (b) Determine the type of switching used in a data link. (c) Determine the type of transmission used in a data link. (d) Detect problems in protocols. () Protocol converters are …… (a) same as multiplexers (b) same as TDMs (c) usually not operated in pairs (d) usually operated in pairs () Satellite transponders contain …. (a) a receiver and transmitter designed to relay microwave transmission from one point on earth to another (b) a device that echoes the radiation without change from one point on earth to another (c) devices that transform the message sent from one location on earth to a different code for transmission to another location (d) all of these () Satellite transponders. (a) use a higher frequency for reception of radiation from earth stations and lower frequency for transmission to earth stations. (b) use lower frequency reception of radiation from earth stations and higher frequency for transmission to earth stations. (c) use a single frequency for reception and transmission from one point on earth to another (d) are devices that echo the radiation without change from one point on earth to another () Satellite in geosynchronous orbit… (a) remains in a fixed position relative to points on earth (b) can cover about 80 (c) moves faster than the earth’s rotation so that it can cover a larger portion of the earth (d) remains in a fixed position so as the earth rotates it can fully cover the earth. () A spin stabilized satellite. (a) solar cells mounted on a cylinder body that continuously rotate so that about 40a time. (b) gyroscopic action of a spinning satellite to maintain its orientation towards the earth and the sun (c) solar panels whose cells are continually oriented towards the sun (d) both (a) and (b) () What frequency range is most affected by fog and precipitation? (a) 4GHz to 6GHz (b) 6GHz to 10GHz (c) above 10GHz (d) 2GHz to 4GHz () In OSI network architecture, the routing is performed by …. (a) a data link layer (b) network layer (c) transport layer (d) session layer () In OSI network architecture, the dialogue control, and token management are responsibilities of …... (a) data link layer (b) network layer (c) transport layer (d) session layer () Which of the following is not an example of data communication? Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 47 (a) A teletype printing news bulletins. (b) A computer transmitting files to another computer (c) An automatic teller machine checking account balance with the bank’s computer (d) A salesman telephoning orders to the office () The standard ASCII …. (a) is version II of the ASC standard (b) has 128 characters, including 32 control characters (c) is a subset of the 8-bit EBCDIC code (d) is used only in the United States and Canada () Escape sequences (a) use ESC character to indicate the start of a special control sequence (b) are used to switch (escape) between ASCII and EBCDI codes (c) are a popular daydream for inmates (d) none of these () Fibre-optic cables operate at frequencies near……. (a) 20 MHz (b) 200 MHz (c) 2 GHz (d) 800 THz () HF ratio waves follow how many basic paths on leaving the transmitter? (a) Two (b) Four (c) One (d) Many () Digital cellular radio systems…… (a) expand the number of cells. (b) allow multiple subscribers to share the use of cells. (c) allow multiple subscribers to share the use of a common channel within a cell (d) extend transmission distance of subscribers within a cell. () Transmission of binary signals require…… (a) less bandwidth than analog (b) more bandwidth than analog (c) same bandwidth as analog (d) a Licence from the FAA () The standard first-level digital multiplex system in the United States operates at…… (a) 2.048 Mbps (b) 44.736 Mbps (c) 1.544 Mbps (d) 9600 Mbps () The use of Dataphone Digital Services. (a) can be expected to increase (b) provides a higher operating rate than FTI service. (c) can be expected to be replaced by FTI service due to the lower cost of that service. (d) provides a higher operating rate than T () Modulation is……. (a) varying of some parameter of a carrier, such as its amplitude to transmit information. (b) utilization of a single transmission channel to carrying multiple signals. (c) transmission of pulses in DC form over a copper wire. Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 48 (d) none of these. () RS-232, RS-449, RS-530, V-24, and X-21 are examples of? (a) standards for various types of transmission channels. (b) standards for interfaces between terminals and modems. (c) two methods of error detection and correction. (d) standards for end-to-end performance of data communication systems. () V.42 defines…. (a) compatibility with MNP Class 5 data compression. (b) a method of data storage. (c) two methods of error detection and correction. (d) compatibility with MNP Class 7 enhanced data compression. () The cable connecting a DB-9 connector at one end to a DB-25 connector at the other end must cross- connect pin 8 at the BD-9 side to which pin at the DB-25 side. (a) 4 (b) 22 (c) 5 (d) 2 () A smart modem can. (a) detect transmission errors and correct them automatically. (b) correctly answer multiple choice quizzes (c) accept commands from the terminals Via Rs-232 interface. (d) none of these. () Many cables have “RS-232” connectors with some wires crossed or connected to each other because…. (a) there are various RS-232 standards. (b) many computers and peripherals use RS-232 serial interfaces, but not as DTE-to-DCE. (c) asynchronous modem reverses the direction of transmitted and received data from the standard. (d) none of these. () Extended command sets supported by modern modems. (a) are standardized. (b) are prefixed with the letter E. (c) use different commands to control many advanced modem features. (d) can be counted on to provide a high-speed data transfer capability without requiring flow control. () Binary codes are sometimes transformed in modems into. (a) Hexadecimal (b) Huffman codes (c) Gray code (d) Complementary codes () A Western Electric 201 modem operates with a carrier frequency of…. (a) 1000 Hz (b) 1200 Hz (c) 1800 Hz (d) 600 Hz () The CCITT V.26 modem has a modulation rate of ….. (a) 1200 Hz (b) 1200 bands (c) 1560 cps (d) none of these Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 49 () If a modem packs six bits into each signal change and operates at 14,400 bps, it can result in a maximum throughput of. (a) 2,400 bps (b) 4,800 bps (c) 9,600 bps (d) 14,400 bps () A bipolar violation. (a) represents a zero-bit followed by one bit. (b) occurs when two successive pulses have the same polarity and are separated by a zero level. (c) occurs when two successive pulses have the same polarity and are separated by one level. (d) represents one bit followed by a zero bit. () On a digital circuit, the absence of a transmitted signal. (a) has no effect on equipment (b) occurs when a DTE has no data transmit. (c) is compensated for by the transmission of intentional bipolar violations to maintain equipment clocking. (d) occurs only after 9 p.m. () Multiplexing is…. (a) the process of increasing bandwidth on a channel. (b) a technique that enables more than one data source to share the use of a common line. (c) mailing letters at the Post Office. (d) the capability to share frequency by time. () Frequency division multiplexing has essentially been replaced by time division multiplexing is because…. (a) there is more time than frequency. (b) it is difficult to place channels side by side. (c) noise is amplified with voice when an FDM system is used. (d) most available frequencies have been used. () When the amplitude of pulses is varied to represent analog information, the method is called. (a) PCM (b) PWM (c) PAM (d) PPM () PCM sampling rate is 8000 samples per second because….. (a) that represents the maximum rate that technology supports. (b) this rate allows unique values. (c) this rate allows the faithful recontraction of an analog signal. (d) this rate is easily produced by a sampling chip. () In general digital transmission provides a higher level of signal quality than angling transmission because…. (a) repeaters regenerate digital pulses and remove distortion, whereas amplifiers distortion to the signal. (b) digital signals are smaller than analog signals and cannot be easily distorted. (c) analog signals are continuous and are not easily distorted. (d) the digital signal is easier to sample than analog signals. () The D4 framing pattern contains a sequence of …. (a) 24 bits (b) 4 terminals and 8 framing bits. (c) 8 terminals and 4 framing bits. (d) 12 bits Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 50 () Bipolar signaling is used in place of unipolar signaling on T lines because…. (a) bipolar signaling produces twice as many marks as a unipolar signal. (b) it allows transmission at polar locations. (c) bipolar signaling reduces residual DC voltage buildup, allowing a digital signal to be separated from power through the use of a transformer. (d) it allows transformers to be spaced far from one another, which reduces the cost of transmission. () Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undetected error? (a) one bit or any odd number of bits inverted in a block of data during transmission (b) Two bits or any even number of bits inverted in a block during transmission (c) one bit or any odd number of bits inverted in a byte during transmission. (d) Two bits or any even number of bits inverted in a byte during transmission. () RS-232-C. (a) is an interface between two data circuit terminating equipment as exemplified by a local and remote modem. (b) is an interface standard between Data Terminal Equipment and Data Circuit Terminating Equipment’s. (c) specifies only the mechanical characteristics of an interface by providing a 25-pin connector. (d) requires only 7 pins out of 25 in order to transmit digital data over public telephone lines. () The residual error rate is the….. (a) number of bit errors per twenty-four hours of continuous operation on an asynchronous line. (b) probability that one or more errors will be undetected when an error detection scheme is used. (c) probability that one or more errors will be detected when an error detection mechanism is used. (d) signal to noise ratio divided by the ratio of energy per bit to noise per hertz. () Which layer os international standard organization OSI model is responsible for creating and recognizing frame boundaries? (a) physical layer (b) data link layer (c) transport layer (d) network layer () The path or channels over which information moves from one location to another make-up is called. (a) lines (b) remote computers (c) modems (d) file transfer () Communications software package enable users to access services such as… (a) electronic mail (b) electronic bulletin boards (c) video channels (d) both (a) and (b) () Which of the following are parameters that must be set in your software and modem before you can begin communications? (a) speed (b) character format (c) duplex (d) both (a) and (b) () The forms of information that may be sent electronically are…. (a) voice (b) data Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 51 (c) video (d) all of these () The basic component necessary for communication is a …… (a) computer terminal (b) modem (c) communications software (d) all of these () The physical path that is used for sending information is called. (a) channel (b) line (c) link (d) all of these () A half-duplex communication channel permits information to travel… (a) both ways at once (b) both ways, but not at once (c) one direction only (d) at timed intervals () Carrier is…. (a) one or more conductors that serve as a common connection for a related group a device. (b) a continuous frequency capable of being modulated or impressed with a second signal (c) the condition when two or more sections attempt to use the same channel at the same time. (d) a collection of interconnected functional units that provides a data communications service among stations attached to the network. () Which of the following methods provides dedicated communications channel between two stations? (a) Switch network (b) Circuit switching (c) Packet switching (d) None of these () Which of the following techniques is used for allocating capacity on a satellite channel using fixed assignment FDM? (a) Amplitude modulation (b) Frequency-division multiple access (c) Frequency modulation (d) Frequency shift keying () An error detecting code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is called. (a) cyclic redundancy check (b) checksum (c) error detecting code (d) error rate () Internet address can be used to refer to networks as well as individual hosts. By convention, the network address has hosted with all bits. (a) 0 (b) 1 (c) combinations of 0 and 1 (d) none of these () B, Zero Code Suppression is a technique that … (a) allows data to flow on a digital line Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 52 (b) ensures that each byte has at least one-mark bit (c) it is the latest clear channel encoding technique developed by Bell Laboratories (d) provides a clear channel transmission capability, allowing 64 kbps data transmission on a voice4 channel () International bipolar violations…… (a) represent coding errors caused by line impairments (b) are used to convey information or maintain a minimum number of ones on a digital line (c) result in successive marks having opposite polarities (d) occur only in the laboratory () Demultiplexing by a time division multiplexer occurs based on the……. (a) the position of data within a frame (b) the position of a frame within a group of frames (c) the activity of a connected device (d) the priority assigned to a connected device () They key to the operation of ADPCM is…. (a) fast sampling (b) high amplitude (c) adaptive predictor (d) digitization () The maximum modem operating rate that can be transported by ADPCM is…… (a) 300 bps (b) 1200 bps (c) 4800 bps (d) 9600 bps () Higher the rate an analog signal is sampled (a) smaller the difference between sampled amplitudes (b) larger the difference between sampled amplitudes (c) greater the noise level (d) more bits required to represent the sample () Common CVSD digitization rates are…. (a) 8 and 64 kbps (b) 65 and 128 kbps (c) 4 and 8 kbps (d) 32 and 16 kbps () A voice/data multiplexer will not flow control…. (a) voice (b) data (c) time slots (d) odd channels () The core for an optical fiber has…. (a) lower index of refraction than air (b) lower index of refraction than the cladding (c) a higher index of refraction than the cladding (d) none of these () Over a period of 30 years, a kilometer of fiber optic cable is likely to be broken. (a) not at all (b) once (c) 10 times Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 53 (d) 2 or 3 times () Deposition of dopants on fiber preforms is done by…. (a) outside vapor deposition (b) axial vapor deposition (c) inside vapor deposition (d) all of these () One unsolved problem with satellite system is…. (a) coverage (b) privacy (c) bandwidth (d) access () When the index of refraction is greater in Material 1 than it is in Material 2, the velocity of propagation in Material 1 compared to Material 2 is…… (a) equal or greater (b) greater (c) lesser (d) equal () The different angles of entry of light into an optical fiber in which the diameter of the core is many times the wavelength of the light transmitted are called. (a) Emitters (b) Modes (c) Sensors (d) Refractors () In single-mode fiber, a large fraction of the power is propagated in the…… (a) sheath (b) core (c) cladding (d) air () The FT3C light wave system contains which of the following number of fibers? (a) 12 (b) 144 (c) 128 (d) 64 () A key advantage of Sonet is its capability to enable…. (a) data to be carried at high operating rates. (b) interoperability of optical transmission between interexchange carriers and telephone companies (c) routing of data to the home (d) interconnection of private networks () The number of bytes of overhead in a Sonet frame is …. (a) 90 (b) 9 (c) 27 (d) 87 () The number of OC-1 signals within an SONET OC-3 signal is…. (a) 3 (b) 6 (c) 9 (d) 12 Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 54 () In the current frequency assignments, how many frequency bands are there for the uplink frequencies? (a) 16 (b) 8 (c) 4 (d) 2 () The capability to provide consumers with video-on-demand. (a) will-occur by the year 2000. (b) depends on the results of field trials (c) is based on fiber to the home (d) is based on the use of satellites () Communications protocols always have a …. (a) set of symbols (b) the start of header (c) the special Flag symbol (d) BCC () In the X MODEM protocol, the sender waits for what character from the receiver before beginning transmission? (a) WACK (b) ACK (c) RVL (d) NAK () Under the Y MODEM protocol, block 0 is used to transport. (a) error-recovery information (b) 100 characters (c) information about the file to be transferred (d) 64 characters () A streaming protocol…. (a) provides error detection (b) does not provide error detection (c) uses 64-byte blocks (d) requires a manual setup’ () An example of a sliding windows protocol is…. (a) XMODEM (b) YMODEM (c) YMODEM-G (d) WXMODEM () Auto dialing allows: (a) to dial phone numbers by typing them on the keyboard (b) a personal computer to answer incoming calls without human assistance (c) both (a) and (b) (d) None of these () If we get both local and remote echoes, every character we type will appear on the screen. (a) once (b) twice (c) three times (d) none of these () Synchronous protocols. Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 55 (a) transmit characters one at a time. (b) allow faster transmission than asynchronous protocols do. (c) are generally used by personal computers. (d) all of these () To avoid transmission errors, a check figure is calculated by. (a) transmitting computer (b) receiving computer (c) a personal computer (d) all of these () To set up a bulletin board system we need a … (a) smart modem with auto answer capabilities. (b) telephone line (c) personal computer (d) all of these () Information utilities. (a) are usually free (b) can be used to send electronic mail. (c) are run by companies that sell time on their time shared mainframe computers (d) Both (a) and (b) () An information utility can offer a user.. (a) instant bond and stock quotations. (b) news stories from wire services (c) complete airline schedules for all domestic flights (d) all of these () An encyclopedic database is…. (a) an information utility that specializes in storing and searching information (b) generally free (c) easy for beginners to use (d) all of these () The economics of computing dictates…. (a) sharing peripherals and data (b) giving processers to people who need processing time and instantaneous response (c) both (a) and (b) (d) all of these () To connect a computer to a device in the same room, we might be likely to use a…. (a) coaxial cable (b) dedicated line (c) ground station (d) all of these () Many low-speed channels are interwove into one high-speed transmission by….. (a) time-division multiplexer (b) frequency-division multiplexer (c) both (a) and (b) (d) none of these () A central computer surrounded by one or more satellite computers is called. (a) bus network (b) ring network (c) star network Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 56 (d) none of these () The most flexibility how devices are wired together is provided by… (a) bust networks (b) ring networks (c) star networks (d) T-switched networks () A network that requires human intervention to route signals is called. (a) bus network (b) ring network (c) star network (d) T-switched network () A packet-switching network (a) is free (b) can reduce the cost of using an information utility (c) allows communication channels to be shared among more than one user (d) both (b) and (c) () Local area network can transmit…. (a) faster than telecommunications over public telephone lines. (b) slower than telecommunications over public telephone lines. (c) using twisted-pair wiring or coaxial cables (d) both (a) and (c) () A local area network…. (a) that connects thirty personal computers can provide more computing power than a minicomputer. (b) cannot become bogged down like a mainframe if the load is too high.. (c) both (a) and (b) (d) none of these. () The cheapest modems can transmit….. (a) 300 bits per second (b) 1200 bits per second (c) 2400 bits per second (d) none of these () Terminal emulation allows…. (a) a dumb terminal to pretend that it is a personal computer. (b) a personal computer to pretend that it is a computer terminal (c) a dumb terminal to produce a local echo (d) both (a) and (b) () Sending a file from personal computer’s primary memory or disks to another computer is called.. (a) uploading (b) downloading (c) logging on (d) none of these () Users use often.........for access to mainframe or supercomputer (a) terminal (b) node (c) desktop (d) hand held () To create a............personal computer can cannot together. Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 57 (a) server (b) super computer (c) enterprise (d) network () What is used to identify whether a data word has an odd or even number of 1's? (a) Cary bit (b) Zero bit (c) Parity bit (d) Sign bit () A combination of hardware and software, which provides facilities sending and rationing of information between computer devices (a) Network (b) Peripheral (c) Expansion slot (d) Digital device () Server is a computer which provides resources other computers commuted in a............ (a) network (b) mainframe (c) super computers (d) clients () LAN, WAN and MAN are computer networks covering different are Their first alphabets L, W and M respectively stand for (a) Local, Wide and Metropolitan (b) Long, Wireless and Metropolitan (c) Local, world and Middle (d) Least, Wireless and Maximum () In.......topology, network comments are connected by only one cable (a) Star (b) Ring (c) Bus (d) Mesh (e) Mixed () Which of the following is used for modulation and demodulation? (a) Modem (b) Protocols (c) Gateway (d) Multiplexer () On the large scale, geographically spreaded LAN's office are connected by using (a) CAN (b) LAN (c) DAN (d) WAN (e) TAN () Which of following is a small single site network (a) LAN (b) DSL (c) RAM (d) USB (e) CPU Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 58 () Computer connected with LAN...... (a) work fast (b) go online (c) can e-mail (d) can share information or peripheral devices () LAN is useful for....... (a) railway (b) bank (c) businessman (d) transport () Telephone broadcast is an example of..........transmission. (a) Simplex (b) Half duplex (c) Full duplex (d) Automatic () A parity bit is: (a) used to indicate upper case letters (b) the last bit in a byte (c) the first bit in a byte (d) use to detect errors () The first computer network of the world is......... (a) I net (b) NSF net (c) Arpanet (d) V net () Which of the following techniques needs source device and destination device in line of sight for data transfer? (a) LAN (b) Bluetooth (c) WAN (d) Infrared (e) All () When more computers are connected at one place, it is called (a) LAN (b) WAN (c) Infinite (d) WON (e) DON () Bank's ATM facility is an example of......... (a) LAN (b) WAN (c) Mixed networking (d) Multipurpose (e) None of these () Which of the following is not of the same group? (a) Internet (b) Apple talk (c) Bus Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 59 (d) Ring (e) None of these () WAN is not useful for - (a) Ministry of Foreign affair (b) Foreign banks (c) Municipality (d) Airport (e) None of these () Which of the following is the fastest media of data transfer? (a) Fiber optic (b) Co-axial cable (c) Untwisted wire (d) Telephone lines () Computer Network is (a) Sharing of resources and information (b) Collection of hardware components and computers (c) Interconnected by communication channels (d) All of the above () The full form of NIC (a) National Interface Card (b) Network Inter Connection (c) Network International Connection (d) Network Interface Card () The speed at which the monitor accepts data is called (a) Response time (b) Interlacing (c) Bandwidth (d) Scanning () The layer is the layer closest to transmission medium (a) Data link (b) Transport (c) Network (d) Physical () ____ is used to refer amount of things. (a) Number representation (b) Number algorithms (c) Number system (d) Number words () Which of the following is required to communication between two computers? (a) Communication hardware (b) Communications software (c) Protocol (d) All of above including access to transmission medium () A communication processor that connects dissimilar networks by providing the translation from one set of protocols to another i s (a) Modem (b) Router (c) Bridge Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024 60 (d) Gateway Topology: () Physical or logical arrangement of network is __________ a) Topology b) Routing c) Networking d) Control 2. Which network topology requires a central controller or hub? a) Star b) Mesh c) Ring d) Bus 3. _______ topology requires a multipoint connection. a) Star b) Mesh c) Ring d) Bus 4. Data communication system spanning states, countries, or the whole world is ________ a) LAN b) WAN c) MAN d) PAN 5. Data communication system within a building or campus is________ a) LAN b) WAN c) MAN d) PAN 6. WAN stands for __________ a) World area network b) Wide area network c) Web area network d) Web access network 7. In TDM, slots are further divided into __________ a) Seconds b) Frames c) Packets d) Bits 8. _____ is the multiplexing technique that shifts each signal to a different carrier frequency. a) FDM b) TDM c) Both FDM & TDM d) PDM Compiled By: Dr. Faisal Afridi; Dated: 04-01-2024

Use Quizgecko on...
Browser
Browser