0% found this document useful (0 votes)
48 views

Computer Networks

This document contains a quiz on computer networks with 51 multiple choice questions. Some key topics covered include data transmission methods, network topologies, networking hardware such as switches and hubs, protocols like TCP/IP and Ethernet, and broadband technologies. The questions test understanding of concepts like error detection, routing, addressing, bandwidth, and characteristics of different network types.

Uploaded by

Ansar iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Computer Networks

This document contains a quiz on computer networks with 51 multiple choice questions. Some key topics covered include data transmission methods, network topologies, networking hardware such as switches and hubs, protocols like TCP/IP and Ethernet, and broadband technologies. The questions test understanding of concepts like error detection, routing, addressing, bandwidth, and characteristics of different network types.

Uploaded by

Ansar iqbal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

CS-610 (Computer Networks)

Grand Quiz Dec 2020


Prepared By: MCS of Virtuallians
If you found any error in the file, Please correct it accordingly
1. In Cyclic Redundancy Checking, CRC is __________.
a. Divisor
b. Quotient
c. Remainder page 20
d. Dividend
2. The satellite or radio topology in which all computers are connected to each
other via satellite or radio wave is a kind of
a. Broadcast network page 5
b. Point-to-Point network
3. Which of the following two operations are performed by Ethernet CD?
I. It monitors outgoing signals.
II. Grabbled signal is interpreted as a collision.
III. Signals are sent back to the sender.
IV. Choose a shorter delay.
a. I and III
b. II and IV
c. II and III
d. I and II page 28
4. The process of forwarding a packet is called ____________.
a. Routing page 58
b. Processing
c. Hierarchical Addressing
d. Source Addressing
5. Which statement is correct about Network Interface Card (NIC)?
I. NIC contains sufficient hardware to process data independent of
system CPU
II. NIC looks like any other I/O device to system CPU
III. NIC also receives interrupt on incoming data.
a. I and II
b. II and III
c. I and III
d. All of the given options page 40
6. While transmitting data from source A to destination B, 4 bits are changed
during the transmission then the error is a _________.
a. Burst error page 22
b. Single error
c. Double error
d. Logic error
7. The switch that has no attached computers is called __________.
a. Packet Switch
b. Exterior Switch
c. Interior Switch page 59
d. External Switch
8. ________ is the most popular wiring scheme because of lowest cost.
a. 5 Base T
b. 10 Base T page 43
c. 100 base T
d. 1000 base T
9. In _________ technique, all members of the network can send data only on the
specific time slot?
a. CDMA
b. FDMA
c. CSMA page 43
d. TDMA
10.If a sender with a 100 Megabit NIC and receiver with 10 Megabit NIC wants to
communicate with each other at which speed they can communicate?
a. 100 Megabit page 40
b. 110 Megabit
c. 1000 Megabit
d. 10 Megabit
11.Missing ______ in a frame format indicates receiving computer missed
beginning of the message.
a. eot
b. soh page 16
c. sot
d. eoh
12.The _______ of errors is easier than the ________ of errors.
a. correction; detection
b. detection; correction cs601 handouts
c. correction; creation
d. detection; manipulation
13.The _______ of errors is difficult than the ________ of errors.
a. correction; detection google
b. detection; correction
c. correction; creation
d. detection; manipulation
14.Source Independence phenomenon allows fast and efficient ____________.
a. Source Addressing
b. Routing
c. Packet Switching page 58
d. Store and forward
15.In distributed route computation process each packet switch computes its
routing table locally and sends messages to the __________.
a. Router
b. Graph
c. Neighbors page 63
d. WAN
16.The ___ layer of the OSI model takes the data from the physical layer and
perform error checking.
a. Transport
b. Data link google
c. Application
d. Presentation
17.CBR stands for _________.
a. Constant Byte Rate
b. Constant Bit Rate
c. Connection break Recovery
d. Constant Borrow Rate
18.A network that uses _______ usually consist of a single long cable to which
computer attach.
a. Star Topology
b. Ring Topology
c. Bus Topology page 26
d. Bus and Ring Topology
19.If simultaneous transmission occurs, the frames interfere with each other and
this phenomenon is called _______.
a. packet loss
b. collision page 28
c. delayed transmission
d. coordination
20. In __________ all computers are attached to a central hub
a. Ring topology
b. Star topology page 31
c. Hub topology
d. Bus topology
21.For adding a new computer in a point to point network ______new connection
will be required
a. N
b. N-1 page 23
c. N-2
d. 2n
22.The fastest Ethernet hardware operates at a rate of _____
a. 1000 bps
b. 100 Mbps page 27
c. 10 Mbps
d. 1000 Mbps
23.Which of the following the benefit to point to point communication?
a. Quick to configure
b. Security implementation page 23
c. Cost
d. Less availability
24.ATM offers _____speed and ________delay
a. High, High
b. High, low page 72
c. Low, low
d. Low, high
25.Thick Ethernet is known as ___________
a. 10 Base 2
b. 10 Base 5 google
c. 10 Base T
d. 10 Base 10
26.Both interior and exterior switches _______packet and they also need routing
tables.
a. Create
b. Delay
c. Forward page 59
d. Start
27.______is the rate at which data can be sent through the network
a. Throughput page 79
b. Propagation delay
c. Access delay
d. Switching delay
28.In a ping command, small –sized information packets of _____are sent.
a. TCP
b. UDP
c. ICMP page 11
d. IGMP
29.Many WANs use ______addressing of efficiency
a. Sequence
b. Forward
c. Hierarchical page 56
d. Sequential
30.Which of the following is not a function of ping commends?
a. Local computer network issue
b. Congestion in the network
c. Relay nodes page 11 and google
d. Remote host availability
31.Packet switched can be linked together to form a ________
a. LAN
b. WAN page 56
c. Bridge
d. None of the given option
32.Fixed network is a type of network which is classified with repect to the
______factor
a. Size
b. Connectivity
c. Medium
d. Mobility page 6
33.Parity bit can detect _________________error(s)
a. 4
b. 3
c. 2 page 19 (even or odd)
d. 1
34.When we will try to connect to the internet which of the following protocol will
be used?
a. Telnet
b. TCP/IP page 84
c. ICMP
d. IPx
35.How many computers are mandatory to form a network?
a. 1
b. 2 google
c. 4
d. 8
36.________ is standard wireless LAN that uses radio signals at 2.4GHz.
a. IEEE 803.16
b. IEEE 802.15
c. IEEE 802.3
d. IEEE 802.11 page 29
37.LAN interface hardware obeys ______ access rule.
a. CSMA/CD page 34
b. Round robin
c. First come first served
d. High priority
38.The most important task a bridge performs is _________.
a. Packet switching
b. Line controlling
c. Noise controlling
d. Frame filtering page 50
39.ATM uses small, fixed-sized packets called cells and each cell has _____
octets.
a. 47
b. 52
c. 53 page 66
d. 55
40.___________ can't be guaranteed with variable length packets as easily as it can
with fixed length cells.
a. Errors
b. Noise
c. Quality of Service page 72
d. None of the given
41.Which multiplexing technique transmits digital signals?
a. WDM
b. FDM
c. TDM page 15
d. GSM
42.Connections in Asynchronous transfer mode are called ________.
a. Virtual channels page 67
b. Virtual Path Identifier
c. Cells
d. Cell tax
43.A _______ is a device that combines multiple signals and forwards into a single
line.
a. Modem
b. Multiplexer page 41
c. Repeater
d. Layer 3 Switch
44.___________ is inflexible.
a. Routing
b. Searching
c. Processing
d. Static routing page 62
45.If a hub is used to connect many computers in a LAN, then only _______
computers can communicate at a given time.
a. Three
b. Two page 54
c. Four
d. One
46._________ is the term used for variance in transmission delays.
a. Friction
b. Segment
c. Checksum
d. Jitter page 66
47.________ is also called self healing network.
a. ATM
b. FDDI
c. Token Ring page 46
d. Frame relay
48._______ and _______ are the two frame types.
a. Internal and external
b. Single and dual
c. Implicit and explicit
d. Multicast and broadcast page 35
49.Bluetooth uses shared medium and _______ instead of coaxial cable.
a. Radio waves page 29
b. Infrared waves
c. Micro waves
d. Low frequency waves
50.Which of the following is not a guided medium?
a. Twisted-pair cable
b. Fiber-optic cable
c. Atmosphere google
d. Coaxial cable
51.As a result of ARPA research, the first network was established which was
named as ________.
a. INTERNETWORKING
b. ARPNET
c. ARPANET page 9
d. PACKET NETWORK
52.Asynchronous transfer mode (ATM) can dynamically establish a __________.
a. Switched virtual circuit page 70
b. Virtual connection identifier
c. Virtual path indicator
d. None of the given options
53.A typical port on an ATM switch operates at ________ or _______ higher.
a. OC-2 speed (155Gbps)
b. OC-2 speed (1000Mbps)
c. OC-3 speed (155Mbps) page 72
d. OC-3 speed (100Gbps)
54.10Base-T Ethernet is often called a __________.
a. ring shaped star
b. ring shaped bus
c. star shaped bus page 46
d. star shaped ring
55.___________ allows automatic updates.
a. Dynamic routing page 62
b. Static routing
c. Routing
d. Default routing
56.Handling variable length packets leads to memory __________.
a. Fragmentation page 72
b. Management
c. Location
d. Allocation
57.In order to forward a copy of frame, the bridge uses ________ address.
a. Network
b. Destination page 51
c. IP
d. Source
58.We may use _______ to extend local area network.
a. Bridge, Router
b. Bridge, Hub, Router
c. Bridge, Hub, Repeater page 149
d. Bridge, Hub, Repeater, Router
59.All of the given options are the types of delay except __________.
a. Propagation
b. Access
c. Throughput page 79
d. Queuing
60.While computing shortest path in a graph, next hop information is inserted into
_________.
a. Routing table page 62
b. Trailer
c. Header
d. Register
61.LAN interface uses _________ to copy frame data directly from main memory
a. DMA page 34
b. FDDI
c. Hard disk
d. Flash
62.The Gigabit Ethernet hardware operates at a rate of ___________.
a. 10 Mbps
b. 100 Mbps
c. 1000 Mbps reference book page 263
d. 1000 Gbps
63.In the early resource sharing era, which resources were shared among users?
a. Computation page 9
b. Floppy Drives
c. Hard Disk
d. Printers
64.If two buildings are located far from each other then bridge, and ________ can
be used to connect two LAN.
a. Optical fiber page 51
b. Ethernet modem
c. Switch
d. NIC
65.Which type of network consists of wireless connection of laptops in a university
classroom?
a. WAN
b. MAN
c. Fog
d. LAN google
66.A typical bridge has _______________.
a. One NIC, a CPU a memory and a ROM.
b. Two NICs, a CPU a memory and a ROM. page 50
c. RAM, ROM and CPU.
d. A cache memory, ROM and CPU.
67.__________ is used for compressed audio and video, where the data rate
depends on the level of compression that can be achieved.
a. Constant Bit Rate
b. Stable Bit Rate
c. Variable Bit Rate page 71
d. Available Bit Rate
68.There are ________ types of data stuffing.
a. 1
b. 2 page 17
c. 0
d. 5
69.Dijkstra's algorithm can accommodate weights on _______ in graph.
a. Nodes
b. Edges page 62
c. Path
d. Connections
70.________ masks your IP address.
a. Firewall
b. Antivirus
c. VPN
d. Incognito mode
71.Static routing computes routing table information at __________ time.
a. Load
b. Boot page 62
c. Execute
d. One
72.___________ was the first automated tool required to see whether the given
computer is online or not.
a. Probing program
b. PING program page 11
c. status program
d. None of the above
73.In which type of error detection, the arithmetic sum is calculated before and
after the transmission of data at both communication ends?
a. CRC
b. Party
c. Checksum page 19
d. Hash Function
74.Computer sends a connection request to the ________ to which it is attached
while establishing a switched virtual circuit
a. Bridge
b. Switch page 70
c. VPI
d. Virtual circuit
75.The bridges communicate with each other on the network and use ________
algorithm to decide which bridge will not forward frames if a cycle occurs.
a. Djikstra
b. Shortest path first
c. Vector distance
d. Distributed Spanning Tree page 53
76.Ethernet uses a ______ bit static addressing scheme in which each device is
assigned a unique address by the manufacturer.
a. 64
b. 48
c. 32
d. 16
77.Weights on graph edges reflect cost of ____________.
a. Nodes
b. Traversing edge page 63
c. Trending edge
d. Path
78.A ________ relies on the hardware manufacturer to assign a unique physical
address to each network interface.
a. Static addressing scheme page 34
b. Configurable addressing scheme
c. Dynamic addressing scheme
d. None of the given
79.In _______ topology, if the switch goes down all the computers will be
disconnected.
a. Star
b. Ring
c. Bus
d. Mesh
80.Which type of network consists of wired computers in a university classroom?
a. MAN
b. PAN
c. WAN
d. LAN
81.If you as a network administrator want to know the traffic flow of your data
while communicating with a remote computer which of the following will be
used to know about intermediate routers?
a. Ipconfig
b. Ping page 11
c. Traceroute
d. Arp
82.Hardware address is also called _____________.
a. Physical address
b. Logical address
c. IP address
d. Port address
83.Thick Ethernet also requires _________ to avoid signal reflectance.
a. Transceivers
b. AUI cable
c. Drop cable
d. Terminators page 41
84.Which of the following network is using the TCP/IP model globally?
a. PAN
b. SAN
c. LAN
d. The Internet
85.VPNs connections are sometimes called ________.
a. Tunnels page 75
b. Open networking
c. Routing
d. Public network
86.To reduce _______ computers can be connected and distributed to a number of
hubs, then the hubs can be connected to a switch.
a. Costs page 54
b. Quality
c. Efficiency
d. Noise
87.If a __________ is used the communication between two computers will not
affect the other pair of computers and they can communicate at the same time
a. Hub
b. Switch page 54
c. Repeater
d. Amplifier
88.The length of hardware address is ______________.
a. One to ten bytes
b. One to five bytes
c. One to six bytes page 34
d. One to seven bytes
89.A network analyzer is also called _________.
a. Network manager
b. Network administrator
c. Network monitor page 37
d. Network supervisor
90.No any error detection scheme is perfect because transmission errors can affect
_________.
a. Data
b. Additional Information
c. Additional information & data google
d. Transmission medium
91.The token ring network topology is a ring but wiring topology is a _________.
a. Star page 44
b. bus
c. tree
d. mesh
92._______ Addresses are used in an ethernet frame.
a. IP
b. Port
c. Logical
d. МАС
93.AUI cable connects from NIC to ___________.
a. BNC Connector
b. RJ-45 Connector
c. Transceiver page 41
d. Terminator
94.Public networks are _______________.
a. More secure than LAN
b. Flexible page 74
c. Limited in boundary
d. Intranet
95.The maximum cable length of a LAN is fixed because _________________.
a. Additional hardware are not suitable for the LAN extension.
b. The electrical signal level gets weaker as it travels. Page 48
c. Additional software are not suitable for the LAN extension
d. The electrical signal level gets stronger as it travels.
96.In _______.network topology is separated from route computation.
a. Local area
b. Link-state routing page 64
c. Static routing
d. Dynamic routing
97.Which layer of the OSI Model directly communicates and controls the
transmission medium:
a. Transmission
b. Physical
c. Application
d. Network
98.In ________ technique data is treated as a sequence of integers and their
arithmetic sum is computed and the carry bits are added to the final sum.
a. CRC
b. Bit stuffing
c. Checksum page 19
d. 2D Parity
99.A network with _______ jitter takes more time to deliver some packets than
others.
a. Zero
b. High page 80
c. Low
d. Moderate
100. A network uses _______ to arrange computers in a single closed loop.
a. Star Topology
b. Mesh Topology
c. Ring Topology page 25
d. Bus Topology
101. Which of the following tasks is not done by the second layer of the OSI
model?
a. Flow control
b. Framing
c. Channel coding google
d. Error control
102. ATM is a single technology designed to meet the goals of both ________
and __________.
a. LAN & PAN
b. LAN & WAN page 66
c. LAN & MAN
d. MAN & WAN
103. LAN and WAN are classified according to their _______.
a. Size page 4
b. Connectivity
c. Medium
d. Mobility
104. The identifier that is used for data transfer in the virtual circuit network is
called _________.
a. Virtual circuit identifier
b. Global address
c. Network identifier
d. IP identifier
105. In Direct point to point communication adding the Nth computer requires
______ new connections
a. N^2
b. N-1 page 23
c. (N^2 -N)/2
d. N (N-1)
106. Which of the following is the correct function of bridge?
a. MTU path discovery
b. Byte stuffing
c. Routing information
d. Filtering and forwarding a frame page 50, 51
107. Point to point topology is
a. Size based
b. Mobility based
c. Connectivity based page 5
d. Medium based
108. IEEE LLC / SNAP header is ________which is used to specify the type of
date.
a. 8 octets google
b. 16 octets
c. 32 octets
d. 64octets
109. IEEE LLC / SNAP header is ________which is used to specify the type of
date.
a. CRC
b. Bit stuffing
c. Checksum
d. 2D Parity
110. What is the largest network in existence?
a. The internet google
b. A PAN
c. A Fog
d. Edge Network
111. The frame format of any LAN technology must consists of ____ and___-
a. Payload and CRC
b. Frame header and CRC
c. Payload and Frame type
d. Frame header and payload page 36
112. ___________ can occur a LANs when a packet is delayed because the
network is busy
a. Jitter page 66
b. Loop
c. Deadlock
d. variance
113. Which of the following cannot be used to extend a LAN?
a. Repeaters
b. Switches
c. Routers
d. Fiber modems
114. Links-state algorithm is used in ___________
a. RIP
b. IGRP
c. RIPv2
d. OSPF page 64
115. According to size, there are ___classifications of networks
a. 2 page 2
b. 3
c. 4
d. 5
116. In which topology terminators are used at the end of the cable?
a. Star
b. Bus
c. Ring
d. Mesh
117. Switch simulates a _________LAN connecting segments
a. Single
b. Single shared
c. Bridged page 54
d. Complex
118. PVS stands for _____________
a. Permanent virtual circuit page 69
b. Private virtual circuit
c. Public virtual circuit
d. Plastic virtual circuit
119. Hardware that calculates a CRC used two simple components _____
a. AND unit and XOR Unit
b. Shift register and XOR unit page 20
c. Shift register & AND unit
d. Shift register and Shift XCR unit
120. Thin ethernet is known as ________
a. 10 base 2 google
b. 10 base 5
c. 10 base T
d. All of the above
121. If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants
to communicate with each other than at which speed they can communicate
a. 11 Megabit
b. 100 Megabit
c. 1 Gigabit
d. 1.1 Gigabit
122. ____________ is used as an alternative of packet for a specific computer
network technology
a. Datum
b. Token
c. Ether
d. Frame page 14
123. The sharing of a medium and its link by two or more devices is called ____
a. Modulation
b. Encoding
c. Multiplexing
d. Line discipline
124. The topology each computer is connected to a central hub is called
a. Ring topology
b. Star topology page 5
c. Tree topology
d. Mesh topology
125. Asynchronous transfer mode (ATM) is designed to work on fiber but can be
used with _____________
a. wireless
b. Twisted pair page 72
c. Wifi
d. Bluetooth
126. The basic responsibility of NIC is ________
a. To access medium network
b. To resource allocation
c. To access memory
d. All of the given option
127. Frame relay is ____
a. Connection oriented service page 64
b. Connectionless service
c. Typically ranges for 5 Mbps to 1000Mbps
d. Call based
128. The length of time required to send a variable length packet is ____
a. 5 second
b. Variable page 72
c. Constant
d. Fix
129. ABR stands for ______
a. Asynchronous bit rate
b. Asynchronous byte recovery
c. Asynchronous bit redundancy
d. Available bit rate page 71
130. In Token Ring, if all computers are ready to transmit it enforces ________
access
a. First come first served
b. Round Robin page 30
c. Shorter delay
d. Last come first served
131. The Ethernet standard specifies that frames are sent using the _________
scheme.
a. Differential Manchester
b. Not Return to Zero (NR2)
c. Manchester Encoding page 27
d. Return to Zero (RZ)
132. ATM uses the concept of ___________.
a. Connection-oriented page 66
b. Connection-less
c. variable packet size
d. Fixed and variable packet size
133. Which of the following is a benefit of point to point communication?
a. Quick to configure
b. Security implementation
c. Cost
d. Less availability
134. _________ is not used to extend LAN.
a. Hub
b. Fiber modem
c. Repeater
d. Bridge
135. Which types of VPNs are used for corporate connectivity across companies
residing in different geographical locations?
a. Remote access VPNs
b. Peer-to-peer VPNs
c. Country-to-country VPNs
d. Site-to-site VPNs google
136. Star topology is the kind of
a. Tree topology
b. Point-to-point topology page 05
c. Broadcast topology
d. Ring topology
137. In a __________ state, a bridge allows simultaneous use of each segment.
a. Ready
b. Steady
c. Final
d. Startup
138. The network occupies larger areas like cities & countries is called
a. LAN
b. WAN
c. MAN
d. All of the above
139. In link state routing __________ send link-state information about local
connections.
a. Bridges
b. Switches
c. Routers
d. Hubs
140. Transmission media are usually categorized as _______.
a. Guided or unguided
b. Fixed or unfixed
c. Determinate or indeterminate
d. Metallic or nonmetallic
141. Even parity can be used to check for ________ bit/ bits of errors.
a. 1 page 18
b. 2
c. 3
d. 0
142. Routing table entries can be ________ with a default route.
a. Collapsed
b. Redirected
c. Emerged
d. Guaranteed
143. The system administrator must coordinate to avoid the conflict in
_________ hardware addressing scheme.
a. Static
b. Dynamic
c. Configurable
d. Fixed
144. ____________ network does not depend on CSMA/CD.
a. Ethernet
b. Fast Ethernet
c. Gigabit Ethernet
d. Wireless
145. Which of the following technologies can extend the diameter of LAN
medium?
a. Fiber optic
b. Repeater
c. Diameter of LAN medium is not extendable
d. Both. Fiber optic and Repeaters
146. Connections are formed in Asynchronous transfer mode by starting values in
________ in ATM switches, as opposed to making actual electrical
connections.
a. Heap
b. Stack
c. Virtual Circuit
d. Memory locations page 67
147. The _______ scheme must be reliable to prevent conflicts.
a. Static
b. Dynamic page 34
c. Configurable
d. Fixed
148. Metropolitan area network is used for ____________.
a. City page 55
b. Building
c. Country
d. Continent
149. Which addressing can be only used in the local area networks?
a. IP google
b. Physical
c. Port
d. Protocol
150. The sharing of a _______ among the workers in an office is a goal of
resource sharing.
a. Mouse
b. Printer page 9
c. Keyboard
d. Motherboard
151. ATM uses fixed size, small cells, 48 octet's data and __________.
a. 3 Octets header
b. 5 Octets header page 65
c. 6 Octets header
d. 7 Octets header
152. Which of the followings is not an advantage of framing?
a. Missing eot indicates sending computer crashed
b. Missing soh indicates receiving computer missed beginning of message
c. Delimiters do not contain any user data page 16
d. Bad frame is discarded
153. The _________ field of Ethernet frame has the purpose of receiver
synchronization.
a. Preamble page 36
b. Frame Type
c. Data
d. CRC
154. ___________ was the first internet available for the first time.
a. ARPANAT
b. The ARPNET
c. The NET
d. ARPANET page 9
155. We need packets rather than bits because ________
a. To compress the data
b. Packets move faster
c. Sender and receiver need to coordinate to detect transmission errors.
Page 14
d. Packets can only move between two terminals
156. When an application ________ any data, it makes a copy of the data
available to all other computers on the network.
a. Multicast page 143
b. Broadcast
c. Anycast
d. Unicast
157. VBR stands for _________
a. Virtual Bit Rate
b. Virtual Byte Rate
c. Variable Byte Redundancy
d. Variable Bit Rate page 71
158. Odd party can be used to check for ______ bit/ bits of errors.
a. 0 page 18
b. 1
c. 3
d. 2
159. Each computer in LAN is identified by a physical address, usually imprinted
on the____________.
a. Modem
b. Router
c. Switch
d. Network Interface Card
160. Which is the incorrect statement about ‘Repeaters’?
a. A repeater listen to all traffic and recognizes frame format.
Page 49
b. One repeater doubles, two repeaters triple the maximum cable length
limitation
c. Maximum cable length cannot be increased as many times by repeaters
d. Every repeater introduces a delay in the network
161. The number of connections needed for 8 computer in direct point to point
communication is equal to __________.
a. 8
b. 7
c. 26
d. 28 page 23
162. The CSMA/CD mechanism does not work with __________
a. Two Ethernet segments.
b. Less cable length
c. High throughput
d. Long delays page 49
163. ___________ was especially most concerned about the lack of highly
powered computers.
a. ARPA page 9
b. IEEE
c. IEFT
d. PTA
164. When there is heavy traffic on the network, the queuing time is _______.
a. Zero
b. Fixed
c. Decreased
d. Increased page 80
165. _________ standard includes logical link control (LLC) sub network
attachment point (SNAP) header
a. IEEE 802.2 page 37
b. IEEE 802.11
c. IEEE 803.2
d. IEEE 803.11
166. To model a WAN, we use a graph in which the nodes model switches and
the edges model direct connection between ________.
a. Switches page 59
b. Routers
c. Hubs
d. LANs
167.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy