Multiple Choice Questions (MCQs)
Frames include additional information to detect/correct errors are insert by ________.
________ is the most popular wiring scheme because of lowest cost.
Which of the following is called virtual channel?
Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection.
If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called ________.
Bluetooth uses shared medium and ________ instead of coaxial cable.
Which of the following cannot be used to extend a LAN?
Fragmentation when using ICMP for path MTU should be avoided.
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
The mechanism extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _______ and bandwidth is very _______.
________ sends ICMP echo messages with increasing TTL.
Thick Ethernet also requires ________ to avoid signal reflectance.
Which of the following is not a guided medium?
________ places the boundary between the second and third octets
In Direct point to point communication adding the Nth computer requires ________ new connections.
We need packets rather than bits because ________.
NIC connection in a physical network is known as __________.
NAT device stores state information in translation table.
Which of the following remains same in the header of the packet in a datagram during the entire journey of the packet?
In ________ topology, if the switch goes down all the computers will be disconnected.
Header contains all information needed to deliver datagram to the destination computer. But which one of the following is not included:
As a result of ARPA research, the first network was established which was named as ________.
An interior switch is one with wich ________.
Which of the following technologies can extend the diameter of LAN medium?
SMDS is ________.
Point-to-point topology is
The number of connections needed for 8 computers in direct point to point communication is equal to ________.
The switch that has computers attached with it is called ________ switch.
The ________ field of Ethernet frame has the purpose of receiver synchronization.
________ protocol uses three way handshake to begin a connection.
Frame relay is ________.
Which layer of the OSI Model directly communicates and controls the transmission medium:
In ________ all computers are attached to a central hub.
________ encapsulates IP datagram as data area in hardware frame.
Which of the following is not a benefit of Source Independence?
The Ethernet standard specifies that frames are sent using the ________ scheme.
In FDDI, in case of a station failure, remaining stations loop back and ________.
The protocol address of the next hop must be _____________ to an equivalent hardware address before a packet can be sent.
________ is standard wireless LAN that uses radio signals at 2.4HHz.
The network occupies larger areas like cities & countries is called
If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other at which speed they can communicate?
The frame format of any LAN technology must consists of ________ and ________.
In 3-way handshake TCP requires to generate a random ________ sequence number.
Each computer in LAN is identified by a physical address, usually imprinted on the ________.
The first automated tool required to see whether the given computer is online or not was
The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.
EGPs stand for ________.
________ is a tool that sends a message to a remote computer and reports whether the computer responds.
The information about ________ is kept in routing tables.
The sharing of a ________ among the workers in an office is a goal of resource sharing.
ATM header is about ________ of the cell.
If a small set of bits changes near a specific location due to lighting or electric motor starting nearby, this type of errors are called ________.
Hardware that calculates a CRC uses two simple components ________.
Physical Addressing is a WAN is similar to LAN as each packet has format with ________.
According to a bridge performance, if both the source and destination are on the same segment.
Which multiplexing technique transmits analog signals?
IPV6 128 bits address includes network prefix and ________
Even parity can be used to check for ________ bit/bits of errors.
To span long distances or many computers, networks must replace shared medium with _________.
Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.
According to size, there are ________ classifications of networks.
The recent executed instruction ________ in temporal aspect of the locality of reference.
The physical addressing in a WAN is similar as in LAN in the way __________.
Missing ________ in a frame format indicates receiving computer missed beginning of the message.
The ________ of errors is easier than the ________ of errors.
Which of the following is a benefit of source independence?
________ is a measure of the rate at which data can be sent through the network.
LAN interface uses ________ to copy frame data directly from main memory.
Which multiplexing technique shifts each signal to a different carrier frequency?
________ is less complex and easy to understand.
VBR stands for __________.
Which type of network consists of wired computers in a university classroom?
________ are more frequently being designed to allow specification of the quality of service required by users.
Which of the following statement is true regarding ATM?
ATM offers high speed and ________ delay.
________ is inflexible.
In a ping command result, time denotes the ________.
How many methods exist for computing routing table?
The third field of the header consists of ___________ bit Ethernet frame type.
________ cannot be extended arbitrarily far or to handle arbitrarily many computers.
When an application _________ data, it makes a copy of the data available to all other computers on the network.
The Fast Ethernet hardware operates at a rate of ________.
What will be the bandwidth rate for older, low-speed network, and analog telephones?
The topology each computer is connected to a central hub is called
The maximum cable length of a LAN is ________.
The length of time required to send a variable length packet is ________.
Due to revolutionalization of IP-V6 the speed has increased from ________.
Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
In CSMA, if simultaneous transmission occurs, the ________ interfere with each other and this phenomenon is called collision.
________ Source is responsible for fragmentation.
________ and ________ are the two types of frame type.
A ________ is a special-purpose computer dedicated to the task of interconnecting networks.
Select a course code for Objective Questions:
Select a course code for Subjective Questions: