Quiznetik
Computer Architecture and Organization | Set 1
1. When collection of various computers seems a single coherent system to its client, then it is called
A. computer network
B. distributed system
C. networking system
D. mail system
Correct : B. distributed system
2. Two devices are in network if
A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. pids of the processes running of different devices are same
D. a process is active and another is inactive
Correct : A. a process in one device is able to exchange information with a process in another device
3. Which of the following computer networks is built on the top of another network?
A. prior network
B. chief network
C. prime network
D. overlay network
Correct : D. overlay network
4. In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. all of the mentioned
Correct : D. all of the mentioned
5. Communication channel is shared by all the machines on the network in
A. broadcast network
B. unicast network
C. multicast network
D. anycast network
Correct : A. broadcast network
6. Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. wide area network
Correct : A. personal area network
7. A is a device that forwards packets between networks by processing the routing information included in the packet.
A. bridge
B. firewall
C. router
D. hub
Correct : C. router
8. A list of protocols used by a system, one protocol per layer, is called
A. protocol architecture
B. protocol stack
C. protocol suite
D. protocol system
Correct : B. protocol stack
9. Network congestion occurs
A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of transfer failure
Correct : A. in case of traffic overloading
10. Which of the following networks extends a private network across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. storage area network
Correct : B. virtual private network
11. Physical or logical arrangement of network is
A. topology
B. routing
C. networking
D. control
Correct : A. topology
12. Which network topology requires a central controller or hub?
A. star
B. mesh
C. ring
D. bus
Correct : A. star
13. topology requires a multipoint connection.
A. star
B. mesh
C. ring
D. bus
Correct : D. bus
14. Data communication system spanning states, countries, or the whole world is
A. lan
B. wan
C. man
D. pan
Correct : B. wan
15. Data communication system within a building or campus is
A. lan
B. wan
C. man
D. pan
Correct : A. lan
16. WAN stands for
A. world area network
B. wide area network
C. web area network
D. web access network
Correct : B. wide area network
17. In TDM, slots are further divided into
A. seconds
B. frames
C. packets
D. bits
Correct : B. frames
18. is the multiplexing technique that shifts each signal to a different carrier frequency.
A. fdm
B. tdm
C. both fdm & tdm
D. pdm
Correct : A. fdm
19. What is internet?
A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. interconnection of wide area networks
Correct : B. a vast collection of different networks
20. To join the internet, the computer has to be connected to a
A. internet architecture board
B. internet society
C. internet service provider
D. different computer
Correct : C. internet service provider
21. Internet access by transmitting digital data over the wires of a local telephone network is provided by
A. leased line
B. digital subscriber line
C. digital signal line
D. digital leased line
Correct : B. digital subscriber line
22. 3 OVERVIEW OF INTERNET
A. internet exchange point
B. subscriber end point
C. isp end point
D. internet end point
Correct : A. internet exchange point
23. Which of the following protocols is used in the internet?
A. http
B. dhcp
C. dns
D. dns, http and dns
Correct : D. dns, http and dns
24. Internet works on
A. packet switching
B. circuit switching
C. both packet switching and circuit switching
D. data switching
Correct : A. packet switching
25. Which one of the following is not an application layer protocol used in internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. local procedure call
Correct : C. resource reservation protocol
26. Which protocol assigns IP address to the client connected in the internet?
A. dhcp
B. ip
C. rpc
D. rsvp
Correct : A. dhcp
27. Which one of the following is not used in media access control?
A. ethernet
B. digital subscriber line
C. fiber distributed data interface
D. packet switching
Correct : D. packet switching
28. Which level is the network layer in the OSI model?
A. third level
B. fourth level
C. second level
D. fifth layer
Correct : A. third level
29. Data in network layer is transferred in the form of
A. layers
B. packets
C. bytes
D. bits
Correct : B. packets
30. The network layer contains which hardware device?
A. routers, bridges
B. bridges only
C. bridges and switches
D. routers, bridges and switches
Correct : D. routers, bridges and switches
31. Network layer protocol exits in
A. host
B. switches
C. packets
D. bridges
Correct : A. host
32. What are the common protocols associated with the network layer?
A. address resolution protocol
B. reverse address resolution protocol
C. internet protocol
D. neighbour discovery protocol
Correct : C. internet protocol
33. The network layer responds to request from which layer?
A. transport layer
B. data layer
C. application layer
D. session layer
Correct : A. transport layer
34. The network layer issues request to which layer?
A. transport layer
B. data layer
C. application layer
D. session layer
Correct : B. data layer
35. IP is connectionless.
A. true
B. false
Correct : A. true
36. Does network layer in TCP/IP and OSI Model are same.
A. true
B. false
Correct : B. false
37. What are called routers?
A. the devices that operates at session layer
B. the devices that operates at data layer
C. the devices that operates at application layer
D. the devices that operates at network
Correct : D. the devices that operates at network
38. ICMP stands for
A. internet coordinate message protocol
B. internet control message protocol
C. interconnect control message protocol
D. interconnect coordinate message protocol
Correct : B. internet control message protocol
39. Packets will be transferred in how many types?
A. 5 types
B. 4 types
C. 2 types
D. 3 types
Correct : D. 3 types
40. DDP stands for
A. datagram delivery protocol
B. device delivery protocol
C. datagram device protocol
D. device datagram protocol
Correct : A. datagram delivery protocol
41. RIP stands for
A. reduced information protocol
B. routing internet protocol
C. routing information protocol
D. reduced internet protocol
Correct : C. routing information protocol
42. The model is 7-layer architecture where each layer is having some specific functionality to perform.
A. tcp/ip
B. cloud
C. osi
D. ois
Correct : C. osi
43. The full form of OSI is OSI model is
A. open systems interconnection
B. open software interconnection
C. open systems internet
D. open software internet
Correct : A. open systems interconnection
44. Which of the following is not physical layer vulnerability?
A. physical theft of data & hardware
B. physical damage or destruction of data & hardware
C. unauthorized network access
D. keystroke & other input logging
Correct : C. unauthorized network access
45. In layer, vulnerabilities are directly associated with physical access to networks and hardware.
A. physical
B. data-link
C. network
D. application
Correct : A. physical
46. Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
A. true
B. false
Correct : A. true
47. Which of the following is not a vulnerability of the data-link layer?
A. mac address spoofing
B. vlan circumvention
C. switches may be forced for flooding traffic to all vlan ports
D. overloading of transport-layer mechanisms
Correct : D. overloading of transport-layer mechanisms
48. is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.
A. vlan attack
B. vlan circumvention
C. vlan compromisation method
D. data-link evading
Correct : B. vlan circumvention
49. may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
A. switches
B. routers
C. hubs
D. repeaters
Correct : A. switches
50. Which of the following is not a vulnerability of the network layer?
A. route spoofing
B. identity & resource id vulnerability
C. ip address spoofing
D. weak or non-existent authentication
Correct : D. weak or non-existent authentication
51. Which of the following is an example of physical layer vulnerability?
A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Correct : B. physical theft of data
52. Which of the following is an example of data-link layer vulnerability?
A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Correct : A. mac address spoofing
53. Which of the following is an example of network layer vulnerability?
A. mac address spoofing
B. physical theft of data
C. route spoofing
D. weak or non-existent authentication
Correct : C. route spoofing
54. Which of the following is an example of physical layer vulnerability?
A. mac address spoofing
B. route spoofing
C. weak or non-existent authentication
D. keystroke & other input logging
Correct : D. keystroke & other input logging
55. Which of the following is an example of data-link layer vulnerability?
A. physical theft of data
B. vlan circumvention
C. route spoofing
D. weak or non-existent authentication
Correct : B. vlan circumvention
56. Which transmission media provides the highest transmission speed in a network?
A. coaxial cable
B. twisted pair cable
C. optical fiber
D. electrical cable
Correct : C. optical fiber
57. Bits can be sent over guided and unguided media as analog signal by
A. digital modulation
B. amplitude modulation
C. frequency modulation
D. phase modulation
Correct : A. digital modulation
58. The portion of physical layer that interfaces with the media access control sublayer is called
A. physical signalling sublayer
B. physical data sublayer
C. physical address sublayer
D. physical transport sublayer
Correct : A. physical signalling sublayer
59. The physical layer provides
A. mechanical specifications of electrical connectors and cables
B. electrical specification of transmission line signal level
C. specification for ir over optical fiber
D. all of the mentioned
Correct : D. all of the mentioned
60. In asynchronous serial communication the physical layer provides
A. start and stop signalling
B. flow control
C. both start & stop signalling and flow control
D. only start signalling
Correct : C. both start & stop signalling and flow control
61. The physical layer is responsible for
A. line coding
B. channel coding
C. modulation
D. all of the mentioned
Correct : D. all of the mentioned
62. The physical layer translates logical communication requests from the into hardware specific operations.
A. data link layer
B. network layer
C. trasnport layer
D. application layer
Correct : A. data link layer
63. A single channel is shared by multiple signals by
A. analog modulation
B. digital modulation
C. multiplexing
D. phase modulation
Correct : C. multiplexing
64. Wireless transmission of signals can be done via
A. radio waves
B. microwaves
C. infrared
D. all of the mentioned
Correct : D. all of the mentioned
65. In the digital communication system, signals in different frequency bands are
A. orthogonal
B. non orthogonal
C. orthogonal & non orthogonal
D. none of the mentioned
Correct : A. orthogonal
66. Properties of impulse function are
A. symmetry
B. time scaling
C. shifting
D. all of the mentioned
Correct : D. all of the mentioned
67. Properties of Fourier transform are
A. duality property
B. time shifting property
C. modulation property
D. all of the mentioned
Correct : D. all of the mentioned
68. A base-band signal can be up-converted using
A. sine wave
B. cosine wave
C. filtering
D. none of the mentioned
Correct : B. cosine wave
69. A band-pass signal can be down-converted using
A. sine wave
B. cosine wave
C. time delayed wave
D. none of the mentioned
Correct : B. cosine wave
70. In down-conversion multiplication with cosine wave is followed by
A. low pass filter
B. high pass filter
C. bandpass filter
D. bandstop filter
Correct : A. low pass filter
71. Fourier transform of a signal gives the
A. frequency content
B. bandwidth
C. frequency content & bandwidth
D. none of the mentioned
Correct : C. frequency content & bandwidth
72. Random things in a communication system are
A. timing offset
B. device frequency
C. attenuation
D. all of the mentioned
Correct : D. all of the mentioned
73. Which can be used for periodic and non periodic?
A. fourier series
B. fourier transforms
C. fourier series & transforms
D. none of the mentioned
Correct : B. fourier transforms
74. A band-pass signal has a Fourier transform equal to
A. one
B. zero
C. infinity
D. cannot be determined
Correct : B. zero
75. A band-pass signal has
A. dc component
B. no dc component
C. no side lobes
D. cannot be determined
Correct : B. no dc component
76. Which are orthonormal signal representation?
A. sine and cosine at same frequency
B. wavelets
C. complex sinusoids at a different frequency
D. all of the mentioned
Correct : D. all of the mentioned
77. Constellation diagram is plotted in
A. constellation space
B. signal space
C. orthogonal space
D. boundary space
Correct : B. signal space
78. Cumulative distributive function is
A. non negative
B. non decreasing
C. non negative & decreasing
D. none of the mentioned
Correct : C. non negative & decreasing
79. Which are non negative functions?
A. pdf
B. pmf
C. pdf & pmf
D. none of the mentioned
Correct : C. pdf & pmf
80. Which of the following tasks is not done by data link layer?
A. framing
B. error control
C. flow control
D. channel coding
Correct : D. channel coding
81. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. error control sublayer
Correct : B. media access control sublayer
82. Header of a frame generally contains
A. synchronization bytes
B. addresses
C. frame identifier
D. all of the mentioned
Correct : D. all of the mentioned
83. When 2 or more bits in a data unit has been changed during the transmission, the error is called
A. random error
B. burst error
C. inverted error
D. double error
Correct : B. burst error
84. CRC stands for
A. cyclic redundancy check
B. code repeat check
C. code redundancy check
D. cyclic repeat check
Correct : A. cyclic redundancy check
85. Which of the following is a data link protocol?
A. ethernet
B. point to point protocol
C. hdlc
D. all of the mentioned
Correct : D. all of the mentioned
86. Which of the following is the multiple access protocol for channel access control?
A. csma/cd
B. csma/ca
C. both csma/cd & csma/ca
D. hdlc
Correct : C. both csma/cd & csma/ca
87. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called
A. piggybacking
B. cyclic redundancy check
C. fletcher’s checksum
D. parity check
Correct : A. piggybacking
88. Automatic repeat request error management mechanism is provided by
A. logical link control sublayer
B. media access control sublayer
C. network interface control sublayer
D. application access control sublayer
Correct : A. logical link control sublayer
89. In layering, n layers provide service to
A. n layer
B. n-1 layer
C. n+1 layer
D. none of the mentioned
Correct : C. n+1 layer
90. Which can be used as an intermediate device in between transmitter entity and receiver entity?
A. ip router
B. microwave router
C. telephone switch
D. all of the mentioned
Correct : D. all of the mentioned
91. Which has comparatively high frequency component?
A. sine wave
B. cosine wave
C. square wave
D. none of the mentioned
Correct : C. square wave
92. Which has continuous transmission?
A. asynchronous
B. synchronous
C. asynchronous & synchronous
D. none of the mentioned
Correct : B. synchronous
93. Which requires bit transitions?
A. asynchronous
B. synchronous
C. asynchronous & synchronous
D. none of the mentioned
Correct : B. synchronous
94. In synchronous transmission, receiver must stay synchronous for
A. 4 bits
B. 8 bits
C. 9 bits
D. 16 bits
Correct : C. 9 bits
95. How error detection and correction is done?
A. by passing it through equalizer
B. by passing it through filter
C. by amplifying it
D. by adding redundancy bits
Correct : D. by adding redundancy bits
96. Which is more efficient?
A. parity check
B. cyclic redundancy check
C. parity & cyclic redundancy check
D. none of the mentioned
Correct : B. cyclic redundancy check
97. Which can detect two bit errors?
A. parity check
B. cyclic redundancy check
C. parity & cyclic redundancy check
D. none of the mentioned
Correct : B. cyclic redundancy check
98. CRC uses
A. multiplication
B. binary division
C. multiplication & binary division
D. none of the mentioned
Correct : C. multiplication & binary division
99. What is start frame delimeter (SFD) in ethernet frame?
A. 10101010
B. 10101011
C. 00000000
D. 11111111
Correct : B. 10101011
100. MAC address is of
A. 24 bits
B. 36 bits
C. 42 bits
D. 48 bits
Correct : D. 48 bits