CS610 final term past papers

We have huge range of cs610 virtual university past papers available to download. You can also download cs610 midterm papers and cs610 final term papers of previous years. Please Click below cs610 past papers to download:

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network


Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network
Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network Download cs610 mid term 1.pdf CS610 final term past papers CS610 - Computer Network

CS610 MCQs Mega File Solved with References by vuislamabad.com

CS610 – Computer NetworkQuiz No.1 Nov 16, 2019
—— Program sends a message to a remote computer and reports whether the computer
responds.
Ping
Ping
Traceroute
ICMP
Non of the given
———- was especially concerned about the lack of high powered computers.
ARPA
IEEE
EIA
Non of the given

The term ——– is used to denote the definition of a packet used with a specific type of
network.
Packet
Frame
Data
None of the given

Computer networks are often called ————– because they use packet technology.
Ethernet
Switch networks
Packet networks
None of the given

————– have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
None of given

Most LANs that employ ring topology use an access mechanism known as——-
CSMA/CD
CSMA/CA
TOKEN PASSING
None of the given

IEEE LLC/SNAP header is ——–, which is used to specify the type of data.
8 octets
8 bytes
8 bits
None of the given

Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
10 Base 2
10 Base 5
10 Base T
None of the given

An interface for twisted pair Ethernet must have an ____________ connector , and must
generate signals according to the_____________ specification.
RJ-45, 10 Base T
RJ-45, 10 Base 5
BNC, 10 Base 2
BNC, 10 Base T

A bridges function in the _________ layers(s).
Physical (MAC)
Data link
Network
Physical (MAC) and Data link

A Bridge can ________
Filter a frame
Forward a frame
Extend a LAN
Do all the above

A Bridge forwards or filters a frame by comparing the information in its address table to
the frame’s__________
Layer 2 source address
Source node’s physical address
Layer 2 destination address
Layer 3 destination address

________ computes shortest paths in a graph by using weights on edges as a measure of
distance.[/b]
Greedy algorithm
Distance vector algorithm
Dijksta’s algorithm
Non of the given

___________ is used for audio and video, since these have predefined maximum data
rates
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given
———- is also called self healing network   ATM
FDDI
Token Ring
None of the given

Most LANs that employ ring topology use an access mechanism known as——-
Select correct option:
 CSMA/CD
 CSMA/CA
 CSMA
 TOKEN PASSING

An ————method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
Explicit frame type
Ideal frame type
Implicit frame type
None of the given

Hardware that calculates a CRC uses two simple components.
AND unit and XOR unit
Shift register and XOR unit
Shift register & AND unit
Shift register and shift XOR unit

The Ethernet standard specifies that frames are sent using the ——–
Differential Manchester
Not Return to Zero (NRZ)
ManchesterEncoding
Return to Zero (RZ)

When an application ———— data, it makes a copy of the data available to all other computers on the network.
Select correct option:
Broadcasting
 Multicasting
 Unicasting
 None of the given

LAN interface may use ———- to copy frame data directly from main memory.    DMA
FDDI
CSMA/CD
None of the given

LAN and WAN are classified according to their………
Select correct option:
Size
Connectivity
Medium
Mobility For how much time would other computers be in wait while one computer was transferring 56MB file with transmission speed of 56Kbps
Select correct option:
10 Sec
11 Sec
12 Sec
13 Sec

A network uses _______ to arrange computers to be connected in a single closed loop.
Select correct option:
Star Topology
Dual Ring Topology
Ring Topology
Bus Topology
CBR stands for…………….Constant Byte RateConstant Bit RateConnection break RecoveryNone of the above
The routing table in interior and exterior switches has which one of the following?It should have next hop for each possible destinationThe next hop in table must be on shortest path to destinationBoth (a) and (b)None of the above
Which one of the following is a method for computing routing table information?Manual entryStatic routingBoot time routingNone of the above
Which one of the following is the responsibility of Djikstra’ algorithm?To compute the shortest path between two nodesTo extract next hop information from path informationTo insert next hop information into routing tableAll of the above

Routing table is used to keep the information about…………….DestinationMedium of transmissionRouters used in networkAll of the above
Frame relay is………………….Connection oriented serviceConnectionless serviceIt is typically ranges from 5Mbps to 1000Mbps.None of the above
Which of the following is not a guided medium?Twisted-paircable Fiber-opticcable AtmosphereCoaxial cableWhich of the following statement is wrong regarding PVC?PVC last as long as the customer pay the periodic fee for its use.Forwarding tables are automatically restored after pow er of equipment failure.Forwarding table entries for PVC’s are dynamically configured.All of the above are wrong
Which of the following statement is true regarding ATM?ATM is a single technology that is designed to meet the goals of both LANs and WANs.ATM uses the concept of connection-oriented networking.Both (a) and (b)None of the above
Djikstra’s algorithm is used to compute the……………….shortest path between two nodesnumber of nodes used in the networkdistance between different nodesnone of the above
_________ is used to attach two autonomous systems.
Select correct option:

BGP
IGP
EGP
none of the given

Due to revolutionalization of IP-V6 the speed has increased from _______
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given
Whenever it handles a packet, IP software needs to separate the destination address into a prefix.
Select correct option:
True
False

TTL stands for __________
Select correct option:
Time to Learn
Time to Leave
Time to Live
none of the given

IGPs stand for _________
Select correct option:

Internal Gateway Protocols
Interior Gateway Protocols
Intermediate Gateway Protocols
None of the given
_____________identifies which application program on receiving computer should receive the data
Select correct option:
Logical address
Source port
Destination Port
None of the given

__________________encapsulates IP datagram as data area in hardware frame.
Select correct option:
Network Interface Layer
Datalink Layer
Network Layer
None of the given

Class A mask is 255.0.0.0 which is used for ________________
Select correct option:
Unicasting
Multicasting
Subnetting
All of the given
class A mask is 255.0.0.0 which is used for subnetting.
NAT is not useful at a residence with Cable Modem or DSL connectivity.
Select correct option:
True
False
Autonomous System chooses a routing protocol to exchange routing information which is passed before being summarized to another group.
Select correct option:
True
False

______ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given
The process of using a routing table to select a next hop for a given datagram is called_________.
Select correct option:
Encapsulation
Reassembling
Routing or forwarding
None of the given

The process of learning the path MTU is known as path MTU discovery.
Select correct option:
True
False

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ________ possible sizes.
Select correct option:
three
two
four
five
End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given

EGP stands for _________
Select correct option:
Extension Gateway Protocol
Exterior Gateway Protocol
Explicit Gateway Protocol
none of the given

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True
False

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
Select correct option:
16-bit
48-bit
64-bit
128-bit
Reliability is not the responsibility of the Transport layer.
Select correct option:
True
False
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
96
100
120
none of the givenNAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
Select correct option:
True
False
TCP uses the term segment to refer to a ________.
Select correct option:

packet
message
both (a) and (b)
None of the givenboth a and b?
The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:
True
False
______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FLAGMENT OFFSET
IDENTIFICATION
None of the given
IP datagram can contains ________ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given
The amount of buffer space available at any time is called the window.
Select correct option:
True
False 
_______ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given

_______ protocol uses three way handshake to begin a connection.
Select correct option:

UDP
TCP
IP
none of the given
Typical internet routing uses uses a combination of two metrics__________________.
Select correct option:
routing metrics
administrative cost and routing metrics
hop cost
administrative cost and hop count
Question # 14 of 20
Network Address and Port Translation (NAPT) is by far the most popular form of _______
Select correct option:
Network Address Transmission
Network Address Translation
Network Address Transformation
None of the given 
The routers within an autonomous system use a _____________ to exchange routing information.
Select correct option:
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True
False 
The Network Layer Protocol ICMP stands for____________
Select correct option:
Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given 
The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given
TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False

In Direct point to point communication adding the Nth computerrequires___________ new connections.N2N-1N2 –N)/2None of the given

Most LANs that employ ring topology use an access mechanism knownas_______ring topology use token passing forsynchronized access to the ring
Computers attached to an ether use —— in which a computer waits for theether to be idle before transmitting a frame.CSMA/CDCSMA/CATOKEN PASSINGNone of the given
FDDI can transmits data at a rate of ___________________100 million bits per second100 million bits per second100 million bits per secondNone of the given________________ has advantages arisen from the size and ease ofcomputation.CRCParityChecksumsNone of given

AUI cable connects from NIC to—————Select correct option:BNC ConnectorRJ-45 ConnectorTransceiverNone of the above

As a result of ARPA research the first network was established which was named as Select correct option:INTERNETWORKINGARPNETARPANETPACKET NETWORK

A ———- provides mechanism that automatically assignes a physical address to a station when the station first boots. Select correct option:Static ad Configurableaddressing scheme
polygons are basically concave polygons that may have self-intersecting edges.ComplexHybridConvexConvex and HybridDynamic addressing scheme
An ___________method, the network hardware designers specify how typeinformation is included in the frame and the value use to identify various frame Local Talk is a LAN technology that employsExplicit frame type
Ideal frame type
Implicit frame type
None of the given

In Point-to-Point topology there are two topologies.Tree and RingStar and RingStar and TreeNone of the given
The topology each computer is connected to a central hub is calledSelect correct option:Ring topologyStar topologyTree topologyMesh topology

The basic responsibility of NIC is —————- Select correct option:To access mediumNetwork To resource allocationTo access memoryAll of above

Currently the original Ethernet hardware operates at a rate of ——–Select correct option:10 Mbps100 Mbps1000 Mbps3 Mbps

The Gigabit Ethernet hardware operates at a rate of_________10 Mbps100 Mbps1000 Mbps
The number of connections needed for N computer in direct point to pointcommunication is equal to:(N2-N)/2N (N-1)N2None of the given
The length of the format of hardware address isSelect correct option:One to ten bytesOne to five bytesOne to six bytesNone of the given
Star topolgy is the kind ofTree topologyPoint-to-point topolgyBroadcast topolgyRing topology

Local Talk is a LAN technology that employs________Bus topologyRing topologyStar topologyNone of the givenThe network occupies larger areas like cities & countries is calledSelect correct option:LANWANMANAll of the above
Computer networks are classified by…….factors234 5

Computers attached to an ethernet use ________in which a computer waits forthe other to be idle before transmitting a frame.CSMA/CDCSMA/CATOKEN PASSINGnone of the given
Point-to-point topology isSize BasedMobility BasedConnectivity BasedMedium Based
NIC connection in a physical network is known as——————–Select correct option:LAN wiring schemeWAN wiring schemeColor wiringNone of above
A_______ relies on the hardware manufacturer to assign a unique physicaladdress to each network interface.Static addressing schemeDynamic addressing schemeConfigurable addressing schemeNone of the given

The main functions of NIC are ———————CRC Errorcorrection AddressrecognitionAll of above
FDDI can transmits data at a rate of ___________________100 million bits per second100 million bits per second100 million bits per secondNone of the given
Wireless LAN use the ——– as a media access methodSelect correct option:CSMA/CDCSMA/CATOKEN PASSINGCSMA
A_______ relies on the hardware manufacturer to assign a unique physicaladdress to each network interface.Static addressing schemeDynamic addressing schemeConfigurable addressing schemeNone of the givenWireless LAN use the ——– as a media access methodSelect correct option:CSMA/CDCSMA/CATOKEN PASSINGCSMA
According to their size there are…………classifications of networks. Select correct option:23 4 5

As a result of ARPA research the first network was established which was named as Select correct option:INTERNETWORKINGARPNETARPANETPACKET NETWOR

———- performs the matching between destination address and MAC address of machine.Select correct option:Hardware addressLAN interfaceDMANone of above
An ___________method, the network hardware designers specify how typeinformation is included in the frame and the value use to identify various frametypes.Explicit frame typeIdeal frame typeImplicit frame typeNone of the given

The demand of sharing is very high because many computers need to use the shared networks.Select correct option: WAN networks Shared networks Unshared networks LAN networks
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.DMA(Direct Memory Access)MultiplexerTransceiverNone of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:broadcast network

Thick Ethernet is known as—————— Select correct option:10 base 510 base T10 base 10010 base 1

The first automated tool required to see whether the given computer is online or not wasSelect correct option:Probing programPING programstatus programNone of the above
The basic responsibility of NIC is —————-Select correct option:To access medium/networkTo resource allocationTo access memoryAll of above

No error detection scheme is perfect because transmission errors can affect _________.Select correct option:DataAdditional InformationAdditional information & dataTransmission medium
————– has advantages arisen from the size and ease of computation.Select correct option:CRCParityChecksumByte Stuffing
The third field of the header consists of —— bit Ethernet frame type.Select correct option:4832168The Ethernet standard specifies that frames are sent using the ——–Select correct option:Differential ManchesterNot Return to Zero (NRZ)Manchester EncodingReturn to Zero (RZ)LAN that use ATM technology have a ————Select correct option:Bus topologyStar topologyRing topologyMesh Topology
Hardware that calculates a CRC uses two simple components.Select correct option:AND unit and XOR unitShift register and XOR unitShift register & AND unitShift register and shift XOR unit
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.Select correct option:DMA (Direct Memory Access)MultiplexerTransceiverNone of the given
Fixed network is a type of networks which is classified with respect to the………..factorSelect correct option:SizeConnectivityMediumMobility
Network interface card acts like a (an) ———–Select correct option:Input/output deviceInput deviceOutput deviceAll of above
IEEE LLC/SNAP header is ——–, which is used to specify the type of data.Select correct option:8 octets8 bytes8 bitsNone of the above
Most LANs that employ ring topology use an access mechanism known as——-Select correct option:CSMA/CDCSMA/CACSMATOKEN PASSING
The Gigabit Ethernet hardware operates at a rate of ________10 Mbps100 Mbps1000 MbpsNone of the given
A network uses ———— if all computers attach to a central pointSelect correct option:Ring TopologyStar TopologyHub TopologyBus Topology
———- is also called self healing networkSelect correct option:ATMFDDIToken RingNone of the given
———- which is designed to help detect transmissions errors, send one extra bit of information with each character.Select correct option:ChecksumCRCParityVRC
Hardware addresses must be ———- on a LAN.Select correct option:CommonUniqueA ———- relies on the hardware manufacturer to assign a unique physical address to each network interface.Select correct option:Static addressing schemeConfigurable addressing schemeDynamic addressing schemeNone of the given
The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind ofSelect correct option:Broadcast networkPoint-to-Point network
1_Which of the following statement is true regarding Link-state routing? 
Network topology is separated from route computation.
Each switch builds its own routing tables.
Link-state routing uses Djikstra’s algorithm.
All of the above = Answer

2_Which one of the following is a property of dynamic routing?
Select correct option:
It is inflexible
It has low network overload
It can work around network failure
All of the above
 3_All destinations on same switch have same
Router
Information
Next hop

None of the above

4_A _____________ address-binding table is used for each physical network.
Select correct option:
 new
 similar
 separate

 old

5_Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.
55
53
52

51

6_Mapping between a protocol address and a hardware address is called Address Resolution.

true
false

7_The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.
Select correct option:
True

False

8_Dotted decimal represents each octet in ________ and uses a dot to separate octets.

binary
decimal   lec25
hexadecimal
Octal ·         
4TH SEM
Emaan..! . January 28, 2014 at 11:10amMostly Quizz were from here..

Routing table is used to keep the information about…………….
Destination
Medium of transmission
Routers used in network
All of the above

Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above

The maximum cable length of a LAN is _____
Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these

Jitter is significance for ——————
Voice
Video
Data
All of above

The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above

Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above

If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0

Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.
55
53
52
51

Which of the following statement is true regarding ATM?
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above

Frame forwarding of a bridge is based on _________.
Select correct option:
Layer 3 source address
Layer 3 destination address
Layer 2 destination address
Layer 2 Source address

The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above

Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above

According to a bridges
Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment

What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?
500 MHz
550 MHz
600 MHz
650 MHz

Asynchronous Transfer Mode uses the concept of …………..
Connection-less network
Connection-oriented network
The fiber-modem converts data into _________ then transmits cover the optional fiber
Pulses of light
Electrons
Electromagnetic signals
None of these

 How many methods exist for computing routing table?
5
4
3
2

To span long distance or many computers, networks must replace shared medium with ………..
Segment transformation
Fiber optics
Packet switches
None of the above

Which of the following statement is true regarding Distance-vector routing?
It is very simple to implement.
Packet switch updates own routing table first
It is used in RIP
All of the above

What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?
100 MHz
150 MHz
200 MHz
250 MHz

CBR stands for…………….
Constant Byte Rate
Constant Bit Rate
Connection break Recovery
None of the above

The routing table in interior and exterior switches has which one of the following?
It should have next hop for each possible destination
The next hop in table must be on shortest path to destination
Both (a) and (b)
None of the above

Which one of the following is a method for computing routing table information?
Manual entry
Static routing
Boot time routing
None of the above
Which one of the following is the responsibility of Djikstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above

Routing table is used to keep the information about…………….
Destination

Medium of transmission
Routers used in network
All of the above

Frame relay is………………….
Connection oriented service
Connectionless service
It is typically ranges from 5Mbps to 1000Mbps.
None of the above

Which of the following is not a guided medium?
Twisted-pair
cable Fiber-optic cable
Atmosphere
Coaxial cable

Which of the following statement is wrong regarding PVC?
PVC last as long as the customer pay the periodic fee for its use.
Forwarding tables are automatically restored after power of equipment failure.
Forwarding table entries for PVC’s are dynamically configured.
All of the above are wrong

Which of the following statement is true regarding ATM?
ATM is a single technology that is designed to meet the goals of both LANs and WANs.
ATM uses the concept of connection-oriented networking.
Both (a) and (b)
None of the above

Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above

If a link or a packet switch fails then which one of the following would possibly be happened?
Link would be reestablished
Request to change failed hardware would appear
The packet switch will modify the tables
None of the above

The routing contains information about immediately around it
Topology of the network
Destination
Both of the above
None of the above

SMDS is ……………………
Connectionless service
Connection oriented service
Used for delivering blocks of data
None of the above

The process of forwarding the packets of information is called
Routing
Switching
Communication
None of the above

The sharing of a medium and its link by two or more devices is called
modulation
encoding
line discipline
multiplexing

Which multiplexing technique transmits analog signals?
FDM
TDM
WDM
(a) and (c)

Which multiplexing technique transmits digital signals?
FDM
TDM
WDM
None of above
Which multiplexing technique shifts each signal to a different carrier frequency?
FDM
TDM
Both (a) and (b)
None of above

In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
n
n+1
N-1
O to n

Which multiplexing technique involves signals composed of light beams?
FDM
TDM
WDM
None of above

_________ Utilization is the use of available bandwidth to achieve specific goals.
Frequency
Bandwidth
Amplitude
None of the above

________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
Efficiency; privacy and antijamming
Privacy and antijamming; efficiency
Privacy and efficiency; antijamming
Efficiency and antijamming; privacy

________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
1; n
1:1
n;1
n;n

The word ______ refers to the portion of a _______ that carries a transmission.
channel; link
link; channel
line; channel
line; link

 ______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.
TDM
FDM
Both (a) or (b)
Neither (a) or (b)

FSM is an _________technique.
Analog
Digital
Either (a) or b)
None of the above

____ is designed to use the high bandwidth capability of fiber-optic cable.
FDM
TDM
WDM
None of the above

_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
FDM
TDM
WDM
None of the above

____ is designed to use the high bandwidth capability of fiber-optic cable.
FDM
TDM
WDM
None of the above

______ is an analog multiplexing technique to combine optical signals.
FDM
TDM
WDM
None of the above

_____ is a digital process that allows several connections to share the high bandwidth of a link.
FDM
TDM
WDM
None of the above

_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
FDM
TDM
WDM
None of the above

Djikstra’s algorithm is used to compute the……………….
shortest path between two nodes
number of nodes used in the network
distance between different nodes
none of the above

The routing table in interior and exterior switches has which one of the following?
None of the above

Which one of the following is the responsibility of Djikstra’ algorithm
To compute the shortest path between two nodes
To extract next hop information from path information
To extract next hop information from path information
None of above
What will be the bandwidth rate for short distance 10Base-T
16mhz
20mhz
100mhz
150mhz

What will be the bandwidth rate for older, low-speed network, and analog telephones
16
20
24
30

How many methods exist for building routing table?
1
2
3
4

Which of the following statement is wrong regarding ATM?
It is a single technology for voice, video and data
it has low jitter and high capacity.
it uses fixed size, small cells, 48 octet’s data
None of the above

In Asynchronous Transfer Mode VPI/VCI fields indentify the cells
Source
Destination
port@
none

The physical addressing in a WAN is similar as in LAN in the way…………….
The data is transmitted in packets equivalent to frames.
Each packet has a format with header.
The packet header includes destination and source addresses.
All of the above

In Asynchronous Transfer Mode VPI/VCI fields indentify the cells————–
Which one of the following is a method for computing routing table information?
Manual entry
Boot time routing
 Static routing
None of the above

All destinations on same switch have same
Router
Information
Next hop
None of the above

Which of the following statement is wrong regarding ATM?
It is a single technology for voice, video and data
It has low jitter and high capacity.
It uses fixed size, small cells, 48 octet’s data
None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?
To compute the shortest path between two nodes
To extract next hop information from path information
To insert next hop information into routing table
All of the above

Which of the following statement is true regarding Link-state routing?
Network topology is separated from route computation.
Each switch builds its own routing tables.
Link-state routing uses Djikstra’s algorithm.
All of the above

Jitter is significance for ——————
Voice
Video
Data
All of above

The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above

Which one of the following is a property of dynamic routing?
Select correct option:
It is inflexible
It has low network overload
It can work around network failure
All of the above

An exterior switch is one with which ………………….
Select correct option:
Computers are attached
No computer is attached
hubs are attached externally
None of the above·         some ware from here..
CS610 – Computer NetworkQuiz #3 JAN 14, 2013

NAT device stores state information in translation table.
Select correct option:
True
 False

A _____________ address-binding table is used for each physical network.
Select correct option:
 new
 similar
 separate
 old
Fragmentation when using ICMP for path MTU should be avoided.
Select correct option:
 True
 False
Static routing
_______ can be used to propagate information about remote networks.
Select correct option:
 Dynamic routing
 Static routing
 Address resolution
 None of the given

TCP stands for _______
Select correct option:
Transport control protocol
Transmission control protocol

The Universal Datagram Protocol is not an end-to-end protocol.
Select correct option:
True
False

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies

IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
 96
 100
 120
 none of the given

_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given

The Universal Datagram Protocol is a message-oriented protocol.  
Select correct option:  

True 
False
destination address into a prefix and suffix  
Select correct option:  
True 
False

which is not the type of error messages defined by ICMP.  
Select correct option:  
Source quench 
Time exceeded 
Destination unreachable 
none of the given

Which protocol is used to test different tools.  
Select correct option:  
ICMP 
IGMP 
TCP/IP 
none of the given

HEADER LEN field gives size of extention header.  
Select correct option:  
False 
True

is a ____ protocol.  
Select correct option:  
Point-to-Point 
Multi-Point 
Both (a) and (b) 
None of the given
CP

NAT device stores state information in translation table.  
Select correct option:  
True 
False

Postfix defines how much of address used to identify network.  
Select correct option:  
True 
False

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.  
Select correct option:  
three 
two 
four 
five

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.  
Select correct option: 
Least 
Maximum 
Fragment 
Frame

Twice NAT allows a site to run servers.  
Select correct option:  
True 
False

The maximum segment size of TCP flow control is_________  
Select correct option:  

3000 octets 
2000 octets 
1000 octets 
none of the given

In IP routing, forwarding refers to ____ transfer.  
Select correct option:  
packet 
datagram 
message 
None of the given

There are _____ possibilities to detect the destination using Trace-route  
Select correct option:  
1  

3  
None of the given

dynamic routing, the routing table is initialized when system boots.  
Select correct option:  
True 
False

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.  
Select correct option:  
True 
False

Dotted decimal represents each octet in ______ and uses a dot to separate octets.  
Select correct option:  

binary 
decimal 
hexadecimal 
Octal

The amount of buffer space available at any time is called the window.  
Select correct option:  
True 
False

In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.  
Select correct option:  
12 
14 
16 
none of the given

______ field is used to identify a specific path through the network  
Select correct option:  
FLOW LABEL 
TRAFFIC CLASS 
Both a and b 
none of the given

IPV6 address consists of ______  
Select correct option:  
32 Bits 
64 Bits 
128 Bits 
none of the given

The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.  
Select correct option:  
16-bit  
32-bit  
48-bit  
64-bit

A datagram cannot be larger than ______ of a network over which it is sent.  
Select correct option:  
MTU 
Size 
IP header
None of the given

An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host  
Select correct option:  
48-bit 
32-bit 
24-bit 
None of the given

IP datagram can contains ______ octets.  
Select correct option:  
0-65,535 
1-65,535 
1-65,536 
none of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.  
Select correct option:  
True 
False

Due to revolutionalization of IP-V6 the speed has increased from_____  
Select correct option:  
56kbps to 512kbps 
512kbps to 1gbps 
56kbps to 1gbps 
none of the given

 _______uses window mechanism to control the flow of data.  
Select correct option:  
IP 
UDP 
TCP 
none of the given
window mechanism

Mapping between a protocol address and a hardware address is called Address Resolution.  
Select correct option:  
True 
False

UPD is operating system independent.  
Select correct option:  
True 
False

A________ is a special-purpose computer dedicated to the task of interconnecting networks.  
Select correct option:  
Router 
Bridge 
Switch 
None of the given

Network having short intervals has a large timeout and the network having large interval has short timeout.  
Select correct option:  
True 
False
_________ places the boundary between the first and second octets  
Select correct option:  
Class A 
Class B 
Class C 
Class D
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix  
Select correct option:  

True 
False

There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing  
True 
False

IPV6 128 bits address includes network prefix and ______  
Select correct option:  
Host Suffix 
Host prefix 
Source Prefix 
none of the given

ICMP message transport is acted upon by getting ICMP_______ in IP.  
Select correct option:  
De-encapsulated 
Encapsulated 
Segmented 
none of the given

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Select correct option:
True
False 

Twice NAT allows a site to run servers.
Select correct option:
True
False·         Preliminary version of IP was called _________.
Select correct option:
IP – New Generation (IPng)
IP – Next Generation (IPng)
IP – Net Generation (IPng)
None of the given 

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False 

_________ uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given 

The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.
Select correct option:
True
False

Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given

________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given

The Source can configure outgoing datagram’s to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given

The time for acknowledgement to arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both a and b
none of the given

which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given 
Preliminary version of IP was called _________.
Select correct option:
IP – New Generation (IPng)
IP – Next Generation (IPng)
IP – Net Generation (IPng)
None of the given

HEADER LEN field gives size of extention header.
Select correct option:
False
True

_______ shows senders preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False

________ field of header indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATIONNo.3
None of the given (not sure) Page 105

In ______________, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form Computation Page 94

Postfix defines how much of address used to identify network.
Select correct option:
True
False

______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
None of the given (not sure) Page 105

H.LEN shows the header length in units of ____ Bits
Select correct option:
34
32 Page 105
30
None of the given

In Closed-form computation, the protocol address assigned to a computer is chosen carefully so
that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Select correct option:
arithmetic
XOR
Shift
XNORNo.5

For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies

End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless Page 120
both a and b
none of the given

______ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data AreaPage No.6
Identifier
none of the given

IPV6 addresses are _____ bits.
Select correct option:
32
64
128
256

The Header format of IPv6 is entirely different.
Select correct option:
True
False

____ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data Area
Identifier
none of the given
Which one of these is not a main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.

H.LEN shows the header length in units of __ Bits
Select correct option:
34
32
30
None of the given
____ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given

Routers use _______ to forward datagrams along prearranged path.
Select correct option:
Traffic class
Flow label
Destination address
none of the given

______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given

_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given

The Current version of IP-Version 4 is _____ old
Select correct option:
18 years
20 years
22 years
none of given

The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these

Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32

_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame

IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given


MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the given
As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ______ possible sizes.
Select correct option:
three
two
four
five

End to End delivery Service of IP datagram is ___
Select correct option:
Connection oriented
Connectionless
Both a and b
None of the given

______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATION
None of the given

Postfix defines how much of address used to identify network.
Select correct option:
True
False

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame·         A routing table contains_______
Select correct option:
The destination network ID
The hop count to reach the network
The router ID of the next hop
All of the given

NAT device stores state information in translation table.
Select correct option:
True
False

TCP achieves _________ by retransmission.
Select correct option:
Efficiency
Accuracy
Reliability
none of the given

________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given

_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given

Routing refers to the _________ of routing information.
Select correct option:
transmission
propagation
communication
None of the given
______ layer Provides reliable delivery of datagram.
Select correct option:

Network
Transport
Datalink
none of the given

End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given

TCP is a connectionless and reliable transport protocol.
Select correct option:
True
False

The demand of sharing is very high because many computers need to use the shared networks.

Select correct option:

 WAN networks

 Shared networks

 Unshared networks

 LAN networks

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

DMA(Direct Memory Access)

Multiplexer

Transceiver

None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of Select correct option:

broadcast network



Thick Ethernet is known as—————— Select correct option:

10 base 5

10 base T

10 base 100

10 base 1

The first automated tool required to see whether the given computer is online or not was

Select correct option:

Probing program

PING program

status program

None of the above

The basic responsibility of NIC is —————-

Select correct option:

To access medium/network

To resource allocation

To access memory

All of above

No error detection scheme is perfect because transmission errors can affect _________.

Select correct option:

Data

Additional Information

Additional information & data

Transmission medium

————– has advantages arisen from the size and ease of computation.

Select correct option:

CRC

Parity

Checksum

Byte Stuffing

The third field of the header consists of —— bit Ethernet frame type.

Select correct option:

48

32

16

8

The Ethernet standard specifies that frames are sent using the ——–

Select correct option:

Differential Manchester

Not Return to Zero (NRZ)

Manchester Encoding

Return to Zero (RZ)

LAN that use ATM technology have a ————

Select correct option:

Bus topology

Star topology

Ring topology

Mesh Topology

Hardware that calculates a CRC uses two simple components.

Select correct option:

AND unit and XOR unit

Shift register and XOR unit

Shift register & AND unit

Shift register and shift XOR unit

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

Select correct option:

DMA (Direct Memory Access)

Multiplexer

Transceiver

None of the given

Fixed network is a type of networks which is classified with respect to the………..factor

Select correct option:

Size

Connectivity

Medium

Mobility

Network interface card acts like a (an) ———–

Select correct option:

Input/output device

Input device

Output device

All of above

IEEE LLC/SNAP header is ——–, which is used to specify the type of data.

Select correct option:

8 octets

8 bytes

8 bits

None of the above

Most LANs that employ ring topology use an access mechanism known as——-

Select correct option:

CSMA/CD

CSMA/CA

CSMA

TOKEN PASSING

The Gigabit Ethernet hardware operates at a rate of ________

10 Mbps

100 Mbps

1000 Mbps

None of the given

A network uses ———— if all computers attach to a central point

Select correct option:

Ring Topology

Star Topology

Hub Topology

Bus Topology

———- is also called self healing network

Select correct option:

ATM

FDDI

Token Ring

None of the given

———- which is designed to help detect transmissions errors, send one extra bit of information with each character.

Select correct option:

Checksum

CRC

Parity

VRC

Hardware addresses must be ———- on a LAN.

Select correct option:

Common

Unique

A ———- relies on the hardware manufacturer to assign a unique physical address to each network interface.

Select correct option:

Static addressing scheme

Configurable addressing scheme

Dynamic addressing scheme

None of the given

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of

Select correct option:

Broadcast network

Point-to-Point network

Responses