CS610 Quiz 1 Lec 1-9 Spring 2022

0

 

 

CS610  130+ Mcqs

Quiz 1 Lec 1-9

Spring 2022 #Mid-Term

WITH PROVE ANSWER


Important NOTE:-

Like share and comment too ..ager koi mistake hogaye ho to sorry and comment main lazmi mention krdijiye ga takey main correction krlon file main …. And like zaroor krein is hamein or bhe apsab keyliye files makes krny ke himat milti hey …JAZAKALLAH

 

 

1.      When an application ____ any data, it makes a copy of the data available to all other computers on the network.

                                              Multicast…..confirm

2.       There are _____ types of data stuffing

                         2….confirm

 

3.      Which of the following is a benefit of direct point to point communication?

                                  Security implementation…..confirm

 

4.      If you as a network administrator want to know the traffic flow of your data while communicating with a remote computer which of the following will be used to know about intermediate routers?

                                                        Ping…..confirm

 

5.      Which of the following network is using the TCP/IP model globally?

                                          The internet….confirm

                

6.      In which type of error detection the arithmetic sum is calculated before and after the transmission of data at both communication ends?

                                    Checksum…..confrim

                        

7.      Hardware address is also called ___________.

                                              Physical address……confirm

 

8.      The sharing of a ________ among the workers in an office is a goal of resource sharing

                   Printer….confirm

 

 

 

 

 

9.      Thick Ethernet also requires __________ to avoid signal reflectance

                                      Terminators…confirm

 

 

10.  The ________ Field of Ethernet frame has the purpose of frame payload.

                                                  Data….confirm

 

11.  In ______ each station is allocated time slot during which it can send data. Each station transmits its data in its assigned time slot.

                                                     TDMA…confirm

12.  In______ all computers are attached to a central hub

                          Star topology…..confirm

 

13.  In which topology terminators are used at the end of the cable?

                                        Bus….confirm

 

14.  A network uses __________ to arrange computers in a single closed loop.

                                       Ring topology…confirm

 

15.  LAN interface uses _________ to copy frame data directly from main memory

                                           DMA….confirm

 

16.  In direct point to point communication adding the NTH computer requires ______ new connections

                                               N-1….confirm

 

17.  ___________ uses counter rotating rings in which data flows in opposite directions

                          FDDI….confirm

 

18.  We need pockets rather than bits because _______.

                                Sender and receiver need to coordinate to detect transmission errors.

 

19.  The gigabit Ethernet hardware operates at a rate of _____________.

                                       1000 Mbps…..confirm

 

20.  Each computer in LAN is identified by a Physical address usually imprinted on the _________.

                                                         Network interface card…..confirm

 

21.  __________________ network does not depend on CSMA/CD.

                                                 Ethernet….confirm

 

22.  LAN interface hardware obeys _________ access rule.

                                              CSMA/CD….confirm

 

23.  Point-to-point topology is

                       Connectivity based….confirm

 

24.  Parity check is usually used to detect _____ bit error(s).

                              1….confirm

 

25.  __________ is a tool that sends a message to a remote computer and reports whether the computer responsibility

                           Ping…confirm

 

26.  LAN and WAN are classified according to their _______.

                               Size….confirm

 

27.  In a ping command result, time denotes the _________.

                          RTT….confirm

 

28.  How many computers are mandatory to form a network?

                                                2

 

29.  In __ technique data is treated as a sequence of integers and their arithmetic sum is computed and the carry bits are added to the final sum

                               Checksum….confirm

                          

30.  In taken ring, if all computers are ready to transmit it enforces ________ access.

                                       Round-robin access…..confirm

 

 

 

31.  Fixed network is a type of networks which is classified with respect to the ______ factor.

                                       Mobility….confirm

                                

32.  __________ are two standard implementations to improve computational efficiency

                        Hashing and direct indexing…confirm

 

33.  In the IP address ________ identifies an individual computer on the network.

                                         Suffix….confirm

 

34.  In the IP address ________ identifies the physical network to which the computers are attached.

                                               Prefix….confirm

 

35.  __________ Serve same purpose in internet as frames on LAN.

                          Packets…..confirm

 

36.  IP datagram can contains ___ octets.

                                        1-65.535…confirm

 

37.  TCP/IP defines the term ____ to refer any computer system that connects to a network and runs applications for users.

                                            Host computer….confirm

 

38.  _______protocols of TCP/IP layering model specify how to organize data into frame and how a computer transmits frames over a network.

                                        Network interface layer….confirm

 

39.  ______ of TCP/IP protocol suit specifies the format of packets sent across internet as well as the mechanisms used to forward packets.

                                                         Internet….confirm

 

40.  As the internet grew the original Glassful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of _____ possible sizes.

                                              Three….confirm

 

41.  Dotted decimal notation is a syntactic form the IP software uses to express _______ binary values when interacting with humans.

                                         32-bit….confirm

 

 

42.  Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included.

                                                      Rectfer…..confirm

 

43.  For ________ information about forwarding is stored in a routing table which is initialized at system initialization and must be updated as network topology changes.

                                                  Efficiency…..confirm

 

44.  MTU stands for __________.

                       Maximum transmission Unit…..confirm

 

45.  In closed-form computation the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and ____________ operations.

                                                        Arithemetic….confirm

 

46.  Internet Protocol (IP) address version 4 is comprised of ______ bits.

                                                                        32…confirm

 

47.  The current version of IP-Version 4 is ______ old.

                                     20….confirm

 

48.  _______________ contains all information needed to deliver datagram to the destination.

                                  Header…confirm

 

49.  Address resolution protocol is mostly used to bind a 32-bit IP address to a ________ Ethernet address.

                               48….confirm

 

50.  The protocol address of the most hop must be _______ to an equivalent hardware before a packet can be sent.

                                   Translated….confrim

 

51.   HEADER LEN field gives size of extension header.

                          True….confirm

 

52.  Class A mask is 255.0.0.0 which is used for ________.

                            Subnetting….confirm

 

53.  IPV6 address consists of ________.

                          128 bits….confirm

 

54.  The header format of IPV6 is entirely different.

                              True….confirm

 

55.  HLEN shows the header length in units of _________ bits.

                              32 bits…confirm

 

56.  VERS shows the version of _____.

                             IP…..confirm

 

57.  TOTAL LENGTH shows total octets in _______.

                                                  Datagram…confirm

 

58.  A datagram cannot be larger than _______ of a network over which it is sent.

                           MTU…confirm

 

59.  Every hardware technology specification includes the definition of the maximum size of the frame data area which is called the _______ transmission Unit.

                                 Maximum…..confirm

 

60.  The IP class scheme does not divide the _________ address space into equal size class and the classes do not contain the same number of networks.

                                     32-bit….confirm

 

61.  _______shows senders preference for low latency high reliability.

                                  Service type….confrim

 

62.  NEXT HEADER field in the base header defines type of header if appears at the end of fixed-size base header.

                                 True…..confirm

 

63.  _________ uses counter rotating rings in which data flows in opposite directions.

                             FDDI….confirm

 

64.  In ________ all computers are attached to a central hub.

                                  Star topology….confirm

 

65.  In a ___ all computers are attached to a single cable and any computer can send data to any other computer.

                                        Bus topology….confirm

 

66.  __________ is standard wireless LAN that uses radio signals at 2.4GHz.

                               IEEE 802.11…..confirm

 

67.  Star topology is the kind of _______.

                          Point to point topology…..confirm

 

68.  Tree topology is the kind of _.

                               Point to point topology….confirm

 

69.  In FDDI, in case of a station failure, remaining stations loop back and _______.

                              Re-route data through spare ring…..confirm

 

70.  _______ are the two frame types

                Multicast and broadcast….confrim

 

71.  In ___ topology if the switch goes down all the computers will be disconnected.

                                                                   Star….confirm

 

72.  Which type of network consists of wireless connection of laptops in a university classroom?

                                                   LAN….confirm

 

73.  The basic idea behind the operation of network analyzer is a computer with a network interface that receives all frames, which is called

                                     Promiscuous mode…..confirm

 

74.  WE need packets rather than bits because________.

                    a sender and receiver need to coordinate to detect transmission errors…confirm

 

75.  As a result of ARPA research, the first network was established which was named as _____.

                                   ARPANET…..confirm

 

76.  While transmitting data from source destination B, 4 bits are changed during the transmission then the error is a _________.

                                   Brust error….confirm

 

77.  Each computer in LAN is identified by a physical address, usually imprinted on the _________.

                                                     Network interface card….confirm

 

78.  Which type of network consists of wired computers in a university classroom?

                                                                 LAN….confirm

 

 

79.  Bluetooth uses shared medium and _______ instead of coaxial cable.

                          Radio waves….confirm

 

 

80.  The Ethernet standard specifies that frames are sent using the _____ scheme.

                                       Manchester Encoding…..confirm

 

81.  In ________ technique, all members of the network can send data on the specific time slot?

                                            CSMA….confirm

 

82.  A network uses ______ to arrange computers in a single closed loop

                                  Ring topology….confrim

 

83.  NICs can provide all three-connection technologies.

RJ-45 connector for 10 base-T, AUI connector for thicknet and BNC connector for Thinnet…..confirm

                               

84.  Computer networks are classified by _____ factors.

                         4…confirm

 

85.  ______ is also called self healing network.

                                                                         FDDI….confirm

 

86.  ________ was the first automated tool required to see whether the given computer is online or not.

                                     PING program….confirm

 

87.  Ethernet uses a ______ bit static addressing scheme in which device is assigned a unique address by the manufacturer.

                                        48….confirm

 

88.  ________ is designed to detect transmission errors, send one extra bit of information with each character.

                                          Parity….confirm

                      

89.  Hardware addresses must be _______ on a LAN.

                                  Unique….confirm

 

90.  The Fast Ethernet hardware operates at a rate of ________.

              100 Mbps…..confirm

 

91.  Inside a computer each address mask is stored as a _______ bit value.

                                 32…..confirm

 

92.  The protocol address of the next hop must be ------ to an equivalent hardware address before a packet can be sent.

                            Translated….confirm

 

 

 

93.  _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

                              Transport layer….confirm

 

94.  _________ are two standard implementations to improve computational efficiency.

                                    Hashing and direct indexing….confirm

 

95.  ________ of TCP/IP protocol suit defines the basic characteristics of network hardware.

                                 Physical layer….confirm

 

96.  Dotted decimal represents each octet in _________ and uses a dot to separate octets.

                                             Decimal…confirm

 

97.   In closed-form computation the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.

                               Arithmetic…confirm

 

98.  Address Resolution Protocol is mostly used to bind a 32-bit IP address to a _______ Ethernet address.

                                                     48-bit…confirm

 

99.  A  separate ________ table is used for each physical network.

                             Address-binding…confirm

 

100.                      The ethernet speed was originally __________.

                                   3MBps…..confirm

101.                      The current standard is _________.

                                    10Mbps….confirm

102.      ________ Source is responsible for fragmentation.

a.      IPV6……confirm

103.      Which of the following statement is true regarding ATM?

a.      It is a single technology for voice, video and data.

b.      It has low jitter and high capacity.

c.       It uses fixed size, small ells, 48 octet’s data.

d.      All of the above

104.      As a result of ARPA research, the first network was established which was named as ________.

a.      ARPANET…..confrim

 

105.      ________ protocol uses three way handshake to begin a connection.

a.      TCP……confirm

 

106.      NAT device stores state information in translation table.

                                  False…confirm

 

107.          NaT device stores state information in table

                                          True…confirm

108.          The number of connections needed for 8 computers in direct point to point communication is equal to _____________.

                                         28….confirm

 

109.      The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

Distributed Spanning Tree……confirm

 

110.      ________ places the boundary between the second and third octets.

                                         Class B….confirm

 

111.      ________ cannot be extended arbitrarily far or to handle arbitrarily many computers.

                                     LAN…..confirm

 

112.      ________ encapsulates IP datagram as data area in hardware frame.

          Network Interface Layer….confirm

 

113.      ________ is standard wireless LAN that uses radio signals at 2.4GHz.

IEEE 802.11…..confirm

 

114.      Missing ________ in a frame format indicates receiving computer missed beginning of the message.

Soh…….confirm

 

115.    Missing _______ indicates sending computer crashed.

                           Eot….confirm

 

116.      An interior switch is one with wich ________..

No computer is attached…..confirm

117.      VBR stands for __________.

Variable Bit Rate….confirm

 

118.       ABR stands for_____________.

                      Available Bit rate….confirm

 

119.                      CBR stands for __________.

                        Constant Bit rate….confirm          

 

120.      If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.

                 Collision…..confirm

 

121.      The first automated tool required to see whether the given computer is online or not was

PING program…..confirm

 

122.      The recent executed instruction ________ in temporal aspect of the locality of reference.

is temporarily not referenced

 

123.      The ________ of errors is easier than the ________ of errors.

correction, detection

 

124.      ATM header is about ________ of the cell.

10 %

 

125.      Hardware that calculates a CRC uses two simple components ________.

Shift register and XOR unit….confirm

 

126.      ________ is inflexible.

Static routing….confirm

127.      Frames include additional information to detect/correct errors are insert by ________.

Sender and Receiver…confirm

128.      Fragmentation when using ICMP for path MTU should be avoided.

True…confirm

129.      The frame format of any LAN technology must consists of ________ and ________.

Frame header and pay load…..confirm

 

130.      SMDS(Switched Multi megabit Data Service) is ________.

Connection less service….confirm

131.      Which of the following is not a guided medium?

           Atmosphere

132.      ________ are more frequently being designed to allow specification of the quality of service required by users.

       Networks….confirm

133.      The physical addressing in a WAN is similar as in LAN in the way __________.

a.      The data is transmitted in packets equivalent to frames.

b.      Each packet has a format with header.

c.       The packet header includes destination and source addresses.

d.      All of the above

134.      Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.

                    True….confirm

135.      NIC connection in a physical network is known as __________.

              LAN wiring scheme…..confirm

136.      A ________ is a special-purpose computer dedicated to the task of interconnecting networks.

                          Router….confirm

137.      The third field of the header consists of ___________ bit Ethernet frame type.

                               16

138.      ________ is the most popular wiring scheme because of lowest cost.

             10 Base T….confirm

139.      To span long distances or many computers, networks must replace shared medium with _________.

packet switches….confirm

140.      Frame relay is ________.

Connection oriented service….confirm

141.      Which multiplexing technique transmits analog signals?

a.      FDM

b.      TDM

c.       WDM

d.      Both (a) and (c)….confirm

142.      Which of the following is not a benefit of Source Independence?

a.      It allows fast and efficient routing.

b.      Packet switch need not hove complete information about all destinations.

c.       network functions even if topology changes.

d.      None of the given……confirm

 

Post a Comment

0Comments

Thanks everone

Post a Comment (0)