0% found this document useful (0 votes)
40 views6 pages

Bit 244 Tcpip End Exam Paper

This document is an examination paper for the Bachelor of Information Technology (Hons) module on TCP/IP. It consists of two sections: multiple choice questions (40 marks) and multiple essay questions (60 marks), with specific instructions for candidates regarding the examination conduct. The questions cover various topics related to computer networks, including network devices, protocols, and security concepts.

Uploaded by

senzoempty.ac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views6 pages

Bit 244 Tcpip End Exam Paper

This document is an examination paper for the Bachelor of Information Technology (Hons) module on TCP/IP. It consists of two sections: multiple choice questions (40 marks) and multiple essay questions (60 marks), with specific instructions for candidates regarding the examination conduct. The questions cover various topics related to computer networks, including network devices, protocols, and security concepts.

Uploaded by

senzoempty.ac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

BACHELOR OF INFORMATION TECHNOLOGY (HONS)

END SEMESTER EXAMINATION

MODULE TITLE : TCP/IP

MODULECODE : BIT 244

TIME: 3 HOURS

THIS QUESTION PAPER CONSISTS OF TWO (2) SECTIONS:


SECTION A: MULTIPLE CHOICE QUESTIONS (MCQ) (40 Marks)
SECTION B: MULTIPLE ESSAY QUESTIONS (MEQ) (60 Marks)

INSTRUCTION TO CANDIDATES:
1. Answer ALL questions in the answer BOOKLET.
2. Write in BLUE or BLACK pen ONLY.
3. Dictionary and electronic devices ARE PROHIBITED in the Examination Hall.
4. No scripts or answer sheets are to be taken out of the Examination Hall.
5. A candidate who is caught cheating in examinations is liable to be expelled from the
University.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 06 pages

Page 1
SECTION A
Select the correct Answer. (2 X 20 = 40 MARKS)

1. What is the primary function of a server in a network?


a) To process individual calculations
b) To manage network resources and security
c) To function as a workstation
d) To solely provide internet access

2. What type of computer is typically used for drafting and math-intensive applications?
a) Server
b) Workstation
c) Host
d) Client

3. Which of the following is NOT a method to connect network hosts?


a) Ethernet
b) DSL
c) Bluetooth
d) ISDN

4. In a network, which device is responsible for managing other devices' resources?


a) Workstation
b) Host
c) Server
d) Modem

5. Which type of network does TCP/IP combine to offer global access?


a) ISDN and Dial-up
b) Ethernet and Wi-Fi
c) LANs and WANs
d) Routers and Servers

6. What is the main characteristic of baseband signaling?


a) Allows multiple signals to share the same medium
b) Allows only one signal at a time on the network medium
c) Uses WiFi for data transmission
d) Is used exclusively in wireless networks

7. Which type of cable is commonly used in Ethernet networks?


a) R6-59
b) R6-58
c) Coaxial Cable
d) Optical Fiber

Page 2
8. What is a key feature of optical fiber cables?
a) Low bandwidth
b) Requires minimal handling
c) Transmits signals as light beams
d) Used in WiMAX connections

9. What is a significant difference between WiFi and WiMAX?


a) WiMAX covers a smaller area than WiFi
b) WiMAX provides a slower connection than WiFi
c) WiMAX is designed for larger, metro area networks
d) WiFi requires special training for installation

10. What is the IEEE 802.3 Standard related to?


a) LLC Sublayer
b) Data Link Layer
c) Token Ring
d) Ethernet

11. What does network topology refer to?


a) The software used in a network
b) The physical layout of devices in a network
c) The speed of data transmission in a network
d) The security protocols of a network

12. Which of the following is NOT a typical property of a network protocol?


a) Detection of underlying physical connections (wired/wireless)
b) Handshaking between devices
c) Creating physical connections between devices
d) Detecting and handling corrupt or improperly formatted messages

13. The device through which network data leaves one network id called ____________.
a) Router
b) Switch
c) Gateway
d) Hub

14. Which internetworking device is used to isolate network traffic and manage data between
different network segments?
a) Repeater
b) Switch
c) Router
d) Modem

Page 3
15. Which of the following is an example of a network security threat?
a) Firewall
b) Encryption
c) Phishing
d) Authentication

16. What does the CIA triad in network security stand for?
a) Confidentiality, Integrity, Availability
b) Communication, Information, Access
c) Control, Inspection, Authentication
d) Connection, Integration, Authorization

17. What is the purpose of an IP address in networking?


a) To manage network congestion
b) To identify devices uniquely on a network
c) To measure network speed
d) To connect directly to a MAC address

18. Which class of IP addresses is typically reserved for small companies or small networks?
a) Class A
b) Class B
c) Class C
d) Class D

19. What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
a) Unshielded twisted pair
b) Optical fiber
c) Coaxial cable
d) Microwave

20. Which one of the following would breach the integrity of a system?
a) Locking the room to prevent theft.
b) Full access rights for all users
c) Fitting the system with an anti-theft device
d) Protecting the device against willful or accidental damage

Page 4
SECTION B
Answer all the questions. (20 X 3 = 60 MARKS)

1. (20 Marks)

1.1. Define the term ‘Computer Network’. (04 marks)


1.2. Mention four components of a Data Communication System. (04 Marks)
1.3. Differentiate LAN from WAN. (04 Marks)
1.4. Briefly describe the followings. (08 Marks)
1.4.1. Controlled Area Network.
1.4.2. Peer-to-Peer Network
1.4.3. Client-Server Network
1.4.4. Servers

2. (20 Marks)

2.1.Give two examples per each of the followings. (02 Marks)


2.1.1. Guided Media
2.1.2. Unguided Media
2.2. List four (4) factors to be considered when choosing a topology. (04 Marks)
2.3. Provide an example scenario where each of the following connection technologies is
applied. (06 Marks)
2.3.1 Wi-Fi
2.3.2 Bluetooth
2.4.Describe briefly how does a network switch work. (05 Marks)
2.5.Explain the purpose of a repeater in a computer network and describe a scenario
where it would be necessary. (03 Marks)

3. (20 Marks)

3.1. "The CIA triad—Confidentiality, Integrity, and Availability—serves as the


foundation for securing data”. Do you agree? Give Reasons. (04 Marks)
3.2. Illustrate the concept of Data Encryption using a suitable diagram. (05 Marks)
3.3 An organization has the following departments: (06 Marks)
Marketing – 15 computers
Finance – 25 computers
HR – 10 computers
Each department is expected to grow by 50% over the next year. Design an IP
allocation table for each department, with columns for Department, Starting IP, Ending
IP, and Subnet Mask. Show all the steps in your derivation.

3.4. State whether the following statements are ‘True’ or ‘False’. Justify your answer
briefly. (05 Marks)
3.4.1. In a ring topology, each device is connected to exactly two other devices,
forming a closed loop.
3.4.2. TCP (Transmission Control Protocol) is a connection-oriented protocol that
ensures reliable data transfer.

Page 5
3.4.3. The IP address 192.168.0.1 is a public address used on the global internet.
3.4.4. The Transport layer of the OSI model ensures error detection and correction
during data transfer.
3.4.5. Latency is measured in milliseconds (ms) and is an important factor in real
time communications like video calls.

-End of paper-

Page 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy