Computer Network and Internet

Published on February 2017 | Categories: Documents | Downloads: 40 | Comments: 0 | Views: 271
of 23
Download PDF   Embed   Report

Comments

Content

1. In OSI network architecture, the dialogue control and token management are responsibility of a. session layer b. network layer c. transport layer d. data link layer e. none of above

2. In OSI network architecture, the routing is performed by a. network layer b. data link layer c. transport layer d. session layer e. none of above

3. Which of the following performs modulation and demodulation? a. fiber optics b. satellite c. coaxial cable d. modem e. none of the above

4. The process of converting analog signals into digital signals so they can be processed by a receiving computer is referred to as: a. modulation b. demodulation

c. synchronizing d. digitising

5. How many OSI layers are covered in the X.25 standard? a. Two b. Three c. Seven d. Six e. None of above

6. Layer one of the OSI model is a. physical layer b. link layer c. transport layer d. network layer e. none of above

7. The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above

8. Which of the following communication modes support two-way traffic but in only one direction at a time? a. simplex b. half duplex c. three-quarters duplex d. all of the above e. none of the above

9. Which of the following might be used by a company to satisfy its growing communications needs? a. front end processor b. multiplexer c. controller d. concentrator e. all of the above

10. What is the number of separate protocol layers at the serial interface gateway specified by the X.25 standard? a. 4 b. 2 c. 6 d. 3

Ans. 1 to 10 1. a 2. a

3. d 4. d 5. b 6. a 7. c 8. b 9. e 10. d

11. Software, such as Explorer and Firefox, are referred to as _____. A) Systems software B) Utility software C) Browsers D) Internet tools

12. Which following ISP is free? A) CompuServe B) AOL C) NetZero D) MSN

13. If you wanted to be part of an online community that creates an educational web site that allows its members to add to or change its information, what type of web site would you need? A) Educational or .edu

B) Social networking site C) Wiki D) Web 2.0

14. If you wanted to create a broadcast that could be downloaded from the Internet, what would you create? A) IBroadcast B) EShow C) Podcast D) ICast

15. When data moves from one set of major connections to another on the Internet, we call these connections the Internet _____. A) Pathway B) Backbone C) Communications system D) Routers

16. When internet data leaves your campus, it normally goes to a(n) ______ before moving toward its destination. A) Internet backbone B) Network access point C) Base station D) Communication system

17. MCI and AT&T are examples of which of the following?

A) Social networks B) Communications systems C) Internet service providers D) Mobisodes

18. What type of telecommunications hardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

19. If a computer on the network shares resources for others Ito use, it is called (a) Server (b) Client (c) Super Computer (d) Mainframe Computer

20. Print server uses which is a buffer that holds data before it is send to the printer. (a) Node (b) Spool (c) Queue (d) Stand alone PC

Ans. 11 to 20

11. c 12. c 13. c 14. c 15. b 16. b 17. c 18. b 19. a 20. b

21. A remote batch-processing operation in which data is solely input to a central computer would require a. telegraph line b. simplex lines c. mixed bad channel d. all of above

22. A band is always equivalent to a. a byte b. a bit c. 100 bits d. none of above

23. The loss in signal power as light travels down the fiber is called a. attenuation b. progragation c. scattering d. interruption

24. Avalanche photodiode receivers can detect bits of transmitted data by receiving a. 100 photons b. 200 photons c. 2000 photons d. 300 photons

25. Communiction circuits that transmit data in both directions but not at the same time are operating in a. a simplex mode b. a half duplex mode c. a full duplex mode d. an asynchronous mode

26. An example of a medium speed, switched communications service is a. series 1000 b. data phone 50 c. DDD d. All of the above

27. In communication satellite, multiple repeaters are known as a. detector b. modulator c. stations d. transponders

28. While transmitting odd-parity coded symbols, the number of zeros in each symbol is a. odd b. even c. a and b both d. unknown

29. Data communications monitors available on the software marked include a. ENVIRON/1 b. TOTAL c. BPL d. Telnet

30. An example of an analog communication method is a. laser beam b. microwave c. voice grade telephone line d. all of the above

Ans. 21 to 30 21. b 22. d 23. a 24. b 25. b 26. c 27. d 28. d 29. a 30. d

31. Which of the following is not an scripting language ? (A) HTML (B) XML (C) Postscript (D) JavaScript

32 Which of the following is a platform free language? (A) Fortran (B) Assembly (C) C (D) Java

33 A digital signature is (A) scanned signature (B) signature in binary form (C) encrypting information (D) handwritten signature

34 Mechanism to protect private networks from outside attack is (A) Firewall (B) Antivirus (C) Digital signature (D) Formatting

35 A computer system that permits multiple users to run programs at same time (A) Real time system (B) Multi programming system (C) Time sharing system (D) Multi tasking system

36 A computer communication technology that provides a way to interconnect multiple computer across short distance is (A) LAN (B) MAN (C) WAN (D) Wireless network

37 Telnet is a service that runs (A) Television on net (B) Remote program (C) Cable TV network (D) Telenext

38. A device that forwards data packet from one network to another is called a (A) Bridge (B) Switch (C) Hub (D) Gateway

39 Which of the following is the fastest media of data transfer (A) Co-axial Cable (B) Untwisted Wire (C) Telephone Lines (D) Fibre Optic

40. Tool that is used to transfer data/files among computers on the Internet (A) FTP (B) Archie (C) TCP (D) Gopher

Ans. 31 to 40 31. c 32. d 33. c 34. a 35. d 36. a 37. b 38. b 39. d 40. c

41. HTML is a (A) Programming Language (B) Scripting Language (C) Web Browser (D) Network Protocol

42. Secret-key encryption is also known as (A) Asymmetric encryption (B) Symmetric encryption (C) Secret-encryption (D) Private encryption

43. The concept of electronic cash is to execute payment by

(A) Credit Card (B) ATM Card (C) Using computers over network (D) Cheque

44. SMTP is a (A) Networking Protocol (B) Protocol used for transferring message between end user & Mail Server (C) Protocol used for smart card message interchange (D) Encryption Standard

45. Digital Signature is (A) Scanned Signature on Computer (B) Code number of the sender. (C) Public Key Encryption. (D) Software to recognize signature.

46. Telnet is a (A) Network of Telephones (B) Television Network (C) Remote Login (D) Remote Login.

47. The internet is (A) Network of networks (B) Web site.

(C) Host (D) Server

48. An e-business that allows consumer to name their own price for products and services is following which e-business model? (A) B2B (B) B2G (C) C2C (D) C2B

49. Kerberos is an encryption-based system that uses (A) Secret key encryption (B) Public key encryption (C) Private key encryption (D) Data key encryption

50. The method(s) of payment for online consumers are (A) Electronic cash (B) Credit/debit (C) Electronic checks (D) All of the above

Ans. 41 to 50 41. b

42. d 43. c 44. b 45. d 46. c 47. a 48. d 49. a 50. d

51. DNS is (A) The distributed hierarchical naming system (B) The vertical naming system (C) The horizontal naming system (D) The client server system

52. A firewall is (A) An established network performance reference point. (B) Software or hardware used to isolate a private network from a public network. (C) A virus that infects macros. (D) A predefined encryption key used to encrypt and decrypt data transmissions.

53. A router (A) Screens incoming information.

(B) Distributes information between networks (C) Clears all viruses from a computer system (D) Is a work virus.

54. LDAP stands for (A) Light weight Data Access Protocol. (B) Light weight Directory Access Protocol. (C) Large Data Access Protocol. (D) Large Directory Access Protocol.

55. E-Commerce is not suitable for (A) Sale/Purchase of expensive jewellery and antiques. (B) Sale/Purchase of mobile phones. (C) Sale/Purchase of branded clothes. (D) Online job searching.

56. Amazon.com comes under the following model (A) B2B (B) B2C (C) C2C (D) C2B

57. Hubs are present in the network (A) to diagnose line failures, measure and manage traffic flow and simplify reconfiguring of LANs.

(B) to interconnect the LAN with WANs. (C) to interconnect the WANs with WANs. (D) to interconnect the WANs with LANs.

58. Firewalls operate by (A) The pre-purchase phase. (B) isolating Intranet from Extranet. (C) Screening packets to/from the Network and provide controllable filtering of network traffic. (D) None of the above.

59. The mercantile process model consists of the following pahase(s): (A) The pre-purchase phase. (B) Purchase consummation phase. (C) Post-purchase Interaction phase. (D) All of the above.

State which of the statement is true and which are false. Write ‘T’ or ‘F’ in the answer book. 60. One disadvantage to online buyers is lack of trust when dealing with unfamiliar sellers a. True b. False

Ans. 51 to 60 51. c 52. b

53. b 54. b 55. d 56. b 57. b 58. c 59. d 60. a

61. Multimedia contents are not important to e-business applications. a. True b. True

62. While making payment using electronic check, credit and debit cards, the server authenticates the customers and verifies with the bank that funds are adequate before purchase. a. True b. False

63. Trojan horse is a program that performs not only a desired task but also includes unexpected malicious functions a. True b. False

64. Home Banking is not an example of consumer oriented applications a. True b. False

65. Electronic checks are another form of electronic tokens. a. True b. False

66. Telephone systems may be classified as: a. b. c. d. duplex and asymmetrical. simplex and symmetrical. duplex and symmetrical. simplex and asymmetrical.

67. A network that provides a constant bandwidth for the complete duration of a message transfer is a: a. packet switched network. b. cell switched network. c. circuit switched network.

68. A router: a. Forwards a packet to all outgoing links, except the link upon which the packet originated. b. Forwards a packet to the next free outgoing link. c. Forwards a packet to all outgoing links. d. Determines on which outgoing link a packet is to be forwarded.

69. The Internet is an example of a: a. circuit switched network. b. packet switched network. c. cell switched network.

70. A data link between the head office of a financial organization and one of its branches runs continuously at 2.048 Mbps. Between the hours of 0900 and 1700 it is noted that there are 295 bits received in error. Determine the bit error rate. a. b. c. d. 5 x 10-9 2 x 10-10 2 x 10-7 5 x 10-8

Ans. 61 to 70

61. a 62. b 63. a 64. b 65. a 66. a 67. c 68. d 69. b 70. a

71. The optical fibre trans-Atlantic cable TAT-14 includes a section from Bude, Cornwall to Tuckerton, New Jersey. Determine the propagation delay if the route length is 6,254 km. a. b. c. d. 312.7 ms. 31.98 ms. 3.198 ms. 31.27 ms.

72. A file is downloaded to a home computer using a 56 kbps modem connected to an Internet Service Provider. If the download completes in 2 minutes, estimate the maximum size of data downloaded. a. b. c. d. 13.44 Mbit. 26.88 Mbit. 6.72 Mbit. 336 Kbit.

73. Baseband transmission may be defined as the transmission of a signal over a link: a. b. c. d. by means of wires. which is relatively short. without any change in frequency. at a different band of frequencies.

74. Skin effect may be described as: a. b. c. d. a thin layer of electricity. conduction of electricity through skin. conduction restricted to a small central region of a conductor. conduction restricted to the outer layer of a conductor.

75. A block of data consisting of 2048 bits is transmitted between two computers interconnected by 450 m of twisted-pair wire. If the transmission rate is 34 kbps determine a, the ratio of propagation delay to transmission delay. a. b. c. d. 3.76 x 10-3 3.76 x 10-6 37.6 x 10-6 376 x 10-6

Ans. 71 to 75 71. a 72. c

73. c 74. c 75. c

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close