Академический Документы
Профессиональный Документы
Культура Документы
1.
2.
3.
Forms
Status
Location
Gateways
Virtual Documents
`Dynamic document
Both of these
None if these
_____________ environment variable specifies the name of the web server host:
a.
b.
c.
d.
9.
cgi-debug
cgi-bin
cgi-jdk
cgi-jdbc
8.
.PL
.BL
.DL
PL
___________ works as an intermediary between the user and the server where direct access of information from the server
in not readable by the user
a.
b.
c.
d.
7.
CGI,
CGI,
CGI,
CGI,
Earlier, servers that were supporting CGI had provided a common directory named ___________ to store CGI program
a.
b.
c.
d.
6.
The CGI programs are the files with extensions __________ or _________
a.
b.
c.
d.
5.
4.
SERVER_NAME
WEB_SERVER
WEB_BROWSER
ALL OF THESE
CGI complete its program processing it passes the resultant data to the ___________;
a.
b.
c.
d.
Web browser
Web server
Server
All of these
10.
11.
Web browser
Web server
Server
All of these
The data can be passed to CGI program in one of the following way:
a.
b.
c.
d.
12. This information is sent to the CGI program in the ___________ environment program:
a.
Query_String
b.
QUERY_STRING
c.
QUERY STRING
d.
ALL OF THESE
13.
14.
15.
REMOTE_USER
REMOTE USER
Remote_user
None of these
It specifies the address of the system of the user issue the request:
a.
b.
c.
d.
16.
REMOTE_HOST
REMOTE HOST
Remote_host
None of these
REMOTE ADDR
Remote_Addr
Remote addr
REMOTE_ADDR
REQUEST METHOD
REQUEST_METHOD
Request}_method
None of these
17. The server does not mark the and of data with an ____________ character:
e.
COF
f.
BOF
g.
EOF
h.
NONE OF THESE
17.
The CGI program use __________ environment variable to read the data correctly:
a.
b.
c.
d.
18.
CONTENT_LENGTH
CONTENT LENGTH
Content _length
None of these
e.
The CGI output must consist of any of these ____________ header files:
a.
b.
c.
1
5
3
d.
19.
e.
Which are the header types :
a.
b.
c.
d.
20.
Radio button
Text fields
Check boxes
All of these
22.
Content-type
Location
Status
All of these
It contains a number of graphical widgets to get the information fro the user:
a.
b.
c.
d.
21.
Adc.com
abc.com
ABC.COM
ADC.COM
Advantages of CGI:
a.
b.
c.
d.
Platform independent
Language independence
Simplicity
All of these
c.
d.
24.
Both of these
None of these
a.
b.
c.
d.
Gateways
Dynamic document
Both of these
None of these
SMTP
This set of Computer Networks Questions & Answers focuses on SMTP.
1) When the mail server sends mail to other mail servers it becomes _____ ?
a) SMTP server
b) SMTP client
c) Peer
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2) If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
3) Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer
Answer: a
Explanation: None.
4) In SMTP, the command to write recievers mail adress is written with this command
a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
5) The underlying Transport layer protocol used by SMTP is
a) TCP
b) UDP
c) Either a or b
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
6) Choose the statement which is wrong incase of SMTP
a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) None of the mentioned
View Answer
Answer: b
Explanation: The sending mail server pushes the mail to receiving mail server hence it is
push protocol.
7) Internet mail places each object in
a) Separate messages for each object
b) One message
c) Varies with number of objects
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
8) Typically the TCP port used by SMTP is
a) 25
b) 35
c) 50
d) 15
View Answer
Answer: a
Explanation: None.
9) A session may include
a) Zero or more SMTP transactions
Separation of responsibility
Addition of responsibility
Subtraction of responsibility
None of these
Client
Server
Both a & b
None of these
3
4
5
6
Oldest protocol
Not so old protocol
Newly established protocol
None of these
Infinite
Finite
Large
None of these
7. Layering the communications process means breaking down the communication process
into______ and _____ to handle interdependent categories
a.
b.
c.
d.
8.
Smaller
Easier
Both a & b
None of these
The convention and rules used in such communications are collectively known as
a.
b.
c.
d.
Peer
Layer protocol
Network
None of these
9.
The entities comprising the corresponding layers on different computers are called
________ which communicate by using layer protocol
a.
b.
c.
d.
Peer
Layer protocol
Network
None of these
e.
10. OSI has two meanings refers to
a. OSI basic reference model
b. Protocol that are authorized by ISO
c. Both a & b
d. None of these
10. Network is the term used for a group of
a.
b.
c.
d.
protocols
layers
Both a & b
None of these
12. The groups of layers provides information to allows _________, which correctly obeys
the appropriate protocol
a.
b.
c.
d.
Hardware implementation
Software implementation
Both a & b
None of these
13. Which are never form a part of the architecture because they are not visible from the
outside
a.
b.
c.
d.
Interface specification
Implementation details
Both a & b
None of these
e.
14. The information exchanged between two computers is physically carried by means of
_________ with the help of certain coding method
a.
b.
c.
d.
Electronics signal
Electrical signal
Physical signal
Physical circuits
15. For two computers to reliably exchange data, they must have a
a. compatible implementation of encoding
b. interpreting data carrying electrical signals
c. Both a & b
d. None of these
16. Transmission media deals with the types of medium used , which is dictated by the
a.
b.
c.
d.
Desirable bandwidth
Immunity to noise
Attenuation properties
All of these
e.
17. The data communication process allocates memory resources, commonly known
as___________ for the sake of transmission and reception of data
a.
b.
c.
d.
Communication buffers
Communication media
Both a & b
None of these
Noise
Electromagnetic interference
Both a & b
None of these
20. Protocols should provide at least ______ logical channels per connection
a.
b.
c.
d.
2
3
4
5
21. Data exchange can take place between any _____ workstations
a.
b.
c.
d.
1
2
3
4
22. Depending on the nature of the involved application in layered architecture, the dialog
type may be
a.
b.
c.
d.
Duplex
Half duplex
Simplex mode
All of these
a.
b.
c.
d.
Checkpoint
Check mechanism
Character encoding
Terminal emulation
24. The check pointing circumvent session recovery requirement by retransmitting only the
a.
b.
c.
d.
Affected files
Saving time
Bandwidth
All of these
e.
25. Some good examples of presentation problems are the existing incompatibilities
between the__________ standard of character encoding
a.
b.
c.
d.
26.
ASCII
EBCDIC
Both a & b
None of these
e.
This is the entities in the same layers but on different computers
a.
b.
c.
d.
Peer entities
Entities
Service provider
SAP
Peer entities
Entities
Service provider
SAP
Peer entities
Entities
Service provider
Service user
29. Which is the point from where services can be accessed .each point is the unique
address
a.
b.
c.
d.
Peer entities
Entities
Service provider
SAP
30. Which are the active elements such as processes, IO chips in every layers
a. Peer entities
b. Entities
c. Service provider
d. SAP
31. Which is the reliable connectionless service with acknowledgement
a.
b.
c.
d.
32.
Registered E-mail
Junk E-mail
Both a & b
None of these
Registered E-mail
Junk E-mail
Both a & b
None of these
e.
33. In which model, Request-reply command is example of connectionless service
a.
b.
c.
d.
34.
Client-server model
User model
Server model
None of these
connection-oriented
connectionless
Both a & b
None of these
Protocol
Primitives
Confirmed service
SAP
Request
Confirm
Response
Indication
Primitives
All of these
g.
37. The Service primitives are the part of
a.
b.
c.
d.
Protocol
Primitives
Confirmed service
SAP
Request
Indication
Confirm
Response
Both a & b
All of these
39. Which are the distinct concepts and are important to release connections between
sender and receiver
a.
b.
c.
d.
Services
Protocol
Both a & b
None of these
e.
40. Which is provided to the upper layer by an immediate lower layer
a.
b.
c.
d.
Protocol to service
Service to protocol
Service primitives
None of these
Name
Content
Function
Total no of layers depend on type of network
All of these
f.
42. The basic function of each single layer is to provides service to the
a.
b.
c.
d.
43. ________ the protocol can make communication between the two either difficult or
impossible
a.
b.
c.
d.
Breaching
Branching
Broaching
Brunching
Set of layers
Set of protocols
Set of machines
Both a & b
45. The hectic task of designing the whole network can be distributed in the
a.
b.
c.
d.
Smaller
Easier
Simpler design problems
All of these
46. Which is the computers from the same manufacturer it was not possible to run
both_______ solution and _______ simultaneously
a.
b.
c.
d.
IBM
DEC
Both a & b
None of these
47. ISO-OSI reference model these could only be run one at a time by the end__________
a.
b.
c.
d.
1969s
1971s
1970s
1972s
Message sequences
Byte streams
Both a & b
None of these
e.
49. Which is similar to postal system where every message contains the complete
destination address and is mapped through the system, free of all the others
a.
b.
c.
d.
Connection-oriented services
Connectionless services
Both a & b
None of these
50. The various types of services provided by the interface to the layers above them are
listed as follows
a.
b.
c.
d.
Connection-oriented services
Connectionless services
Both a & b
None of these
51. The connectionless services can be further sub-divided into many categories
a.
b.
c.
d.
Unreliable datagram
Acknowledged datagram
Both a & b
None of these
1980
1970
1990
1960
54. The first and the lowest layer is called the ___________________________
a. Physical layer
b. Supporting rules for low-level signaling
c. Hardware implementation
d. All of these
55. The seventh and the highest layer is the application layer that deals with the
a.
b.
c.
d.
User interface
Applications
Both a & b
None of these
56. In moving from layer one to layer seven, the level of abstraction ________
a.
b.
c.
d.
Increases
Decreases
May be increases or decreases
None of these
e.
57. The first layer deals with the actual ____________
a. Hardware of networks
b. The specific methods of sending bits from one device to another
c. Both a & b
d. None of these
57. The second layer also deals with ________________
a. Signaling
b. Hardware
c. Both a & b
d. None of these
e.
59. The transport layer is the one, which links the communication process to this
_________________
a.
b.
c.
d.
Hardware-oriented protocol
Software-oriented protocol
Both a & b
None of these
Data
Header
Both a & b
None of these
61. The seventh layer does not deal with __________ concepts very much
a.
b.
c.
d.
Hardware
Even operating system
Both a & b
None of these
62. The basic philosophy of the seven-layer model is that each layer may be defined
a. Dependently of every other layer
b. Independently of every other layer
c. Dependent on same layer
d. None of these
63. The seven layers of the OSI model are categorized into ________ groupings
a.
b.
c.
d.
2
3
4
5
1,2,3
1,2,3,4
1,2,3,4,5
2,3,4,5,6
5,6
5,7
6,7
5,6,7
66. The lower layers are implemented by using ______________ with the incidence of
hardware reducing to software from layer 1 to layer 4
a.
b.
c.
d.
Software
Hardware
Both a & b
None of these
e.
67. The upper layers are not expected to know anything about ____________
a.
b.
c.
d.
Networking
Network addresses
Both a & b
None of these
Networking
Network addresses
Both a & b
None of these
e.
69. The OSI interface is a process of communication between adjacent layers in which data
is passed between
a.
b.
c.
d.
Layer n
Layer n-1
Layer n+1
All of these
Pass control
Pass Data information
Both a & b
None of these
71. This refers to communication up and down the protocol stack every time any data is
sent received across the network
a.
b.
c.
d.
Vertical communication
Horizontal communication
Protocols
OSI interfaces
72. Which is a communication process running at a particular layer on one host machine
can accomplish logical communication with a similar process running at the same layer
on another host machine
a. Vertical communication
b. Horizontal communication
c. Protocols
d. OSI interfaces
73. Which OSI model supports the interconnection of different implementations of various
autonomous layers
a.
b.
c.
d.
Modularity
Inter-layer interactions
Both a & b
None of these
e.
1
2
3
4
5
6
7
Layers
Physical
Data link
Functions
It moves bits between devices by using media
It tends to assemble packets into bytes and bytes into frames and
provides access to media by using MAC address
Network
It is responsible for providing logical addressing which routers use for
path determination and routing
Transport
It provides reliable or unreliable delivery and performs error correction
before retransmit. It is also responsible for end-to-end connection
Session
It aims to keep different applications data separately and provides dialog
control
Presentation
It provides rules to present data, handle processing like encryption,
compression and translation services
Application
It aims to provide a user interface like file, print, message, database and
application services
75. A number of transmission media exist, some of them are
a.
b.
c.
d.
e.
f.
Voltage
Current
Phase or frequency
All of these
77. The physical layer uses four types of bit signaling approaches these are
a. RZ(return to zero) by using pulse signaling
b. NRZ(non return to zero) transmission by using level signaling
c. Manchester encoding by using phase signaling
Asynchronous communications
Synchronous communications
Both a & b
None of these
Bytes
Bits
Gigabyte
Megabyte
80. Which bit stream is to be transmitted with the objective that when the sending side
sends _____ bit
a.
b.
c.
d.
1
0
1,0
None of these
81. Which bit stream is to be transmitted with the objective that when the received by the
receiving side as 1 bit, not as ___ bit
a.
b.
c.
d.
1
0
1,0
None of these
82. It defines the electrical and mechanical aspects of interfacing to a physical medium for
transmitting data ________________________________
a.
b.
c.
d.
As well as setting up
Maintaining
Disconnecting physical links
All of these
RS-323C/D
RS-232C/D
RS-233C/D
RS-322C/D
HDLC
Ethernet
Both a & b
None of these
Hardware
Address
MAC address
All of these
Logical addressing
Routing
Datagram encapsulation
Fragmentation and reassembly
All of these
Static
Dynamic
Both a & b
None of these
e.
92. The network layer uses which service for delivering packets across the network
a. Connection-oriented
b. Connectionless service
c. Both a & b
d. None of these
93. In broadcast network ,the routing problem is ________, so the network layer is often
thin or even nonexistent
a.
b.
c.
d.
Complex
Simple
Both a & b
None of these
94. The transport layer provides the necessary function to enable communication between
_____________ processes on different computers
a.
b.
c.
d.
Software application
Hardware application
Both a & b
None of these
e.
95. The transport layer accepts data from the ______ and splits it up into smaller units so
that it can be passed to the network layer
a.
b.
c.
d.
Network layer
Session layer
Presentation layer
Physical layer
FTP
TFTP
HTTP
TCP/IP
Establishing
Maintaining
Arbitrating
All of these
99. The session layer provides enhanced useful services in some applications such as
a. Remote login
b. Remote file transfer
c. Both a & b
d. None of these
100.
NetBIOS
TCP/IP sockets
Remote Procedure Calls (RPCs)
All of these
101.
Which enable an application to complete specified high level communications
over the network successfully and easily with the help of a standardized set of services
a. RPCs
b. APIs
c. TCP/IP
d. All of these
102.
103.
Link layer
Data layer
Open layer
None of these
Some example of data link layers are
a.
b.
c.
d.
HDLC
Ethernet
Both a & b
None of these
104.
Which provides link to many wireless and wired local area networking (LAN)
like Ethernet ,FDDI, IEEE802.11 etc to function
a.
b.
c.
d.
105.
link
Which layer is responsible for the reliable transfer of data across the physical
a.
b.
c.
d.
106.
Physical layer
Data link layer
Transport layer
Presentation layer
Physical layer
Data link layer
Transport layer
Presentation layer
The responsibility of data link layer include functions such as
a.
b.
c.
d.
e.
f.
g.
107.
Which layer performs functions relative to the syntax and semantics of the
information transmitted
a.
b.
c.
d.
108.
Physical layer
Data link layer
Transport layer
Presentation layer
The types of data handling issue that presentation layer provides are as follows
a.
b.
c.
d.
Translation
Compression
Encryption
All of these
109.
In translation, different types of computers like _____________in an Internetwork have many distinct characteristics and represent data in different ways
a.
b.
c.
d.
e.
110.
111.
Physical layer
Data link layer
Application layer
Presentation layer
The application layer provides network-based services to the user are
a.
b.
c.
d.
e.
f.
g.
112.
PCs
Macintoshes
UNIX systems
AS/400 servers
All of these
Distributed database
Electronic mail
Resource sharing
File transfer
Remote file access
Network management
All of these
Which layer provides user interface to communicate with a computer
a. Physical layer
b. Application layer
c. Transport layer
d. Presentation layer
113.
HTTP, FTP
SMTP, DHCP
NFS, Telnet
SNMP, POP3
NNTP, IRC
All of these
114.
Which model is considered the oldest protocol of all computer networks like
the ARPANET and its successor, the Internet
a.
b.
c.
d.
e.
115.
Most users rely on ______ for the purpose of file transfers, electronic mail(email) and remote login services
a.
b.
c.
d.
116.
e.
a.
b.
c.
d.
117.
a.
b.
c.
d.
118.
Physical layer
Application layer
Transport layer
Presentation layer
TCP/IP defines a four-layer model consisting of the
a.
b.
c.
d.
e.
119.
TCP/IP
SMTP
DHCP
NFS
Internet layer
Transport layer
Application layer
Network interface layer
All of these
TCP/IP architecture is based on the three sets of interdependent processes are
a.
b.
c.
d.
Application-specific processes
Host-specific processes
Network-specific processes
All of these
120.
Which TCP/IP standards define protocols for TCP/IP networks for layer two
implementation to fill the gap between the network layer and the physical layer
a. Serial Line Internet Protocol(SLIP)
b. Point-to-Point Protocol(PPP)
c. Both a & b
d. None of these
121.
The Internet layer of the TCP/IP matches with the which layer of the OSI model
a.
b.
c.
d.
122.
123.
124.
IP
ICMP
RIP
BGP
All of these
Which protocols are found in a Network interface Layer of TCP/IP model
a.
b.
c.
d.
e.
a.
b.
c.
d.
126.
Network protocol
Internet protocol
OSI protocol
None of these
Which protocols are found in a Internet Layer of TCP/IP model
a.
b.
c.
d.
e.
125.
Network layer
Physical layer
Session layer
Data link layer
Ethernet
FDDI
Token Ring
All of these
d.
e.
f.
g.
127.
NFS
TELNET
SNMP
All of these
h. None of these
The UDP Protocols are
a.
b.
c.
d.
Reliable
Connection-oriented
Connectionless
Unreliable
i. Both a & b
ii. Both c & d
iii. None of these
Which protocols are found in the application layer
128.
a.
b.
c.
d.
Numerous
UDP
TCP
IP
129.
Which other function include __________________and identification of port
number
a.
b.
c.
d.
130.
Sequence control
Error recovery and control
Flow control
All of these
TCP layer is a
a.
b.
c.
d.
Service
Connection type service
Connectionless type service
None of these
131.
The basic functions of application layer are _____________ that wish to
communicate with one another
a. To identify the source machine
b. To identify the destination machine
c. Both a & b
d. None of these
132.
The Internet has definite standards for FTP that connects to a
a.
b.
c.
d.
133.
Remote machine
Sends an arbitrary file
Fetches an arbitrary file
All of these
Login remotely
Logout
Remotely
None of these
135.
TCP connection with another location and then pass keystrokes from the
_______
a. Remote host to local host
b. Local host to remote host
c. remote host to remote host
d. Local host to Local host
136.
Similarly, there are many other applications such as NNTP enabling
communication between a ___________
a.
b.
c.
d.
137.
News server
News client
Web(HTTP)-based protocol for communication on the WWW
All of these
FTP is among the oldest protocols used in the_____
a.
b.
c.
d.
Internet
Web
Both a & b
None of these
138.
Which is a file server access protocol that enables a user to transfer files
between two hosts
a.
b.
c.
d.
SMTP
TCP
FTP
NNTP
139.
FTP is widely available on almost all-browsers indicating that all computing
platforms, including _________
a. DOS
b. OS/2
c. UNIX and up to the mainframe level have this service available
d. All of these
140.
Which dose not require any familiarity with the remote operating system
a.
b.
c.
d.
SMTP
TCP
FTP
NNTP
e.
141.
142.
143.
TCPD
FTPD
SMTD
CTPD
e.
a.
b.
c.
d.
144.
Control connection
Data connection
Both a & b
None of these
Which is invoked for the entire duration of transfer of file or FTP session
Control connection
Data connection
Both a & b
None of these
Which connection is establish as and when it is required
a.
b.
c.
d.
Control connection
Data connection
Both a & b
None of these
e.
145.
The main function of data connection is to facilitate transfer of file and
directory to and from the________
145.
a.
b.
c.
d.
a.
b.
c.
d.
TFTP
FTP
Both a & b
None of these
TFTP does not provide _____________
a.
b.
c.
d.
149.
150.
e.
a.
b.
c.
d.
152.
Electronic message
Electronic mail
Electric mail
None of these
a.
b.
c.
d.
153.
FTP
SMTP
NNTP
FTPD
Which is one of the most popular network services
a.
b.
c.
d.
151.
Password protection
User directory capability
Both a & b
None of these
User agent
Message Transfer agent
Both a & b
None of these
a.
b.
c.
d.
155.
User agent
MTA
Both a & b
None of these
The MTA has to perform more complex jobs than other applications
a. MTA distinguishes between local and remote recipients
b. MTA needs to deliver copies of a message to several machines
c. MTA allows mixing of text, voice appending documents, files and video in a
message
156.
157.
158.
Mailbox names
Symbolic names
Group names(mail exploders)
All of these
User agent
MTA
Both a & b
None of these
a.
b.
c.
d.
Mailbox names
Symbolic names
Group names(mail exploders)
All of these
160.
There are a number of e-mail packages available. Some of them are free like
____________________, while some are paid
a.
b.
c.
d.
Google mail
Yahoo mail
Hotmail
All of these
161.
In MTA, all of them are also not alike but most of the e-mail software have
common basic functionality these are
a. Send and receive mail messages
b. Save your messages in a file
c. Print mail messages
d. Forward a mail message to other recipients
e. Reply to mail messages
f. Attach a file to a mail message
g. All of these
162.
E-mail address has three parts
a. A user identity or name
b. An at sign(@)
c. The domain name, which basically specifies the address of the users mail
server
d. All of these
163.
164.
SMTP uses ______ transport for the reliably delivery of mail messages
a.
b.
c.
d.
165.
FTP
TCP
MTA
FTPD
The SMTP server also allows _____
a.
b.
c.
d.
166.
NNTP
Telnet service
FTPD
none of these
SMTP can be considered as a complement of ______
a.
b.
c.
d.
167.
UUDP
UUCP
UCCP
UCPD
SMTP commands consist of human-readable __________
a.
b.
c.
d.
168.
dee facto
de facto
de fact
none of these
EBCDIC strings
ASCII strings
Both a & b
None of these
a.
b.
c.
d.
170.
e.
FTPD
FTP
MIME
UUCP
170.
a.
b.
c.
d.
SMTP
POP3
IMAP
All of these
170.
173.
174.
SMTP
POP3
IMAP
Both b & c
Telnet can also be used to connect other ports serving as _____________
a.
b.
c.
d.
User-defined services
Well-known services
Both a & b
None of these
175.
Telnet works as a _____________ model where it establishes a virtual
connection by using the TCP transport protocol
a.
b.
c.
d.
176.
176.
e.
User-defined
Well-known
Client-server
All of these
a.
b.
c.
d.
a.
b.
c.
d.
e.
176.
services
a.
b.
c.
d.
179.
Platform-specific
Not platform-specific
Platform-service
None of these
0Some of the Telnet commands are as follows
Interrupt Process(IP)
Abort output(AO)
Are You there(AYT)
182.
Client type
Server type
Both a & b
None of these
3 layers
4 layers
5 layers
6 layers
a.
b.
c.
d.
NVT
IPX
IP
FTP
184.
The rise 1985 saw the rise of Novell NetWare when _____________ were
launched
a. NetWare 286 2.0a
b. Intel 80,286 16-bit processor
c. Both a & b
d. None of these
185.
Two methods of operation were supported by NetWare 286 2.x namely are
a. Dedicated
b. Non-dedicated
c. Both a & b
d. None of these
e.
186.
Beginning with NetWare 3.x, assistance for _____ protected mode was
included, removing the 16MB memory limit of NetWare 286
a.
b.
c.
d.
16-bit
32-bit
64-bit
128-bit
187.
Which managed all functions and was activated at startup or at the time of
requirement
a. NLM(NetWare Loadable Module)
b. FTP
c. SMTP
d. FTPD
188.
A set of protocols used in the communication network can be termed as
a.
b.
c.
d.
189.
e.
a.
b.
c.
d.
190.
e.
a.
b.
c.
d.
Protocol
Protocol stack
Protocol layer
None of these
191.
When data travels downwards from upper the layer in TCP/IP, each upper layer
attaches a
a.
b.
c.
d.
Footer
Header
Standard
None of these
e.
192.
After the transmission of data in bit form to another machine it travels upward,
____________ the header till data reaches the application layer
a.
b.
c.
d.
Stripping in
Stripping off
Tackling off
Tackling in
e.
193.
In which year, Netware directory service were added to the Netware version 4
a.
b.
c.
d.
194.
195.
1993
1996
1998
2001
In which year, NetWare5 was launched in October
a.
b.
c.
d.
196.
1993
1996
1998
2001
In which year, NetWare6 was launched
a.
b.
c.
d.
197.
1993
1996
1998
2001
e.
a.
b.
c.
d.
1993
1996
1998
2001
198.
Which is a file server access protocol that enables a user to transfer file
between two hosts, across the network or Internet using TCP
a.
b.
c.
d.
FTPD
FTP
Telnet
PPP
199.
Which is a remote terminal protocol that enables a user at one location to
establish a TCP connection with another location
a.
b.
c.
d.
FTPD
FTP
Telnet
PPP
200.
Which protocol is used by network computers operating system for sending
error messages
a.
b.
c.
d.
FTPD
FTP
Telnet
ICMP
1.
a.
b.
c.
d.
1969
1990
1972
1995
2.
a.
b.
c.
d.
3.
a.
b.
c.
d.
Interconnection
Network
Both of these
None of these
4.
a.
b.
c.
d.
In 1970
In 1980
In 1979
In 1990
5.
a.
b.
c.
d.
6.
a.
b.
c.
d.
In 1980
In 1990
In 1995
In 1999
7.
a.
b.
c.
d.
8.
a.
b.
c.
d.
CERN
CARN
AOL
NSF
9.
a.
b.
c.
d.
1968
1980
1989
1890
e.
13. AOL is stand for:
a.
b.
c.
d.
Australia online
America online
Both of these
None of these
FTP
PPP
HTTP
All of these
Web page
Web browser
Web servers
None of these
Yahoo.com
Rediff.com
Indiatimes.com
All of these
2
3
4
5
Internal modem
External modem
Both of these
None of these
19. which modem are cabled between the computer and phone:
a.
b.
c.
d.
Internal modem
External modem
Both of these
None of these
a.
Integrated Sanchar Digital Network
b.
Integrated Service Digital Network
c.
Internet Service Digital Network
d.
Internet Speed Digital Network
24. DSL is stand for:
a.
b.
c.
d.
Set of devices
Set of protocol
Set of component
All of these
International Protocol
Interconnection Protocol
Interwork Protocol
Internet Protocol
a.
b.
c.
d.
Unreliable
Connectionless
Both of these
None of these
1
2
3
4
Absolute URL
Relative URL
Both of these
None of these
a.
b.
c.
d.
TCP/IP
FTP
NNTP
HTTP
NTTP
HTTP
FTP
TCP/IP
Difficult to remember
Difficult to write
Both of these
None of these
Native support
Plug ins
Helper programs
All of these
39. Which of these searches new terms on internet and stores the searched terms in a database?
a.
b.
c.
d.
Crawler
Indexer
Search algorithm
None of these
Password cracking
Email spoofing
Virus intrusion
All of these
Web server
Web pages
Web browser
Www
S/w application
H/w application
Both of these
None of these
Telnet
USENET
NNTP
SMTP
Web browser
Website
Web pages
Index pages
c.
d.
Both a & b
None of these
Mailserv
Listserv
Fileserv
Saveserv
APL
AOL
Rediff.com
Yahoo.com
Text based
Graphical based
Both a & b
None of these
User server
Web server
Client server
None of these
URL
FTP
HTML
FIIT
56. If ftp has the permission to access remote machine then one cana.
b.
c.
d.
Upload files
Download files
A&b
None of these
1965
1970
1960
None of these
0 to 64
0 to 255
0 to 289
0 to 169
Four
Three
Two
One
Alta-vista
Goggle
Yahoo
All
a.
b.
c.
d.
Info
Error
Permission
None of these
Anonymous ftp
Synonymous ftp
Fetch ftp
None
64. The relationship b/w the ip addresses and the domain names is maintained by an internet service called the:
a.
b.
c.
d.
1.
a.
b.
c.
d.
2.
a.
b.
c.
d.
3.
a.
b.
c.
d.
4.
a.
b.
c.
d.
5.
a.
b.
c.
d.
6.
a.
b.
c.
d.
7.
a.
b.
c.
d.
8.
a.
b.
c.
d.
9.
a.
b.
c.
d.
10.
a.
b.
c.
d.
11.
a.
b.
c.
d.
12.
a.
b.
c.
d.
13.
a.
b.
c.
d.
14.
a.
b.
c.
d.
15.
a.
IP
DNS
URL
None
HTML stands for;
Hyper text marker language
Hyper tab marker language.
High transfer markup language
Hyper text markup language
Html is used for:
Hardware programming
Software programming
Web programming
All of these
Tags are used to describe:
Web page
Wed site
Web size
None of these
Html code contains:
Tags
Attributes
Elements
All of these
To create and view an html document, which tools are used:
Text editor
Web browser
Both a and b
None of these
Html document must always be saved with:
.html
.htm
.doc
Both a &b
How many levels of headings are in html:
2
7
6
4
Break element is used to insert :
A new line
New text
A blank line
None of these
To insert blank lines, which tags are used:
<p>
<bk>
<br>
<ba>
To centralize any text, it is simply enclosed within:
<center>
<cen>
<centr>
<cent>
Horizontal rule element is used to divide the webpage into:
Two sections
Separate sections
Four sections
All sections
Text level elements affect the :
Size of text
Style of text
Color of text
Appearance of the text
Logical elements can be used in the webpage:
Only two times
Seven times
Any number of times
None of these
Logical elements indicate __________of the webpage
Logical description
General description
Both a &b
None of these
The size attribute specifies the font size on a scale, ranging from:
1 to7
b.
c.
d.
16.
a.
b.
c.
d.
17.
a.
b.
c.
d.
18.
a.
b.
c.
d.
19.
a.
b.
c.
d.
20.
a.
b.
c.
d.
21.
a.
b.
c.
d.
22.
a.
b.
c.
d.
23.
a.
b.
c.
d.
24.
a.
b.
c.
d.
25.
a.
b.
c.
d.
26.
a.
b.
c.
d.
27.
a.
b.
c.
d.
28.
a.
b.
c.
d.
2 to 11
7 to 16
11 to 21
How many times should basefont element be used in the entire webpage:
Once
Twice
Thrice
None of these
How many types of lists are supported by html:
Two
Three
Four
Five
By default, the value of type attribute is:
1
2
3
None of these
Type attribute is used with
<ty>
<tp>
<ol>
<op>
The type attribute can be used with _________ tag for setting the type for the entire list:
<ty>
<li>
<ol>
<ul>
It can be used with individual _________ tag to set the type of a particular list item:
<ul>
<li>
<ol>
<ty>
Image element has only an opening tag:
<im>
<ima>
<img>
<image>
The align attribute is used to adjust :
The size of image
Color of image
Shape of image
Position of the image
The default value of border is:
1
2
3
0
By default,the background color of the web page is:
Black
Red
Pink
White
The hexadecimal number of white color:
#ffffff
#fffeee
#fefefe
#efefef
The hexadecimal number of red color is:
#ff0110
#ff0111
#ff0000
#ff1001
To create a link in the same document how many anchor elements are used:
Two
Three
Four
Five
d.
31.
a.
b.
c.
d.
32.
a.
b.
c.
d.
33.
a.
b.
c.
d.
34.
a.
b.
c.
d.
35.
a.
b.
c.
d.
36.
a.
b.
c.
d.
37.
a.
b.
c.
d.
38.
a.
b.
c.
d.
39.
a.
b.
c.
d.
40.
a.
b.
c.
d.
41.
Hghj
Frames are used to divide the browser window into:
Dependent segments
Two dependent segments
Four independent segments
Various independent segments
Web pages created using frames can contain :
Table of contents
Navigation links
Footnotes,banners
All of these
To create a frameset document,________ element is included in an html document:
Frames
Frameset
Font
Html
The syntax of the frame element is:
<fra>
<fram>
<frame>
<frameset>
Web publishing means:
Collecting the web pages
Publishing the web pages
Storing the web pages
None of these
The most common place for publishing the web page is on the web space provided by:
DNS
URL
ISP
All of these
Scripting languages can be used to provide:
Simple features to the web page
Main features to theweb page
Dynamic features to the web page
None of these
Most common scripting language is:
Html
C
C++
JavaScript
JavaScript language was developed by:
Microsoft
Sun
Nsf
Netscape
JavaScript is used for:
Client-side applications
Data validation
Creating interactive forms
All of these
The default size of the basefont element is:
a.
b.
c.
d.
1
2
3
4
------------------------------------
3
f) The HTTP request line contains a ________________ method to get information
about a
document without retrieving the document itself.
(a) HEAD.
(b) POST.
(c) COPY.
(d) None of the above.
g) DNS can use the services of ___________________ on the well-know port 53.
(a) UDP.
(b) TCP.
(c) Either (a) or (b).
2.
3.
Latin
Contextual
DB
None of these
4.
Images
Numbers
Words
All of these
1
2
3
4
Qualitative
Quantitative
c.
d.
5.
6.
Qualitative data
Quantitative data
Both a & b
None of these
Which data are rich, poor, tall, short, good, bad, better
a.
b.
c.
d.
13.
Things
Words
Text
None of these
12.
Numerical form
Non-numerical form
Both a & b
None of these
11.
Numerical form
Non-numerical form
Both a & b
None of these
10.
Highest
Middle
Lowest
None of these
9.
Highest
Middle
Lowest
None of these
8.
Highest
Middle
Lowest
None of these
7.
Both a & b
None of these
Qualitative data
Quantitative data
Both a & b
None of these
Values
Operations on values
Both a & b
None of these
14.
15.
The smallest addressable unit of data is defined as a group of ___ bits is known as a byte:
a.
b.
c.
d.
16.
22.
Electric current
Electromagnetic field
Electronic current
Both a & b
23.
0 to 232 -1
-231 to 231-1
231 to 264 -1
0 to 231 -1
A signal is an
a.
b.
c.
d.
21.
0 to 232 -1
-231 to 231-1
0 to 264 -1
0 to 231 -1
20.
8 bit or 16 bit
16 bit or 32 bit
32 bit or 64 bit
64bit or 128 bit
19.
Word
Number
Bit
Byte
The machine code unit may be _________ depending on the computer architecture:
a.
b.
c.
d.
18.
4
8
16
32
17.
Integers
Floating-point numbers
Characters
Alphanumeric strings
All of these
A telephone user
The telephone network
Both a & b
None of these
24.
25.
26.
28.
In channel
a.
b.
c.
d.
In channel
a.
b.
c.
d.
e.
f.
29.
Images
Audio
Text
Programs
Telemetry
All of these
Electrical form
Electromagnetic form
Both a & b
None of these
Internal
External
Both a & b
None of these
32.
31.
Upgrades
Degrades
Both a & b
None of these
30.
Hard wired
Wireless
Both a & b
None of these
27.
Physical
Logical
Both a & b
None of these
300kHz
300MHz
300GHz
300Hz
The noise generated which is lower than the high frequency range of ____ and may have more interface with the signal of
information:
a.
b.
c.
d.
300MHz
300kHz
300GHz
300Hz
33.
34.
35.
Internal noise is less dependent on frequency, but has a significant effect at:
a.
b.
c.
d.
36.
38.
40.
decibels
Hertz
Micron
bits per second
e.
____________ defined as the size of the range of frequencies that can be transmitted through a channel
a.
Channel Bandwidth
b.
Channel Data Transmission Rate
c.
Channel noise
d.
Channel capacity
In other words channel bandwidth may be define it as the volume of information per unit time that a
_____________________
a.
b.
c.
d.
42.
S/N
SNR
S/M
Both a & b
40.
More
Less
No
None of these
39.
Higher frequency
Low frequency
Middle frequency
No frequency
37.
Channels
Receivers
Transmitter
Both a & b
Computer
Person
Transmission medium can handle
All of these
decibels
Hertz
Micron
d.
43.
44.
46.
48.
decibels
Hertz
Micron
bits per second
49.
Highest frequency
Lowest frequency
Both a & b
None of these
__________ is determined by the maximum number of bits that can be transmitted per unit time through the physical
medium:
a.
Channel Bandwidth
b.
Channel Data Transmission Rate
c.
Channel noise
d.
Channel capacity
Channel Data Transmission Rate is measured in
a.
b.
c.
d.
47.
decibels
Hertz
Micron
bits per second
45.
_____________ is the amount of time that is needed for the information to propagate from the source to destination through
the channel:
a.
b.
c.
d.
e.
50.
Throughput may be defined as the number of _______________ through a data communication system over a period of time:
a.
b.
c.
d.
51.
bits
characters
blocks passing
All of these
52.
Propagation time
Channel Latency
Channel Utilization
Both a & b
Bandwidth
Channel noise
Bit rate
Channel latency
a.
b.
c.
d.
53.
54.
55.
62.
>1008GHz
<1018GHz
>1018GHz
<1008GHz
The most popular method for detecting errors in bit rate is ________ a parity bit alongside the data bit for a character
a.
b.
c.
d.
61.
Bit rate
Data rate
Baud rate
Pass band
60.
Bandwidth
Channel
Distance
None of these
_________ is the rate over network speed which is used to detect errors while transmitting data
a.
b.
c.
d.
59.
Lesser
Greater
Medium
None of these
________ refers to the minimum or maximum spatial separation between devices over a link, in the context of a complete,
end to end circuit
a.
b.
c.
d.
58.
Baud rate
Pass band
Band data
Pass
57.
Frequency
Frequency spectrum
Carrier frequency
None of these
56.
More
Less
Medium
None of these
Deleting
Inserting
Modifying
Updating
TDM means
a.
Total division multiplex
b.
Time division modem
c.
Time detect modem
d.
Time division multiplex
FEC means
a.
b.
c.
d.
63.
64.
68.
TDM
FEC
Framing Bit
All of these
69.
TDM
FEC
Framing Bit
All of these
67.
66.
65.
The size of the multimedia file is the length of recording in seconds divided by:
a.
b.
c.
d.
4
8
12
16
70.
e.
The fundamentals of Bit rate:
70.
a.
The sample uses different number of bits
b.
The data is encoded by different number of bits
c.
The material is sampled at different frequencies
d.
The information is digitally compressed by different algorithms
e.
All of these
The bit rate is __________ for a specific network
a.
b.
c.
d.
72.
Fixed
Uniform
Fixed and Uniform
None of these
73.
a.
per second by an ideal transmitter
b.
per second by an ideal transistor
c.
per min by an ideal transmitter
d.
per min by an ideal transistor
The bit rate could be as high as
a.
b.
c.
d.
74.
75.
Bit rate is used to calculate the speed of time to access the network
a.
Without getting error frames
b.
Getting error frames
c.
Without getting error format
d.
Getting error format
Bit rate is always ________ to the baud rate
a.
b.
c.
d.
76.
79.
81.
83.
8-key
6-key
5-key
9-key
82.
Less
Large
Equal
None of these
80.
Signal
Data
Symbol
None of these
Lesser bandwidth is required to move these signal units with _____ bits for an efficient system
a.
b.
c.
d.
78.
Equal
More
Equal or more
None of these
77.
1Gbit/s
1Mbit/s
1Mbyte/s
1Gbyte/s
ITA 1
ITA 2
ITA 3
ITA 4
a.
b.
c.
d.
84.
85.
87.
89.
UTF-7
UTF-8
UTF-16
UTF-32
UTF-EBCDIC
All of these
Binary Coded Decimal system makes use of a series of _____ to represent a decimal number
a.
b.
c.
d.
91.
Inside computer
Outside computer
Both a & b
None of these
90.
8 characters
16 characters
32 characters
64 characters
88.
Line Feed
Light Feed
Line Format
None of these
The basic idea behind coding was really workable if number of characters it had to handle do not require more than
a.
b.
c.
d.
86.
00011
00101
00010
10101
4
8
16
32
e.
Nibble is known as series of ____
a.
b.
c.
d.
8 bits
4 bits
16 bits
32 bits
92.
93.
94.
95.
Characters belong
Integers belong
String belong
None of these
99.
Zone
Digit
Byte
Bit
98.
Zone
Digit
Byte
Bit
97.
3
4
2
6
96.
8 bit
4 bit
16 bit
32 bit
64 bit
7 bit
16 bit
32 bit
e.
ASCII was published in
a.
b.
c.
d.
1964
1965
1963
1966
Unicode Consortium
Unique Consortium
Unicode Constant
None of these
101. Unicode is appeared in
a.
b.
c.
d.
1992
1991
1993
1994
102. The first version of Unicode
a.
b.
c.
d.
Unicode 1.0
Unicode 2.0
Unicode 3.0
None of these
2005
2006
2007
2004
104. In Unicode there were codes for representing characters and their basic graphical representation are known as
a.
b.
c.
d.
Graphical
Graphemes
Graphs
None of these
105. The first 256 code points belong to __________ for conversion to Roman Text
a.
b.
c.
d.
ISO 5589-1
ISO 5569-1
ISO 5579-1
ISO 5559-1
Channel
Bandwidth
Carrier
Data rate
Physical
Logical
Both a & b
None of these
1M
2M
3M
4M
110. Data rate that can be achieved using a channel depends on the _____________ of a channel
a.
b.
c.
d.
Frequency
Bandwidth
Data rate
Capacity
Anti-Aliasing
Aliasing
Channel
Bandwidth
a.
b.
c.
d.
113. How many
a.
b.
c.
d.
Analog
Digital
Both a & b
None of these
Analog Modulation
Analog Manipulation
Amplitude Modulation
Analog Modeling
Frequency Modulation
Fourier Manipulation
Frequency Manipulation
Frequency Modeling
4000Hz
5000Hz
6000Hz
3000Hz
2MHz
4MHz
6MHz
8MHz
c.
d.
Analog
Digital
Both a & b
None of these
Signal Source7
Signaling source7
Signaling system7
Signal system7
System
Source
Protocol
None of these
126. The PSTN provides a _________ path between the destination and source
a.
b.
c.
d.
Logical
Physical
Both a & b
None of these
129. SSPs uses Query Service Control Point (SCP) database using Packet switches called
a.
b.
c.
d.
130. _____________ refers to correct detection by receiving equipment at the beginning and end of data that was sent from
sending equipment
a.
b.
c.
d.
Asynchronous
Synchronous
Synchronization
None of these
Start
Stop
Start-stop
None of these
20MHz
15MHz
10MHz
5MHz
e.
136. The another name of DME(Differential Manchester Encoding)
a.
CDP(Conditioned Diphase Encoding)
b.
MPE(Manchester Phase Encoding)
c.
SSWs(Service Switching websites)
d.
SSPs(Service Switching Points)
136. In DME, logical values are indicated by _______________ of transitions
a.
b.
c.
d.
Absence
Presence
Both a & b
None of these
Rest Condition
Neutral Point
Both a & b
None of these
less
more
either less or more
none of these
Rest
Zero
Neutral
None of these
141. MLT-3 is an encoding scheme in which ____ voltage levels are used
a.
b.
c.
d.
2
3
4
5
142. Due to four transitions the maximum fundamental frequency requirement is reduced to ____
a.
One-fourth of the baud rate
b.
One-third of the baud rate
c.
One-half of the baud rate
d.
None of these
143. Who specified the committee scheme of coding
a.
b.
c.
d.
ANSI X3T9.7
ANSI X5T9.6
ANSI X3T9.5
ANSI X6T9.5
144. FDDI uses ANSI X3T9.5 for obtaining 100Mbps from a signal of ______
a.
b.
c.
d.
32.25MHz
31.25MHz
31.24MHz
32.26MHz
Block coding
Bit coding
Byte coding
Block character
1000MHz
100MHz
10MHz
99MHz
147. The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined _____ bit symbol
a.
b.
c.
d.
5
4
6
3
Audio
Video
Music
Data
All of these
Linear process
Non-linear process
Both a & b
None of these
Special character
Start bit
Stop bit
None of these
a.
b.
c.
d.
STN
SYN
SBN
SRN
01001111
10001110
00010110
00110011
2bit
4bit
8bit
16bit
100MHz
10MHz
1000MHz
10000MHz
156. 5B/6B creates a data pattern that is placed with equal numbers of
a.
b.
c.
d.
1
0
Both a & b
None of these
10
100
1000
10000
158. Modulation is the technique used to translate low-frequency(base-band) signals like __________ to a higher frequency
a.
b.
c.
d.
e.
Audio
Music
Video
Data
All of these
159. Modulation/ demodulation is a non linear process where two different sinusoids are _________
a.
b.
c.
d.
Addition
Subtraction
Multiplied
Division
Once
Twice
Thrice
None of these
161. The frequencies that comprise the message (base band) are translated into a _________ range of frequencies
a.
b.
Lower
Higher
c.
d.
Zero
None of these
162. Modulation also reduces the size of antenna for higher frequencies with ________ frequency
a.
b.
c.
d.
Lower
Greater
Middle
None of these
Even
Odd
Both a & b
None of these
164. Harmonics are the _________ of the frequency, that is the message frequency
a.
b.
c.
d.
Addition
Subtraction
Multiply
Division
Radio wave
Light wave
Both a & b
None of these
166. The amplitude of carrier frequency ________ in accordance with the modulated signal
a.
b.
c.
d.
DSB-SC
DBS-CS
BDS-SC
BSD-CS
171. Pulse code modulation is a method by which an audio signals are represented as
a.
b.
c.
d.
Direct data
Digital data
Device data
None of these
32Kbps
64Kbps
128Kbps
256Kbps
173. PCM is a coding scheme used in digital communication because of _____ sensitive to noise
a.
b.
c.
d.
Less
Middle
High
None of these
174. In digital signal the main source of noise is ___________, which introduces as the finite number of quantization levels during
the conversion to PCM code
a.
Quantization noise
b.
Equalization noise
c.
Digital noise
d.
None of these
175. The main parameters in determining the quality of a PCM system are the
a.
b.
c.
d.
Dynamic range
Signal-to-Noise Ratio(SNR)
Both a & b
None of these
Original level
Quantized level
Both a & b
None of these
177. The maximum error occurs when the original level falls exactly halfway between ______ quantized levels
a.
b.
c.
d.
2
3
4
1
34dB
36dB
40dB
38dB
180. In dynamic range, the largest voltage amplitude is _______ the smallest voltage amplitude
a.
b.
c.
d.
32times
64times
125times
256times
b.
Granular noise
c.
Both a & b
d.
None of these
182. Communication channels like ____________ are usually analog media
a.
Telephone lines
b.
c.
d.
Television lines
Digital lines
None of these
Digital media
Analog media
Both a & b
None of these
184. In the case of telephone lines, the usable bandwidth falls in the range of _______
a.
300Hz to 3000Hz
b.
300Hz to 3300Hz
c.
30Hz to 3300Hz
d.
33Hz to 3300Hz
185. Digital information signals have the shape of pulse and represented by
a.
b.
c.
d.
0
1
both a & b
none of these
Signals
Also to detect them
Both a & b
None of these
188. Telephone lines limit amplitude changes to some _________ changes per second
a.
b.
c.
d.
3000
3300
3100
3330
189. In the Frequency Shift keying, the frequency of the carrier signal is changed according to the data
a.
b.
c.
d.
Modulation
Data
Signals
None of these
190. In the Phase Shift Keying method a sine wave is transmitted and the phase of the sine wave carries the ______
a.
b.
c.
d.
Analog data
Digital data
Signal data
None of these
0
45
90
180
a.
b.
c.
d.
0
45
90
180
195. In the differential phase shift keying, For a 0 the modem shifts the phase of each succeeding signal in a certain number of
degrees
a.
b.
c.
d.
0
45
90
180
196. In the differential phase shift keying, For a 1 the modem shifts the phase of each succeeding signal and a different certain
number of degrees
a.
b.
c.
d.
0
90
180
270
197. In binary phase shift keying, the case of 4 different phase shifts, where each symbol represents ____, the modulation
technique is called quadrature PSK(QPSK)
a.
b.
c.
d.
2 bits
4 bits
8 bits
16 bits
198. In binary phase shift keying, the case of 8 different phase shifts, where each symbol represents ____, the modulation
technique is called
a.
b.
c.
d.
QPSK
8PSK
8QAM
8FSK
Decibel
Baud
Hertz
bits per second
0
45
90
180
Linear process
Non-linear process
Both a & b
d.
None of these
Linear process
Non-linear process
Both a & b
None of these
Amplitude Modulation
Frequency Modulation
Angle Modulation
Pulse Code Modulation
Frequency
Phase
Both a & b
None of these
e.
205. PCM requires bandwidth of
a.
b.
c.
d.
21Kbps
24Kbps
64Kbps
65Kbps
206. In data communication using computers ,________ signal are normally converted into PCM
a.
b.
c.
d.
Analog
Digital
Both a & b
None of these
207. The PCM is a coding scheme used in __________ communication because of less sensitive to noise
a.
b.
c.
d.
Analog
Digital
Both a &b
None of these
208. ________ is a process where multiple analog message signals or digital data streams are combined into one medium over a
shared medium
a.
b.
c.
d.
Multiplexing
Modulation
Encoding technique
De-multiplexing
a.
b.
c.
d.
Bandwidth
Signal
Frequency
None of these
212. _________ was the foremost multiplexing scheme to have the benefits of wide scale network deployment and till today, such
systems are still in use and are used with analog transmission
a.
Frequency Division Multiplexing(FDM)
b.
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
213. The two alternative technologies of multiplexing for digital sources are
a.
b.
c.
d.
e.
f.
g.
214. _______ provides a means for merging data from the varied sources into a single channel to support communication over a
microwave system , satellite system or a telephone lines
a.
b.
c.
d.
Synchronous TDM
Asynchronous TDM
Both a & b
None of these
e.
216. In which type of TDM , a single channel is divided into time slots and each transmitting device is assigned for least one of the
time slots for its transmission
a.
b.
c.
d.
Synchronous TDM
Asynchronous TDM
Both a & b
None of these
Statistical TDM
Static TDM
Dynamic TDM
None of these
FDM
TDM
CDM
None of these
219. In which way of multiplex ,the whole amount for a certain amount of time is provided to the user and all user uses the same
frequency but at different time
a.
b.
c.
d.
FDM
TDM
CDM
None of these
a.
b.
c.
d.
CDM
FDM
STDM
CDMA
222. ________ may be defined as the form of multiplexing where the transmitter encodes the signal using a pseudo random
sequence
a.
b.
c.
d.
CDM
FDM
STDM
CDMA
Bit rate
Data rate
Baud rate
Chip rate
224. If one or more bits are transmitted at the same frequency are called
a.
b.
c.
d.
Frequency doping
Frequency hopping
Frequency hoping
Frequency hipping
1963
1989
1979
1958
227. In CDMA system ,all user transmit in the ______ bandwidth simultaneously
a.
b.
c.
d.
Different
Same
Both a & b
None of these
e.
228. The spread spectrum technology of CDMA is ___________ than TDMA
a.
b.
c.
d.
More secure
Provides higher transmission quality
Both a & b
None of these
e.
229. A CDMA call starts with a standard rate of ___________ bits per second
a.
b.
c.
d.
9500
9200
9300
9600
230. The code used with the signal for spreading have
a.
Low cross-correlation values
b.
Unique to every user
c.
Higher transmission quality
d.
Both a & b
231. In spread spectrum technique, a receiver is only capable of selecting the desired signal if it has the knowledge about the
code of the intended
a.
b.
c.
d.
Receiver
Transmitter
Both a & b
Signal
235. The pattern of switching from one channel to another channel is known as
a.
b.
c.
d.
Hipping
Hyping
Harping
Hopping
236. ________ is best known spread spectrum technique in which a pseudo random noise code multiples the signal
a.
b.
c.
d.
FHSS
FCSS
DSSS
DHSS
237. A pseudo random noise code is a sequence of chips valued________ with noise-like properties
a.
b.
c.
d.
-1 and1(polar)
0 and 1(non-polar)
Both a & b
None of these
e.
238. ________ time is the time spent on a channel with certain frequency
a.
b.
c.
d.
FDM
Dwell
Dowel
Dowry
e.
239. FHSS includes_______ technology
a.
b.
c.
FDM
TDM
CDM
d.
Both a & b
e.
240. Individual channels are
a.
b.
c.
d.
Data
Audio
Video or their combination
All of these
241. __________ a multi-channel system in which a number of individuals channels are multiplexed for transmission
a.
b.
c.
d.
System
Carrier
Carrier system
None of these
T1 standards is widely
a.
b.
c.
d.
Bell Laboratory
Hell Laboratory
Dull Laboratory
None of these
used in
Japan
North America
Both a & b
None of these
T1
E1
DS0
DS1
North America
Japan
South Korea
All of these
24 channels
26 channels
28 channels
30 channels
Timeslots
DS0
Both a & b
None of these
68Kbit/s
64Kbit/s
c.
d.
62Kbit/s
70Kbit/s
250. DS1 is full-duplex circuit in which the circuit does concurrent transmission and reception at a data rate of ___
a.
b.
c.
d.
1.533Mbit/s
1.544Mbit/s
1.566Mbit/s
1.555Mbit/s
251. By sampling each 8-bit frame for 8000 times per second, total bandwidth achieved is ________
a.
b.
c.
d.
1.537Kbit/s
1.536Kbit/s
1.538Kbit/s
1.539Kbit/s
253.
Framing channel has been divided into two each with ______ in Super Frame
a.
b.
c.
d.
2Kbit/s
3Kbit/s
4Kbit/s
6Kbit/s
254. There are _____ contiguous frames of 193-bit each in a Super Frame
a.
b.
c.
d.
10
12
14
16
255. There are _____ contiguous frames of 193-bit each in a Extended Super Frame
a.
b.
c.
d.
20
22
24
26
256. Framing channel has been divided into two each with _______ in Super frame
a.
b.
c.
d.
2Kbit/s
4Kbit/s
6Kbit/s
8Kbit/s
Terminal frame
Signaling frame
Super frame
Switching frame
e.
258. Second is used for alignment of ________
a.
b.
c.
d.
e.
Terminal frame
Signaling frame
Super frame
Switching frame
259. Alignment of terminal is carried out with frames having _______ in the super frame
a.
b.
c.
d.
Even-number
Odd-number
Prime-number
None of these
260. A frame having _________ in the super frame is used for signaling alignment of frame
a.
b.
c.
d.
Even-number
Odd-number
Prime-number
None of these
1.566Mbit/s
1.544Mbit/s
1.555Mbit/s
1.533Mbit/s
AMI
LAN
DS1
CEPT
Bandwidth
Signal
Both a & b
None of these
2bits
4bits
8bits
16bits
2.084Mbps
2.048Mbps
2.044Mbps
2.088Mbps
30
32
34
36
269. 32 time slots implements an individual communication channel supporting a bit rate of ________
a.
b.
c.
d.
60Kbps
62Kbps
64Kbps
66Kbps
128bits
256bits
64bits
192bits
271. Which is used to exchange information over the E1 carriers that connect remote zones
a.
b.
c.
d.
e.
272. CEPT revised and improved the technology adopted by
a.
b.
c.
d.
T-carrier system
E-carrier system
Both a & b
None of these
e.
273. Which was taken by International Telecommunications Union Telecommunication Standardization Sector(ITU-T)
a.
b.
c.
d.
T-carrier system
E-carrier system
E1 system
T1 system
274. ITU-T finds wide use all over the world except three nations namely
a.
UK, USA, Japan
b.
USA, Canada, Japan
c.
Japan, America, USA
d.
Japan, America, Canada
275. PDH means
a.
b.
c.
d.
276. In 32 timeslots of E1, only ___ are used two of these are used for framing and signalling call setup
a.
b.
c.
d.
20
15
30
40
277. High quality of call is ensured since transmission takes place with a constant
a.
b.
c.
d.
Latency
Capacity
Both a & b
None of these
TS16
TS15
TS14
TS13
Teardown
Call setup
Both a & b
None of these
280. E1 is different from earlier T-carrier systems since all ___ of every sampling are available for every call
a.
b.
c.
d.
4bits
8bits
16bits
32bits
Twisted pair
Coaxial cable
Fibre optic cables
All of these
Physical conductor
Guide to bind the signal
Logical conductor
Both a & b
Copper
Glass
Both a & b
None of these
e.
286. The transmission systems addressed under this category include
a.
b.
c.
d.
Microwave
Satellite
Infrared
All of the above
Radio
TV
Cellular phones
All of these
Satellite signal
Satellite relay
Analog signal
Digital signal
a.
b.
c.
d.
290.
a.
b.
c.
d.
Mutual interference
Band usage is regulated
Both a & b
None of these
293. A pair of copper wires twisted together and wrapped with a plastic coating as a twisted pair and which has a diameter of
____:
a.
b.
c.
d.
0.2-0.6
0.4-0.7
0.2-0.8
0.4-0.8
Teflon(r)
Flouropolymer resin
Polyvinyl chloride
Polyethylene
All of these
f.
295. In modem data rate is restricted to approximately____:
a.
b.
c.
d.
24Kbps
28Kbps
30Kbps
32Kbps
e.
296. _______ was first used in telephone system by Alexander Graham Bell
a.
b.
c.
d.
Copper medium
Copper signal
Copper set up
None of these
e.
297. The unshielded twisted pair states the link between the end in the communication closet and the outlet which is further
restricted to
a.
b.
c.
d.
60metres
90metres
100metres
190metres
2 to 240
2 to 4200
c.
d.
2 to 2400
None of these
1 pair
2 pairs
3 pairs
4 pairs
2 pairs
3 pairs
4 pairs
5 pairs
52.5/125
72.5/125
62.5/125
82.5/125
Spacing of amplifiers
The length of the circuit
The gauge of the centre conductor
Other intermediate devices
All of these
10BASE5
10BASE2
10BASET
All of these
Baseband
Broadband
Both a & b
d.
None of these
309. The gauge of coaxial cable is _____ than the twisted pair
a.
b.
c.
d.
Thicker
Thinner
Heavy
Bulky
310. Traditional coaxial cable is quite ________ of which Ethernet LAN 10Base5 is an example
a.
b.
c.
d.
Thick
Heavy
Bulky
All of these
311. Twin axial cables contains _____ such configurations within a single cable sheath
a.
b.
c.
d.
2
3
4
5
313. The bandwidth is typically ________ over a length of one kilometer of fibre expressed as MHz-Km
a.
b.
c.
d.
10 to 20
20 to 30
30 to 40
40 to 50
314. In which multimode fibre, light is refracted by an increasing amount as it moves away from the core
a.
Single mode fibre
b.
Step index multimode fibre
c.
Graded index multimode fibre
d.
All of these
315. The actual bandwidth of graded index multimode fibre depends on
a.
b.
c.
d.
316. The typical bandwidth of graded index multimode fibre range from
a.
b.
c.
d.
318. In which multimode fibre , different wavelength of light travel at a different speeds
a.
b.
c.
d.
Light sources
Cables
Light detectors
All of these
Repeater
EMI
RMI
RFI
250Km
350Km
225Km
325Km
Media
Twisted pair cable
Advantages
Inexpensive, well established ,
easy to add nodes
Disadvantage
Sensitive to noise, short distances,
limited
bandwidth,
security
hazard
because
of
easy
interception
Physical
dimensions,
noise
immunity security is better in pair
cable
Connections, cost
327. In data communication the signal has to travel through the transmission media that may be
a.
b.
c.
d.
Wired
Wireless
Both a & b
None of these
329.
Attenuation
Distortion
Noise
All of these
___________ is the loss of the signal power while traversing a transmission media including electronic circuitry
a.
b.
c.
d.
Attenuation
Distortion
Noise
None of these
Hertz
Micro
decibel
Kilometer
Loss
Gain
Either loss or gain
None of these
Loss
Gain
Either loss or gain
None of these
e.
334. The attenuation includes a number of factors like
a.
b.
c.
d.
e.
f.
334. Distortion
a.
b.
c.
d.
334. Equalizing
Atmospheric conditions
Modulation techniques
Operating frequency
Operating system
devices are ________ at intermediate points to keep the shape of the signal intact
a.
b.
c.
d.
Created
Inserted
Modified
Deleted
337. Data processing and transmission systems experience errors due to several reasons
a.
b.
Noise
Distortion
Attenuation
Dropouts
All of these
339. The digital signals do not suffer from ___________ but they are susceptible to dropouts
a.
b.
c.
d.
Noise
Distortion
Both a & b
None of these
e.
343. A transmission cable has
a.
b.
c.
d.
Inductance
Capacitance
Resistance
All of these
Causes the amplitude of the signal to reduce and therefore loss of power
Distort the shape of a signal
Both a & b
None of these
Burst errors
Single bit errors
Both a & b
None of these
e.
347. Which type of error corrupt the multiple bits of transmission
a.
b.
c.
d.
Burst errors
Single bit errors
Both a & b
None of these
Enquiry
Encryptions
Enquire
None of these
correction of errors
detection of errors
Redundancy check
All of these
Parity check
Cyclic redundancy check
Checksum
All of these
e.
354. __________ is the technique of providing a data string that is added to information packets used to detect errors in data
packets
a.
b.
c.
d.
CRC
Parity check
Checksum
All of these
e.
355. Which redundancy process can detect the more than 95 per cent of all errors
a.
b.
c.
d.
CRC
Parity check
Checksum
All of these
a.
b.
c.
d.
358. When signal amplitude degrades along a transmission medium , this is called
a.
b.
c.
d.
Signal attenuation
Signal bandwidth
Frequency
Data rate
1
2
3
4
360.
a.
b.
c.
d.
WAN
None of these
______ is a network that this technology connects sites that are in diverse locations
LAN
MAN
WAN
None of these
______ is a collection of point-to-point links that may form a circle
LAN
MAN
WAN
Ring topology
______ refers to tone signals used for various control purposes via the telephone network
SMS
DTMF
GSM
None of these
LAN is a network that is restricted to a relatively
Small area
Large area
Both a & b
None of these
The components used by LANs can be categorized into
Hardware
Cabling protocols
Standards
All of these
Medium access control(MAC) equivalent to the lower part of the OSI data link layer
Logical link layer(LAC) equivalent to the upper part of the data link layer
Network layer, the OSI network layer, that performs some of the higher order layer functions
All of these
The 802.2 compatible interfaces provide two major types of services, which are
Unacknowledged
Connectionless
Both a & b
None of these
The ________ follows the ring topology
IBM of LAN
LAN of IBM
Both a & b
None of these
Delete
Find
Frame control is also used to specify the ________
Frame technique
Frame type
Both a & b
None of these
The destination address and source address field is similar to
IEEE 802.3 or CSMA/CD bus
IEEE 802.4 or token bus
IEEE 802.5 or token ring
IEEE 802.6 or MAN protocol
Info field is used to ________
Send messages
Send data
Delete data
Create data
The maximum length of this field is _______ when the address is _______
8182 & 2 bits
8182 & 2 bytes
8182 & 4 bits
8182 & 4 bytes
The maximum length of this field is _______ when the address is _______
8174 bytes & 6 bits
8174 bytes & 6 bytes
8174 bytes & 8 bytes
8174 bits & 6 bytes
Check sum is used for
Error correction
Error detection
Both a & b
None of these
Local carrier
Both a & b
None of these
All of these
The other government organizations like _______________ to enter this field to bring the Internet to common people
NIC
VSNL
MTNL
All of the above
The major network infrastructure available in the country has two types of WAN
Terrestrial WAN
VSAT WAN
Both a & b
None of these
Following are different options for setting up the Intranet, education portal or e-commerce, etc.
Leased line
Dial Up connection
VSAT
Radio link
All of the above
The networks can be broadly divided into three categories namely
LAN for a single building
MAN- single city
WAN-country, continent and planet
All of the above
The host to terminal connection is a conventional type of connection between
Main frame
Dumb terminals
Both a & b
None of these
TC means
Terminal Computer
Terminal Controller
Technical Computer
None of these
A collection of interconnected networks is known as
Internetwork
Internet
Network
None of these
Frame relay
All of these
Which function allows selection of the appropriate route based on IP header information and sends packets through this route
Forwarding function
Filtering function
Both a & b
None of these
Which function allows dumping of invalid packets for a specific network instead of forwarding
Forwarding function
Filtering function
Both a & b
None of these
Routing in the same network may be termed as
Local routing
Static routing
Dynamic routing
Distributing routing
The routing table possessed by a router includes
Combination of destination address
Next hops that corresponds to that address
Both a & b
None of these
If there is a fixed route information to each router, is called
Fixed routing
Dynamic routing
Both a & b
Distributed routing
If routing information is automatically updated by routers when changes are made to the network configuration are called
Fixed routing
Dynamic routing
Both a & b
Distributed routing
The processing required to transferring a packet from the source host to the destination host or to the relaying router are called
Fixed routing
Dynamic routing
Local routing
Distributed routing
If two or more routers are available in distributed routing, which route should be selected
High possible cost
Least possible cost
Link cost
Both b & c
If there is no any specific intention, the cost for a single link is usually set at ___
1
2
3
4
Multi-path routing can be achieved in
Distance-vector type
Link-state type
Both a & b
None of these
If there are two or more routes to reach the same destination at the same cost, which method is applicable to determine how to
select this route
Round robin method
Random selection method
Mixed method
All of these
The Mixed method remains _________ for the amount of processing required
Effective
Ineffective
Both a & b
None of these
A set of networks interconnected by routers within a specific area using the same routing protocol is called
Domain
Backbone
Inter-domain router
All of these
A network composed of inter-domain router is called
Domain
Backbone
Inter-domain router
All of these
A router within a specific domain is called
Domain
Backbone
Inter-domain router
All of these
Two or more domains may be further combined to form a
Domain
Backbone
Inter-domain router
Higher-order domain
Each domain is also called
Operation domain
Backbone
Inter-domain
All of these
Routing protocol in such an internet system can be broadly divided into two types named
Intra- domain routing
Inter- domain routing
Both a & b
None of these
To communication between two or more domains, which are used
Intra- domain routing
Inter- domain routing
Both a & b
None of these
Some Intra-domain protocols are
RIP(Routing Information Protocol)
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System )
All of these
________ are the algorithms are available to update contents of routing tables
Distance-Vector Protocol
Link-State Protocol
Both a & b
None of these
Distance vector protocols are
RIP
IGRP(Interior Gateway Routing Protocol )
Both a & b
None of these
RIP stands for
Routing Information Protocol
Routing Intra Protocol
Route Intermediate Protocol
Resolution Information Protocol
The Link state protocol are
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System)
Both a & b
None of these
In link state protocol, the load on router will be
Small
Large
Medium
None of these
Simple
Both a & b
None of these
Which protocol are used in link state type routing protocol developed for use in large scale network
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System)
Both a & b
None of these
The common part of OSPF packet format is
Packet type
Packet length
Router ID
Area ID
Authentication type
Authentication data
Version
Checksum
Individual information part
All of these
The router may be classified into three types named
Domain border router
Internal router
Area border router
All of these
OSPF is a hierarchical routing composed of
Intra-area routing
Inter-area routing
Inter-domain routing
All of these
_________ is used for connection between routers or equipment that must be highly reliable
SLIP
PPP
Both a & b
None of these
The wireless LANs offers the obvious advantage of
Avoidance of cabling cost
Provide LAN capabilities in temporary quarters
Both a & b
None of these
The bandwidth of wireless radio LAN is
24Mbps
2 Mbps
4 Mbps
8 Mbps
The frequency range of wireless LAN is
900 MHz bands
2GHz bands
5 GHz bands
All of these
A hub antennae is located at a _________ from where line-of-sight can be established with the various terminal antennae.
Highest point
Lowest point
Central point
None of these
The effective throughput is more in the range of _________ per hub
1 to 2 Mbps
2 to 3 Mbps
3 to 4 Mbps
4 to 5 Mbps
PDA stands for
Personal Device Assistant
Pointer Description Assistant
Personal Digital Assistant
Personal Description Analog
USB stands for
University System Bus
Universal System Board
University System Board
University Serial Bus
_______ are wireless network standard with a data rate of only 2Mbps
IEEE802.11a
IEEE802.11b
IEEE803.11a
IEEE803.11b
_______ are wireless network standard with a data rate of only11Mbps
IEEE802.11a
IEEE802.11b
IEEE803.11a
IEEE803.11b
IEEE802.11a and IEEE802.11b have a distance limitation up to _____ from the access point router
1000feet
100feet
101feet
110feet
IEEE802.11a and IEEE802.11b uses _____ band
1.4GHz
2.4GHz
3.4GHz
4.4GHz
________ technology allows speeds up to 54Mbps
IEEE802.11g
IEEE803.11a
IEEE803.11b
IEEE802.11a
A user can access to the same or similar telecommunication services at different places
User mobility
Device portability
Both a & b
None of these
The availability of _________ made the wireless communication popular among the masses.
Low cost microprocessor
Digital switching
Both a & b
None of these
Cellular radio has another popular names as
Cellular mobile
Cellular phone
Both a & b
None of these
Radio is basically a device, which has
Receiver
Transmitter
Both a & b
None of these
Wireless communication can be carried out
Use of radio
Without using radio
Both a & b
Without use of video
The term radio may be defined as consisting of ______________ of the signal
Modulation
Radiation
Both a & b
None of these
A transmitter and an antenna are used to ____________ the modulated signal within radio spectrum
Modulate
Radiate
Both a & b
None of these
In telephone system as we know that a voice with bandwidth of approximately ____ modulates the current of a telephone line
2kHz
3 kHz
4 kHz
5 kHz
Wireless ca be defined as the ____________________ by means of high frequency electrical waves without a connecting wire
Radio transmission
Reception of signals
Both a & b
None of these
The frequency of a cell may be ________ after the interference zone
Reused
Used
Not be used
Not be reused
PSTN stands for
Public Switched Transport Network
Public System Transport Network
Public System Transfer Network
Public Switched Telephone Network
The radii of a cell may vary from ___________ in a building to a city
One of meters to tens of kilometers
Tens of meters to tens of kilometers
Hundreds of meters to tens of kilometers
Hundreds of meters to hundreds of kilometers
The shape of cell mat not be a ___________ and depends up on the environment
Hexagon
Circle
Pentagon
Both a & b
SDM stands for
System Division Multiple
System Division Multiplexing
Space Division Multiplexing
System Double Multiplexing
Frequencies for communication may vary from very high frequency to ________
Medium range
Microwave range
Digital range
None of these
7.6kbps
8.8kbps
The uplink and downlink frequencies for GSM are different and therefore a channel has a pair of frequencies _______ apart
70MHz
80MHz
90MHz
60MHz
The separation between uplink and downlink frequencies are called
Duplex distance
Double distance
Triplex distance
None of these
In a channel the separation between adjacent carrier frequencies is known as channel separation which is _______ in case of GSM
100kHz
200 kHz
300 kHz
400 kHz
The services supported by GSM are
Telephony
Fax and SMS
Call forwarding
Caller ID
Call waiting
All of these
GSM supports data at rates up to 9.6kbps on
POTS(Plain Old Telephone Service)
ISDN
Packet Switched Public Data Networks
Circuit Switched Public Data Networks
All of these
The access methods and protocols for GSM may be from
X.25
X.32
Both a & b
None of these
There are basic types of services offered through GSM are
Telephony or teleservices
Data or bearer services
Supplementary services
All of these
The supplementary services are used to enhance the features of
Bearer
Teleservices
Both a & b
None of these
Dual tone signals are used for various control purposes via the
Telephone network
Different from dual pulses
Both a & b
None of these
SMS(Short Message Service) is a message consisting of a maximum of ______ alphanumeric characters
150
160
170
180
GSM supports ______ Group 3 facsimile
CCIIT
CCITT
CCCIT
CCTTI
Call forwarding is a ________________
Telephony or teleservices
Data or bearer services
Supplementary services
All of these
The other services of call forwarding are
Cell broadcast, voice mail, fax mail
Barring of outgoing and incoming calls conditionally
Call hold, call waiting, conferencing
Closed user groups
All of these
GSM consists of many subsystems, such as the
Mobile station(MS)
Base station subsystem(BSS)
Network and Switching subsystem(NSS)
Operation subsystem(OSS)
All of these
Which forms a radio subsystem
Mobile station
Base station subsystem
Both a & b
None of these
The generic GSM network architecture which is composed of three subsystem are__________
Radio subsystem (RSS)
Network and switching subsystem
Operation subsystem
All of these
The RSS is basically consisting of radio specific equipment such as ____________ to control the radio link
Mobile station(MS)
Base station subsystem(BSS)
Both a & b
None of these
The chief components of RSS are
BSS
Cellular layout
Base station controller(BSC)
All of these
SIM stands for
System Identity Module
Subscriber Identity Module
Subscriber Identity Modem
Subscriber Input Modem
MS contains a SIM card in the form of a very _______ inside the equipment
Large chip
Small chip
Both a & b
None of these
Cell site is defined as the location where _______________ are placed
Base station
Antennas
Both a & b
None of these
Cell systems
Cell forwarding
None of these
A cell is simply represented by simple ____________
Pentagon
Hexagon
Both a & b
None of these
The size of cells in case of GSM and Personal Communication Service(PCS) are much smaller in the range of _______
5Kms
10Kms
15Kms
20Kms
The portions covered by the antenna are called
Portions
Sectors
Cell sector
None of these
The BTS or Base Transceiver Station is also called
RBS
PCS
GSM
SIM
BTS are housed with all radio equipments such as
Antennas
Signal processors
Amplifiers
All of these
Base station may also be placed near center of cell and known as
Excited cell
Center excited cell
Center cell
None of these
The actual cell is the _____ hexagon, with the towers at the corners
Red
Blue
Red and blue
None of these
Antenna always transmits inward to each cell and area served depends on
Topography
Population
Traffic
All of these
Network and switching subsystem is composed of the ________________
Mobile Services Switching Center(MSC)
Home Location Register(HLR)
Visitor Location Register(VLR)
All of these
The mobile stations(MS) communicates only via the
BTS
BSS
BSC
Um
A BTS is connected to a mobile station via the
BTS
BSS
GSM
No of base station
No of mobile station
Transmitter power
The more channel decreases the
GSM
No of base station
No of mobile station
Transmitter power
The other popular name for MSC(Mobile Switching Center ) is
BS(Base Station)
MS(Mobile Switch)
MTSO(Mobile Telecommunication Switching Office)
Both b & c
MSC is connected to a ____________ at one end
Mobile station
Base station
Transmitter station
None of these
MSC is connected to a ____________ at other end
MSCs
PSTN
ISDN
None of these
MSCs acts as a __________
Switching
Local Switching exchange
Remote Switching exchange
None of these
The operations and Maintenance Center oversees the all important for__________
Proper operation
Setup of the network
Authentication
Encryption
Both a & b
None of these
GSM network checks the __________________ of a mobile device through EIR database
Type
Serial number
Both a & b
None of these
935-960MHz
940-970MHz
945-950MHz
925-960MHz
FDM is used to ___________ the available frequency band in GSM
Addition
Divide
Both a & b
None of these
The GSM has many burst types such as
Normal burst
Access burst
Synchronization burst
Frequency correction burst
Dummy burst
All of these
The normal burst period lasts
Approximately 577ms or 15/26ms
Approximately 572ms
Approximately 567ms
Approximately 578ms
Which is provided to avoid overlap with other burst
Frequency space
Guard space
Information space
Bandwidth space
Which is a dedicated time slots within a data or bit stream which repeats after a certain period of time
Frequency
Amplitude
Channel
Normal burst
The channel can be further divided into
Dedicated channel
Common channel
Both a & b
None of these
Both the dedicated and common channel are allocated to a
Base station
Mobile station
Mobile switch
All of these
When a slot repeated every 4.615ms constitute a _______ channel which can be split into several logical channel
Logical
Physical
Both a & b
None of these
TDMA is used to split carrier frequency of 200kHz into_______ time slots
4
8
16
24
GSM 900 has _____ physical full duplex channels
125
124
248
247
GSM 900 has _____ physical half duplex channels
125
124
248
247
Time slot is also known as
Logical channel
Physical channel
Both a & b
None of these
25
16
How many frames are included for currently unused in 26TDMA frames
1
24
25
16
Which are basically used to control the logical channels
CCHs
TCH
Both a & b
None of these
Depending upon the task performed by the Control Channels(CCHs),they are categorized in
Broadcast Control Channels(BCCH)
Common Control Channels(CCCH)
Dedicated Control Channels(DCCH)
All of these
The different control channel are accessed by
Idle mode
Dedicated mode mobile
Both a & b
None of these
Which is a unidirectional downlink point to multi-point signaling channel from BTS to MS
BCCH
CCCH
DCCH
All of these
Which is bi-directional point to multi-point signaling channel that exchanges the signaling information for network access
management and transport information regarding connection setup between MS and BTS
BCCH
CCCH
DCCH
All of these
Which is bidirectional and are multiplexed on a standard channel for registration, location updating and authentication in order to
set up a call or TCH
BCCH
CCCH
DCCH
All of these
GSM specifies a multiplexing scheme to integrate several frames where a periodic pattern of 26 slots occurs in all TDM frames with
a TCH , the combination of these frames are called
Multiframe
Traffic-multiframe
Multiprogramming
None of these
Out of 26 frames, 24 are used for traffic, one is used for the __________ and one is currently unused
SACCH(Slow Associated Control Channel)
FACCH(Fast Associated Control Channel)
BCCH
CCCH
GSM is already mentioned that the duration of one TDMA frame is
4.516ms
4.615ms
4.156ms
4.165ms
Control multiframe comprises of 51 TDMA frame with a duration of ________
234.5ms
233.5ms
235.4ms
235.3ms
2048 superframes constitute a ________
hyperframe
lowerframe
strongerframe
none of these
GSM has three functional layers
Physical layer
Data link layer
Layer three in correspondence with OSI model
All of these
In OSI model, the lower three layers usually terminate in the ______ but it is not true in case of GSM
Another node
Same node
Two nodes
None of these
In protocols, the RR part of layer three is spread over the
MS
BTS
BSC
MSC
All of these
Physical layer is the ___________ which provides transfer of bit streams over the physical radio links through U m interface
Lowest layer
Highest layer
First layer
None of these
The communication on Abis interface between _____ and BSC is established by using the standard LAPD
MS
BTS
MTS
None of these
A reliable data link service is provided between _________ through Message Transfer Part of SS7
BSC
MSC
Both a & b
None of these
CM performs
Establishment
Maintenance
Termination of a circuit-switched call
All of these
BTS
BSC
MSC
Both a & b
The __________ is also responsibility of the layers
Handover
Handoff
Both a & b
None of these
Which uses signal strength measurements and cell congestion information to determine when a handoff should occur
MSC
BSS
BSC
Both a & b
Handoff notifications are sent to respective ____ which in turn forward them to HLRs
VLRs
VLCs
VCDs
LCDs
The mobility management sublayer on the _____ of the RR is terminated at the MSC
Low
Top
Center
First
MM is used to
Establish
Maintain
Release connections between the MS a
The network MSC
All of these
The Communication Management protocol controls __________ call establishment
first-to-end
end-to-end
end-to-first
first-to-first
CM protocols are used in GSM network, these are
Transaction Capabilities Application Part(TCAP) protocol
Mobile Application Part(MAP) protocol
Both a & b
None of these
MAP is used between _________in the form of query and response messages
MSC
VLR
HLR
AuC
All of these
____________ Together with the MSC. Provide the call routing and roaming capabilities of GSM where a subscriber can roam
nationally and even internationally
HLR
VLR
CLR
Both a & b
MSISDN stands for
Mobile Subscriber ISDN Number
Mobile Station ISDN Number
Mobile Switching ISDN Number
Mobile Standard ISDN Number
Which number caller used to reach a mobile subscriber
MSISDN number
IMSI number
TMSI number
MSRN
MSISDN number consists of
Country code(such as 91 for India)
National subscriber destination code
Subscriber number
All of these
Which number of MSISDN is the address of the GSM provider
Country code(such as 91 for India)
National subscriber destination code
Subscriber number
All of these
Which is a unique identification number allocated to each mobile subscriber
MSISDN Number
IMSI Number
TMSI Number
MSRN
It sits inside SIM card, which can be carried out anywhere and can be used in any MS
MSISDN Number
IMSI Number
TMSI Number
MSRN
The IMSI number consists of
MCC(Mobile Country Code consisting of three digits)
MNC(Mobile Network Code consisting of two digits)
MSIN(Mobile Subscriber Identity Number consisting of ten digits)
All of these
Which is used in the place of the IMSI for the definite identification and addressing of the mobile station
MSISDN Number
IMSI Number
TMSI Number
MSRN
In TMSI nobody can determine the identity of the subscriber by listening to the __________
Video channel
Radio channel
Audio channel
None of these
GSM used the _______ byte TMSI for local subscriber identification
2
4
6
8
Which is a temporary location-dependent ISDN number assigned by the locally responsible VLR to each mobile station in its area
MSISDN Number
IMSI Number
TMSI Number
MSRN
The MSRN consists of
VCC(Visitor country code)
VNDC(Visitor national destination code)
The identification of the current MSC along with the subscriber number(SN)
All of these
GSM call may be classified into two types namely
MTC(Mobile Terminated Call)
MOC(Mobile Originated Call)
Both a & b
None of these
___________ becomes necessary when mobile moves from area of one BSC into another area of the same or into another BSC
Handoff
Handover
Haddon
Handwork
Handover involves a number of procedures depending upon the location are
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
All of these
Which involve the transfer of connections from one channel to another channel on the same BTS
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
Which involve the transfer of the connection from one BTS to another BTS on the same BSC
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
The connections is transferred between BTS belonging to two different BSCs within one MSC is called
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
Which involve the transfer of a connection to a BTS between two cells within another MSC
Intra-cell handover
Catenet
Bridge
PANs
Novell netware
The computer network are of different typessome are
PANs(Personal Area Networks)
Novell Netware
Both a & b
None of these
The word Internet and internet are
Different
Same
Dependent on each other
None of these
Which signifies the specific network model
internet
Internet
Both a & b
None of these
Which means generic interconnection of networks
internet
Internet
Both a & b
None of these
Both a & b
Which protocol provides a unreliable data transfer
TCP
UDP
IP
Both a & b
Every computer has a unique address called
IP
UDP
TCP
None of these
The IP address lies between
0 to 245
0 to 254
0 to 255
0 to 265
Source computer
Destination computer
Both a & b
None of these
TCP is __________ in nature
Textual
Not textual
None of these
IP is ___________
Connectionless
Unreliable
Both a & b
None of these
IP does not ensure movement of a packet to its destination and have no knowledge of __________
Port numbers
Connections
Both a & b
None of these
May
May not
May or may not
None of these
None of these
North American implementation uses DQDB with DS1 at a data rate of
1.5Mbit/s
45Mbits/s
1.6Mbit/s
46Mbit/s
Address of source and destination in SMDS both consists of 4 bit code followed by a telephone no of max.
12 decimal digits
16 decimal digits
15 decimal digits
20 decimal digits
SNMP
Scalability
Screening
Simple
Which is a network protocol that is based on UDP and is a component of the component of the Internet Protocol Suite, defined by
IETF(Internet Engineering Task Force)
SNMP
Scalability
Screening
Multicasting
The user can have access to high speed lines ______ connected to MAN
32Mbits/s
33Mbits/s
34Mbits/s
35Mbits/s
The user can having access capacity of ______ connected to MAN
151Mbits/s
152Mbits/s
154Mbits/s
155Mbits/s
The backbones of MAN has working data rate of ________
139Mbits/s
140Mbits/s
155Mbits/s
134Mbits/s
User is charged for maximum rate of __________ bandwidth
34Mbits/s
4Mbits/s
10Mbits/s
16Mbits/s
25Mbits/s
Except (a) all are answers
SMDS was primarily used for connecting
LAN
MAN
WAN
PAN
In SMDS, MAN interconnect
Ethernet
Token ring networks
Both a & b
None of these
SMDS networks have many underlying devices for supporting high-speed service are
Subscriber network interface(SNI)
Carrier equipment
Customer Premises Equipment (CPE)
All of these
CPE may be devices such as
PCs(Personal computers)
Intermediate nodes
Terminals
All of these
All of these
PDUs contain
Source address
Destination address
Both a & b
None of these
Addressing in SMDS has provision for
Group addressing
Security features
Both a & b
None of these
In SMDS, there are two useful security features, namely
Source address validation
Address screening
Both a & b
None of these
CCITT stands for
Consultative Committee International for Telegraphy and Telephony
International Consultative Committee for Telegraphy and Telephony
International Consultative Committee for Telephony and Telegraphy
Consultative Committee International for Telephony and Telegraphy
X.25, it was developed for computer connections used for
Timesharing connection
Terminal connection
Both a & b
None of these
X.25 provides a virtual high-quality digital network at
Low cost
High cost
Medium cost
All of these
Which is another useful characteristics of X.25
Speed
Matching
Speed matching
None of these
In X.25 DTEs are not required to use the same line speed because of the
Store
Forward nature of packet switching
Excellent flow control
All of these
In X.25, A host connected at 56kbps and communicating with numerous remote sites can be linked with cheaper______ lines
18.2kbps
19.2kbps
20.2kbps
22.2kbps
In X.25 defines the protocols from
Layer 2 to Layer 3
Layer 1 to Layer 2
Layer 1 to Layer 3
Layer 3 to Layer 2
Based on X.25 rules, how many logical channel can be set on a single physical line
256
16
4096
2556
To enable control of 4096 logical channels in X.25, there are ____ channel groups
256
16
4096
2556
Each logical channel group is divided into ____ logical channels
256
16
4096
2556
The channel grouping in X.25 are known as
Logical channel group number(LCGN)
Logical channel number(LCN)
Both a & b
None of these
X.25 is a
Protocol
Data service
Telephone service
Technology
X.25 protocol was recommended by CCITT in
1975
1976
1977
1978
X.25 protocol exchanged the data control information between
A node
A user device
Both a & b
None of these
None of these
The device which splits data into frames as well as combines frames into data is referred as
FRAD(Frame relay and Disassembly)
FDLC
HDLC
DLCI
Frame relay indicates network congestion using two flags namely ________ bits in data frames
Forward Explicit Congestion Notification(FECN)
Backward Explicit Congestion Notification(BECN)
Both a & b
None of these
Cell relay is data transmission services that uses transmission technology referred to as
ATM(Asynchronous Transfer Mode)
BTM
STM
DTM
The data transmission is a fixed length of data known as
Cell
Frame
Relay
Cell relay
Protocol
VP is a bundle of
VCs
VCM
VCI
VIP
Identifiers are called ___________________ are used to identify VPS and VCs
VCIs
VIPs
Both a & b
None of these
In cell relay communication performed between
Two VP
Two VC
VP and VC
VP and VCI
ATM is an
International Telecommunication
International Telecommunication-Union
International Telecommunication Union-Telecommunication Standardization Sector(ITU-T)
International Telecommunication Union-Telecommunication
ATM networks are
Connectionless
Interconnected
Connection oriented
None of these
In today ATM, separate networks are used to carry _________ information mostly
Voice
Video
Data
All of these
Data traffic in ATM tend to be
Continuous
Bursty
Discontinuous
None of these
ATM cell has a fixed length of __________
52bytes
53bytes
54bytes
55bytes
Which is a portion carries the actual information
Payload(48bytes)
Payment
Payroll
None of these
The purpose of ATM is to provide
High speed
Low-delay multiplexing
Switching networks
All of these
ATM is specifically designed as ________ technology for voice, video, and data
Single
Double
Multiple
None of these
ATM can support
Different speeds
Traffic types
Quality of service attached to applications
All of these
ATM cells coming from a user are guaranteed delivery at the other end with a
High probability
Low delay
Both a & b
None of these
The characteristics of ATM are as follows
The transport speeds of most ATM applications are most often 155Mbps and 622Mbps
ATM is a flexible service made possible by the size of the packets (cells).
The small cell size allows a variety of applications to run on ATM networks including voice, video and data
All of these
Narrow band ISDN provides for the following services
Circuit-switched voice
Circuit-switched data
Low-speed packet
High-speed packet
All of these
The cell relay is considered to be the __________ of the future
Transmission service
Transport service
Transfer service
None of these
ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines, as also
other media
CCITT
ITU
Both a & b
None of these
Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less
1.533Mbps
1.544Mbps
1.555Mbps
1.552Mbps
The range of speeds for the broadband ISDN services usually range from ______ to the Gigabit range
24Mbs
25Mbs
26Mbs
27Mbs
BRA stands for
Basic Rate Access
Basic Random Assembly
Bit Rate Assembly
Bursty Rate Assembly
BRA affords an ISDN user with simultaneous access to two _____ data channels
32kbps
64kbps
128kbps
256kbps
The ISDN Internetworking Equipment devices are
Terminal Adapters(TAs)
ISDN Bridges
ISDN Routers
All of these
Advantages of ISDN internetworking are
Quality
Economy
Availability
All of these
None of these
ISDN can be accessed as per CCITT by using two service called
BRI(Basic Rate Interface)
PRI(Primary Rate Interface)
Both a & b
None of these
62kbps
63kbps
64kbps
65kbps