Which of the following does not allow multiple users or devices to share one communications line? 

Doubleplexer
Multipplexer
Concentrator
Controller
      _____________________________________________________________________________________
Which of the following best illustrates the default subnet mask for a class A,B, and C Network 

0.0.0.0, 0.0.0.1, 0.0.1.1
255.255.255.0, 255.255.0.0, 255.0.0.0
255.0.0.0, 255.255.0.0, 255.255.255.0
255.255.0.0, 255.255.255.0, 255.255.255.255
      _____________________________________________________________________________________
MTU is specified by 

IP Datagram size
Hardware technology
TCP Segment size
None of the above
      _____________________________________________________________________________________
In which congestion control policy the router can discard less sensitive packets when congestion is likely to happen?

Discarding policy
Acknowledgement policy
Window policy
Retransmission policy
      _____________________________________________________________________________________
Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? 

UDP
VMTP
X.25
SMTP
      _____________________________________________________________________________________
In an IPv4 datagram, the M bit is 0, the value of HLEN is 10, the value of total length is 400 and the fragment offset value is 300. The position of the datagram, the sequence numbers of the first and the last bytes of the payload, respectively are

Last fragment, 2400 and 2789
First fragment, 2400 and 2759
Last fragment, 2400 and 2759
Middle fragment, 300 and 689
      _____________________________________________________________________________________
The value of N(S) is related to the value of P(S) as

N(S)-P(S)=number of outstanding packets
N(S)-P(S)=number of outstanding frames
N(S)-P(S)=number of active logical channels in the link
They are not related
      _____________________________________________________________________________________
Which of following divides the high speeds signals into frequency bands?

T-switch
Time division multiplexer
Frequency division multiplexer
Modem
      _____________________________________________________________________________________
Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE

BUTAEEZ
SUZANNE
XYZABCD
ABCDXYZ
      _____________________________________________________________________________________
Which channel is deployed by the radio station for transmission?

Half duplex
Full duplex
Simplex channel
None of the above
      _____________________________________________________________________________________
Match the following with link quality measurement and handoff initiation :
(a) Networked-Controlled Handoff(NCHO)    (i) MS connect to BS
(b) Mobile-Assisted Handoff(MAHO)            (ii) Process via channel the target BS
(c) Forward Handoff                                        (iii) First Generation Analog Cellular System
(d) Hard Handoff                                             (iv) Second Generation Digital Cellular System


(iii)  (iv)  (ii)  (i)
(ii)  (iii)  (i)  (iv)
(ii)  (i)   (iv)  (iii)
(iv)  (iii)  (i)  (ii)
      _____________________________________________________________________________________
To prevent signal alternation ,what is the maximum number of repeaters that can be placed on one 10 Base 5 or 10 Base 2 network?

Four
Five
Three
Any number
      _____________________________________________________________________________________
Who strips the data frame from the token ring network?

Destination station
The first station which wants to transmit next
The sending station
The station next to the destination station
      _____________________________________________________________________________________
ATM is an example of 

Ring topology
Star topology
Bus topology
None of the above
      _____________________________________________________________________________________
FDM devices can operate

On multipoint analog data channels
More efficiently than dumb TDMs
More efficiently than smart TDMs
Like modern sharing devices
      _____________________________________________________________________________________
.......uses two carriers one in phase and the other quadrature?

ASK
PSK
FSK
QAM
      _____________________________________________________________________________________
The research and development department at your office has been experimenting with different technologies to help improve the performance of the network. One group has been examining the use of a broadband network versus a based band network. Select the correct statement about broadband and baseband. 

Broadband networks carry several channels on a single cable, whereas in a baseband network several cables carry one channel
Baseband networks carry a single channel on a single cable, whereas broadband networks carry several channels on a single cable
Baseband refers to local area networks, and broadband refers to wide area networks.
Baseband operates at a standard bit rate, whereas broadband may operate at different rates as needed
      _____________________________________________________________________________________
Error detection at a data link level is achieved by 

Bit stuffing
Cyclic redundancy codes
Hamming codes
Equalization
      _____________________________________________________________________________________
Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? 

POP
SMTP
FTP
HTTP
      _____________________________________________________________________________________
Which of the following device is used to connect two systems, especially if the systems use different protocols? 

Hub
Bridge
Gateway
Repeater
      _____________________________________________________________________________________
What is the maximum window size in sliding window protocol used in a computer network ?

4
8
15
16
      _____________________________________________________________________________________
You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? 

255.254.0.0
255.240.0.0
255.248.0.0
255.252.0.0
      _____________________________________________________________________________________
Frames from one LAN can be transmitted to another LAN via the device 

Router
Bridge
Repeater
Modem
      _____________________________________________________________________________________
The receiver equalizer reduces delay distortions using

Tapped Delay lines
Gearshift
Desrambler
Difference enging
      _____________________________________________________________________________________
The device which connects dissimilar LANs of different topologies using different sets of communication protocols so that information can flow from one to another is called

Router
Bridge
Gateway
Switch
      _____________________________________________________________________________________
The _____ houses the switches in token ring 

Transceiver
Nine-pin connector
MAU
NIC
      _____________________________________________________________________________________
IEEE 802.3 popularly called

Switch Ethernet
Ethernet
Wifi
Wireless Network
      _____________________________________________________________________________________
In IPv4 header, the ______ field is needed to allow the destination host to determine which datagram a newly arrived fragments belongs to.

identification
fragment offset
time to live
header checksum
      _____________________________________________________________________________________
In token ring ,the tokens can be removed by

The nearest down stream neighbour
The receiving station
The ring monitor
The nearest upstream neighbor
      _____________________________________________________________________________________
Which of the following field of the TCP header tells how many bytes may be sent starting at the byte acknowledged ?

TCP header length
Window size
Acknowledgement number
Urgent pointer
      _____________________________________________________________________________________
802.11i standard included an encryption scheme is known as

Wireless Security
WEP (Wired Equivalent Privacy)
WiFi Protected Access
WiFi Protected Protocol
      _____________________________________________________________________________________
Error rate is 

An error-detecting code based on a summation operation performed on the bits to be checked.
A check bit appended to an array of binary digits to make the sum of all the binary digits.
a code in which each expression conforms to Specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected
The ratio of the number of data units in error to the total number of data units
      _____________________________________________________________________________________
When you ping the loopback address, a packet is sent where? 

Down through the layers of the IP architecture and then up the layers again
Across the wire
On the network
Through the loopback dongle
      _____________________________________________________________________________________
An error-detecting code inserted as a field in a block of data to be transmitted is known as 

Frame check sequence
Error detecting code
Checksum
Flow control
      _____________________________________________________________________________________
ICMP (Internet Control Message Protocol) is 

A TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
a TCP/IP high level protocol for transferring files from one machine to anothe
a protocol used to monitor computers
a protocol that handles error and control messages
      _____________________________________________________________________________________
Maximum speed of LAN(Local Area Network)

Up to 5 Gbps
Up to 3 Gbps
Up to 10 Gbps
Up to 15 Gbps
      _____________________________________________________________________________________
In classful addressing, the IP address 190.255.254.254 belongs to

Class A
Class B
Class C
Class D
      _____________________________________________________________________________________
Radio signals generally propagate according to the following mechanisms

Modulation, Amplification, Scattering
Reflection, Diffraction, Scattering
Amplification, Diffraction, Modulation
Reflection, Amplification, Diffraction
      _____________________________________________________________________________________
The unlicensed National Information Infrastructure band operates at the _________ frequency

2.4 GHz
5 GHz
33 MHz
5 MHz
      _____________________________________________________________________________________
The addressing especially used by Transport Layer is 

Station address
Network address
Application port address
Dialog address
      _____________________________________________________________________________________
802.11g standard running speed is

Up to 11 Mbps
Up to 54 Mbps
Up to 450 Mbps
Up to 2 Mbps
      _____________________________________________________________________________________
In ATM which facility support multimedia applications that require minimal delays?

Constant bit rate
Unspecified bit rate
Avail bit rate
Realtime bit rate
      _____________________________________________________________________________________
GSM/CDMA systems

are limited to very low speed data
are predominantly used for voice
are predominantly used for voice
all of the above
      _____________________________________________________________________________________
The count-to-infinity problem is associated with

Flooding algorithm
Hierarchical routing algorithm
Distance vector routing algorithm
Link state routing algorithm
      _____________________________________________________________________________________
For the transmission of the signal, Bluetooth wireless technology uses

time division multiplexing
frequency division multiplexing
time division duplex
frequency division duplex
      _____________________________________________________________________________________
Brouter

Is a type of bridge
Works at all the layers of OSI model
Is able to bridge those protocols that are not routable
None of the above
      _____________________________________________________________________________________
Which channel of transmission is used in a telephone call?

Simplex
Half duplex
Full duplex
None of the above
      _____________________________________________________________________________________
X.25 is ________ Network

Connection Oriented Network
Connection Less Network
Either Connection Oriented or Connection Less
Neither Connection Oriented nor Connection Less
      _____________________________________________________________________________________
IEEE 802.16 standard for

Wireless LAN (WiFi)
Broadband wireless
Personal Area Network
Wireless Regional Area Network
      _____________________________________________________________________________________
The single stage network is also called

one sided network
two sided network
recirculating network
pipeline network
 
Top