CS610 130+ Mcqs
Quiz 1 Lec 1-9
#Mid-Term
WITH PROVE ANSWER
Important NOTE:-
Like share and comment too ..ager koi mistake hogaye ho to sorry and comment main lazmi mention krdijiye ga takey main correction krlon file main …. And like zaroor krein is hamein or bhe apsab keyliye files makes krny ke himat milti hey …JAZAKALLAH
Star topolgy is the kind of
Tree topology
1. When an application ____ any data, it makes a copy of the data available to all other computers on the network.
Multicast…..confirm
2. There are _____ types of data stuffing
2….confirm
3. Which of the following is a benefit of direct point to point communication?
Security implementation…..confirm
4. If you as a network administrator want to know the traffic flow of your data while communicating with a remote computer which of the following will be used to know about intermediate routers?
Ping…..confirm
5. Which of the following network is using the TCP/IP model globally?
The internet….confirm
6. In which type of error detection the arithmetic sum is calculated before and after the transmission of data at both communication ends?
Checksum…..confrim
7. Hardware address is also called ___________.
Physical address……confirm
8. The sharing of a ________ among the workers in an office is a goal of resource sharing
Printer….confirm
9. Thick Ethernet also requires __________ to avoid signal reflectance
Terminators…confirm
10. The ________ Field of Ethernet frame has the purpose of frame payload.
Data….confirm
11. In ______ each station is allocated time slot during which it can send data. Each station transmits its data in its assigned time slot.
TDMA…confirm
12. In______ all computers are attached to a central hub
Star topology…..confirm
13. In which topology terminators are used at the end of the cable?
Bus….confirm
14. A network uses __________ to arrange computers in a single closed loop.
Ring topology…confirm
15. LAN interface uses _________ to copy frame data directly from main memory
DMA….confirm
16. In direct point to point communication adding the NTH computer requires ______ new connections
N-1….confirm
17. ___________ uses counter rotating rings in which data flows in opposite directions
FDDI….confirm
18. We need pockets rather than bits because _______.
Sender and receiver need to coordinate to detect transmission errors.
19. The gigabit Ethernet hardware operates at a rate of _____________.
1000 Mbps…..confirm
20. Each computer in LAN is identified by a Physical address usually imprinted on the _________.
Network interface card…..confirm
21. __________________ network does not depend on CSMA/CD.
Ethernet….confirm
22. LAN interface hardware obeys _________ access rule.
CSMA/CD….confirm
23. Point-to-point topology is
Connectivity based….confirm
24. Parity check is usually used to detect _____ bit error(s).
1….confirm
25. __________ is a tool that sends a message to a remote computer and reports whether the computer responsibility
Ping…confirm
26. LAN and WAN are classified according to their _______.
Size….confirm
27. In a ping command result, time denotes the _________.
RTT….confirm
28. How many computers are mandatory to form a network?
2
29. In __ technique data is treated as a sequence of integers and their arithmetic sum is computed and the carry bits are added to the final sum
Checksum….confirm
30. In taken ring, if all computers are ready to transmit it enforces ________ access.
Round-robin access…..confirm
31. Fixed network is a type of networks which is classified with respect to the ______ factor.
Mobility….confirm
32. __________ are two standard implementations to improve computational efficiency
Hashing and direct indexing…confirm
33. In the IP address ________ identifies an individual computer on the network.
Suffix….confirm
34. In the IP address ________ identifies the physical network to which the computers are attached.
Prefix….confirm
35. __________ Serve same purpose in internet as frames on LAN.
Packets…..confirm
36. IP datagram can contains ___ octets.
1-65.535…confirm
37. TCP/IP defines the term ____ to refer any computer system that connects to a network and runs applications for users.
Host computer….confirm
38. _______protocols of TCP/IP layering model specify how to organize data into frame and how a computer transmits frames over a network.
Network interface layer….confirm
39. ______ of TCP/IP protocol suit specifies the format of packets sent across internet as well as the mechanisms used to forward packets.
Internet….confirm
40. As the internet grew the original Glassful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of _____ possible sizes.
Three….confirm
41. Dotted decimal notation is a syntactic form the IP software uses to express _______ binary values when interacting with humans.
32-bit….confirm
42. Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included.
Rectfer…..confirm
43. For ________ information about forwarding is stored in a routing table which is initialized at system initialization and must be updated as network topology changes.
Efficiency…..confirm
44. MTU stands for __________.
Maximum transmission Unit…..confirm
45. In closed-form computation the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and ____________ operations.
Arithemetic….confirm
46. Internet Protocol (IP) address version 4 is comprised of ______ bits.
32…confirm
47. The current version of IP-Version 4 is ______ old.
20….confirm
48. _______________ contains all information needed to deliver datagram to the destination.
Header…confirm
49. Address resolution protocol is mostly used to bind a 32-bit IP address to a ________ Ethernet address.
48….confirm
50. The protocol address of the most hop must be _______ to an equivalent hardware before a packet can be sent.
Translated….confrim
51. HEADER LEN field gives size of extension header.
True….confirm
52. Class A mask is 255.0.0.0 which is used for ________.
Subnetting….confirm
53. IPV6 address consists of ________.
128 bits….confirm
54. The header format of IPV6 is entirely different.
True….confirm
55. HLEN shows the header length in units of _________ bits.
32 bits…confirm
56. VERS shows the version of _____.
IP…..confirm
57. TOTAL LENGTH shows total octets in _______.
Datagram…confirm
58. A datagram cannot be larger than _______ of a network over which it is sent.
MTU…confirm
59. Every hardware technology specification includes the definition of the maximum size of the frame data area which is called the _______ transmission Unit.
Maximum…..confirm
60. The IP class scheme does not divide the _________ address space into equal size class and the classes do not contain the same number of networks.
32-bit….confirm
61. _______shows senders preference for low latency high reliability.
Service type….confrim
62. NEXT HEADER field in the base header defines type of header if appears at the end of fixed-size base header.
True…..confirm
63. _________ uses counter rotating rings in which data flows in opposite directions.
FDDI….confirm
64. In ________ all computers are attached to a central hub.
Star topology….confirm
65. In a ___ all computers are attached to a single cable and any computer can send data to any other computer.
Bus topology….confirm
66. __________ is standard wireless LAN that uses radio signals at 2.4GHz.
IEEE 802.11…..confirm
67. Star topology is the kind of _______.
Point to point topology…..confirm
68. Tree topology is the kind of _.
Point to point topology….confirm
69. In FDDI, in case of a station failure, remaining stations loop back and _______.
Re-route data through spare ring…..confirm
70. _______ are the two frame types
Multicast and broadcast….confrim
71. In ___ topology if the switch goes down all the computers will be disconnected.
Star….confirm
72. Which type of network consists of wireless connection of laptops in a university classroom?
LAN….confirm
73. The basic idea behind the operation of network analyzer is a computer with a network interface that receives all frames, which is called
Promiscuous mode…..confirm
74. WE need packets rather than bits because________.
a sender and receiver need to coordinate to detect transmission errors…confirm
75. As a result of ARPA research, the first network was established which was named as _____.
ARPANET…..confirm
76. While transmitting data from source destination B, 4 bits are changed during the transmission then the error is a _________.
Brust error….confirm
77. Each computer in LAN is identified by a physical address, usually imprinted on the _________.
Network interface card….confirm
78. Which type of network consists of wired computers in a university classroom?
LAN….confirm
79. Bluetooth uses shared medium and _______ instead of coaxial cable.
Radio waves….confirm
80. The Ethernet standard specifies that frames are sent using the _____ scheme.
Manchester Encoding…..confirm
81. In ________ technique, all members of the network can send data on the specific time slot?
CSMA….confirm
82. A network uses ______ to arrange computers in a single closed loop
Ring topology….confrim
83. NICs can provide all three-connection technologies.
RJ-45 connector for 10 base-T, AUI connector for thicknet and BNC connector for Thinnet…..confirm
84. Computer networks are classified by _____ factors.
4…confirm
85. ______ is also called self healing network.
FDDI….confirm
86. ________ was the first automated tool required to see whether the given computer is online or not.
PING program….confirm
87. Ethernet uses a ______ bit static addressing scheme in which device is assigned a unique address by the manufacturer.
48….confirm
88. ________ is designed to detect transmission errors, send one extra bit of information with each character.
Parity….confirm
89. Hardware addresses must be _______ on a LAN.
Unique….confirm
90. The Fast Ethernet hardware operates at a rate of ________.
100 Mbps…..confirm
91. Inside a computer each address mask is stored as a _______ bit value.
32…..confirm
92. The protocol address of the next hop must be ------ to an equivalent hardware address before a packet can be sent.
Translated….confirm
93. _______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
Transport layer….confirm
94. _________ are two standard implementations to improve computational efficiency.
Hashing and direct indexing….confirm
95. ________ of TCP/IP protocol suit defines the basic characteristics of network hardware.
Physical layer….confirm
96. Dotted decimal represents each octet in _________ and uses a dot to separate octets.
Decimal…confirm
97. In closed-form computation the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Arithmetic…confirm
98. Address Resolution Protocol is mostly used to bind a 32-bit IP address to a _______ Ethernet address.
48-bit…confirm
99. A separate ________ table is used for each physical network.
Address-binding…confirm
100. The ethernet speed was originally __________.
3MBps…..confirm
101. The current standard is _________.
10Mbps….confirm
102. ________ Source is responsible for fragmentation.
a. IPV6……confirm
103. Which of the following statement is true regarding ATM?
a. It is a single technology for voice, video and data.
b. It has low jitter and high capacity.
c. It uses fixed size, small ells, 48 octet’s data.
d. All of the above
104. As a result of ARPA research, the first network was established which was named as ________.
a. ARPANET…..confrim
105. ________ protocol uses three way handshake to begin a connection.
a. TCP……confirm
106. NAT device stores state information in translation table.
False…confirm
107. NaT device stores state information in table
True…confirm
108. The number of connections needed for 8 computers in direct point to point communication is equal to _____________.
28….confirm
109. The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.
Distributed Spanning Tree……confirm
110. ________ places the boundary between the second and third octets.
Class B….confirm
111. ________ cannot be extended arbitrarily far or to handle arbitrarily many computers.
LAN…..confirm
112. ________ encapsulates IP datagram as data area in hardware frame.
Network Interface Layer….confirm
113. ________ is standard wireless LAN that uses radio signals at 2.4GHz.
IEEE 802.11…..confirm
114. Missing ________ in a frame format indicates receiving computer missed beginning of the message.
Soh…….confirm
115. Missing _______ indicates sending computer crashed.
Eot….confirm
116. An interior switch is one with wich ________..
No computer is attached…..confirm
117. VBR stands for __________.
Variable Bit Rate….confirm
118. ABR stands for_____________.
Available Bit rate….confirm
119. CBR stands for __________.
Constant Bit rate….confirm
120. If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.
Collision…..confirm
121. The first automated tool required to see whether the given computer is online or not was
PING program…..confirm
122. The recent executed instruction ________ in temporal aspect of the locality of reference.
is temporarily not referenced
123. The ________ of errors is easier than the ________ of errors.
correction, detection
124. ATM header is about ________ of the cell.
10 %
125. Hardware that calculates a CRC uses two simple components ________.
Shift register and XOR unit….confirm
126. ________ is inflexible.
Static routing….confirm
127. Frames include additional information to detect/correct errors are insert by ________.
Sender and Receiver…confirm
128. Fragmentation when using ICMP for path MTU should be avoided.
True…confirm
129. The frame format of any LAN technology must consists of ________ and ________.
Frame header and pay load…..confirm
130. SMDS(Switched Multi megabit Data Service) is ________.
Connection less service….confirm
131. Which of the following is not a guided medium?
Atmosphere
132. ________ are more frequently being designed to allow specification of the quality of service required by users.
Networks….confirm
133. The physical addressing in a WAN is similar as in LAN in the way __________.
a. The data is transmitted in packets equivalent to frames.
b. Each packet has a format with header.
c. The packet header includes destination and source addresses.
d. All of the above
134. Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.
True….confirm
135. NIC connection in a physical network is known as __________.
LAN wiring scheme…..confirm
136. A ________ is a special-purpose computer dedicated to the task of interconnecting networks.
Router….confirm
137. The third field of the header consists of ___________ bit Ethernet frame type.
16
138. ________ is the most popular wiring scheme because of lowest cost.
10 Base T….confirm
139. To span long distances or many computers, networks must replace shared medium with _________.
packet switches….confirm
140. Frame relay is ________.
Connection oriented service….confirm
141. Which multiplexing technique transmits analog signals?
a. FDM
b. TDM
c. WDM
d. Both (a) and (c)….confirm
142. Which of the following is not a benefit of Source Independence?
a. It allows fast and efficient routing.
b. Packet switch need not hove complete information about all destinations.
c. network functions even if topology changes.
d. None of the given……confirm
Frames include additional information to detect/correct errors are insert by ________.
- Sender
- Receiver
- Network Devices
- Sender and Receiver
SMDS is ________.
- Connectionless service
- Connection oriented service
- Used for delivering blocks of data
- None of the given
The topology each computer is connected to a central hub is called
- Ring topology
- Star topology
- Tree topology
- Mesh topology
If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?
- 11 Megabit
- 100 Megabit
- 1 Gigabit
- 1.1 Gigabit
The ________ field of Ethernet frame has the purpose of receiver synchronization.
- Preamble
- Frame Type
- Data
- CRC
________ are more frequently being designed to allow specification of the quality of service required by users.
- Switch
- VPI
- VCI
- Networks
Which layer of the OSI Model directly communicates and controls the transmission medium:
- Transmission
- Physical
- Application
- Network
________ and ________ are the two types of frame type.
- Internal and external
- Single and dual
- Implicit and explicit
- Multicast and broadcast
According to size, there are ________ classifications of networks.
- 2
- 3
- 4
- 5
We need packets rather than bits because ________.
- To compress the data
- Packets move faster
- Sender and receiver need to coordinate to detect transmission errors.
- Packets can only move between two terminals
According to a bridge performance, if both the source and destination are on the same segment.
- It forwards the frame to the other segment
- It does not forward the frame to the other segment
- It does not forward the frame to the same segment
- It forwards the frame to every other segment
________ is the most popular wiring scheme because of lowest cost.
- 5 Base T
- 10 Base T
- 100 Base T
- 1000 Base T
Point-to-point topology is
- Size Based
- Mobility Based
- Connectivity Based
- Medium Based
The recent executed instruction ________ in temporal aspect of the locality of reference.
- won't be executed soon
- is temporarily not referenced
- will be wxwcuted soon again
- will be showing the final results
Even parity can be used to check for ________ bit/bits of errors.
- 1
- 2
- 3
- 0
________ is inflexible.
- Routing
- Searching
- Processing
- Static routing
The switch that has computers attached with it is called ________ switch.
- Exterior
- Interior
- Packet
- Front
________ cannot be extended arbitrarily far or to handle arbitrarily many computers.
- WAN
- LAN
- MAN
- LED
The length of time required to send a variable length packet is ________.
- 5 seconds
- Variable
- Constant
- Fix
If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.
- Burst error
- Vertical error
- Parity Error
- Single bit error
ATM header is about ________ of the cell.
- 100 %
- 10 %
- 20 %
- 50 %
In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.
- Computers
- Network
- Frames
- Cable wires
The ________ of errors is easier than the ________ of errors.
- correction, detection
- detection, correction
- correction, creation
- detection, manipulation
The sharing of a ________ among the workers in an office is a goal of resource sharing.
- Mouse
- Printer
- Keyboard
- Motherboard
Frame relay is ________.
- Connection oriented service
- Connectionless service
- It is typically ranges from 5Mbps to 1000Mbps
- None of the given
________ is a measure of the rate at which data can be sent through the network.
- Throughput
- Propagation delay
- Access delay
- Switching delay
Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?
- Source Address
- Destination Address
- Next Node Address
- Checksum
Which of the following technologies can extend the diameter of LAN medium?
- Fiber optic
- Repeaters
- Diameter of LAN medium is not extendable
- Both Fiber Optic and Repeaters
SMDS is ________.
- Connectionless service
- Connection oriented service
- Used for delivering blocks of data
- None of the given
The information about ________ is kept in routing tables.
- Entries
- Destinations
- Source
- Packets
Physical Addressing is a WAN is similar to LAN as each packet has format with ________.
- Header
- Title
- Frame
- Address
Which of the following cannot be used to extend a LAN?
- Repeaters
- Switches
- Routers
- Fiber Modems
The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.
- Djikstra
- Shortest path first
- Vector distance
- Distributed Spanning Tree
If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.
- collision
- delayed transmission
- packet loss
- coordination
The Ethernet standard specifies that frames are sent using the ________ scheme.
- Differential Manchester
- Not Return to Zero (NRZ)
- Return to Zero (RZ)
- Manchester Encodind
Bluetooth uses shared medium and ________ instead of coaxial cable.
- Radio waves
- Low frequency waves
- Micro waves
- Infrared waves
In Direct point to point communication adding the Nth computer requires ________ new connections.
- (N^2 - N)/2
- N^2
- N(N - 1)
- N - 1
Which type of network consists of wired computers in a university classroom?
- WAN
- LAN
- MAN
- PAN
As a result of ARPA research, the first network was established which was named as ________.
- ARPANET
- PACKET NETWORK
- ARPNET
- INTERNETWORKING
Each computer in LAN is identified by a physical address, usually imprinted on the ________.
- Router
- Switch
- Network Interface Card
- Modem
________ is standard wireless LAN that uses radio signals at 2.4HHz.
- IEEE 803.16
- IEEE 802.3
- IEEE 802.15
- IEEE 802.11
Missing ________ in a frame format indicates receiving computer missed beginning of the message.
- soh
- eoh
- eot
- sot
Thick Ethernet also requires ________ to avoid signal reflectance.
- Terminators
- Drop cable
- Transceivers
- AUI cable
The number of connections needed for 8 computers in direct point to point communication is equal to ________.
- 28
- 8
- 7
- 26
________ is a tool that sends a message to a remote computer and reports whether the computer responds.
- Ping
- Flag
- Fragment offset
- TCP
The Fast Ethernet hardware operates at a rate of ________.
- 10 Mbps
- 1000 Mbps
- 1000 bps
- 100 Mbps
In ________ topology, if the switch goes down all the computers will be disconnected.
- Bus
- Ring
- Mesh
- Star
In a ping command result, time denotes the ________.
- TLT
- BRT
- TTL
- RTT
Hardware that calculates a CRC uses two simple components ________.
- Shift register and XOR unit
- ANd unit and XOR unit
- Shift register and shift XOR unit
- Shift register & AND unit
The frame format of any LAN technology must consists of ________ and ________.
- Payload and CRC
- Payload and Frame type
- Frame header and pay load
- Frame header and CRC
In FDDI, in case of a station failure, remaining stations loop back and ________.
- Re-route data through spare ring
- Data frames are discarded
- Re-transmit data through the same ring
- Collision will occur
In ________ all computers are attached to a central hub.
- Star Topology
- Bus Topology
- Hub Topology
- Ring Topology
The network occupies larger areas like cities & countries is called
- LAN
- WAN
- MAN
- All of the above
The first automated tool required to see whether the given computer is online or not was
- Probing program
- PING program
- status program
- None of the above
LAN interface uses ________ to copy frame data directly from main memory.
- DMA
- FDDI
- Hard disk
- Flash
When an application _________ data, it makes a copy of the data available to all other computers on the network.
- Broadcasting
- Multicasting
- Unicasting
- None of the given
The third field of the header consists of ___________ bit Ethernet frame type.
- 48
- 32
- 16
- 8
The maximum cable length of a LAN is ________.
- Fixed
- Unlimited
- Fixed and Unlimited in different conditions
- None of these
The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.
- Low, High
- High, Low
- High, High
- Low, Low
The physical addressing in a WAN is similar as in LAN in the way __________.
- The data is transmitted in packets equivalent to frames.
- Each packet has a format with header.
- The packet header includes destination and source addresses.
- All of the above
To span long distances or many computers, networks must replace shared medium with _________.
- segment transformation
- fiber optices
- packet switches
- None of the above
Which of the following is a benefit of source independence?
- It allows fast and efficient routing.
- Packet switch do not need to have complete information about all destinations
- Network functions even if topology changes
- All of the above
Which of the following is not a benefit of Source Independence?
- It allows fast and efficient routing.
- Packet switch need not hove complete information about all destinations.
- network functions even if topology changes.
- None of the given
An interior switch is one with wich ________.
- Computers are attached.
- No computer is attached.
- Computers are attached internally.
- None of the above.
How many methods exist for computing routing table?
- 5
- 4
- 3
- 2
Which of the following statement is true regarding ATM?
- It is a single technology for voice, video and data.
- It has low jitter and high capacity.
- It uses fixed size, small cells, 48 octet’s data.
- All of the above
Which of the following is called virtual channel?
- Connection in VCI
- Connection in ATM
- Connection in virtual circuit
- None of the above
Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.
- true
- false
VBR stands for __________.
- Virtual Bit Rate
- Virtual Byte Rate
- Variable Byte Redundancy
- Variable Bit Rate
Thanks everone