Multiple Choice Questions (MCQs)
Which type of network consists of wired computers in a university classroom?
The ________ of errors is easier than the ________ of errors.
SMDS is ________.
Due to revolutionalization of IP-V6 the speed has increased from ________.
Fragmentation when using ICMP for path MTU should be avoided.
If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.
Which of the following is called virtual channel?
Which of the following statement is true regarding ATM?
If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?
The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.
Hardware that calculates a CRC uses two simple components ________.
The length of time required to send a variable length packet is ________.
Which multiplexing technique transmits analog signals?
________ sends ICMP echo messages with increasing TTL.
In Direct point to point communication adding the Nth computer requires ________ new connections.
In FDDI, in case of a station failure, remaining stations loop back and ________.
IPV6 128 bits address includes network prefix and ________
Which of the following is not a benefit of Source Independence?
Which of the following technologies can extend the diameter of LAN medium?
________ is less complex and easy to understand.
The first automated tool required to see whether the given computer is online or not was
If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.
________ encapsulates IP datagram as data area in hardware frame.
Frames include additional information to detect/correct errors are insert by ________.
________ is the most popular wiring scheme because of lowest cost.
The number of connections needed for 8 computers in direct point to point communication is equal to ________.
Bluetooth uses shared medium and ________ instead of coaxial cable.
Physical Addressing is a WAN is similar to LAN as each packet has format with ________.
The information about ________ is kept in routing tables.
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
________ is a measure of the rate at which data can be sent through the network.
An interior switch is one with wich ________.
As a result of ARPA research, the first network was established which was named as ________.
Which of the following is a benefit of source independence?
Missing ________ in a frame format indicates receiving computer missed beginning of the message.
The Ethernet standard specifies that frames are sent using the ________ scheme.
NAT device stores state information in translation table.
Point-to-point topology is
________ cannot be extended arbitrarily far or to handle arbitrarily many computers.
ATM offers high speed and ________ delay.
Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?
Which multiplexing technique shifts each signal to a different carrier frequency?
Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included:
The protocol address of the next hop must be _____________ to an equivalent hardware address before a packet can be sent.
How many methods exist for computing routing table?
What will be the bandwidth rate for older, low-speed network, and analog telephones?
Which of the following is not a guided medium?
________ is standard wireless LAN that uses radio signals at 2.4HHz.
The network occupies larger areas like cities & countries is called
The sharing of a ________ among the workers in an office is a goal of resource sharing.
________ is inflexible.
In ________ topology, if the switch goes down all the computers will be disconnected.
________ protocol uses three way handshake to begin a connection.
The topology each computer is connected to a central hub is called
________ is a tool that sends a message to a remote computer and reports whether the computer responds.
Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.
The maximum cable length of a LAN is ________.
The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.
The physical addressing in a WAN is similar as in LAN in the way __________.
Thick Ethernet also requires ________ to avoid signal reflectance.
We need packets rather than bits because ________.
In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.
________ and ________ are the two types of frame type.
________ are more frequently being designed to allow specification of the quality of service required by users.
ATM header is about ________ of the cell.
The frame format of any LAN technology must consists of ________ and ________.
In ________ all computers are attached to a central hub.
LAN interface uses ________ to copy frame data directly from main memory.
Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.
According to size, there are ________ classifications of networks.
In 3-way handshake TCP requires to generate a random ________ sequence number.
In a ping command result, time denotes the ________.
When an application _________ data, it makes a copy of the data available to all other computers on the network.
Each computer in LAN is identified by a physical address, usually imprinted on the ________.
VBR stands for __________.
To span long distances or many computers, networks must replace shared medium with _________.
Even parity can be used to check for ________ bit/bits of errors.
The ________ field of Ethernet frame has the purpose of receiver synchronization.
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
NIC connection in a physical network is known as __________.
The third field of the header consists of ___________ bit Ethernet frame type.
EGPs stand for ________.
________ places the boundary between the second and third octets
________ Source is responsible for fragmentation.
Which of the following cannot be used to extend a LAN?
The recent executed instruction ________ in temporal aspect of the locality of reference.
Which layer of the OSI Model directly communicates and controls the transmission medium:
The switch that has computers attached with it is called ________ switch.
Frame relay is ________.
The Fast Ethernet hardware operates at a rate of ________.
A ________ is a special-purpose computer dedicated to the task of interconnecting networks.
According to a bridge performance, if both the source and destination are on the same segment.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: