1) In token ring ,the tokens can be removed by
A. The nearest down stream neighbour
B. The receiving station
C. The ring monitor
D. The nearest upstream neighbor
Ans:- C
2) In cyclic redundancy checking CRC is the
A. Divisor
B. Quotient
C. Dividend
D. Remainder
Ans:-D
3) Error detection at the data link level is achieved by
A. Bit stuffing
B. Cyclic redundancy codes
C. Hamming codes
D. Both b and c
Ans:-B
4) If there are n devices in a network ,what is the number of cable links required for a mesh and a star respectively.
A. n,n-1
B. n(n-1)/2,n-1
C. n-1,n
D. n-1,n(n-1)/2
Ans:-B
5) What can happen at a token ring station?
A. Examination of the destination address
B. Regeneration of the frame
C. Passing of the frame to the next station
D. All of these
Ans:-D
6) Protection of data from a natural disaster such as a tornado belongs to which of the following network issue?
A. Performance
B. Reliability
C. Security
D. Management
Ans:-B
7) Which of the following best illustrates the default subnet mask for a class A,B, and C Network
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
Ans:-C
8) The constellation diagram of BASK has.......dots
A. 2
B. 1
C. 0
D. None of above
Ans:-A
9) Decryption and encryption of data are responsibility of
A. Physical layer
B. Data link layer
C. Presentation layer
D. Session layer
Ans:-C
10) Controlled access line discipline is used with which type of circuit
A. Point to point
B. Multipoint
C. Either (a) or (b)
D. Neither (a) nor (b)
Ans:-B
11) Which of following is not a digital to analog conversion?
A. ASK
B. PSK
C. FSK
D. AM
Ans:-D
12) Who can send ICMP error reporting messages?
A. Routers
B. Destination
C. Source host
D. Both a and c
Ans:-D
13) How many carrier frequencies are used in BPSK?
A. 2
B. 1
C. 0
D. None of above
Ans:-B
14) Consider s be the average number of new frames generated per frame time.If s>1 ,then
A. Frames not at all collide
B. Every frame will suffer collision
C. Maximum utilization of channel
D. No change in throughput
Ans:-B
15) FTP does not use
A. Two transfer mode
B. Control connect ion to remote computer before file can be transfer red
C. User Datagram Protocol
D. Authorizat ion of a user through login and password verification
Ans:-C
16) Which of the following error detection method consists of just one redundant bit per data unit?
A. Checksum
B. LRC
C. CRC
D. VRC
Ans:-D
17) FDM devices can operate
A. On multipoint analog data channels
B. More efficiently than dumb TDMs
C. More efficiently than smart TDMs
D. Like modern sharing devices
Ans:-A
18) The addressing especially used by Transport Layer is
A. Station address
B. Network address
C. Application port address
D. Dialog address
Ans:-B
19) When you ping the loopback address, a packet is sent where?
A. Down through the layers of the IP architecture and then up the layers again
B. Across the wire
C. On the network
D. Through the loopback dongle
Ans:-A
20) The loss in signals power as light travels down the fiber is called
A. Attenuation
B. Scattering
C. Propagation
D. Interruption
Ans:-A
A. The nearest down stream neighbour
B. The receiving station
C. The ring monitor
D. The nearest upstream neighbor
Ans:- C
2) In cyclic redundancy checking CRC is the
A. Divisor
B. Quotient
C. Dividend
D. Remainder
Ans:-D
3) Error detection at the data link level is achieved by
A. Bit stuffing
B. Cyclic redundancy codes
C. Hamming codes
D. Both b and c
Ans:-B
4) If there are n devices in a network ,what is the number of cable links required for a mesh and a star respectively.
A. n,n-1
B. n(n-1)/2,n-1
C. n-1,n
D. n-1,n(n-1)/2
Ans:-B
5) What can happen at a token ring station?
A. Examination of the destination address
B. Regeneration of the frame
C. Passing of the frame to the next station
D. All of these
Ans:-D
6) Protection of data from a natural disaster such as a tornado belongs to which of the following network issue?
A. Performance
B. Reliability
C. Security
D. Management
Ans:-B
7) Which of the following best illustrates the default subnet mask for a class A,B, and C Network
A. 0.0.0.0, 0.0.0.1, 0.0.1.1
B. 255.255.255.0, 255.255.0.0, 255.0.0.0
C. 255.0.0.0, 255.255.0.0, 255.255.255.0
D. 255.255.0.0, 255.255.255.0, 255.255.255.255
Ans:-C
8) The constellation diagram of BASK has.......dots
A. 2
B. 1
C. 0
D. None of above
Ans:-A
9) Decryption and encryption of data are responsibility of
A. Physical layer
B. Data link layer
C. Presentation layer
D. Session layer
Ans:-C
10) Controlled access line discipline is used with which type of circuit
A. Point to point
B. Multipoint
C. Either (a) or (b)
D. Neither (a) nor (b)
Ans:-B
11) Which of following is not a digital to analog conversion?
A. ASK
B. PSK
C. FSK
D. AM
Ans:-D
12) Who can send ICMP error reporting messages?
A. Routers
B. Destination
C. Source host
D. Both a and c
Ans:-D
13) How many carrier frequencies are used in BPSK?
A. 2
B. 1
C. 0
D. None of above
Ans:-B
14) Consider s be the average number of new frames generated per frame time.If s>1 ,then
A. Frames not at all collide
B. Every frame will suffer collision
C. Maximum utilization of channel
D. No change in throughput
Ans:-B
15) FTP does not use
A. Two transfer mode
B. Control connect ion to remote computer before file can be transfer red
C. User Datagram Protocol
D. Authorizat ion of a user through login and password verification
Ans:-C
16) Which of the following error detection method consists of just one redundant bit per data unit?
A. Checksum
B. LRC
C. CRC
D. VRC
Ans:-D
17) FDM devices can operate
A. On multipoint analog data channels
B. More efficiently than dumb TDMs
C. More efficiently than smart TDMs
D. Like modern sharing devices
Ans:-A
18) The addressing especially used by Transport Layer is
A. Station address
B. Network address
C. Application port address
D. Dialog address
Ans:-B
19) When you ping the loopback address, a packet is sent where?
A. Down through the layers of the IP architecture and then up the layers again
B. Across the wire
C. On the network
D. Through the loopback dongle
Ans:-A
20) The loss in signals power as light travels down the fiber is called
A. Attenuation
B. Scattering
C. Propagation
D. Interruption
Ans:-A
No comments:
Post a Comment