Sunteți pe pagina 1din 28

Demodulation is a process of

A.
B.
C.
D.

Converting analog to digital signals


Converting digital to analog signals
Multiplexing various signals into one high speed line signals
Performing data description

Answer A____________________________________________________________________
_________________
How many hosts are attached to each of the local area networks at your site?

A.
B.
C.
D.

128
256
254
512

Answer C____________________________________________________________________
_________________
If the period of a signal is 1000 ms, then what is its frequency in kilohertz ?

A.
B.
C.
D.

103 KHz
102 KHz
101 KHz
1 KHz

Answer A____________________________________________________________________
_________________
Device on one network can communicate with devices on another network via a

A.
B.
C.
D.

Hub/Switch
Utility server
File server
Gateway

Answer D____________________________________________________________________
_________________
How many digits of the DNIC (Data Network Identification Code) identify the country?

A.
B.
C.
D.

First three
First four
First five
First six

Answer A____________________________________________________________________
_________________
Which layer of OSI reference model uses the ICMP (Internet Control Message Protocol)

A.
B.
C.
D.

Transport layer
Data link layer
Network layer
Application layer

Answer C____________________________________________________________________
_________________

The device which connects dissimilar LANs of different topologies using different sets of
communication protocols so that information can flow from one to another is called

A.
B.
C.
D.

Router
Bridge
Gateway
Switch

Answer C____________________________________________________________________
_________________
Which of the following technique is used for encapsulation?

A. A technique used in best-effort delivery systems to avoid endlessly looping packets.


B. A technique used by protocols in which a lower level protocol accepts a message from a
higher level protocol and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller
pieces for transmission across a network that cannot handle the original datagram size
D. All of the above
Answer B____________________________________________________________________
_________________
What frequency range is used for FM radio transmission?

A.
B.
C.
D.

Very Low Frequency : 3 kHz to 30. kHz


Low Frequency : 30 kHz to 300 kHz
High Frequency : 3 MHz to 30 MHz
Very High Frequency : 30 MHz to 300 MHz

Answer D____________________________________________________________________
_________________
Which of the following types of channels moves data relatively slowly?

A.
B.
C.
D.

Wideband channel
Voiceband channel
Narrowband channel
Broadband channel

Answer C
In cyclic redundancy checking CRC is the

A.
B.
C.
D.

Divisor
Quotient
Dividend
Remainder

Answer D_____________________________________________________________
________________________
Mobile IP provides two basic functions

A.
B.
C.
D.

Route discovery and registration


Agent discovery and registration
IP binding and registration
None of the above

Answer B_____________________________________________________________
________________________

The amount of uncertainty in a system of symbol is called

A.
B.
C.
D.

Bandwidth
Entropy
Loss
Quantum

Answer B_____________________________________________________________
________________________
Match the following with link quality measurement and handoff initiation :
(a) Networked-Controlled Handoff(NCHO) (i) MS connect to BS
(b) Mobile-Assisted Handoff(MAHO)
(ii) Process via channel the target BS
(c) Forward Handoff
(iii) First Generation Analog Cellular System
(d) Hard Handoff
(iv) Second Generation Digital Cellular
System

A.
B.
C.
D.

(iii) (iv) (ii) (i)


(ii) (iii) (i) (iv)
(ii) (i) (iv) (iii)
(iv) (iii) (i) (ii)

Answer A_____________________________________________________________
________________________
MTU is specified by

A.
B.
C.
D.

IP Datagram size
Hardware technology
TCP Segment size
None of the above

Answer B_____________________________________________________________
________________________
The number of bits required for an IPV6 address is

A.
B.
C.
D.

32
64
128
256

Answer C_____________________________________________________________
________________________
Check sum used along with each packet computes the sum of the data, where data is
treated as a sequence of

A.
B.
C.
D.

Integer
Character
Real numbers
Bits

Answer D_____________________________________________________________
________________________
Which technology is sometime referred to as wireless cable ?

A.
B.
C.
D.

MMDS
ATM
LMDS
CDMA

Answer A_____________________________________________________________
________________________
Frames from one LAN can be transmitted to another LAN via the device

A.
B.
C.
D.

Router
Bridge
Repeater
Modem

Answer B_____________________________________________________________
________________________
Protocol used to monitor and control network devices operates at

A.
B.
C.
D.

Application layer
Transport layer
Network layer
Data Link layer

Answer A
FTP does not use

A.
B.
C.
D.

Two transfer mode


Control connect ion to remote computer before file can be transfer red
User Datagram Protocol
Authorizat ion of a user through login and password verification

Answer C_____________________________________________________________
________________________
Sending a file from your personal computer primary memory or disk to another
computer is called

A.
B.
C.
D.

Uploading
Downloading
Logging on
Hang on

Answer A_____________________________________________________________
________________________
A telephone conference call is an example of which type of communications

A.
B.
C.
D.

Same time / same place


Same time / different place
Different time / different place
Different time / same place

Answer B_____________________________________________________________
________________________

What is the size (in terms of bits) of Header length field in IPV4 header ?

A.
B.
C.
D.

2
4
8
16

Answer B_____________________________________________________________
________________________
What is the name of the software package that allows people to send electronic mail
along a network of computers and workstations?

A.
B.
C.
D.

Memory resident package


Project management package
Data communication package
Electronic mail package

Answer C_____________________________________________________________
________________________
What are the data transmission channels available for carrying data from one location to
another?

A.
B.
C.
D.

Narrowband
Voiceband
Broadband
All of the above

Answer D_____________________________________________________________
________________________
In case of Bus/Tree topology signal balancing issue is overcome by

A.
B.
C.
D.

Modulation
Polling
Segmentation
Strong transmitter

Answer C_____________________________________________________________
________________________
The research and development department at your office has been experimenting with
different technologies to help improve the performance of the network. One group has
been examining the use of a broadband network versus a based band network. Select
the correct statement about broadband and baseband.

A. Broadband networks carry several channels on a single cable, whereas in a baseband


network several cables carry one channel
B. Baseband networks carry a single channel on a single cable, whereas broadband
networks carry several channels on a single cable
C. Baseband refers to local area networks, and broadband refers to wide area networks.
D. Baseband operates at a standard bit rate, whereas broadband may operate at different
rates as needed

Answer B_____________________________________________________________
________________________
Which of the following IP address class is a multicast address ?

A.
B.
C.
D.

Class A
Class B
Class C
Class D

Answer D_____________________________________________________________
________________________
Devices interconnected by the LAN should include

A.
B.
C.
D.

Computers and terminals


Mass storage device, printers and plotters
Bridges and gateways
All of the above

Answer D
A smart modem can dial, hangup and answer incoming calls automatically. Can you tell
who provides the appropriate instructions to the modem for this purpose ?

A.
B.
C.
D.

Communication software
Error detection protocols
Link access procedure (LAP)
Telecommunications

Answer A_____________________________________________________________
________________________
Which one of the following is an error reporting protocol?

A.
B.
C.
D.

ARP
ICMP
TCP
UDP

Answer B

Explanation ICMP is an error reporting protocol .


______________________________________________________________________
_______________
An Internet Service Provider (ISP) has the following chunk of CIDR-based IP addresses
available with it: 245.248.128.0/20. The ISP wants to give half of this chunk of
addresses to Organization A,
and a quarter to Organization B, while retaining the remaining with itself. Which of the
following is a valid allocation of addresses to A and B?

A.
B.
C.
D.

245.248.136.0/21 and 245.248.128.0/22


245.248.128.0/21 and 245.248.128.0/22
245.248.132.0/22 and 245.248.132.0/21
245.248.136.0/24 and 245.248.132.0/21

Answer A_____________________________________________________________
________________________
The geostationary satellite used for communication systems

A.
B.
C.
D.

Rotates with the earth


Remains stationary relative to the earth
Is positioned over equator
All of the above

Answer D_____________________________________________________________
________________________
An example of an analog communication method is

A.
B.
C.
D.

Laser beam
Microwave
Voice grade telephone line
All of the above

Answer D_____________________________________________________________
________________________
Which address is the loopback address?

A.
B.
C.
D.

0.0.0.1
127.0.0.1
255.255.255.255
127.0.0.0

Answer B_____________________________________________________________
________________________
Network address prefixed by 1110 is a

A.
B.
C.
D.

Class A address
Multicast address
Class B address
Reserve address

Answer B_____________________________________________________________
________________________
ATM is an example of

A.
B.
C.
D.

Ring topology
Star topology
Bus topology
None of the above

Answer B_____________________________________________________________
________________________

A remote batch-processing operation in which data is solely input to a central computer


would require a

A.
B.
C.
D.

Telegraph line
Simplex lines
Mixedband channel
All the above

Answer B_____________________________________________________________
________________________
A Network uses a star topology if

A.
B.
C.
D.

Computers are arranged in a closed loop


All computers attach to a central point
All computers attach to a single long cable
Computers attach to multiple hierarchical cables

Answer B_________________________
The addressing especially used by Transport Layer is

A.
B.
C.
D.

Station address
Network address
Application port address
Dialog address

Answer B_____________________________________________________________
________________________
Which network topology is considered passive?

A.
B.
C.
D.

Cross
Star
Bus
Tree

Answer C_____________________________________________________________
________________________
The cost of the network is usually determined by

A.
B.
C.
D.

time complexity
switching complexity
circuit complexity
none of these

Answer B_____________________________________________________________
________________________
Internet-like networks within an enterprise

A.
B.
C.
D.

Intranets
Switching alternating
Inter organizational networks
Extranets

Answer A_____________________________________________________________
________________________
Error detecting method that can detect more errors without increasing additional
information in each packet is

A.
B.
C.
D.

Checksum
Even parity mechanism
CRC
Odd parity mechanism

Answer C_____________________________________________________________
________________________
The single stage network is also called

A.
B.
C.
D.

one sided network


two sided network
recirculating network
pipeline network

Answer C_____________________________________________________________
________________________
The unlicensed National Information Infrastructure band operates at the _________
frequency

A.
B.
C.
D.

2.4 GHz
5 GHz
33 MHz
5 MHz

Answer B_____________________________________________________________
________________________
In the IPv4 addressing format, the number of networks allowed under Class C addresses
is

A. 214
B. 27
C. 221
D. 224
Answer C_____________________________________________________________
________________________
Which of the following does not allow multiple users or devices to share one
communications line?

A.
B.
C.
D.

Doubleplexer
Multipplexer
Concentrator
Controller

Answer A_____________________________________________________________
________________________
The Fiber Distributed Data Interface uses:

A.
B.
C.
D.

single mode fibers and LEDs


multimode fibers and LEDs
single mode fibers and ILDs
multimode fibers and ILDs

Answer B
The receive equalizer reduces delay distortions using a

A.
B.
C.
D.

Tapped delay lines


Gearshift
Descrambler
Difference Engine

Answer A_____________________________________________________________
________________________
Which one of the following uses the greatest number of layers in the OSI model?

A.
B.
C.
D.

Bridge
Repeater
Router
Gateway

Answer D_____________________________________________________________
________________________
Both hosts and routers are TCP/IP protocol software. However, routers do not use
protocol from all layers. The layer for which protocol software is not needed by a router
is

A.
B.
C.
D.

Layer 5 (Application)
Layer 1 (Physical)
Layer 3 (Internet)
Layer 2 (Network Interface)

Answer A_____________________________________________________________
________________________
End-to-End connectivity is provided from Last-to-Last in

A.
B.
C.
D.

Network layer
Session layer
Transport layer
Data link layer

Answer C_____________________________________________________________
________________________
Decryption and encryption of data are the responsibility of which of the following layer
?

A.
B.
C.
D.

Physical layer
Data Link layer
Presentation layer
Session layer

Answer C_____________________________________________________________
________________________
Assume that source S and destination D are connected through two intermediate routers
labeled R. Determine how many times each packet has to visit the network layer and the
data link layer during a transmission from S to D.

A.
B.
C.
D.

Network layer 4 times and Data link layer-4 times


Network layer 4 times and Data link layer-3 times
Network layer 4 times and Data link layer-6 times
Network layer 2 times and Data link layer-6 times

Answer C

Explanation Each packet will visit network layer at S and D once and at two intermediate
nodes R, R also once, so 4 times in total. Packet will visit Data link layer at S and D once
(same as Network Layer), but in addition it will visit data link layer of routers(R, R) each
two times. Once at the beginning when packet reaches R and goes up from Physical-Data
Link-Network and second time in the reverse order while coming out of router in order
Network-Data link-Physical. Hence 6 times in total.
______________________________________________________________________
_______________
The protocol data unit (PDU) for the application layer in the Internet stack is

A.
B.
C.
D.

Segment
Datagram
Message
Frame

Answer C_____________________________________________________________
________________________
Identify the incorrect statement

A.
B.
C.
D.

he ATM adoption layer is not service dependent


Logical connections in ATM are referred to as virtual channel connections
ATM is streamlined protocol with minimal error and flow control capabilities
ATM is also known as cell delays

Answer A_____________________________________________________________
________________________

Which of the following transport layer protocols is used to support electronic mail?

A.
B.
C.
D.

SMTP
IP
TCP
UDP

Answer C_____________________________________________________________
________________________
Which of the following layer protocols are responsible for user and the application
programme support such as passwords, resource sharing, file transfer and network
management?

A.
B.
C.
D.

Layer 7 protocols
Layer 6 protocols
Layer 5 protocols
Layer 4 protocols

Answer A
The transport layer protocols used for real time multimedia, file transfer, DNS and email,
respectively are

A.
B.
C.
D.

TCP, UDP, UDP and TCP


UDP, TCP, TCP and UDP
UDP, TCP, UDP and TCP
TCP, UDP, TCP and UDP

Answer C_____________________________________________________________
________________________
Which of the following are Data Link Layer standard ?
1. Ethernet
2. HSSI
3. Frame Relay
4. 10 Base T 5. Token Ring

A.
B.
C.
D.

1, 2, 3
1, 3, 5
1, 3, 4, 5
1, 2, 3, 4, 5

Answer C_____________________________________________________________
________________________
To employ multi-access in GSM, users are given different:

A.
B.
C.
D.

time slots
bandpass filters
Andsets
frequency bands

Answer B_____________________________________________________________
________________________
Which of the following summation operations is performed on the bits to check an errordetecting code?

A. Codec

B. Coder-decoder
C. Checksum
D. Attenuation
Answer C_____________________________________________________________
________________________
A leased special high-speed connection from the local telephone carrier for business
users that transmits at 1.544 mbps is known as ________ carrier.

A.
B.
C.
D.

T1
T2
T3
T4

Answer A_____________________________________________________________
________________________
Which of the following technique is used for fragment?

A. A technique used by protocols in which a lower level protocol accepts a message from a
higher level protocol and places it in the data portion of the low level frame
B. One of the pieces that results when an IP gateway divides an IP datagram into smaller
pieces for transmission across a network that cannot handle the original datagram size
C. A technique used in best-effort delivery systems to avoid endlessly looping packets
D. All of the above
Answer B_____________________________________________________________
________________________
Which of the following file transfer protocols use TCP and establishes two virtual circuits
between the local and remote server ?

A.
B.
C.
D.

FTP
TFTP
TELNET
NFS

Answer A_____________________________________________________________
________________________
When you ping the loopback address, a packet is sent where?

A.
B.
C.
D.

Down through the layers of the IP architecture and then up the layers again
Across the wire
On the network
Through the loopback dongle

Answer A_____________________________________________________________
________________________
Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP
address from a server ?

A. RAP
B. RIP

C. ARP
D. X.25
Answer C_____________________________________________________________
________________________
What can greatly reduce TCP/IP configuration problems?

A.
B.
C.
D.

WINS Proxy
WINS Server
PDC
DHCP Server

Answer C

Explanation A Primary Domain Controller (PDC) is a server computer in a Windows


domain
_______________________
Carrier is

A. One or more conductors that serve as a common connection for a related group of
devices
B. A continuous frequency capable of being modulated or impressed with a second signal
C. The condition when two or more sections attempt to use the same channel at the same
time
D. A collection of interconnected functional units that provides a data communications
service among stations attached to the network
Answer B_____________________________________________________________
________________________
The threshold effect in demodulator is

A. exhibited by all demodulator, when the input signal to noise ratio is low.
B. the rapid fall on output signal to noise ratio when the input signal to noise ratio fall
below a particular value.
C. the rapid fall on output signal to noise ratio when the input signal to noise ratio fall
below a particular value.
D. the property exhibited by correlation receiver.
Answer B_____________________________________________________________
________________________
HMP (Host Monitoring Protocol) is:

A. A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level


physical hardware address
B. A TCP/IP high level protocol for transferring files from one machine to another.
C. A protocol used to monitor computers
D. A protocol that handles error and control messages
Answer C_____________________________________________________________
________________________

Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

A. The method of determining which device has access to the transmission medium at any
time.
B. A medium access control technique for multiple access transmission media
C. A form of TDMA in which circuit switching is used to dynamically change the channel
assignments
D. All of the above
Answer C_____________________________________________________________
________________________
Contention is

A. A collection of interconnected functional units that provides a data communications


service among stations attached to the network
B. The condition when two or more stations attempt to use the same channel at the same
time
C. A continuous frequency capable of being modulated or impressed with a second signal
D. One or more conductors that serve as a common connection for a related group of
devices
Answer B_____________________________________________________________
________________________
The baud rate is

A.
B.
C.
D.

always equal to the bit transfer rate


equal to twice the bandwidth of an ideal channel
not equal to the signalling rate
equal to half of the bandwidth of an ideal channel

Answer B_____________________________________________________________
________________________
What is the maximum window size in sliding window protocol used in a computer
network ?

A.
B.
C.
D.

4
8
15
16

Answer A_____________________________________________________________
________________________
Start and stop bits are used in serial communications for

A.
B.
C.
D.

Error detection
Error correction
Synchronization
Slowing down the communication

Answer C_____________________________________________________________
________________________

In order that a code is t error correcting, the minimum Hamming distance should be

A.
B.
C.
D.

T
2t-1
2t
2t+1

Answer D_____________________________________________________________
________________________
Which of the following condition is used to transmit two packets over a medium at the
same time?

A.
B.
C.
D.

Contention
Synchronous
Collision
Asynchronous

Answer C
The Internet Control Message Protocol (ICMP)

A. Allows gateways to send error a control messages to other gateways or hosts


B. Provides communication between the Internet Protocol Software on one machine and the
Internet Protocol Software on another
C. Reports error conditions to the original source, the source must relate errors to individual
application programs and take action to correct the problem
D. All of the above
Answer D_____________________________________________________________
________________________
CDMA Cell uses ________ carriers of 1.25 MHz.

A.
B.
C.
D.

9
18
22
64

Answer B_____________________________________________________________
________________________
Handoff is the mechanism that

A.
B.
C.
D.

Transfer an ongoing call from one base station to another


Initiating a new call
Dropping an ongoing call
None of above

Answer A_____________________________________________________________
________________________
Which of the following refers to the terms "residual error rate"?

A. The number of bit errors per twenty four hours of continuous operation on an
asynchronous line

B. The probability that one or more errors will be undetected when an error detection
scheme is used
C. The probability that one or more errors will be detected when an error detection
mechanism is used
D. Signal to noise ratio divided by the ratio of energy per bit to noise per hertz
Answer B_____________________________________________________________
________________________
Error detection at a data link level is achieved by

A.
B.
C.
D.

Bit stuffing
Cyclic redundancy codes
Hamming codes
Equalization

Answer B_____________________________________________________________
________________________
______ is a satellite based tracking system that enables the determination of persons
position.

A.
B.
C.
D.

Bluetooth
WAP
Short Message Service
Global Positioning System

Answer D_____________________________________________________________
________________________
Error rate is

A. An error-detecting code based on a summation operation performed on the bits to be


checked.
B. A check bit appended to an array of binary digits to make the sum of all the binary
digits.
C. a code in which each expression conforms to Specific rules of construction, so that if
certain errors occur in an expression, the resulting expression will not conform to the rules of
construction and thus the presence of the errors is detected
D. The ratio of the number of data units in error to the total number of data units
Answer D_____________________________________________________________
________________________
Which of the following is used for modulation and demodulation?

A.
B.
C.
D.

Protocols
Repeater
Modem
Gateway

Answer C_____________________________________________________________
________________________
What is the maximum operating rate of a wireless LAN using infrared communication ?

A.
B.
C.
D.

1 mbps
2 mbps
3 mbps
4 mbps

Answer A_____________________________________________________________
________________________
Which of the following TCP/IP protocol is used for transferring electronic mail messages
from one machine to another?

A.
B.
C.
D.

POP
SMTP
FTP
HTTP

Answer B
Radio signals generally propagate according to the following mechanisms

A.
B.
C.
D.

Modulation, Amplification, Scattering


Reflection, Diffraction, Scattering
Amplification, Diffraction, Modulation
Reflection, Amplification, Diffraction

Answer B_____________________________________________________________
________________________
For the transmission of the signal, Bluetooth wireless technology uses

A.
B.
C.
D.

time division multiplexing


frequency division multiplexing
time division duplex
frequency division duplex

Answer C_____________________________________________________________
________________________
An error-detecting code inserted as a field in a block of data to be transmitted is known
as

A.
B.
C.
D.

Frame check sequence


Error detecting code
Checksum
Flow control

Answer A_____________________________________________________________
________________________
Which of the following TCP/IP protocol allows an application program on one machine
to send a datagram to an application program on another machine?

A.
B.
C.
D.

UDP
VMTP
X.25
SMTP

Answer A_____________________________________________________________
________________________
The probability that a single bit will be in error on a typical public telephone line using
4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the
residual error rate for a communication line using 9-bit frames is approximately equal
to

A.
B.
C.
D.

0.003
0.009
0.991
0.999

Answer B_____________________________________________________________
________________________
ICMP (Internet Control Message Protocol) is

A. A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level


physical hardware address
B. a TCP/IP high level protocol for transferring files from one machine to anothe
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
Answer D_____________________________________________________________
________________________
A noiseless 3 KHz Channel transmits bits with binary level signals. What is the maximum
data rate?

A.
B.
C.
D.

3 Kbps
6 Kbps
12 Kbps
16 Kbps

Answer B_____________________________________________________________
________________________
In which circuit switching, delivery of data is delayed because data must be stored and
retrieved from RAM ?

A.
B.
C.
D.

Space division
Time division
Virtual
Packet

Answer B_____________________________________________________________
________________________
Frequency shift keying is used mostly in

A.
B.
C.
D.

Radio transmission
Telegraphy
Telephone
None of the above

Answer B_____________________________________________________________
________________________
GSM/CDMA systems

A.
B.
C.
D.

are limited to very low speed data


are predominantly used for voice
are predominantly used for voice
all of the above

Answer D_____________________________
Consider the following statement :
(i) The bandwidth of the A.M., wave depends on the band width of the modulating
signal.
(ii) The bandwidth of the A.M., wave depends on the modulation index.
(iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude
of the carrier. Of these statements the correct statements are

A.
B.
C.
D.

(i, ii)
(i, iii)
(ii, iii)
All of the above

Answer B_____________________________________________________________
________________________
What device separates a single network into two segments but lets the two segments
appear as one to higher protocols?

A.
B.
C.
D.

Switch
Bridge
Gateway
Router

Answer B_____________________________________________________________
________________________
What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

A.
B.
C.
D.

192.0.0.1
192.168.10
255.255.255.0
0.0.0.5

Answer B_____________________________________________________________
________________________
Which of the following statements is correct for the use of packet switching?

A. The subdivision of information into individually addressed packets in conjunction with


alternative routing arrangement enabled the transmission path to be altered in the event of
congestion or individual link failure
B. The employment of additional intelligence within the network enabled more
sophisticated error control and link control procedures to be applied

C. By employing wide bandwidth circuits for the trunk networks substantial economies
through extensive sharing of capacity could be achieved.
D. All of the above
Answer D_____________________________________________________________
________________________
Which of the following device is used to connect two systems especially if the systems
use different protocols?

A.
B.
C.
D.

Hub
Bridge
Gateway
Repeater

Answer C_____________________________________________________________
________________________
What is the default subnet mask for a class C network?

A.
B.
C.
D.

255.255.0.0
255.255.255.0
127.0.0.1
255.0.0.0

Answer B_____________________________________________________________
________________________
Which of the following switching techniques is most suitable for interactive traffic ?

A.
B.
C.
D.

Circuit switching
Message switching
Packet switching
All of the above

Answer C_____________________________________________________________
________________________
Another name of IEEE 802.11 a is ____________

A.
B.
C.
D.

Wi-Max
Fast Ethernet
Wi-Fi
802.11 g

Answer C_____________________________________________________________
________________________
A front-end processor is

A. A user computer system


B. A processor in a large-scale computer that executes operating system instructions
C. A minicomputer that relieves main-frame computers at a computer centre of
communications control functions
D. Preliminary processor of batch jobs.

Answer D_____________________________________________________________
________________________
Which of the following network access standard disassembler is used for connection
station to a packet switched network ?

A.
B.
C.
D.

X.3
X.21
X.25
X.75

Answer C

Networks that use different technologies can be connected by using

A.
B.
C.
D.

Packets
Switches
Bridges
Routers

Answer D_____________________________________________________________
________________________
A comparison of frequency division and time division multiplexing system shows that

A.
B.
C.
D.

FDM requires a lower bandwidth, but TDM has greater noise immunity.
FDM has greater noise immunity and requires lower bandwidth than TDM.
FDM requires channel synchronization, while TDM has greater noise immunity.
FDM requires more multiplex while TDM requires band pass filter.

Answer C_____________________________________________________________
________________________
Match the following :
(i) Ethernet
(a) Deterministic
(ii) Token Ring
(b) Utilize the full wire speed
(iii) Cut-through switch (c) Prevent looping
(iv) Spanning tree
(d) Checking valid address

A.
B.
C.
D.

i d, ii a, iii b, iv c
i d, ii a, iii b, iv c
i d, ii d, iii c, iv b
i d, ii c, iii b, iv a

Answer A_____________________________________________________________
________________________
Which of the following device is used to connect two systems, especially if the systems
use different protocols?

A.
B.
C.
D.

Hub
Bridge
Gateway
Repeater

Answer C_____________________________________________________________
________________________
You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60
new subnets very soon. You would like to still allow for the largest possible number of
host IDs per subnet. Which subnet mask should you assign?

A.
B.
C.
D.

255.254.0.0
255.240.0.0
255.248.0.0
255.252.0.0

Answer A_____________________________________________________________
________________________
X.25 is ________ Network

A.
B.
C.
D.

Connection Oriented Network


Connection Less Network
Either Connection Oriented or Connection Less
Neither Connection Oriented nor Connection Less

Answer A_____________________________________________________________
________________________
FDDI is a

A.
B.
C.
D.

Ring network
Star network
Mesh network
Bus based network

Answer A_____________________________________________________________
________________________
Which of the following best illustrates the default subnet mask for a class A,B, and C
Network

A.
B.
C.
D.

0.0.0.0, 0.0.0.1, 0.0.1.1


255.255.255.0, 255.255.0.0, 255.0.0.0
255.0.0.0, 255.255.0.0, 255.255.255.0
255.255.0.0, 255.255.255.0, 255.255.255.255

Answer C_____________________________________________________________
________________________
X.25 protocol consists of

A.
B.
C.
D.

Physical and Frame levels


Frame and Packet levels
Physical, Frame and Packet levels
None of the above

Answer C_____________________________________________________________
________________________

If carrier modulated by a digital bit stream, has one one of the possible phase of 0, 90,
180 and 270 degrees, then modulation called

A.
B.
C.
D.

BPSK
QPSK
QAM
MSK

Answer B___________________
The _____ houses the switches in token ring

A.
B.
C.
D.

Transceiver
Nine-pin connector
MAU
NIC

Answer C_____________________________________________________________
________________________
When compared with analog cellular systems, an advantage of digital TDMA cellular
system is that

A.
B.
C.
D.

it is less complicated
it requires less of computer memory
it conserves spectrum bandwidth
it costs less

Answer C_____________________________________________________________
________________________
Hub is a term used with

A.
B.
C.
D.

A Star Networks
A Ring Networks
A Router
A Bridge

Answer A_____________________________________________________________
________________________
Which of the following can be used for clustering of data ?

A.
B.
C.
D.

Single layer perception


Multilayer perception
Self organizing map
Radial basis function

Answer C_____________________________________________________________
________________________
The cellular frequency reuse factor for the cluster size N is

A.
B.
C.
D.

N
N2
1/N
1/N2

Answer C_____________________________________________________________
________________________
The station to hub distance in which it is 2000 metres

A.
B.
C.
D.

100 Base-Tx
100 Base-FX
100 Base-T4
100 Base-T1

Answer B_____________________________________________________________
________________________
A station in a network in a network forward incoming packets by placing them on its
shortest output queue. What routing algorithm is being used ?

A.
B.
C.
D.

Hot potato routing


Flooding
Static routing
Delta routing

Answer A_____________________________________________________________
________________________
After sending a message, the sender should not be able to, at a later date, deny having
sent the message, is referred to as

A.
B.
C.
D.

Authenticity
Non-Repudiability
Auditability
Repudiability

Answer B_____________________________________________________________
________________________
Usually information security in a network is achieved by

A.
B.
C.
D.

Layering
Cryptography
Grade of service
None of the above

Answer B_____________________________________________________________
________________________
Intranets and extranets can use their network fire walls and other security features to
establish secure Internet links within an enterprise or with its trading partners. Select
the best fit for answer:

A.
B.
C.
D.

Network Server
Virtual Private Network
Network operating system
OSI

Answer B

A station in a network forwards incoming packets by placing them on its shortest output
queue. What routing algorithm is being used?

A.
B.
C.
D.

Hot potato routing


Delta routing
Flooding
Static routing

Answer A_____________________________________________________________
________________________
What is the routing algorithm used by RIP and IGRP ?

A.
B.
C.
D.

OSPF
Link-state
Dynamic
Dijkestra vector

Answer D_____________________________________________________________
________________________
In which Routing Method do all the routers have a common database?

A.
B.
C.
D.

Distance vector
Link state
Link vector
Dijkestra method

Answer B_____________________________________________________________
________________________

1) BSC is a ?

a. Character Oriented Protocol


b. Bit Oriented Protocol
c.

Full duplex protocol

d. Half duplex protocol


e. A and D
2) Which of the following are non - polling system ?
a. TDMA
b. Stop & wait
c.

Xon/Xoff

d. Continuous ARQ
e. A and C
3) Adaptive or dynamic directory used in packet routing changes?
a. within each user session
b. with each user session
c.

at system generation time only

d. Both A and B

4) The parameter which gives the probability of the transport layer itself spontaneously
terminating a connection due to internal problem is called?
a. protection
b. resilience
c.

option negotiation

d. transfer failure
6) Which of the following is an example of bounded media ?
a. Wave guide
b. Coaxial Cable
c.

Fiber optic cable

d. All of above
5) What is the main purpose of a data link content monitor ?
a. to detect problems in protocols
b. to determine the type of switching
c.

to determine the type of transmission used in data link

d. to determine the flow of data


7) ICMPv6 includes ......?
a. RARP
b. ARP
c.

ICMP

d. B and C
8) IPv6 has ...... bit address ?
a. 32
b. 64
c.

128

d. variable
9) What is the main difference between DDCMP and SDLC ?
a. DDCMP does not need special hardware to final the beginning of a message
b. DDCMP has a message header
c.

SDLC has a IP address

d. SDLC does not use CPC


10) Number of bits per symbol used in Baudot code is ?
a. 7
b. 8
c.

d. 9
1) The Hamming distance between 100 and 001 is _____. ?
a. 0
b. 1
c.

d. 3

S-ar putea să vă placă și