0% found this document useful (0 votes)
5 views5 pages

CN_BitBank

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

1. Identify the layer which provides service to the user.

A)Session layer B)Application layer


C) Presentation error D) Physical layer

2. Radio waves are _________.


A) unidirectional B) omni-directional C) bidirectional D) none

3. A _______ is a data communication system within a building, plant, or campus, or


between nearby buildings.
a) LAN b) MAN c)WAN d) None of the above

4. Which topology requires a central controller or hub?


a) Star b) Bus c) Ring d) Mesh
5. How is a single channel shared by multiple signals in a computer network?
A) Multiplexing B) Phase modulation
C) Analog modulation D) Digital modulation
6. Identify the incorrect network topology,
A) Bus B)Star C) P2P D) Ring

7. What does TCP/IP stand for?


A) Telephone control protocol / Internet Protocol
B) Transmission control protocol/Internet protocol
C) Transmission control protocol/International protocol
D) None

8. Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above

9. Which type of topology is best suited for large businesses which must carefully
control and coordinate the operation of distributed branch outlets?

A) Ring
B) Local area
C) Hierarchical
D) Star
10. "Parity bits" are used for which of the following purposes?
A) Encryption of data
B) To transmit faster
C) To detect errors
D) To identify the user

11. What was the name of the first network?


a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET

12. Which of the following tasks is not done by data link layer?
a) framing
b) error control
c) flow control
d) encoding

13. The network layer is concerned with __________ of data.


a) bits
b) frames
c) packets
d) bytes

14. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) logical addressing
d) error control
15. ICMP is primarily used for __________
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing

16. Which of the following algorithm is not a routing algorithm?


a) Dijkstra’s algorithm b) distance vector routing
c) link state routing d) all of the mentioned
17. User datagram protocol is called connectionless because _____________
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
18. which layer in OSI Model responsible for service to service delivery?
a) Application Layer b) Transport Layer c) Network Layer d) Physical
Layer
19. Which of the following protocol is flow control protocol ?

a) Stop-and-wait ARQ b) Selective Repat ARQ


c) Go-back-N ARQ d) all of the above
20. Which of the following protocol is not used in Application layer
a) SNMP b) HTTP c) FTP d) TCP
21. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
21. Electronic mail uses which Application layer protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
22. The application-level protocol in which a few manager stations control a set of agents is
called ______
a) HTML
b) TCP
c) SNMP
d) SNMP/IP
23. In TCP, sending and receiving data is done as _______
a) Stream of bytes
b) Sequence of characters
c) Lines of data
d) Packets
24. TCP groups a number of bytes together into a packet called _______
a) Packet
b) Buffer
c) Segment
d) Stack
25. To achieve reliable transport in TCP, ___________ is used to check the safe and sound
arrival of data.
a) Packet
b) Buffer
c) Segment
d) Acknowledgment
26. Which of the following is false with respect to UDP?
a) Connection-oriented
b) Unreliable
c) Transport layer protocol
d) Low overhead
27. The term that is used to place packet in its route to its destination is called __________
a) Delayed
b) Urgent
c) Forwarding
d) Delivering
28. In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
a) Graph
b) Tree
c) Network
d) Link
29. LSP stands for __________
a) Link Stable Packet
b) Link State Packet
c) Link State Protocol
d) Link State Path
30. The domain name system is maintained by _______
a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned
31. The technique of temporarily delaying outgoing out going acknowledgements so that they
can be hooked onto the next outgoing data frame is called
a) Piggybacking b) Cyclic Redundancy Check
c) Sliding Window d) None of the mentioned
32. Which one of the following is the multiple access protocol for channel access control?
a) CSMA/CD b) CSMA/CA c) Stop-and-wait d) both a & b

1. Topology refers to the physical or logical arrangement of a network.


2. A point-to-point connection provides a dedicated link between two devices.
3. Wavelength Devision Multiplexing(WDM) is an analog multiplexing technique to
combine optical signals.
4. Protocol define a set of rules.
5. Simplex type of transmission mode is involved in communication between a
computer and a keyboard.
6. Mesh topology requires a multipoint connection.
7. A computer network that spans a relatively large geographical area is called WAN
8. A conversation on walkie-talkie is a Half-Duplex data flow.
9. Hamming code with dmin=3 detect two errors and corrects one error.
10. Simple parity bit detects odd error.
11. DNS maps domain name with logical (IP Address) address.
12. Automatic repeat request error management mechanism is provided by logical link
control sublayer
13. TCP is a connection oriented protocol.
14. FTP uses Two parallel TCP connections to transfer a file.
15. Socket address is a combination of IP address and Port address.
16. IP stands for Internet Protocol.
17. SCTP takes best features from TCP protocol and UDP protocol.
18. Sliding Window size (Ssize ) in Selective-Repeat ARQ Protocol 2m-1.
19. Network Layer deals with Logical address.

You might also like