Quiznetik

Computer Architecture and Organization | Set 1

1. When collection of various computers seems a single coherent system to its client, then it is called

Correct : B. distributed system

2. Two devices are in network if

Correct : A. a process in one device is able to exchange information with a process in another device

3. Which of the following computer networks is built on the top of another network?

Correct : D. overlay network

4. In computer network nodes are

Correct : D. all of the mentioned

5. Communication channel is shared by all the machines on the network in

Correct : A. broadcast network

6. Bluetooth is an example of

Correct : A. personal area network

7. A                      is a device that forwards packets between networks by processing the routing information included in the packet.

Correct : C. router

8. A list of protocols used by a system, one protocol per layer, is called

Correct : B. protocol stack

9. Network congestion occurs

Correct : A. in case of traffic overloading

10. Which of the following networks extends a private network across public networks?

Correct : B. virtual private network

11. Physical or logical arrangement of network is

Correct : A. topology

12. Which network topology requires a central controller or hub?

Correct : A. star

13. topology requires a multipoint connection.

Correct : D. bus

14. Data communication system spanning states, countries, or the whole world is

Correct : B. wan

15. Data communication system within a building or campus is

Correct : A. lan

16. WAN stands for

Correct : B. wide area network

17. In TDM, slots are further divided into

Correct : B. frames

18. is the multiplexing technique that shifts each signal to a different carrier frequency.

Correct : A. fdm

19. What is internet?

Correct : B. a vast collection of different networks

20. To join the internet, the computer has to be connected to a

Correct : C. internet service provider

21. Internet access by transmitting digital data over the wires of a local telephone network is provided by

Correct : B. digital subscriber line

22. 3 OVERVIEW OF INTERNET

Correct : A. internet exchange point

23. Which of the following protocols is used in the internet?

Correct : D. dns, http and dns

24. Internet works on

Correct : A. packet switching

25. Which one of the following is not an application layer protocol used in internet?

Correct : C. resource reservation protocol

26. Which protocol assigns IP address to the client connected in the internet?

Correct : A. dhcp

27. Which one of the following is not used in media access control?

Correct : D. packet switching

28. Which level is the network layer in the OSI model?

Correct : A. third level

29. Data in network layer is transferred in the form of

Correct : B. packets

30. The network layer contains which hardware device?

Correct : D. routers, bridges and switches

31. Network layer protocol exits in

Correct : A. host

32. What are the common protocols associated with the network layer?

Correct : C. internet protocol

33. The network layer responds to request from which layer?

Correct : A. transport layer

34. The network layer issues request to which layer?

Correct : B. data layer

35. IP is connectionless.

Correct : A. true

36. Does network layer in TCP/IP and OSI Model are same.

Correct : B. false

37. What are called routers?

Correct : D. the devices that operates at network

38. ICMP stands for

Correct : B. internet control message protocol

39. Packets will be transferred in how many types?

Correct : D. 3 types

40. DDP stands for

Correct : A. datagram delivery protocol

41. RIP stands for

Correct : C. routing information protocol

42. The                          model is 7-layer architecture where each layer is having some specific functionality to perform.

Correct : C. osi

43. The full form of OSI is OSI model is

Correct : A. open systems interconnection

44. Which of the following is not physical layer vulnerability?

Correct : C. unauthorized network access

45. In                                      layer, vulnerabilities are directly associated with physical access to networks and hardware.

Correct : A. physical

46. Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.

Correct : A. true

47. Which of the following is not a vulnerability of the data-link layer?

Correct : D. overloading of transport-layer mechanisms

48. is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

Correct : B. vlan circumvention

49. may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

Correct : A. switches

50. Which of the following is not a vulnerability of the network layer?

Correct : D. weak or non-existent authentication

51. Which of the following is an example of physical layer vulnerability?

Correct : B. physical theft of data

52. Which of the following is an example of data-link layer vulnerability?

Correct : A. mac address spoofing

53. Which of the following is an example of network layer vulnerability?

Correct : C. route spoofing

54. Which of the following is an example of physical layer vulnerability?

Correct : D. keystroke & other input logging

55. Which of the following is an example of data-link layer vulnerability?

Correct : B. vlan circumvention

56. Which transmission media provides the highest transmission speed in a network?

Correct : C. optical fiber

57. Bits can be sent over guided and unguided media as analog signal by

Correct : A. digital modulation

58. The portion of physical layer that interfaces with the media access control sublayer is called

Correct : A. physical signalling sublayer

59. The physical layer provides

Correct : D. all of the mentioned

60. In asynchronous serial communication the physical layer provides

Correct : C. both start & stop signalling and flow control

61. The physical layer is responsible for

Correct : D. all of the mentioned

62. The physical layer translates logical communication requests from the              into hardware specific operations.

Correct : A. data link layer

63. A single channel is shared by multiple signals by

Correct : C. multiplexing

64. Wireless transmission of signals can be done via

Correct : D. all of the mentioned

65. In the digital communication system, signals in different frequency bands are

Correct : A. orthogonal

66. Properties of impulse function are

Correct : D. all of the mentioned

67. Properties of Fourier transform are

Correct : D. all of the mentioned

68. A base-band signal can be up-converted using

Correct : B. cosine wave

69. A band-pass signal can be down-converted using

Correct : B. cosine wave

70. In down-conversion multiplication with cosine wave is followed by

Correct : A. low pass filter

71. Fourier transform of a signal gives the

Correct : C. frequency content & bandwidth

72. Random things in a communication system are

Correct : D. all of the mentioned

73. Which can be used for periodic and non periodic?

Correct : B. fourier transforms

74. A band-pass signal has a Fourier transform equal to

Correct : B. zero

75. A band-pass signal has

Correct : B. no dc component

76. Which are orthonormal signal representation?

Correct : D. all of the mentioned

77. Constellation diagram is plotted in

Correct : B. signal space

78. Cumulative distributive function is

Correct : C. non negative & decreasing

79. Which are non negative functions?

Correct : C. pdf & pmf

80. Which of the following tasks is not done by data link layer?

Correct : D. channel coding

81. Which sublayer of the data link layer performs data link functions that depend upon the type of medium?

Correct : B. media access control sublayer

82. Header of a frame generally contains

Correct : D. all of the mentioned

83. When 2 or more bits in a data unit has been changed during the transmission, the error is called

Correct : B. burst error

84. CRC stands for

Correct : A. cyclic redundancy check

85. Which of the following is a data link protocol?

Correct : D. all of the mentioned

86. Which of the following is the multiple access protocol for channel access control?

Correct : C. both csma/cd & csma/ca

87. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called

Correct : A. piggybacking

88. Automatic repeat request error management mechanism is provided by

Correct : A. logical link control sublayer

89. In layering, n layers provide service to

Correct : C. n+1 layer

90. Which can be used as an intermediate device in between transmitter entity and receiver entity?

Correct : D. all of the mentioned

91. Which has comparatively high frequency component?

Correct : C. square wave

92. Which has continuous transmission?

Correct : B. synchronous

93. Which requires bit transitions?

Correct : B. synchronous

94. In synchronous transmission, receiver must stay synchronous for

Correct : C. 9 bits

95. How error detection and correction is done?

Correct : D. by adding redundancy bits

96. Which is more efficient?

Correct : B. cyclic redundancy check

97. Which can detect two bit errors?

Correct : B. cyclic redundancy check

98. CRC uses

Correct : C. multiplication & binary division

99. What is start frame delimeter (SFD) in ethernet frame?

Correct : B. 10101011

100. MAC address is of

Correct : D. 48 bits