Bit 244 Tcpip End Exam Paper
Bit 244 Tcpip End Exam Paper
TIME: 3 HOURS
INSTRUCTION TO CANDIDATES:
1. Answer ALL questions in the answer BOOKLET.
2. Write in BLUE or BLACK pen ONLY.
3. Dictionary and electronic devices ARE PROHIBITED in the Examination Hall.
4. No scripts or answer sheets are to be taken out of the Examination Hall.
5. A candidate who is caught cheating in examinations is liable to be expelled from the
University.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 06 pages
Page 1
SECTION A
Select the correct Answer. (2 X 20 = 40 MARKS)
2. What type of computer is typically used for drafting and math-intensive applications?
a) Server
b) Workstation
c) Host
d) Client
Page 2
8. What is a key feature of optical fiber cables?
a) Low bandwidth
b) Requires minimal handling
c) Transmits signals as light beams
d) Used in WiMAX connections
13. The device through which network data leaves one network id called ____________.
a) Router
b) Switch
c) Gateway
d) Hub
14. Which internetworking device is used to isolate network traffic and manage data between
different network segments?
a) Repeater
b) Switch
c) Router
d) Modem
Page 3
15. Which of the following is an example of a network security threat?
a) Firewall
b) Encryption
c) Phishing
d) Authentication
16. What does the CIA triad in network security stand for?
a) Confidentiality, Integrity, Availability
b) Communication, Information, Access
c) Control, Inspection, Authentication
d) Connection, Integration, Authorization
18. Which class of IP addresses is typically reserved for small companies or small networks?
a) Class A
b) Class B
c) Class C
d) Class D
19. What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
a) Unshielded twisted pair
b) Optical fiber
c) Coaxial cable
d) Microwave
20. Which one of the following would breach the integrity of a system?
a) Locking the room to prevent theft.
b) Full access rights for all users
c) Fitting the system with an anti-theft device
d) Protecting the device against willful or accidental damage
Page 4
SECTION B
Answer all the questions. (20 X 3 = 60 MARKS)
1. (20 Marks)
2. (20 Marks)
3. (20 Marks)
3.4. State whether the following statements are ‘True’ or ‘False’. Justify your answer
briefly. (05 Marks)
3.4.1. In a ring topology, each device is connected to exactly two other devices,
forming a closed loop.
3.4.2. TCP (Transmission Control Protocol) is a connection-oriented protocol that
ensures reliable data transfer.
Page 5
3.4.3. The IP address 192.168.0.1 is a public address used on the global internet.
3.4.4. The Transport layer of the OSI model ensures error detection and correction
during data transfer.
3.4.5. Latency is measured in milliseconds (ms) and is an important factor in real
time communications like video calls.
-End of paper-
Page 6