CS610 Quiz 1 Lec 1-9 according to new book

0

  

 

CS610  130+ Mcqs

Quiz 1 Lec 1-9

#Mid-Term

WITH PROVE ANSWER


Important NOTE:-

Like share and comment too ..ager koi mistake hogaye ho to sorry and comment main lazmi mention krdijiye ga takey main correction krlon file main …. And like zaroor krein is hamein or bhe apsab keyliye files makes krny ke himat milti hey …JAZAKALLAH

Star topolgy is the kind of

Tree topology


1.     When an application ____ any data, it makes a copy of the data available to all other computers on the network.

                                              Multicast…..confirm

2.       There are _____ types of data stuffing

                         2….confirm

 

3.      Which of the following is a benefit of direct point to point communication?

                                  Security implementation…..confirm

 

4.      If you as a network administrator want to know the traffic flow of your data while communicating with a remote computer which of the following will be used to know about intermediate routers?

                                                        Ping…..confirm

 

5.      Which of the following network is using the TCP/IP model globally?

                                          The internet….confirm

                

6.      In which type of error detection the arithmetic sum is calculated before and after the transmission of data at both communication ends?

                                    Checksum…..confrim

                        

7.      Hardware address is also called ___________.

                                              Physical address……confirm

 

8.      The sharing of a ________ among the workers in an office is a goal of resource sharing

                   Printer….confirm

 

 

 

 

 

9.      Thick Ethernet also requires __________ to avoid signal reflectance

                                      Terminators…confirm

 

 

10.  The ________ Field of Ethernet frame has the purpose of frame payload.

                                                  Data….confirm

 

11.  In ______ each station is allocated time slot during which it can send data. Each station transmits its data in its assigned time slot.

                                                     TDMA…confirm

12.  In______ all computers are attached to a central hub

                          Star topology…..confirm

 

13.  In which topology terminators are used at the end of the cable?

                                        Bus….confirm

 

14.  A network uses __________ to arrange computers in a single closed loop.

                                       Ring topology…confirm

 

15.  LAN interface uses _________ to copy frame data directly from main memory

                                           DMA….confirm

 

16.  In direct point to point communication adding the NTH computer requires ______ new connections

                                               N-1….confirm

 

17.  ___________ uses counter rotating rings in which data flows in opposite directions

                          FDDI….confirm

 

18.  We need pockets rather than bits because _______.

                                Sender and receiver need to coordinate to detect transmission errors.

 

19.  The gigabit Ethernet hardware operates at a rate of _____________.

                                       1000 Mbps…..confirm

 

20.  Each computer in LAN is identified by a Physical address usually imprinted on the _________.

                                                         Network interface card…..confirm

 

21.  __________________ network does not depend on CSMA/CD.

                                                 Ethernet….confirm

 

22.  LAN interface hardware obeys _________ access rule.

                                              CSMA/CD….confirm

 

23.  Point-to-point topology is

                       Connectivity based….confirm

 

24.  Parity check is usually used to detect _____ bit error(s).

                              1….confirm

 

25.  __________ is a tool that sends a message to a remote computer and reports whether the computer responsibility

                           Ping…confirm

 

26.  LAN and WAN are classified according to their _______.

                               Size….confirm

 

27.  In a ping command result, time denotes the _________.

                          RTT….confirm

 

28.  How many computers are mandatory to form a network?

                                                2

 

29.  In __ technique data is treated as a sequence of integers and their arithmetic sum is computed and the carry bits are added to the final sum

                               Checksum….confirm

                          

30.  In taken ring, if all computers are ready to transmit it enforces ________ access.

                                       Round-robin access…..confirm

 

 

 

31.  Fixed network is a type of networks which is classified with respect to the ______ factor.

                                       Mobility….confirm

                                

32.  __________ are two standard implementations to improve computational efficiency

                        Hashing and direct indexing…confirm

 

33.  In the IP address ________ identifies an individual computer on the network.

                                         Suffix….confirm

 

34.  In the IP address ________ identifies the physical network to which the computers are attached.

                                               Prefix….confirm

 

35.  __________ Serve same purpose in internet as frames on LAN.

                          Packets…..confirm

 

36.  IP datagram can contains ___ octets.

                                        1-65.535…confirm

 

37.  TCP/IP defines the term ____ to refer any computer system that connects to a network and runs applications for users.

                                            Host computer….confirm

 

38.  _______protocols of TCP/IP layering model specify how to organize data into frame and how a computer transmits frames over a network.

                                        Network interface layer….confirm

 

39.  ______ of TCP/IP protocol suit specifies the format of packets sent across internet as well as the mechanisms used to forward packets.

                                                         Internet….confirm

 

40.  As the internet grew the original Glassful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of _____ possible sizes.

                                              Three….confirm

 

41.  Dotted decimal notation is a syntactic form the IP software uses to express _______ binary values when interacting with humans.

                                         32-bit….confirm

 

 

42.  Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included.

                                                      Rectfer…..confirm

 

43.  For ________ information about forwarding is stored in a routing table which is initialized at system initialization and must be updated as network topology changes.

                                                  Efficiency…..confirm

 

44.  MTU stands for __________.

                       Maximum transmission Unit…..confirm

 

45.  In closed-form computation the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and ____________ operations.

                                                        Arithemetic….confirm

 

46.  Internet Protocol (IP) address version 4 is comprised of ______ bits.

                                                                        32…confirm

 

47.  The current version of IP-Version 4 is ______ old.

                                     20….confirm

 

48.  _______________ contains all information needed to deliver datagram to the destination.

                                  Header…confirm

 

49.  Address resolution protocol is mostly used to bind a 32-bit IP address to a ________ Ethernet address.

                               48….confirm

 

50.  The protocol address of the most hop must be _______ to an equivalent hardware before a packet can be sent.

                                   Translated….confrim

 

51.   HEADER LEN field gives size of extension header.

                          True….confirm

 

52.  Class A mask is 255.0.0.0 which is used for ________.

                            Subnetting….confirm

 

53.  IPV6 address consists of ________.

                          128 bits….confirm

 

54.  The header format of IPV6 is entirely different.

                              True….confirm

 

55.  HLEN shows the header length in units of _________ bits.

                              32 bits…confirm

 

56.  VERS shows the version of _____.

                             IP…..confirm

 

57.  TOTAL LENGTH shows total octets in _______.

                                                  Datagram…confirm

 

58.  A datagram cannot be larger than _______ of a network over which it is sent.

                           MTU…confirm

 

59.  Every hardware technology specification includes the definition of the maximum size of the frame data area which is called the _______ transmission Unit.

                                 Maximum…..confirm

 

60.  The IP class scheme does not divide the _________ address space into equal size class and the classes do not contain the same number of networks.

                                     32-bit….confirm

 

61.  _______shows senders preference for low latency high reliability.

                                  Service type….confrim

 

62.  NEXT HEADER field in the base header defines type of header if appears at the end of fixed-size base header.

                                 True…..confirm

 

63.  _________ uses counter rotating rings in which data flows in opposite directions.

                             FDDI….confirm

 

64.  In ________ all computers are attached to a central hub.

                                  Star topology….confirm

 

65.  In a ___ all computers are attached to a single cable and any computer can send data to any other computer.

                                        Bus topology….confirm

 

66.  __________ is standard wireless LAN that uses radio signals at 2.4GHz.

                               IEEE 802.11…..confirm

 

67.  Star topology is the kind of _______.

                          Point to point topology…..confirm

 

68.  Tree topology is the kind of _.

                               Point to point topology….confirm

 

69.  In FDDI, in case of a station failure, remaining stations loop back and _______.

                              Re-route data through spare ring…..confirm

 

70.  _______ are the two frame types

                Multicast and broadcast….confrim

 

71.  In ___ topology if the switch goes down all the computers will be disconnected.

                                                                   Star….confirm

 

72.  Which type of network consists of wireless connection of laptops in a university classroom?

                                                   LAN….confirm

 

73.  The basic idea behind the operation of network analyzer is a computer with a network interface that receives all frames, which is called

                                     Promiscuous mode…..confirm

 

74.  WE need packets rather than bits because________.

                    a sender and receiver need to coordinate to detect transmission errors…confirm

 

75.  As a result of ARPA research, the first network was established which was named as _____.

                                   ARPANET…..confirm

 

76.  While transmitting data from source destination B, 4 bits are changed during the transmission then the error is a _________.

                                   Brust error….confirm

 

77.  Each computer in LAN is identified by a physical address, usually imprinted on the _________.

                                                     Network interface card….confirm

 

78.  Which type of network consists of wired computers in a university classroom?

                                                                 LAN….confirm

 

 

79.  Bluetooth uses shared medium and _______ instead of coaxial cable.

                          Radio waves….confirm

 

 

80.  The Ethernet standard specifies that frames are sent using the _____ scheme.

                                       Manchester Encoding…..confirm

 

81.  In ________ technique, all members of the network can send data on the specific time slot?

                                            CSMA….confirm

 

82.  A network uses ______ to arrange computers in a single closed loop

                                  Ring topology….confrim

 

83.  NICs can provide all three-connection technologies.

RJ-45 connector for 10 base-T, AUI connector for thicknet and BNC connector for Thinnet…..confirm

                               

84.  Computer networks are classified by _____ factors.

                         4…confirm

 

85.  ______ is also called self healing network.

                                                                         FDDI….confirm

 

86.  ________ was the first automated tool required to see whether the given computer is online or not.

                                     PING program….confirm

 

87.  Ethernet uses a ______ bit static addressing scheme in which device is assigned a unique address by the manufacturer.

                                        48….confirm

 

88.  ________ is designed to detect transmission errors, send one extra bit of information with each character.

                                          Parity….confirm

                      

89.  Hardware addresses must be _______ on a LAN.

                                  Unique….confirm

 

90.  The Fast Ethernet hardware operates at a rate of ________.

              100 Mbps…..confirm

 

91.  Inside a computer each address mask is stored as a _______ bit value.

                                 32…..confirm

 

92.  The protocol address of the next hop must be ------ to an equivalent hardware address before a packet can be sent.

                            Translated….confirm

 

 

 

93.  _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

                              Transport layer….confirm

 

94.  _________ are two standard implementations to improve computational efficiency.

                                    Hashing and direct indexing….confirm

 

95.  ________ of TCP/IP protocol suit defines the basic characteristics of network hardware.

                                 Physical layer….confirm

 

96.  Dotted decimal represents each octet in _________ and uses a dot to separate octets.

                                             Decimal…confirm

 

97.   In closed-form computation the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.

                               Arithmetic…confirm

 

98.  Address Resolution Protocol is mostly used to bind a 32-bit IP address to a _______ Ethernet address.

                                                     48-bit…confirm

 

99.  A  separate ________ table is used for each physical network.

                             Address-binding…confirm

 

100.                      The ethernet speed was originally __________.

                                   3MBps…..confirm

101.                      The current standard is _________.

                                    10Mbps….confirm

102.      ________ Source is responsible for fragmentation.

a.      IPV6……confirm

103.      Which of the following statement is true regarding ATM?

a.      It is a single technology for voice, video and data.

b.      It has low jitter and high capacity.

c.       It uses fixed size, small ells, 48 octet’s data.

d.      All of the above

104.      As a result of ARPA research, the first network was established which was named as ________.

a.      ARPANET…..confrim

 

105.      ________ protocol uses three way handshake to begin a connection.

a.      TCP……confirm

 

106.      NAT device stores state information in translation table.

                                  False…confirm

 

107.          NaT device stores state information in table

                                          True…confirm

108.          The number of connections needed for 8 computers in direct point to point communication is equal to _____________.

                                         28….confirm

 

109.      The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

Distributed Spanning Tree……confirm

 

110.      ________ places the boundary between the second and third octets.

                                         Class B….confirm

 

111.      ________ cannot be extended arbitrarily far or to handle arbitrarily many computers.

                                     LAN…..confirm

 

112.      ________ encapsulates IP datagram as data area in hardware frame.

          Network Interface Layer….confirm

 

113.      ________ is standard wireless LAN that uses radio signals at 2.4GHz.

IEEE 802.11…..confirm

 

114.      Missing ________ in a frame format indicates receiving computer missed beginning of the message.

Soh…….confirm

 

115.    Missing _______ indicates sending computer crashed.

                           Eot….confirm

 

116.      An interior switch is one with wich ________..

No computer is attached…..confirm

117.      VBR stands for __________.

Variable Bit Rate….confirm

 

118.       ABR stands for_____________.

                      Available Bit rate….confirm

 

119.                      CBR stands for __________.

                        Constant Bit rate….confirm          

 

120.      If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.

                 Collision…..confirm

 

121.      The first automated tool required to see whether the given computer is online or not was

PING program…..confirm

 

122.      The recent executed instruction ________ in temporal aspect of the locality of reference.

is temporarily not referenced

 

123.      The ________ of errors is easier than the ________ of errors.

correction, detection

 

124.      ATM header is about ________ of the cell.

10 %

 

125.      Hardware that calculates a CRC uses two simple components ________.

Shift register and XOR unit….confirm

 

126.      ________ is inflexible.

Static routing….confirm

127.      Frames include additional information to detect/correct errors are insert by ________.

Sender and Receiver…confirm

128.      Fragmentation when using ICMP for path MTU should be avoided.

True…confirm

129.      The frame format of any LAN technology must consists of ________ and ________.

Frame header and pay load…..confirm

 

130.      SMDS(Switched Multi megabit Data Service) is ________.

Connection less service….confirm

131.      Which of the following is not a guided medium?

           Atmosphere

132.      ________ are more frequently being designed to allow specification of the quality of service required by users.

       Networks….confirm

133.      The physical addressing in a WAN is similar as in LAN in the way __________.

a.      The data is transmitted in packets equivalent to frames.

b.      Each packet has a format with header.

c.       The packet header includes destination and source addresses.

d.      All of the above

134.      Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.

                    True….confirm

135.      NIC connection in a physical network is known as __________.

              LAN wiring scheme…..confirm

136.      A ________ is a special-purpose computer dedicated to the task of interconnecting networks.

                          Router….confirm

137.      The third field of the header consists of ___________ bit Ethernet frame type.

                               16

138.      ________ is the most popular wiring scheme because of lowest cost.

             10 Base T….confirm

139.      To span long distances or many computers, networks must replace shared medium with _________.

packet switches….confirm

140.      Frame relay is ________.

Connection oriented service….confirm

141.      Which multiplexing technique transmits analog signals?

a.      FDM

b.      TDM

c.       WDM

d.      Both (a) and (c)….confirm

142.      Which of the following is not a benefit of Source Independence?

a.      It allows fast and efficient routing.

b.      Packet switch need not hove complete information about all destinations.

c.       network functions even if topology changes.

d.      None of the given……confirm

  1. Frames include additional information to detect/correct errors are insert by ________.

    1. Sender
    2. Receiver
    3. Network Devices
    4. Sender and Receiver
  2. SMDS is ________.

    1. Connectionless service
    2. Connection oriented service
    3. Used for delivering blocks of data
    4. None of the given
  3. The topology each computer is connected to a central hub is called

    1. Ring topology
    2. Star topology
    3. Tree topology
    4. Mesh topology
  4. If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?

    1. 11 Megabit
    2. 100 Megabit
    3. 1 Gigabit
    4. 1.1 Gigabit
  5. The ________ field of Ethernet frame has the purpose of receiver synchronization.

    1. Preamble
    2. Frame Type
    3. Data
    4. CRC
  6. ________ are more frequently being designed to allow specification of the quality of service required by users.

    1. Switch
    2. VPI
    3. VCI
    4. Networks
  7. Which layer of the OSI Model directly communicates and controls the transmission medium:

    1. Transmission
    2. Physical
    3. Application
    4. Network
  8. ________ and ________ are the two types of frame type.

    1. Internal and external
    2. Single and dual
    3. Implicit and explicit
    4. Multicast and broadcast
  9. According to size, there are ________ classifications of networks.

    1. 2
    2. 3
    3. 4
    4. 5
  10. We need packets rather than bits because ________.

    1. To compress the data
    2. Packets move faster
    3. Sender and receiver need to coordinate to detect transmission errors.
    4. Packets can only move between two terminals
  11. According to a bridge performance, if both the source and destination are on the same segment.

    1. It forwards the frame to the other segment
    2. It does not forward the frame to the other segment
    3. It does not forward the frame to the same segment
    4. It forwards the frame to every other segment
  12. ________ is the most popular wiring scheme because of lowest cost.

    1. 5 Base T
    2. 10 Base T
    3. 100 Base T
    4. 1000 Base T
  13. Point-to-point topology is

    1. Size Based
    2. Mobility Based
    3. Connectivity Based
    4. Medium Based
  14. The recent executed instruction ________ in temporal aspect of the locality of reference.

    1. won't be executed soon
    2. is temporarily not referenced
    3. will be wxwcuted soon again
    4. will be showing the final results
  15. Even parity can be used to check for ________ bit/bits of errors.

    1. 1
    2. 2
    3. 3
    4. 0
  16. ________ is inflexible.

    1. Routing
    2. Searching
    3. Processing
    4. Static routing
  17. The switch that has computers attached with it is called ________ switch.

    1. Exterior
    2. Interior
    3. Packet
    4. Front
  18. ________ cannot be extended arbitrarily far or to handle arbitrarily many computers.

    1. WAN
    2. LAN
    3. MAN
    4. LED
  19. The length of time required to send a variable length packet is ________.

    1. 5 seconds
    2. Variable
    3. Constant
    4. Fix
  20. If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.

    1. Burst error
    2. Vertical error
    3. Parity Error
    4. Single bit error
  21. ATM header is about ________ of the cell.

    1. 100 %
    2. 10 %
    3. 20 %
    4. 50 %
  22. In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.

    1. Computers
    2. Network
    3. Frames
    4. Cable wires
  23. The ________ of errors is easier than the ________ of errors.

    1. correction, detection
    2. detection, correction
    3. correction, creation
    4. detection, manipulation
  24. The sharing of a ________ among the workers in an office is a goal of resource sharing.

    1. Mouse
    2. Printer
    3. Keyboard
    4. Motherboard
  25. Frame relay is ________.

    1. Connection oriented service
    2. Connectionless service
    3. It is typically ranges from 5Mbps to 1000Mbps
    4. None of the given
  26. ________ is a measure of the rate at which data can be sent through the network.

    1. Throughput
    2. Propagation delay
    3. Access delay
    4. Switching delay
  27. Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?

    1. Source Address
    2. Destination Address
    3. Next Node Address
    4. Checksum
  28. Which of the following technologies can extend the diameter of LAN medium?

    1. Fiber optic
    2. Repeaters
    3. Diameter of LAN medium is not extendable
    4. Both Fiber Optic and Repeaters
  29. SMDS is ________.

    1. Connectionless service
    2. Connection oriented service
    3. Used for delivering blocks of data
    4. None of the given
  30. The information about ________ is kept in routing tables.

    1. Entries
    2. Destinations
    3. Source
    4. Packets
  31. Physical Addressing is a WAN is similar to LAN as each packet has format with ________.

    1. Header
    2. Title
    3. Frame
    4. Address
  32. Which of the following cannot be used to extend a LAN?

    1. Repeaters
    2. Switches
    3. Routers
    4. Fiber Modems
  33. The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

    1. Djikstra
    2. Shortest path first
    3. Vector distance
    4. Distributed Spanning Tree
  34. If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.

    1. collision
    2. delayed transmission
    3. packet loss
    4. coordination
  35. The Ethernet standard specifies that frames are sent using the ________ scheme.

    1. Differential Manchester
    2. Not Return to Zero (NRZ)
    3. Return to Zero (RZ)
    4. Manchester Encodind
  36. Bluetooth uses shared medium and ________ instead of coaxial cable.

    1. Radio waves
    2. Low frequency waves
    3. Micro waves
    4. Infrared waves
  37. In Direct point to point communication adding the Nth computer requires ________ new connections.

    1. (N^2 - N)/2
    2. N^2
    3. N(N - 1)
    4. N - 1
  38. Which type of network consists of wired computers in a university classroom?

    1. WAN
    2. LAN
    3. MAN
    4. PAN
  39. As a result of ARPA research, the first network was established which was named as ________.

    1. ARPANET
    2. PACKET NETWORK
    3. ARPNET
    4. INTERNETWORKING
  40. Each computer in LAN is identified by a physical address, usually imprinted on the ________.

    1. Router
    2. Switch
    3. Network Interface Card
    4. Modem
  41. ________ is standard wireless LAN that uses radio signals at 2.4HHz.

    1. IEEE 803.16
    2. IEEE 802.3
    3. IEEE 802.15
    4. IEEE 802.11
  42. Missing ________ in a frame format indicates receiving computer missed beginning of the message.

    1. soh
    2. eoh
    3. eot
    4. sot
  43. Thick Ethernet also requires ________ to avoid signal reflectance.

    1. Terminators
    2. Drop cable
    3. Transceivers
    4. AUI cable
  44. The number of connections needed for 8 computers in direct point to point communication is equal to ________.

    1. 28
    2. 8
    3. 7
    4. 26
  45. ________ is a tool that sends a message to a remote computer and reports whether the computer responds.

    1. Ping
    2. Flag
    3. Fragment offset
    4. TCP
  46. The Fast Ethernet hardware operates at a rate of ________.

    1. 10 Mbps
    2. 1000 Mbps
    3. 1000 bps
    4. 100 Mbps
  47. In ________ topology, if the switch goes down all the computers will be disconnected.

    1. Bus
    2. Ring
    3. Mesh
    4. Star
  48. In a ping command result, time denotes the ________.

    1. TLT
    2. BRT
    3. TTL
    4. RTT
  49. Hardware that calculates a CRC uses two simple components ________.

    1. Shift register and XOR unit
    2. ANd unit and XOR unit
    3. Shift register and shift XOR unit
    4. Shift register & AND unit
  50. The frame format of any LAN technology must consists of ________ and ________.

    1. Payload and CRC
    2. Payload and Frame type
    3. Frame header and pay load
    4. Frame header and CRC
  51. In FDDI, in case of a station failure, remaining stations loop back and ________.

    1. Re-route data through spare ring
    2. Data frames are discarded
    3. Re-transmit data through the same ring
    4. Collision will occur
  52. In ________ all computers are attached to a central hub.

    1. Star Topology
    2. Bus Topology
    3. Hub Topology
    4. Ring Topology
  53. The network occupies larger areas like cities & countries is called

    1. LAN
    2. WAN
    3. MAN
    4. All of the above
  54. The first automated tool required to see whether the given computer is online or not was

    1. Probing program
    2. PING program
    3. status program
    4. None of the above
  55. LAN interface uses ________ to copy frame data directly from main memory.

    1. DMA
    2. FDDI
    3. Hard disk
    4. Flash
  56. When an application _________ data, it makes a copy of the data available to all other computers on the network.

    1. Broadcasting
    2. Multicasting
    3. Unicasting
    4. None of the given
  57. The third field of the header consists of ___________ bit Ethernet frame type.

    1. 48
    2. 32
    3. 16
    4. 8
  58. The maximum cable length of a LAN is ________.

    1. Fixed
    2. Unlimited
    3. Fixed and Unlimited in different conditions
    4. None of these
  59. The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.

    1. Low, High
    2. High, Low
    3. High, High
    4. Low, Low
  60. The physical addressing in a WAN is similar as in LAN in the way __________.

    1. The data is transmitted in packets equivalent to frames.
    2. Each packet has a format with header.
    3. The packet header includes destination and source addresses.
    4. All of the above
  61. To span long distances or many computers, networks must replace shared medium with _________.

    1. segment transformation
    2. fiber optices
    3. packet switches
    4. None of the above
  62. Which of the following is a benefit of source independence?

    1. It allows fast and efficient routing.
    2. Packet switch do not need to have complete information about all destinations
    3. Network functions even if topology changes
    4. All of the above
  63. Which of the following is not a benefit of Source Independence?

    1. It allows fast and efficient routing.
    2. Packet switch need not hove complete information about all destinations.
    3. network functions even if topology changes.
    4. None of the given
  64. An interior switch is one with wich ________.

    1. Computers are attached.
    2. No computer is attached.
    3. Computers are attached internally.
    4. None of the above.
  65. How many methods exist for computing routing table?

    1. 5
    2. 4
    3. 3
    4. 2
  66. Which of the following statement is true regarding ATM?

    1. It is a single technology for voice, video and data.
    2. It has low jitter and high capacity.
    3. It uses fixed size, small cells, 48 octet’s data.
    4. All of the above
  67. Which of the following is called virtual channel?

    1. Connection in VCI
    2. Connection in ATM
    3. Connection in virtual circuit
    4. None of the above
  68. Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.

    1. true
    2. false
  69. VBR stands for __________.

    1. Virtual Bit Rate
    2. Virtual Byte Rate
    3. Variable Byte Redundancy
    4. Variable Bit Rate

Post a Comment

0Comments

Thanks everone

Post a Comment (0)