CS610 130+ Mcqs
Quiz 1 Lec
1-9
Spring 2022
#Mid-Term
WITH PROVE ANSWER
Important NOTE:-
Like share and comment too ..ager koi mistake hogaye ho to sorry and comment
main lazmi mention krdijiye ga takey main correction krlon file main …. And
like zaroor krein is hamein or bhe apsab keyliye files makes krny ke himat
milti hey …JAZAKALLAH
1. When an application ____ any data,
it makes a copy of the data available to all other computers on the network.
Multicast…..confirm
2. There are _____ types of data stuffing
2….confirm
3. Which of the following is a benefit
of direct point to point communication?
Security
implementation…..confirm
4. If you as a network administrator
want to know the traffic flow of your data while communicating with a remote
computer which of the following will be used to know about intermediate
routers?
Ping…..confirm
5. Which of the following network is
using the TCP/IP model globally?
The internet….confirm
6. In which type of error detection
the arithmetic sum is calculated before and after the transmission of data at
both communication ends?
Checksum…..confrim
7. Hardware address is also called
___________.
Physical
address……confirm
8. The sharing of a ________ among the
workers in an office is a goal of resource sharing
Printer….confirm
9. Thick Ethernet also requires
__________ to avoid signal reflectance
Terminators…confirm
10. The ________ Field of Ethernet
frame has the purpose of frame payload.
Data….confirm
11. In ______ each station is allocated
time slot during which it can send data. Each station transmits its data in its
assigned time slot.
TDMA…confirm
12. In______ all computers are attached
to a central hub
Star
topology…..confirm
13. In which topology terminators are
used at the end of the cable?
Bus….confirm
14. A network uses __________ to
arrange computers in a single closed loop.
Ring
topology…confirm
15. LAN interface uses _________ to
copy frame data directly from main memory
DMA….confirm
16. In direct point to point
communication adding the NTH computer requires ______ new connections
N-1….confirm
17. ___________ uses counter rotating
rings in which data flows in opposite directions
FDDI….confirm
18. We need pockets rather than bits because
_______.
Sender and
receiver need to coordinate to detect transmission errors.
19. The gigabit Ethernet hardware
operates at a rate of _____________.
1000
Mbps…..confirm
20. Each computer in LAN is identified
by a Physical address usually imprinted on the _________.
Network interface card…..confirm
21. __________________ network does not
depend on CSMA/CD.
Ethernet….confirm
22. LAN interface hardware obeys
_________ access rule.
CSMA/CD….confirm
23. Point-to-point topology is
Connectivity
based….confirm
24. Parity check is usually used to
detect _____ bit error(s).
1….confirm
25. __________ is a tool that sends a
message to a remote computer and reports whether the computer responsibility
Ping…confirm
26. LAN and WAN are classified
according to their _______.
Size….confirm
27. In a ping command result, time
denotes the _________.
RTT….confirm
28. How many computers are mandatory to
form a network?
2
29. In __ technique data is treated as
a sequence of integers and their arithmetic sum is computed and the carry bits
are added to the final sum
Checksum….confirm
30. In taken ring, if all computers are
ready to transmit it enforces ________ access.
Round-robin access…..confirm
31. Fixed network is a type of networks
which is classified with respect to the ______ factor.
Mobility….confirm
32. __________ are two standard
implementations to improve computational efficiency
Hashing and direct
indexing…confirm
33. In the IP address ________
identifies an individual computer on the network.
Suffix….confirm
34. In the IP address ________
identifies the physical network to which the computers are attached.
Prefix….confirm
35. __________ Serve same purpose in
internet as frames on LAN.
Packets…..confirm
36. IP datagram can contains ___
octets.
1-65.535…confirm
37. TCP/IP defines the term ____ to
refer any computer system that connects to a network and runs applications for
users.
Host computer….confirm
38. _______protocols of TCP/IP layering
model specify how to organize data into frame and how a computer transmits
frames over a network.
Network
interface layer….confirm
39. ______ of TCP/IP protocol suit
specifies the format of packets sent across internet as well as the mechanisms
used to forward packets.
Internet….confirm
40. As the internet grew the original
Glassful addressing scheme became a limitation. The IP address space was being
exhausted because all networks had to choose one of _____ possible sizes.
Three….confirm
41. Dotted decimal notation is a
syntactic form the IP software uses to express _______ binary values when
interacting with humans.
32-bit….confirm
42. Header contains all information
needed to deliver datagram to the destination computer. But which one of the
following is not included.
Rectfer…..confirm
43. For ________ information about
forwarding is stored in a routing table which is initialized at system
initialization and must be updated as network topology changes.
Efficiency…..confirm
44. MTU stands for __________.
Maximum transmission
Unit…..confirm
45. In closed-form computation the
protocol address assigned to a computer is chosen carefully so that computer’s
hardware address can be computed from the protocol address using basic Boolean
and ____________ operations.
Arithemetic….confirm
46. Internet Protocol (IP) address
version 4 is comprised of ______ bits.
32…confirm
47. The current version of IP-Version 4
is ______ old.
20….confirm
48. _______________ contains all
information needed to deliver datagram to the destination.
Header…confirm
49. Address resolution protocol is
mostly used to bind a 32-bit IP address to a ________ Ethernet address.
48….confirm
50. The protocol address of the most
hop must be _______ to an equivalent hardware before a packet can be sent.
Translated….confrim
51. HEADER LEN field gives size of extension
header.
True….confirm
52. Class A mask is 255.0.0.0 which is
used for ________.
Subnetting….confirm
53. IPV6 address consists of ________.
128 bits….confirm
54. The header format of IPV6 is
entirely different.
True….confirm
55. HLEN shows the header length in
units of _________ bits.
32 bits…confirm
56. VERS shows the version of _____.
IP…..confirm
57. TOTAL LENGTH shows total octets in
_______.
Datagram…confirm
58. A datagram cannot be larger than
_______ of a network over which it is sent.
MTU…confirm
59. Every hardware technology
specification includes the definition of the maximum size of the frame data
area which is called the _______ transmission Unit.
Maximum…..confirm
60. The IP class scheme does not divide
the _________ address space into equal size class and the classes do not
contain the same number of networks.
32-bit….confirm
61. _______shows senders preference for
low latency high reliability.
Service type….confrim
62. NEXT HEADER field in the base
header defines type of header if appears at the end of fixed-size base header.
True…..confirm
63. _________ uses counter rotating rings
in which data flows in opposite directions.
FDDI….confirm
64. In ________ all computers are
attached to a central hub.
Star
topology….confirm
65. In a ___ all computers are attached
to a single cable and any computer can send data to any other computer.
Bus
topology….confirm
66. __________ is standard wireless LAN
that uses radio signals at 2.4GHz.
IEEE
802.11…..confirm
67. Star topology is the kind of
_______.
Point to point
topology…..confirm
68. Tree topology is the kind of _.
Point to point
topology….confirm
69. In FDDI, in case of a station
failure, remaining stations loop back and _______.
Re-route data
through spare ring…..confirm
70. _______ are the two frame types
Multicast and
broadcast….confrim
71. In ___ topology if the switch goes
down all the computers will be disconnected.
Star….confirm
72. Which type of network consists of
wireless connection of laptops in a university classroom?
LAN….confirm
73. The basic idea behind the operation
of network analyzer is a computer with a network interface that receives all
frames, which is called
Promiscuous mode…..confirm
74. WE need packets rather than bits
because________.
a sender and receiver need
to coordinate to detect transmission errors…confirm
75. As a result of ARPA research, the
first network was established which was named as _____.
ARPANET…..confirm
76. While transmitting data from source
destination B, 4 bits are changed during the transmission then the error is a
_________.
Brust error….confirm
77. Each computer in LAN is identified
by a physical address, usually imprinted on the _________.
Network interface card….confirm
78. Which type of network consists of
wired computers in a university classroom?
LAN….confirm
79. Bluetooth uses shared medium and
_______ instead of coaxial cable.
Radio waves….confirm
80. The Ethernet standard specifies
that frames are sent using the _____ scheme.
Manchester Encoding…..confirm
81. In ________ technique, all members
of the network can send data on the specific time slot?
CSMA….confirm
82. A network uses ______ to arrange computers
in a single closed loop
Ring
topology….confrim
83. NICs can provide all
three-connection technologies.
RJ-45 connector for 10 base-T, AUI
connector for thicknet and BNC connector for Thinnet…..confirm
84. Computer networks are classified by
_____ factors.
4…confirm
85. ______ is also called self healing
network.
FDDI….confirm
86. ________ was the first automated
tool required to see whether the given computer is online or not.
PING
program….confirm
87. Ethernet uses a ______ bit static
addressing scheme in which device is assigned a unique address by the
manufacturer.
48….confirm
88. ________ is designed to detect
transmission errors, send one extra bit of information with each character.
Parity….confirm
89. Hardware addresses must be _______
on a LAN.
Unique….confirm
90. The Fast Ethernet hardware operates at a rate
of ________.
100 Mbps…..confirm
91. Inside
a computer each address mask is stored as a _______ bit value.
32…..confirm
92. The
protocol address of the next hop must be ------ to an equivalent hardware
address before a packet can be sent.
Translated….confirm
93. _______
protocols of TCP/IP layering model specify how to ensure reliable transfer.
Transport
layer….confirm
94. _________
are two standard implementations to improve computational efficiency.
Hashing and
direct indexing….confirm
95. ________
of TCP/IP protocol suit defines the basic characteristics of network hardware.
Physical
layer….confirm
96. Dotted
decimal represents each octet in _________ and uses a dot to separate octets.
Decimal…confirm
97. In closed-form computation the protocol
address assigned to a computer is chosen carefully so that computer’s hardware
address can be computed from the protocol address using basic Boolean and
_________ operations.
Arithmetic…confirm
98. Address
Resolution Protocol is mostly used to bind a 32-bit IP address to a _______
Ethernet address.
48-bit…confirm
99. A separate ________ table is used for each
physical network.
Address-binding…confirm
100.
The ethernet speed was originally __________.
3MBps…..confirm
101.
The current standard is _________.
10Mbps….confirm
102.
________
Source is responsible for fragmentation.
a.
IPV6……confirm
103.
Which
of the following statement is true regarding ATM?
a.
It is a single technology for voice, video and
data.
b.
It has low jitter and high capacity.
c.
It uses fixed size, small ells, 48 octet’s
data.
d.
All of
the above
104.
As
a result of ARPA research, the first network was established which was named as
________.
a.
ARPANET…..confrim
105.
________
protocol uses three way handshake to begin a connection.
a.
TCP……confirm
106.
NAT
device stores state information in translation table.
False…confirm
107.
NaT device stores state information in table
True…confirm
108.
The number of connections needed for 8
computers in direct point to point communication is equal to _____________.
28….confirm
109.
The
bridges communicate with each other on the network and use ________ algorithm
to decide which bridge will not forward frames if a cycle occurs.
Distributed Spanning
Tree……confirm
110.
________
places the boundary between the second and third octets.
Class
B….confirm
111.
________
cannot be extended arbitrarily far or to handle arbitrarily many computers.
LAN…..confirm
112.
________
encapsulates IP datagram as data area in hardware frame.
Network Interface Layer….confirm
113.
________
is standard wireless LAN that uses radio signals at 2.4GHz.
IEEE 802.11…..confirm
114.
Missing
________ in a frame format indicates receiving computer missed beginning of the
message.
Soh…….confirm
115.
Missing _______ indicates sending computer
crashed.
Eot….confirm
116.
An
interior switch is one with wich ________..
No computer is
attached…..confirm
117.
VBR
stands for __________.
Variable Bit Rate….confirm
118.
ABR stands for_____________.
Available Bit
rate….confirm
119.
CBR stands for __________.
Constant Bit
rate….confirm
120.
If
simultaneous transmission occurs, the frames interfere with each other and this
phenomenon is called ________.
Collision…..confirm
121.
The
first automated tool required to see whether the given computer is online or
not was
PING program…..confirm
122.
The
recent executed instruction ________ in temporal aspect of the locality of
reference.
is temporarily not
referenced
123.
The
________ of errors is easier than the ________ of errors.
correction, detection
124.
ATM
header is about ________ of the cell.
10 %
125.
Hardware
that calculates a CRC uses two simple components ________.
Shift register and XOR
unit….confirm
126.
________
is inflexible.
Static routing….confirm
127.
Frames
include additional information to detect/correct errors are insert by ________.
Sender and Receiver…confirm
128.
Fragmentation
when using ICMP for path MTU should be avoided.
True…confirm
129.
The
frame format of any LAN technology must consists of ________ and ________.
Frame header and pay
load…..confirm
130.
SMDS(Switched
Multi megabit Data Service) is ________.
Connection less
service….confirm
131.
Which
of the following is not a guided medium?
Atmosphere
132.
________
are more frequently being designed to allow specification of the quality of
service required by users.
Networks….confirm
133.
The
physical addressing in a WAN is similar as in LAN in the way __________.
a.
The data is transmitted in packets equivalent
to frames.
b.
Each packet has a format with header.
c.
The packet header includes destination and
source addresses.
d.
All of the
above
134.
Two
computers with a connection through an ATM network will likely have same
VPI/VCI values for each end of the connection.
True….confirm
135.
NIC
connection in a physical network is known as __________.
LAN wiring scheme…..confirm
136.
A
________ is a special-purpose computer dedicated to the task of interconnecting
networks.
Router….confirm
137.
The
third field of the header consists of ___________ bit Ethernet frame type.
16
138.
________
is the most popular wiring scheme because of lowest cost.
10 Base T….confirm
139.
To
span long distances or many computers, networks must replace shared medium with
_________.
packet switches….confirm
140.
Frame
relay is ________.
Connection oriented
service….confirm
141.
Which
multiplexing technique transmits analog signals?
a.
FDM
b.
TDM
c.
WDM
d.
Both (a) and
(c)….confirm
142.
Which
of the following is not a benefit of Source Independence?
a.
It allows fast and efficient routing.
b.
Packet switch need not hove complete
information about all destinations.
c.
network functions even if topology changes.
d.
None of the
given……confirm
Thanks everone