Important Objectives computer networking
Data communication and computer networks
The layer of the TCP/IP model which lies below the transport layer is:
a) Physical Layer
b) Network Layer
c) Session Layer
d) Application Layer
A packet in the data-link layer is called:
a) Frame
b) Segment
c) Datagram
d) header
OSI stands for:
a) Open Systems Internet
b) Open Systems Interchange
c) Open Systems Interconnect
d) Open Systems Interface
TCP stands for:
a) Transmission Control Protocol
d) Transition Control Protocol
b) Transport Control Protocol
c) Transfer Control Protocol
Which of the following layers is present in the OSI model but not in the TCP/IP model?
a) Data link layer
b) Network layer
c) Transport Layer
d) Session Layer
The bandwidth of an analog signal is measured in:
a) Hertz
b) Bits per second
c) Bytes per second
d) Megabytes or Gigabytes
Which of the following problems can be addressed by the use of an amplifier:
a) attenuation
b) distortion
c) noise
d) all of the above
When different packets encounter different amounts of delay and arrive at uneven intervals of time, it is termed:
a) Latency
b) Noise
c) Jitter
d) Bandwidth Delay Product
Baud rate refers to number of:
a) bits sent per second
b) signals elements per second
c) bandwidth per second
d) None of these
A line encoding scheme that uses three voltage levels, positive, zero and negative is called:
a) Unipolar encoding
b) Polar encoding
c) Bipolar encoding
d) Multilevel encoding
Which of the following is not a part of Pulse Code Modulation:
a) Sampling
b) Scrambling
c) Encoding
d) Quantizing
According to the Nyquist theorem, the sampling rate must be:
a) twice the bandwidth
b) twice the SNR
c) twice the lowest frequency
d) twice the highest frequency
A type of serial transmission in which start and stop bits are used is called:
a) asynchronous transmission
b) synchronous transmission
c) isochronous transmission
d) all of the above
In which of the following digital to analog modulation techniques do we vary the frequency to represent data:
a) Quadrature Amplitude Modulation
b) Phase Shift Keying
c) Amplitude Shift Keying
d) None of these
The total number of ports in TCP/IP is:
a) 1024
b) 4096
c) 8192
d) 65536
The connector used for twisted pair cables is called:
a) BNC
b) RJ-11
c) RJ-45
d) Cat-5
Which of the following are omni-directional?
a) Radio waves
b) Microwaves
c) infrared waves
d) All of these
When the individual packet from a source host to a destination host can travel through different routes through the network, it is a:
a) Circuit Switched Network
b) Virtual Circuit Network
c) Datagram Network
d) Message Switching Network
MAC addresses are used at the:
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
The length of an IP address (IPv4) is:
a) 48 bits
b) 16 bits
c) 64 bits
d) 32 bits
Which one of the following is used for error detection:
a) Virtual Circuit
b) Port
c) Parity Bit
d) Packet
Which one of the following is an error correction code:
a) ARP
b) Cyclic Redundancy Check
c) TCP
d) Parity
When the packet travelling in one direction also carries an acknowledgement of packets sent in the other direction, it is called:
a) Bit stuffing
b) Framing
c) Encapsulation
d) Piggybacking
When more than one station on a shared link is transmitting frames, it can lead to a situation called:
a) Buffer Overflow
b) Scrambling
c) Collision
d) Multiplexing
CSMA is a
a) Point to Point Protocol
b) Collision detection protocol
c) Transport Layer protocol
d) Encoding Technique
ARP stands for:
a) Address Request Protocol
b) Address Resolution Protocol
c) Autonegotiation Request Protocol
d) Autonegotiation Release Protocol
The maximum speed of the Ethernet protocol is:
a) 100 Mbps
b) 1 Gbps
c) 10 Gbps
d) Limited by the switch or router
The ping command is used:
a) To find out if a host on a network is alive and responding.
b) To find out if we can log in to a server
c) To establish an IP connection to a host
d) All of the above
The Ethernet protocol is:
a) Connectionless
b) Unreliable
c) Both connectionless and unreliable
d) Neither
The minimum length of an Ethernet frame is:
a) 1048 bytes
b) 64 bytes
c) 128 bytes
d) 512 bytes
The maximum length of an Ethernet frame is:
a) 512 bytes
b) 1518 bytes
c) 2048 bytes
d) 4096 bytes
Which of the following mac addresses is a broadcast Ethernet address:
a) 00: 00: 00: 00: 00: 00
b) 11: 11: 11: 11: 11: 11
c) FF: FF: FF: FF: FF: FF
d) 1.1.1.1
The original Ethernet was limited to a length of:
a) 2500 m
b) 1500 m
c) 250 m
d) 1000 m
Which of the following media are allowed in an Ethernet:
a) UTP/STP
b) Coaxial
c) Optical Fiber
d) All of the above
The http protocol uses port number ______:
a) 27
b) 447
c) 110
d) 80
The feature that allows incompatible devices like a 1
0 Mbps device and a 100 Mbps device to communicate in Ethernet is called:
a) Bus arbitration
b) CSMA/CD
c) ALOHA
d) Autonegotiation
To convert a URL like http://google.com into an IP address, _____ is used:
a) HTTP
b) TCP/IP
c) Web Server
d) DNS
ADSL stands for
a) Analog Digital Subscriber Line
b) Asymmetric Digital Subscriber Line
c) Analog Demodulated Subscriber Line
d) Alternate Demodulated Subscriber Line
Which of the following are WAN protocols?
a) SONET
b) ATM
c) WiMAX
d) All of the above
The set of standards that define WiFi are:
a) 802.11x
c) 802.13x
b) 802.14x
d) 802.15x
The data rate of Bluetooth is:
a) 200 Kbps
b) 512 kbps
c) 768 kbps
d) 1 Mbps
The maximum speed of a dial-up modem is:
a) 28 kbps
b) 112 kbps
c) 46 kbps
d) 56 kbps
A geostationary satellite orbits the earth at an altitude of:
a) 24000 km
b) 43000 km
c) 36000 km
d) 27000 km
The minimum number of geostationary satellites required to provide full global transmission is:
a) 3
b) 24
c) 5
d) 6
A device that operates at the physical layer and regenerates the bits but cannot perform any filtering of packets is called:
a) Switch
b) Router
c) Hub
d) Gateway
A device that operates at the data link layer and checks the destination address of a frame to decide on which outgoing port the frame should be sent is:
a) Switch
b) Router
c) Hub
d) Gateway
Which layer does a router operate at?
a) Network Layer
b) Transport Layer
c) Data link layer
d) Physical Layer
What is the number of possible IP addresses in the IP protocol:
a) one billion
b) two billion
c) three billion
d) four billion
End to end addressing at the transport layer are provided by:
a) IP Addresses
b) Port Numbers
c) MAC Addresses
d) URLs
The IP address 192.168.0.1 belongs to:
a) Class A
b) Class B
c) Class C
d) none of the above
If the Network ID part of an IP address is variable in length, the IP address is a:
a) Classful IP Address
b) Classless IP Address
c) Can be either one of the two
d) Depends on the network
A technique that divides the range of IP addresses obtained by an organization into several subranges is:
a) Subnetting
b) VLANs
c) CIDR
d) Hierarchical routing
Which of the following IP addresses is a loopback address?
a) 192.168.0.1
b) 255.255.255.255
c) 127.0.0.1
d) 192.168.0.0
Which of the following IP addresses is the broadcast IP address?
a) 192.168.0.1
b) 255.255.255.255
c) 127.0.0.1
d) 192.168.0.0
The protocol that automatically assigns IP addresses to computers that join a network is:
a) ALOHA
b) DHCP
c) HTTP
d) TCP
ICMP stands for:
a) Internetwork Configuration Message Protocol
b) Internet Control Message Protocol
c) Internet Configuration Management Protocol
d) Internetwork Control Message Protocol
Which of the following is a routing protocol:
a) RIP
b) OSPF
c) BGP
d) all of the above
The IP protocol is:
a) Connectionless
b) Unreliable
c) Both connectionless and unreliable
d) Neither
The maximum allowed size of an IP packet is:
a) 65536 bytes
b) 8192 bytes
c) 32765 bytes
d) 4096 bytes
Fragmentation and reassembly of datagrams is done by:
a) Network layer
b) Transport layer
c) Data link layer
d) All of the above
Which of the following techniques can be used to avoid collisions:
a) Random access protocols
b) Controlled access protocols
c) Channelization protocols
d) All of the above
DHCP stands for:
a) Digital Handshaking Control Protocol
b) Digital Handshaking Configuration Protocol
c) Dynamic Host Control Protocol
d) Dynamic Host Configuration Protocol
How many classes of IP addresses are there in the classful addressing scheme:
a) three
b) five
c) two
d) ten
Which of the following is a channelization protocol:
a) ALOHA
b) CSMA/CD
c) TDMA
d) Polling
Which of the following is a digital multiplexing technique:
a) FDM
b) WDM
c) TDM
d) All of the above
The purpose of a bridge is:
a) To increase the bandwidth of the network
b) To create separate collision domains
c) To increase bandwidth as well as to separate the collision domains
d) To connect to outside networks
The bandwidth of a landline telephone connection when used for voice calling is:
a) 1 Mhz
b) 8 Khz
c) 56 kbps
d) 20 Khz
To find out the IP addresses of all routers that are on the path to a destination host, we can use:
a) ping
b) hop
c) tracert
d) finger
Protocols are
logy