Вы находитесь на странице: 1из 160

CGI

1.

Full form of CGI


a.
b.
c.
d.

2.

The different ways to send data to the CGI program


a.
b.
c.
d.

3.

Forms
Status
Location
Gateways

Virtual Documents
`Dynamic document
Both of these
None if these

_____________ environment variable specifies the name of the web server host:
a.
b.
c.
d.

9.

cgi-debug
cgi-bin
cgi-jdk
cgi-jdbc

__________ are created dynamically in response to user request:


a.
b.
c.
d.

8.

.PL
.BL
.DL
PL

___________ works as an intermediary between the user and the server where direct access of information from the server
in not readable by the user
a.
b.
c.
d.

7.

CGI,
CGI,
CGI,
CGI,

Earlier, servers that were supporting CGI had provided a common directory named ___________ to store CGI program
a.
b.
c.
d.

6.

Interface between web server


External programs on the web server
Both a & b
None of these

The CGI programs are the files with extensions __________ or _________
a.
b.
c.
d.

5.

Arguments of the CGI program


Environment variables
Standard input
All of these

CGI is a set of rules that works as an __________________


a.
b.
c.
d.

4.

Computer Graphics Interface


Common Gateway Interface
Common Graphics Interface
Computer Gateway Interface

SERVER_NAME
WEB_SERVER
WEB_BROWSER
ALL OF THESE

CGI complete its program processing it passes the resultant data to the ___________;
a.
b.
c.
d.

Web browser
Web server
Server
All of these

10.

The web server then responds back to the _____________ accordingly:


a.
b.
c.
d.

11.

Web browser
Web server
Server
All of these

The data can be passed to CGI program in one of the following way:
a.
b.
c.
d.

Argument of the CGI program


Environment variable
Standard input
All of these

12. This information is sent to the CGI program in the ___________ environment program:
a.
Query_String
b.
QUERY_STRING
c.
QUERY STRING
d.
ALL OF THESE
13.

It specifies the name of host issuing request:


a.
b.
c.
d.

14.

It specifies the name of user issuing request:


a.
b.
c.
d.

15.

REMOTE_USER
REMOTE USER
Remote_user
None of these

It specifies the address of the system of the user issue the request:
a.
b.
c.
d.

16.

REMOTE_HOST
REMOTE HOST
Remote_host
None of these

REMOTE ADDR
Remote_Addr
Remote addr
REMOTE_ADDR

It specifies the request method used by the browser:


a.
b.
c.
d.

REQUEST METHOD
REQUEST_METHOD
Request}_method
None of these

17. The server does not mark the and of data with an ____________ character:
e.
COF
f.
BOF
g.
EOF
h.
NONE OF THESE
17.

The CGI program use __________ environment variable to read the data correctly:
a.
b.
c.
d.

18.

CONTENT_LENGTH
CONTENT LENGTH
Content _length
None of these

e.
The CGI output must consist of any of these ____________ header files:
a.
b.
c.

1
5
3

d.

19.

e.
Which are the header types :
a.
b.
c.
d.

20.

Radio button
Text fields
Check boxes
All of these

There is one dynamic information that is:


a.
b.
c.
d.

22.

Content-type
Location
Status
All of these

It contains a number of graphical widgets to get the information fro the user:
a.
b.
c.
d.

21.

Adc.com
abc.com
ABC.COM
ADC.COM

Advantages of CGI:
a.
b.
c.
d.

Platform independent
Language independence
Simplicity
All of these

23. CGI program also known as ___________


a.
CGI scripts
b.
Server side web programs

c.
d.

24.

Both of these
None of these

The major application of CGI are forms

a.
b.
c.
d.

Gateways
Dynamic document
Both of these
None of these

SMTP
This set of Computer Networks Questions & Answers focuses on SMTP.
1) When the mail server sends mail to other mail servers it becomes _____ ?
a) SMTP server
b) SMTP client
c) Peer
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
2) If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
View Answer
Answer: c
Explanation: None.
3) Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
View Answer
Answer: a
Explanation: None.
4) In SMTP, the command to write recievers mail adress is written with this command
a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the mentioned
View Answer

Answer: b
Explanation: None.
5) The underlying Transport layer protocol used by SMTP is
a) TCP
b) UDP
c) Either a or b
d) None of the mentioned
View Answer
Answer: a
Explanation: None.
6) Choose the statement which is wrong incase of SMTP
a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) None of the mentioned
View Answer
Answer: b
Explanation: The sending mail server pushes the mail to receiving mail server hence it is
push protocol.
7) Internet mail places each object in
a) Separate messages for each object
b) One message
c) Varies with number of objects
d) None of the mentioned
View Answer
Answer: b
Explanation: None.
8) Typically the TCP port used by SMTP is
a) 25
b) 35
c) 50
d) 15
View Answer
Answer: a
Explanation: None.
9) A session may include
a) Zero or more SMTP transactions

b) Exactly one SMTP transactions


c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
View Answer
Answer: a
Explanation: None.
10) Example of user agents for e-mail
a) Microsoft Outlook
b) Apple Mail
c)
d) All of the mentioned
View Answer
Answer: d
Explanation: None.
11) When the sender and the receiver of an email are on different systems, we need only
______ .
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAs
View Answer
Answer: d
Explanation: None.
12) User agent does not support this
a) Composing messages
b) Reading messages
c) Replying messages
d) All of the mentioned
View Answer
Answer: d
Explanation: None.

Data Communication And Networks 03


1. ISO stands for
a. International Organization for Standardization
b. Internet Organization for Standardization
c. International Organization Standardization
d. International for Organization Standardization

2. The main principle of layered architecture is


a.
b.
c.
d.

Separation of responsibility
Addition of responsibility
Subtraction of responsibility
None of these

3. Which type of network operating system in Novell Netware


a.
b.
c.
d.

Client
Server
Both a & b
None of these

4. How many layers a Novell Netware protocol stack uses


a.
b.
c.
d.

3
4
5
6

5. TCP/IP model is the _______ , which is used in the OSI model


a.
b.
c.
d.

Oldest protocol
Not so old protocol
Newly established protocol
None of these

6. In layered architecture, each layer is responsible for a ________ amount of work


a.
b.
c.
d.

Infinite
Finite
Large
None of these

7. Layering the communications process means breaking down the communication process
into______ and _____ to handle interdependent categories
a.
b.
c.
d.
8.

Smaller
Easier
Both a & b
None of these

The convention and rules used in such communications are collectively known as
a.
b.
c.
d.

Peer
Layer protocol
Network
None of these

9.

The entities comprising the corresponding layers on different computers are called
________ which communicate by using layer protocol
a.
b.
c.
d.

Peer
Layer protocol
Network
None of these

e.
10. OSI has two meanings refers to
a. OSI basic reference model
b. Protocol that are authorized by ISO
c. Both a & b
d. None of these
10. Network is the term used for a group of
a.
b.
c.
d.

protocols
layers
Both a & b
None of these

12. The groups of layers provides information to allows _________, which correctly obeys
the appropriate protocol
a.
b.
c.
d.

Hardware implementation
Software implementation
Both a & b
None of these

13. Which are never form a part of the architecture because they are not visible from the
outside
a.
b.
c.
d.

Interface specification
Implementation details
Both a & b
None of these

e.
14. The information exchanged between two computers is physically carried by means of
_________ with the help of certain coding method
a.
b.
c.
d.

Electronics signal
Electrical signal
Physical signal
Physical circuits

15. For two computers to reliably exchange data, they must have a
a. compatible implementation of encoding
b. interpreting data carrying electrical signals
c. Both a & b
d. None of these

16. Transmission media deals with the types of medium used , which is dictated by the
a.
b.
c.
d.

Desirable bandwidth
Immunity to noise
Attenuation properties
All of these

e.
17. The data communication process allocates memory resources, commonly known
as___________ for the sake of transmission and reception of data
a.
b.
c.
d.

Communication buffers
Communication media
Both a & b
None of these

ng computer must be capable of distinguishing between information


Carrying signal and mere noise
a. Error control
b. Logical channels
c. Routing
d. All of these
19. In error control, this corruption could be in the form of ________________
a.
b.
c.
d.

Noise
Electromagnetic interference
Both a & b
None of these

20. Protocols should provide at least ______ logical channels per connection
a.
b.
c.
d.

2
3
4
5

21. Data exchange can take place between any _____ workstations
a.
b.
c.
d.

1
2
3
4

22. Depending on the nature of the involved application in layered architecture, the dialog
type may be
a.
b.
c.
d.

Duplex
Half duplex
Simplex mode
All of these

23. The session recovery can be achieved by providing a

a.
b.
c.
d.

Checkpoint
Check mechanism
Character encoding
Terminal emulation

24. The check pointing circumvent session recovery requirement by retransmitting only the
a.
b.
c.
d.

Affected files
Saving time
Bandwidth
All of these

e.
25. Some good examples of presentation problems are the existing incompatibilities
between the__________ standard of character encoding
a.
b.
c.
d.

26.

ASCII
EBCDIC
Both a & b
None of these

e.
This is the entities in the same layers but on different computers
a.
b.
c.
d.

Peer entities
Entities
Service provider
SAP

27. Which function of the layer provides certain services


a.
b.
c.
d.

Peer entities
Entities
Service provider
SAP

28. Which function of the layer uses certain services


a.
b.
c.
d.

Peer entities
Entities
Service provider
Service user

29. Which is the point from where services can be accessed .each point is the unique
address
a.
b.
c.
d.

Peer entities
Entities
Service provider
SAP

30. Which are the active elements such as processes, IO chips in every layers
a. Peer entities

b. Entities
c. Service provider
d. SAP
31. Which is the reliable connectionless service with acknowledgement
a.
b.
c.
d.
32.

Registered E-mail
Junk E-mail
Both a & b
None of these

Which is the unreliable connectionless service without acknowledgement


a.
b.
c.
d.

Registered E-mail
Junk E-mail
Both a & b
None of these

e.
33. In which model, Request-reply command is example of connectionless service
a.
b.
c.
d.
34.

Client-server model
User model
Server model
None of these

Which service is specified by a set of primitives available to a service user to


interact with the service provider
a.
b.
c.
d.

connection-oriented
connectionless
Both a & b
None of these

35. Which are parameters to define conditions


a.
b.
c.
d.

Protocol
Primitives
Confirmed service
SAP

36. A confirmed services is defined with a


a.
b.
c.
d.
e.
f.

Request
Confirm
Response
Indication
Primitives
All of these

g.
37. The Service primitives are the part of

a.
b.
c.
d.

Protocol
Primitives
Confirmed service
SAP

38. An unconfirmed is defined with a


a.
b.
c.
d.
e.
f.

Request
Indication
Confirm
Response
Both a & b
All of these

39. Which are the distinct concepts and are important to release connections between
sender and receiver
a.
b.
c.
d.

Services
Protocol
Both a & b
None of these

e.
40. Which is provided to the upper layer by an immediate lower layer
a.
b.
c.
d.

Protocol to service
Service to protocol
Service primitives
None of these

41. The characteristic of each layer are as


a.
b.
c.
d.
e.

Name
Content
Function
Total no of layers depend on type of network
All of these

f.
42. The basic function of each single layer is to provides service to the
a.
b.
c.
d.

Layer of the top


Layer of the bottom
Layer above it
Layer below it

43. ________ the protocol can make communication between the two either difficult or
impossible
a.
b.
c.
d.

Breaching
Branching
Broaching
Brunching

44. The network architecture can be termed as a


a.
b.
c.
d.

Set of layers
Set of protocols
Set of machines
Both a & b

45. The hectic task of designing the whole network can be distributed in the
a.
b.
c.
d.

Smaller
Easier
Simpler design problems
All of these

46. Which is the computers from the same manufacturer it was not possible to run
both_______ solution and _______ simultaneously
a.
b.
c.
d.

IBM
DEC
Both a & b
None of these

47. ISO-OSI reference model these could only be run one at a time by the end__________
a.
b.
c.
d.

1969s
1971s
1970s
1972s

48. Which is a reliable connection-oriented service has two subparts


a.
b.
c.
d.

Message sequences
Byte streams
Both a & b
None of these

e.
49. Which is similar to postal system where every message contains the complete
destination address and is mapped through the system, free of all the others
a.
b.
c.
d.

Connection-oriented services
Connectionless services
Both a & b
None of these

50. The various types of services provided by the interface to the layers above them are
listed as follows
a.
b.
c.
d.

Connection-oriented services
Connectionless services
Both a & b
None of these

51. The connectionless services can be further sub-divided into many categories
a.
b.
c.
d.

Unreliable datagram
Acknowledged datagram
Both a & b
None of these

52. Unreliable connectionless service can be also termed as


a. Datagram service
b. Data service
c. Byte stream service
d. None of these
53. By the end of _________, the Open System Interconnection model was developed by
the International Organization for Standardization to break the barrier
a.
b.
c.
d.

1980
1970
1990
1960

54. The first and the lowest layer is called the ___________________________
a. Physical layer
b. Supporting rules for low-level signaling
c. Hardware implementation
d. All of these
55. The seventh and the highest layer is the application layer that deals with the
a.
b.
c.
d.

User interface
Applications
Both a & b
None of these

56. In moving from layer one to layer seven, the level of abstraction ________
a.
b.
c.
d.

Increases
Decreases
May be increases or decreases
None of these

e.
57. The first layer deals with the actual ____________
a. Hardware of networks
b. The specific methods of sending bits from one device to another
c. Both a & b
d. None of these
57. The second layer also deals with ________________
a. Signaling
b. Hardware
c. Both a & b

d. None of these
e.
59. The transport layer is the one, which links the communication process to this
_________________
a.
b.
c.
d.

Hardware-oriented protocol
Software-oriented protocol
Both a & b
None of these

60. Which is collectively known as a protocol data unit(PDU)


a.
b.
c.
d.

Data
Header
Both a & b
None of these

61. The seventh layer does not deal with __________ concepts very much
a.
b.
c.
d.

Hardware
Even operating system
Both a & b
None of these

62. The basic philosophy of the seven-layer model is that each layer may be defined
a. Dependently of every other layer
b. Independently of every other layer
c. Dependent on same layer
d. None of these
63. The seven layers of the OSI model are categorized into ________ groupings
a.
b.
c.
d.

2
3
4
5

64. The lower layers are layers


a.
b.
c.
d.

1,2,3
1,2,3,4
1,2,3,4,5
2,3,4,5,6

65. The upper layers are layers


a.
b.
c.
d.

5,6
5,7
6,7
5,6,7

66. The lower layers are implemented by using ______________ with the incidence of
hardware reducing to software from layer 1 to layer 4

a.
b.
c.
d.

Software
Hardware
Both a & b
None of these

e.
67. The upper layers are not expected to know anything about ____________
a.
b.
c.
d.

Networking
Network addresses
Both a & b
None of these

68. The bottom four layers take the responsibility of _________________


a.
b.
c.
d.

Networking
Network addresses
Both a & b
None of these

e.
69. The OSI interface is a process of communication between adjacent layers in which data
is passed between
a.
b.
c.
d.

Layer n
Layer n-1
Layer n+1
All of these

70. The layers 3 and 4 interface are used by protocol to _____________


a.
b.
c.
d.

Pass control
Pass Data information
Both a & b
None of these

71. This refers to communication up and down the protocol stack every time any data is
sent received across the network
a.
b.
c.
d.

Vertical communication
Horizontal communication
Protocols
OSI interfaces

72. Which is a communication process running at a particular layer on one host machine
can accomplish logical communication with a similar process running at the same layer
on another host machine
a. Vertical communication
b. Horizontal communication
c. Protocols
d. OSI interfaces
73. Which OSI model supports the interconnection of different implementations of various
autonomous layers

a.
b.
c.
d.

Modularity
Inter-layer interactions
Both a & b
None of these

e.

74. The functions of the OSI layer model are

1
2
3
4
5
6
7

Layers
Physical
Data link

Functions
It moves bits between devices by using media
It tends to assemble packets into bytes and bytes into frames and
provides access to media by using MAC address
Network
It is responsible for providing logical addressing which routers use for
path determination and routing
Transport
It provides reliable or unreliable delivery and performs error correction
before retransmit. It is also responsible for end-to-end connection
Session
It aims to keep different applications data separately and provides dialog
control
Presentation
It provides rules to present data, handle processing like encryption,
compression and translation services
Application
It aims to provide a user interface like file, print, message, database and
application services
75. A number of transmission media exist, some of them are
a.
b.
c.
d.
e.
f.

Open wire circuits


Twisted pair cables
Coaxial cables
Fiber optic cables
Wireless
All of these

76. The physical layer specifies the representation of each bit as a


a.
b.
c.
d.

Voltage
Current
Phase or frequency
All of these

77. The physical layer uses four types of bit signaling approaches these are
a. RZ(return to zero) by using pulse signaling
b. NRZ(non return to zero) transmission by using level signaling
c. Manchester encoding by using phase signaling

d. NRZ-I(non return to zero-invertive) by using bandwidth


e. All of these
78. What are the two types of systems that are used to provide timing signal
a.
b.
c.
d.

Asynchronous communications
Synchronous communications
Both a & b
None of these

79. The timing signal identifies the boundaries between the


a.
b.
c.
d.

Bytes
Bits
Gigabyte
Megabyte

80. Which bit stream is to be transmitted with the objective that when the sending side
sends _____ bit
a.
b.
c.
d.

1
0
1,0
None of these

81. Which bit stream is to be transmitted with the objective that when the received by the
receiving side as 1 bit, not as ___ bit
a.
b.
c.
d.

1
0
1,0
None of these

82. It defines the electrical and mechanical aspects of interfacing to a physical medium for
transmitting data ________________________________
a.
b.
c.
d.

As well as setting up
Maintaining
Disconnecting physical links
All of these

83. The functions of the physical layer are


a. Describing hardware specifications
b. Encoding and signaling
c. Data transmission and reception
d. All of these
84. The physical layer supports various encoding and signaling functions to convert data,
from bit stream to frame and vice versa, to send across the network
a.
b.
c.
d.

Describing hardware specifications


Encoding and signaling
Data transmission and reception
None of these

85. What is an example of a physical layer definition


a.
b.
c.
d.

RS-323C/D
RS-232C/D
RS-233C/D
RS-322C/D

86. Examples of data link layers are


a.
b.
c.
d.

HDLC
Ethernet
Both a & b
None of these

87. The functions of the data link layer are


a. Logical Link control(LLC)
b. Media Access Control(MAC)
c. Data framing
d. Addressing
e. Error detection and handling
f. All of these
88. The data link layer also deals with the issue of addressing what is popularly known as
a.
b.
c.
d.

Hardware
Address
MAC address
All of these

89. Some of the examples of MAC are


a. CSMA/CD for Ethernet
b. Token passing for the Token Ring network
c. Both a & b
d. None of these
90. The functions of the Network layer are
a.
b.
c.
d.
e.

Logical addressing
Routing
Datagram encapsulation
Fragmentation and reassembly
All of these

91. The routing of network layer may be


a.
b.
c.
d.

Static
Dynamic
Both a & b
None of these

e.
92. The network layer uses which service for delivering packets across the network
a. Connection-oriented
b. Connectionless service

c. Both a & b
d. None of these
93. In broadcast network ,the routing problem is ________, so the network layer is often
thin or even nonexistent
a.
b.
c.
d.

Complex
Simple
Both a & b
None of these

94. The transport layer provides the necessary function to enable communication between
_____________ processes on different computers
a.
b.
c.
d.

Software application
Hardware application
Both a & b
None of these

e.
95. The transport layer accepts data from the ______ and splits it up into smaller units so
that it can be passed to the network layer
a.
b.
c.
d.

Network layer
Session layer
Presentation layer
Physical layer

96. Which protocol uses the transport layer


a.
b.
c.
d.

FTP
TFTP
HTTP
TCP/IP

97. The functions of transport layer are


a. Process-level addressing
b. Multiplexing and de-multiplexing
c. Segmentation, packaging and reassembly
d. Connection establishment , management and termination
e. Acknowledgements and retransmission
f. Flow control
g. All of these
98. The session layer is responsible for _______________ the dialogues between
communicating applications
a.
b.
c.
d.
e.

Establishing
Maintaining
Arbitrating
All of these

99. The session layer provides enhanced useful services in some applications such as
a. Remote login
b. Remote file transfer
c. Both a & b
d. None of these
100.

Some examples of APIs are


a.
b.
c.
d.

NetBIOS
TCP/IP sockets
Remote Procedure Calls (RPCs)
All of these

101.
Which enable an application to complete specified high level communications
over the network successfully and easily with the help of a standardized set of services
a. RPCs
b. APIs
c. TCP/IP
d. All of these
102.

The data link layer is also known as


a.
b.
c.
d.

103.

Link layer
Data layer
Open layer
None of these
Some example of data link layers are

a.
b.
c.
d.

HDLC
Ethernet
Both a & b
None of these

104.
Which provides link to many wireless and wired local area networking (LAN)
like Ethernet ,FDDI, IEEE802.11 etc to function
a.
b.
c.
d.
105.
link

Which layer is responsible for the reliable transfer of data across the physical

a.
b.
c.
d.
106.

Physical layer
Data link layer
Transport layer
Presentation layer

Physical layer
Data link layer
Transport layer
Presentation layer
The responsibility of data link layer include functions such as

a.
b.
c.
d.
e.
f.
g.

Data flow control


Breaking the input data
Frame formatting
Transmission of the frame sequence
Error detection
Link management
All of these

107.
Which layer performs functions relative to the syntax and semantics of the
information transmitted
a.
b.
c.
d.
108.

Physical layer
Data link layer
Transport layer
Presentation layer
The types of data handling issue that presentation layer provides are as follows

a.
b.
c.
d.

Translation
Compression
Encryption
All of these

109.
In translation, different types of computers like _____________in an Internetwork have many distinct characteristics and represent data in different ways
a.
b.
c.
d.
e.
110.

Which layer allows the user to use the network


a.
b.
c.
d.

111.

Physical layer
Data link layer
Application layer
Presentation layer
The application layer provides network-based services to the user are

a.
b.
c.
d.
e.
f.
g.
112.

PCs
Macintoshes
UNIX systems
AS/400 servers
All of these

Distributed database
Electronic mail
Resource sharing
File transfer
Remote file access
Network management
All of these
Which layer provides user interface to communicate with a computer

a. Physical layer
b. Application layer

c. Transport layer
d. Presentation layer
113.

The most popular application layer protocols are


a.
b.
c.
d.
e.
f.

HTTP, FTP
SMTP, DHCP
NFS, Telnet
SNMP, POP3
NNTP, IRC
All of these

114.
Which model is considered the oldest protocol of all computer networks like
the ARPANET and its successor, the Internet
a.
b.
c.
d.

TCP/IP Reference model


SMTP model
Telnet model
NNTP model

e.
115.
Most users rely on ______ for the purpose of file transfers, electronic mail(email) and remote login services
a.
b.
c.
d.

116.

e.

a.
b.
c.
d.
117.

How many layers TCP/IP model has


2
3
4
5
TCP/IP layer specifies the __________ layer

a.
b.
c.
d.
118.

Physical layer
Application layer
Transport layer
Presentation layer
TCP/IP defines a four-layer model consisting of the

a.
b.
c.
d.
e.
119.

TCP/IP
SMTP
DHCP
NFS

Internet layer
Transport layer
Application layer
Network interface layer
All of these
TCP/IP architecture is based on the three sets of interdependent processes are

a.
b.
c.
d.

Application-specific processes
Host-specific processes
Network-specific processes
All of these

120.
Which TCP/IP standards define protocols for TCP/IP networks for layer two
implementation to fill the gap between the network layer and the physical layer
a. Serial Line Internet Protocol(SLIP)
b. Point-to-Point Protocol(PPP)
c. Both a & b
d. None of these
121.
The Internet layer of the TCP/IP matches with the which layer of the OSI model
a.
b.
c.
d.
122.

The Packet format and protocol at internet layer is called


a.
b.
c.
d.

123.

124.

IP
ICMP
RIP
BGP
All of these
Which protocols are found in a Network interface Layer of TCP/IP model

a.
b.
c.
d.
e.

a.
b.
c.
d.
126.

Network protocol
Internet protocol
OSI protocol
None of these
Which protocols are found in a Internet Layer of TCP/IP model

a.
b.
c.
d.
e.

125.

Network layer
Physical layer
Session layer
Data link layer

Ethernet
FDDI
Token Ring
All of these

Which protocols are found in a Transport Layer of TCP/IP model


TCP
UDP
FDDI
Both a & b
Which protocols are found in a Application Layer of TCP/IP model
a. FTP
b. TFTP
c. SMTP

d.
e.
f.
g.

127.

NFS
TELNET
SNMP
All of these

h. None of these
The UDP Protocols are
a.
b.
c.
d.

Reliable
Connection-oriented
Connectionless
Unreliable
i. Both a & b
ii. Both c & d
iii. None of these
Which protocols are found in the application layer

128.
a.
b.
c.
d.

Numerous
UDP
TCP
IP

129.
Which other function include __________________and identification of port
number
a.
b.
c.
d.
130.

Sequence control
Error recovery and control
Flow control
All of these
TCP layer is a

a.
b.
c.
d.

Service
Connection type service
Connectionless type service
None of these

131.
The basic functions of application layer are _____________ that wish to
communicate with one another
a. To identify the source machine
b. To identify the destination machine
c. Both a & b
d. None of these
132.
The Internet has definite standards for FTP that connects to a
a.
b.
c.
d.
133.

Remote machine
Sends an arbitrary file
Fetches an arbitrary file
All of these

FTP addresses the


a. Issues of authentication

b. Listing of directory contents


c. ASCII or binary files
d. All of these
134.
Another aspect of the application layer is to __________ ,this application is
called telnet
a.
b.
c.
d.

Login remotely
Logout
Remotely
None of these

135.
TCP connection with another location and then pass keystrokes from the
_______
a. Remote host to local host
b. Local host to remote host
c. remote host to remote host
d. Local host to Local host
136.
Similarly, there are many other applications such as NNTP enabling
communication between a ___________
a.
b.
c.
d.
137.

News server
News client
Web(HTTP)-based protocol for communication on the WWW
All of these
FTP is among the oldest protocols used in the_____

a.
b.
c.
d.

Internet
Web
Both a & b
None of these

138.
Which is a file server access protocol that enables a user to transfer files
between two hosts
a.
b.
c.
d.

SMTP
TCP
FTP
NNTP

139.
FTP is widely available on almost all-browsers indicating that all computing
platforms, including _________
a. DOS
b. OS/2
c. UNIX and up to the mainframe level have this service available
d. All of these
140.
Which dose not require any familiarity with the remote operating system
a.
b.
c.
d.

SMTP
TCP
FTP
NNTP

e.
141.

Modern FTP servers known as _______


a.
b.
c.
d.

142.

FTPD support two different TCP connections namely_______


a.
b.
c.
d.

143.

TCPD
FTPD
SMTD
CTPD

e.

a.
b.
c.
d.
144.

Control connection
Data connection
Both a & b
None of these

Which is invoked for the entire duration of transfer of file or FTP session
Control connection
Data connection
Both a & b
None of these
Which connection is establish as and when it is required
a.
b.
c.
d.

Control connection
Data connection
Both a & b
None of these

e.
145.
The main function of data connection is to facilitate transfer of file and
directory to and from the________

145.

a.
b.
c.
d.

Clients at the servers request


Clients at the clients request
Server at the servers request
Server at the clients request
TFTP stands for

a.
b.
c.
d.

Transfer file trivial protocol


Transfer file transfer protocol
Trivial file trivial protocol
Trivial file transfer protocol
145.
Which is also an internet service intended for the transfer of files from one
computer to another over a network
a.
b.
c.
d.
148.

TFTP
FTP
Both a & b
None of these
TFTP does not provide _____________

a.
b.
c.
d.
149.

TFTP is simpler than the ___________ but less capable


a.
b.
c.
d.

150.

e.

a.
b.
c.
d.
152.

Electronic message
Electronic mail
Electric mail
None of these

Electronic mail works like an


Post mail
Postal mail
Post card
None of these
E-mail has two parts namely

a.
b.
c.
d.
153.

FTP
SMTP
NNTP
FTPD
Which is one of the most popular network services

a.
b.
c.
d.

151.

Password protection
User directory capability
Both a & b
None of these

User agent
Message Transfer agent
Both a & b
None of these

MTA stands for


Message Transmission Agent
Machine Transfer Agent
Message Transfer Agent
Mobile Transfer Agent
154.
Which is a software package that transports the message created by a user to
destination mailboxes possibly on remote machines
a.
b.
c.
d.

a.
b.
c.
d.
155.

User agent
MTA
Both a & b
None of these

The MTA has to perform more complex jobs than other applications
a. MTA distinguishes between local and remote recipients
b. MTA needs to deliver copies of a message to several machines
c. MTA allows mixing of text, voice appending documents, files and video in a
message

156.

d. MTA handles temporary failures when a destination machine is temporarily


unavailable
e. All of these
In MTA, e-mail address consist of the following components
a.
b.
c.
d.

157.

Which is the user interface to the mail system


a.
b.
c.
d.

158.

Mailbox names
Symbolic names
Group names(mail exploders)
All of these

User agent
MTA
Both a & b
None of these

Which refers to the name of a service rather than a specific user


Mailbox names
Symbolic names
Group names(mail exploders)
All of these
159.
Which refers to an alias for a set of recipients, that consults an internal
database to specify the mail addresses
a.
b.
c.
d.

a.
b.
c.
d.

Mailbox names
Symbolic names
Group names(mail exploders)
All of these

160.
There are a number of e-mail packages available. Some of them are free like
____________________, while some are paid
a.
b.
c.
d.

Google mail
Yahoo mail
Hotmail
All of these

161.
In MTA, all of them are also not alike but most of the e-mail software have
common basic functionality these are
a. Send and receive mail messages
b. Save your messages in a file
c. Print mail messages
d. Forward a mail message to other recipients
e. Reply to mail messages
f. Attach a file to a mail message
g. All of these
162.
E-mail address has three parts
a. A user identity or name
b. An at sign(@)
c. The domain name, which basically specifies the address of the users mail
server
d. All of these

163.

SMTP is the ________ standard for an electronic mail service provider


a.
b.
c.
d.

164.

SMTP uses ______ transport for the reliably delivery of mail messages
a.
b.
c.
d.

165.

FTP
TCP
MTA
FTPD
The SMTP server also allows _____

a.
b.
c.
d.
166.

NNTP
Telnet service
FTPD
none of these
SMTP can be considered as a complement of ______

a.
b.
c.
d.
167.

UUDP
UUCP
UCCP
UCPD
SMTP commands consist of human-readable __________

a.
b.
c.
d.
168.

dee facto
de facto
de fact
none of these

EBCDIC strings
ASCII strings
Both a & b
None of these

MIME stands for


Multipurpose Internet Machine Extensions
Multiprogramming Internet Machine Extensions
Multipurpose Internet Mail Extensions
Multipurpose Internet Mail Exchange
169.
________ standards were used to encode binary files for transfer through SMTP,
which has now become a standard with its varied version
a.
b.
c.
d.

a.
b.
c.
d.

170.

e.

FTPD
FTP
MIME
UUCP

POP3 stands for


a. Postal Office Protocol
b. Post Office Protocol

170.

c. Post Office Program


d. Posting of Protocol
IMAP stands for
a.
b.
c.
d.

Internet Machine Access Protocol


Internet Message Access Protocol
Internet Multipurpose Access Protocol
Inkjet Message Access Protocol
Which one is a push kind of protocol

a.
b.
c.
d.

SMTP
POP3
IMAP
All of these

170.

173.

Which one is a pull kind of protocol


a.
b.
c.
d.

174.

SMTP
POP3
IMAP
Both b & c
Telnet can also be used to connect other ports serving as _____________

a.
b.
c.
d.

User-defined services
Well-known services
Both a & b
None of these

175.
Telnet works as a _____________ model where it establishes a virtual
connection by using the TCP transport protocol
a.
b.
c.
d.

176.

176.

e.

User-defined
Well-known
Client-server
All of these

The Telnet program requires two arguments

a.
b.
c.
d.

The name of a computer on which the server runs


The protocol port number of the server
Both a & b
None of these
______________ to support centralized terminal management can support

a.
b.
c.
d.
e.

Transfer binary data


Support byte macros
Emulate graphics terminals
Convey information
All of these
Telnet service is unique in the manner that is ___________ like other TCP/IP

176.
services

a.
b.
c.
d.
179.

Platform-specific
Not platform-specific
Platform-service
None of these
0Some of the Telnet commands are as follows

Interrupt Process(IP)
Abort output(AO)
Are You there(AYT)

It terminates the running program


It refers to discarding of any buffered output
This command allows a client to send an out-of-band query to verify
whether the remote end is still there
Erase character(EC)
It refers to the erasing of the previous character
Erase line(EL)
It deletes the entire current line
Synchronize
It clears the data path to the remote party
Break
It is equivalent to the BREAK or ATTENTION key
180.
Novell NetWare is a ___________ network operating system that was created
by Novell, Inc
a.
b.
c.
d.
181.

Novell NetWare uses a protocol stack having _____


a.
b.
c.
d.

182.

Client type
Server type
Both a & b
None of these

3 layers
4 layers
5 layers
6 layers

IPX stands for


Internet Packet Exchange
Inter-network Packet Exchange
Inter-network Protocol Exchange
Internet Package Exchange
183.
_______ is a networking protocol used by the Novell NetWare operating systems
for performing connectionless communication
a.
b.
c.
d.

a.
b.
c.
d.

NVT
IPX
IP
FTP

184.
The rise 1985 saw the rise of Novell NetWare when _____________ were
launched
a. NetWare 286 2.0a
b. Intel 80,286 16-bit processor
c. Both a & b
d. None of these
185.
Two methods of operation were supported by NetWare 286 2.x namely are
a. Dedicated
b. Non-dedicated

c. Both a & b
d. None of these
e.
186.
Beginning with NetWare 3.x, assistance for _____ protected mode was
included, removing the 16MB memory limit of NetWare 286
a.
b.
c.
d.

16-bit
32-bit
64-bit
128-bit

187.
Which managed all functions and was activated at startup or at the time of
requirement
a. NLM(NetWare Loadable Module)
b. FTP
c. SMTP
d. FTPD
188.
A set of protocols used in the communication network can be termed as
a.
b.
c.
d.

189.

e.

a.
b.
c.
d.

190.

e.

a.
b.
c.
d.

Protocol
Protocol stack
Protocol layer
None of these

According to RFC 1122 the TCP/IP consists of ________


2 layers
3 layers
4 layers
5 layers

The lowest layers of the TCP/IP establishes communication with


Upper layer
Physical media
Next layer
Protocol

191.
When data travels downwards from upper the layer in TCP/IP, each upper layer
attaches a
a.
b.
c.
d.

Footer
Header
Standard
None of these

e.
192.
After the transmission of data in bit form to another machine it travels upward,
____________ the header till data reaches the application layer

a.
b.
c.
d.

Stripping in
Stripping off
Tackling off
Tackling in

e.
193.

In which year, Netware directory service were added to the Netware version 4
a.
b.
c.
d.

194.

In which year. Version 4.11 was launched by Novell


a.
b.
c.
d.

195.

1993
1996
1998
2001
In which year, NetWare5 was launched in October

a.
b.
c.
d.
196.

1993
1996
1998
2001
In which year, NetWare6 was launched

a.
b.
c.
d.

197.

1993
1996
1998
2001

e.

a.
b.
c.
d.

1993
1996
1998
2001

Every protocol with a certain from of contact is known as


Protocol stack
Protocol suite
Stack
Suite

198.
Which is a file server access protocol that enables a user to transfer file
between two hosts, across the network or Internet using TCP
a.
b.
c.
d.

FTPD
FTP
Telnet
PPP

199.
Which is a remote terminal protocol that enables a user at one location to
establish a TCP connection with another location

a.
b.
c.
d.

FTPD
FTP
Telnet
PPP

200.
Which protocol is used by network computers operating system for sending
error messages

a.
b.
c.
d.

FTPD
FTP
Telnet
ICMP

1.

In which year the internet is founded:

a.
b.
c.
d.

1969
1990
1972
1995

2.

Who founded the internet:

a.
b.
c.
d.

Department of defense, India


Department of defense, USA
IBM
Apple

3.

The word internet derived from:

a.
b.
c.
d.

Interconnection
Network
Both of these
None of these

4.

When millions of computers linked worldwide from 200 computers:

a.
b.
c.
d.

In 1970
In 1980
In 1979
In 1990

5.
a.
b.
c.
d.
6.

Arpanet is stands for:


Advanced research projects agency network
Apple research projects agency network
Apple research protocol agency network
Advanced research projects agency net connection
In which year NSF created new network of computer:

a.
b.
c.
d.

In 1980
In 1990
In 1995
In 1999

7.
a.
b.
c.
d.
8.

NSF is stands for:


National science foundation
National social foundation
Network science foundation
Network social foundation
The concept of web begin which research center:

a.
b.
c.
d.

CERN
CARN
AOL
NSF

9.

Www is stand for:

a.
b.
c.
d.

World wide web


World wide website
World wide windows
Window wide web

10. CERN is stand for:


a.
European center nuclear research
b.
Center European nuclear research
c.
European center national research
d.
None of these
11. In which year the concept of web are begin:
a.
b.
c.
d.

1968
1980
1989
1890

12. URL is stand for:


a.
b.
c.
d.

Uniform research location


Uniform research locator
Universal research locator
None of these

e.
13. AOL is stand for:
a.
b.
c.
d.

Australia online
America online
Both of these
None of these

14. A web browser use which protocol:


a.
b.
c.
d.

FTP
PPP
HTTP
All of these

15. Computer are also known as:


a.
b.
c.
d.

Web page
Web browser
Web servers
None of these

16. Some of the popular web portals used today are:


a.
b.
c.
d.

Yahoo.com
Rediff.com
Indiatimes.com
All of these

17. Modems parts:


a.
b.
c.
d.

2
3
4
5

18. Name of the modems parts:


a.
b.
c.
d.

Internal modem
External modem
Both of these
None of these

19. which modem are cabled between the computer and phone:
a.
b.
c.
d.

Internal modem
External modem
Both of these
None of these

20. ISP is stand for:


a.
b.
c.
d.

Internet service provider


Internal service provider
Internet search protocol
Internet service protocol

21. MTNL is stand for:


a.
Mumbai Telephone Nigam limited
b.
Mahanagar Telephone Nigam limited
c.
Mahan agar telephone Nagar limited
d.
None of these
22. VSNL is stand for:
a.
b.
c.
d.

Videsh Sanchar Nigam Limited


Videsh Service Nigam Limited
Videsh Sanchar Nagar Limited
None of these

23. ISDN is stand for:

a.
Integrated Sanchar Digital Network
b.
Integrated Service Digital Network
c.
Internet Service Digital Network
d.
Internet Speed Digital Network
24. DSL is stand for:
a.
b.
c.
d.

Digital Subscriber Line


Digital Search Line
Digital Search Limited
None of these

25. Leased-line is providing high speed internet access ranging from:


a.
b.
c.
d.

3.4 kbps to 45mbps


1.4 kbps to 45mbps
2.4 kbps to 45mbps
None of these

26. TCP is stand for


a.
Transport Control Protocol
b.
Transmission Communication Protocol
c.
Transmission Control Protocol
d.
Transmission Computer Protocol
27. What is TCP/IP
a.
b.
c.
d.

Set of devices
Set of protocol
Set of component
All of these

28. IP stand for


a.
b.
c.
d.

International Protocol
Interconnection Protocol
Interwork Protocol
Internet Protocol

29. IP is the type of protocol.


a.
b.
c.
d.

a.
b.
c.
d.

Unreliable
Connectionless
Both of these
None of these

30. NNTP stand for:


Network News Transfer Protocol
Netconnection News Transfer Protocol
Network Netnews Transfer Protocol
Netconnection News Transfer Protocol
31. What the use of NNTP:
a.
Mange the communication b/w client and server
b.
Mange the components of computer
c.
Mange the news posted on newsgroups
d.
All of these
32. Types of URL:
a.
b.
c.
d.

1
2
3
4

33. Name of the URL types :


a.
b.
c.
d.

Absolute URL
Relative URL
Both of these
None of these

34. DNS stand for :


a.
b.
c.
d.

Domain Name Source


Domain Name System
Description Name System
None of these

35. ________ facilitates the access of hypertext document :

a.
b.
c.
d.

TCP/IP
FTP
NNTP
HTTP

36. ________ is transfer file from one system to another.


a.
b.
c.
d.

NTTP
HTTP
FTP
TCP/IP

37. Why we use the domain name:


a.
b.
c.
d.

Difficult to remember
Difficult to write
Both of these
None of these

38. A browser support multimedia data, which are as follows:


a.
b.
c.
d.

Native support
Plug ins
Helper programs
All of these

39. Which of these searches new terms on internet and stores the searched terms in a database?
a.
b.
c.
d.

Crawler
Indexer
Search algorithm
None of these

40. Some of the common security threats are:


a.
b.
c.
d.

Password cracking
Email spoofing
Virus intrusion
All of these

41. Website is a collection of:


a.
b.
c.
d.

Web server
Web pages
Web browser
Www

42. Web browser is a:


a.
b.
c.
d.

S/w application
H/w application
Both of these
None of these

43. SMTP is used for:


a.
Sending mail from one machine to another
b.
Transfer news message from one machine to another
c.
Transfer file from one to another
d.
None of these
44. A newsgroup is also known as:
a.
b.
c.
d.

Telnet
USENET
NNTP
SMTP

45. A homepage is also called:


a.
b.
c.
d.

Web browser
Website
Web pages
Index pages

46. a protocol is referred to as:


a.
b.

The formal set of rules & convention


The formal set of application

c.
d.

Both a & b
None of these

47. Telnet is derived from word:


a.
b.
c.
d.

Telecommunication & network


Telemail & network
Teleline & Networking
None of these

48. Mailing list is also called:


a.
b.
c.
d.

Mailserv
Listserv
Fileserv
Saveserv

49. Every machine on the internet is assigned a unique ip address, which is


a.
b.
c.
d.

16-bit numeric address


32-bit numeric address
64-bit numeric address
8-bit numeric address

50. Two subsystem of an e-mail system


a.
b.
c.
d.

MBA and MLA


MUA and MTA
MNA and MBA
MCA and MBA

51. The first web portal was:


a.
b.
c.
d.

APL
AOL
Rediff.com
Yahoo.com

52. Linux is a web browser:


a.
b.
c.
d.

Text based
Graphical based
Both a & b
None of these

53. Http is based on the concept of :


a.
b.
c.
d.

User server
Web server
Client server
None of these

54. The unique address of each web page is called as:


a.
b.
c.
d.

URL
FTP
HTML
FIIT

55. MUA is a program used for:


a.
b.
c.
d.

Transfer email from one system to another


Send receive mails
Send, receive and manage mails
None of these

56. If ftp has the permission to access remote machine then one cana.
b.
c.
d.

Upload files
Download files
A&b
None of these

57. Telnet was developed in:


a.
b.
c.
d.

1965
1970
1960
None of these

58. IP address no. Can range from:


a.
b.
c.
d.

0 to 64
0 to 255
0 to 289
0 to 169

59. IP address is written as a string of _____ numbers separated by dots(.)


a.
b.
c.
d.

Four
Three
Two
One

60. NVT is stand for:


a.
Network virtual terminal
b.
Network virtual transfer
c.
Network virtual telecommunication
d.
None of these
61. Some popular search engine are:
a.
b.
c.
d.

Alta-vista
Goggle
Yahoo
All

a.
b.
c.
d.

Info
Error
Permission
None of these

63. Ftp servers allow user to use a method called:


a.
b.
c.
d.

Anonymous ftp
Synonymous ftp
Fetch ftp
None

64. The relationship b/w the ip addresses and the domain names is maintained by an internet service called the:

a.
b.
c.
d.
1.
a.
b.
c.
d.
2.
a.
b.
c.
d.
3.
a.
b.
c.
d.
4.
a.
b.
c.
d.
5.
a.
b.
c.
d.
6.
a.
b.
c.
d.
7.
a.
b.
c.
d.
8.
a.
b.
c.
d.
9.
a.
b.
c.
d.
10.
a.
b.
c.
d.
11.
a.
b.
c.
d.
12.
a.
b.
c.
d.
13.
a.
b.
c.
d.
14.
a.
b.
c.
d.
15.
a.

IP
DNS
URL
None
HTML stands for;
Hyper text marker language
Hyper tab marker language.
High transfer markup language
Hyper text markup language
Html is used for:
Hardware programming
Software programming
Web programming
All of these
Tags are used to describe:
Web page
Wed site
Web size
None of these
Html code contains:
Tags
Attributes
Elements
All of these
To create and view an html document, which tools are used:
Text editor
Web browser
Both a and b
None of these
Html document must always be saved with:
.html
.htm
.doc
Both a &b
How many levels of headings are in html:
2
7
6
4
Break element is used to insert :
A new line
New text
A blank line
None of these
To insert blank lines, which tags are used:
<p>
<bk>
<br>
<ba>
To centralize any text, it is simply enclosed within:
<center>
<cen>
<centr>
<cent>
Horizontal rule element is used to divide the webpage into:
Two sections
Separate sections
Four sections
All sections
Text level elements affect the :
Size of text
Style of text
Color of text
Appearance of the text
Logical elements can be used in the webpage:
Only two times
Seven times
Any number of times
None of these
Logical elements indicate __________of the webpage
Logical description
General description
Both a &b
None of these
The size attribute specifies the font size on a scale, ranging from:
1 to7

b.
c.
d.
16.
a.
b.
c.
d.
17.
a.
b.
c.
d.
18.
a.
b.
c.
d.
19.
a.
b.
c.
d.
20.
a.
b.
c.
d.
21.
a.
b.
c.
d.
22.
a.
b.
c.
d.
23.
a.
b.
c.
d.
24.
a.
b.
c.
d.
25.
a.
b.
c.
d.
26.
a.
b.
c.
d.
27.
a.
b.
c.
d.
28.
a.
b.
c.
d.

2 to 11
7 to 16
11 to 21
How many times should basefont element be used in the entire webpage:
Once
Twice
Thrice
None of these
How many types of lists are supported by html:
Two
Three
Four
Five
By default, the value of type attribute is:
1
2
3
None of these
Type attribute is used with
<ty>
<tp>
<ol>
<op>
The type attribute can be used with _________ tag for setting the type for the entire list:
<ty>
<li>
<ol>
<ul>
It can be used with individual _________ tag to set the type of a particular list item:
<ul>
<li>
<ol>
<ty>
Image element has only an opening tag:
<im>
<ima>
<img>
<image>
The align attribute is used to adjust :
The size of image
Color of image
Shape of image
Position of the image
The default value of border is:
1
2
3
0
By default,the background color of the web page is:
Black
Red
Pink
White
The hexadecimal number of white color:
#ffffff
#fffeee
#fefefe
#efefef
The hexadecimal number of red color is:
#ff0110
#ff0111
#ff0000
#ff1001
To create a link in the same document how many anchor elements are used:
Two
Three
Four
Five

29. The first anchor element is specified with which attribute:


a.
Name
b.
Wfhy
c.
Abfg
d.
Href
30. The second anchor element is specified with:
a.
Href
b.
Hrfe
c.
Name

d.
31.
a.
b.
c.
d.
32.
a.
b.
c.
d.
33.
a.
b.
c.
d.
34.
a.
b.
c.
d.
35.
a.
b.
c.
d.
36.
a.
b.
c.
d.
37.
a.
b.
c.
d.
38.
a.
b.
c.
d.
39.
a.
b.
c.
d.
40.
a.
b.
c.
d.
41.

Hghj
Frames are used to divide the browser window into:
Dependent segments
Two dependent segments
Four independent segments
Various independent segments
Web pages created using frames can contain :
Table of contents
Navigation links
Footnotes,banners
All of these
To create a frameset document,________ element is included in an html document:
Frames
Frameset
Font
Html
The syntax of the frame element is:
<fra>
<fram>
<frame>
<frameset>
Web publishing means:
Collecting the web pages
Publishing the web pages
Storing the web pages
None of these
The most common place for publishing the web page is on the web space provided by:
DNS
URL
ISP
All of these
Scripting languages can be used to provide:
Simple features to the web page
Main features to theweb page
Dynamic features to the web page
None of these
Most common scripting language is:
Html
C
C++
JavaScript
JavaScript language was developed by:
Microsoft
Sun
Nsf
Netscape
JavaScript is used for:
Client-side applications
Data validation
Creating interactive forms
All of these
The default size of the basefont element is:

a.
b.
c.
d.

1
2
3
4

------------------------------------

1. Multiple Choice, True/False [10 points]


1.1) Multiple choice questions each question is worth [1 point].
a) The loopback (IP) address is a member of
(a) Class A network.
(b) Class B network.
(c) Class C network.
(d) None of the above.
b) IPv6 addresses are __________________ bytes long.
(a) 8
(b) 16
(c) 32
(d) 128
c) What is usually returned when a request is made to connect to a TCP port at which no
server
is listening?
(a) A TCP segment with the ACK and SYN bits set to 1.
(b) A TCP segment with the ACK and FIN bits set to 1.
(c) A TCP segment with the ACK and RST bits set to 1.
(d) A TCP segment with the ACK and PSH bits set to 1.
d) Which of the following are true statements about TCP.
(a) The slow-start algorithm increases a sources rate of transmission faster than
the
additive-increase.
(b) Setting RTO (retransmission timeout value) to a value less than the measured
RTT
may lead to unnecessary retransmissions.
(c) TCP segments can only be lost when router queues overflow.
(d) TCP connection termination procedure is called two-way handshaking.
e) In a network, after the load reaches and exceeds the capacity, throughput
_________________ .
(a) Increases sharply.
(b) Increases proportionally with the load.
(c) Declines sharply.
(d) Declines proportionally with the load.

3
f) The HTTP request line contains a ________________ method to get information
about a
document without retrieving the document itself.
(a) HEAD.
(b) POST.
(c) COPY.
(d) None of the above.
g) DNS can use the services of ___________________ on the well-know port 53.
(a) UDP.
(b) TCP.
(c) Either (a) or (b).

(d) None of the above.


h) Suppose a Certificate Authority (CA) has Bob's certificate registered with it, binding
Bob's
public key to Bob. This certificate is signed with:
(a) Bob's public key.
(b) The CA's public key.
(c) Bob's private key.
(d) The CA's private key.
i) Suppose we choose a small value for a fixed playout delay for a real-time interactive
multimedia application. This will result i:
(a) Less loss, less interactivity.
(b) Less loss, higher interactivity.
(c) More loss, less interactivity.
(d) More loss, higher interactivity.
j) The _____________________ (shaping) algorithm allows idle hosts to accumulate
credit for
the future transmissions.
(a) Leaky bucket.
(b) Token bucket.
(c) Early random detection.
(d) None of the above.

Data Communication And Networks 01


1.

Data can be either


a.
b.
c.
d.

2.

The word Data is derived from


a.
b.
c.
d.

3.

Latin
Contextual
DB
None of these

How many types of data are


a.
b.
c.
d.

4.

Images
Numbers
Words
All of these

1
2
3
4

The types of data are


a.
b.

Qualitative
Quantitative

c.
d.
5.

Data are taken as ________ level of abstraction


a.
b.
c.
d.

6.

Qualitative data
Quantitative data
Both a & b
None of these

Which data are rich, poor, tall, short, good, bad, better
a.
b.
c.
d.

13.

Things
Words
Text
None of these

Which type of data is hard, rigorous, credible and scientific


a.
b.
c.
d.

12.

Numerical form
Non-numerical form
Both a & b
None of these

The qualitative data may be


a.
b.
c.
d.

11.

Numerical form
Non-numerical form
Both a & b
None of these

The qualitative data is expressed in


a.
b.
c.
d.

10.

Highest
Middle
Lowest
None of these

The quantitative data is expressed in


a.
b.
c.
d.

9.

Highest
Middle
Lowest
None of these

Knowledge are taken as ________ level of abstraction


a.
b.
c.
d.

8.

Highest
Middle
Lowest
None of these

Information are taken as ________ level of abstraction


a.
b.
c.
d.

7.

Both a & b
None of these

Qualitative data
Quantitative data
Both a & b
None of these

Data type is thought of as a set of


a.
b.
c.
d.

Values
Operations on values
Both a & b
None of these

14.

Data type as defined in programming language are


a.
b.
c.
d.
e.

15.

The smallest addressable unit of data is defined as a group of ___ bits is known as a byte:
a.
b.
c.
d.

16.

22.

Electric current
Electromagnetic field
Electronic current
Both a & b

A signal is used to convey data from


a.
One place to another place
b.
One system to another system
c.
Both a & b
d.
None of these
In case of PSTN, signaling between
a.
b.
c.
d.

23.

0 to 232 -1
-231 to 231-1
231 to 264 -1
0 to 231 -1

A signal is an
a.
b.
c.
d.

21.

0 to 232 -1
-231 to 231-1
0 to 264 -1
0 to 231 -1

In a 32-bit word it can represent signed integer values ranging from


a.
b.
c.
d.

20.

8 bit or 16 bit
16 bit or 32 bit
32 bit or 64 bit
64bit or 128 bit

In a 32-bit word it can represent unsigned integer values ranging from


a.
b.
c.
d.

19.

Word
Number
Bit
Byte

The machine code unit may be _________ depending on the computer architecture:
a.
b.
c.
d.

18.

4
8
16
32

The unit processed by machine code instructions is called a _______


a.
b.
c.
d.

17.

Integers
Floating-point numbers
Characters
Alphanumeric strings
All of these

A telephone user
The telephone network
Both a & b
None of these

A channel is defined as a path between

24.

The path of channel may be


a.
b.
c.
d.

25.

The path of channel may be


a.
b.
c.
d.

26.

28.

In channel
a.
b.
c.
d.
In channel
a.
b.
c.
d.
e.
f.

29.

Images
Audio
Text
Programs
Telemetry
All of these

Electrical form
Electromagnetic form
Both a & b
None of these

Internal
External
Both a & b
None of these

The noise generated because of electricity or atmospheric disturbances is of the order of


a.
b.
c.
d.

32.

, the information may not be


Reproduced
Reach the receiver at all
Both a & b
None of these
noise, data by affecting communications and files of all types including

The noise may be classified as ______________ based upon the sources


a.
b.
c.
d.

31.

Upgrades
Degrades
Both a & b
None of these

Information and data may be treated as a signal in either


a.
b.
c.
d.

30.

Hard wired
Wireless
Both a & b
None of these

Noise of channel noise___________ the quality of information and data


a.
b.
c.
d.

27.

Physical
Logical
Both a & b
None of these

300kHz
300MHz
300GHz
300Hz

The noise generated which is lower than the high frequency range of ____ and may have more interface with the signal of
information:
a.
b.
c.
d.

300MHz
300kHz
300GHz
300Hz

33.

34.

External noise is generally picked up from electrical appliances existing ____________________


a.
In the vicinity
b.
From the atmosphere
c.
From electrical transformers
d.
Also from outer space
e.
All of these
Internal noise is generated in the
a.
b.
c.
d.

35.

Internal noise is less dependent on frequency, but has a significant effect at:
a.
b.
c.
d.

36.

38.

40.

decibels
Hertz
Micron
bits per second

e.
____________ defined as the size of the range of frequencies that can be transmitted through a channel
a.
Channel Bandwidth
b.
Channel Data Transmission Rate
c.
Channel noise
d.
Channel capacity
In other words channel bandwidth may be define it as the volume of information per unit time that a
_____________________
a.
b.
c.
d.

42.

S/N
SNR
S/M
Both a & b

The unit of noise is


a.
b.
c.
d.

40.

More
Less
No
None of these

Internal noise is fairly low in case of


a.
Digital signal processing
b.
Fiber optics technology
c.
Both a & b
d.
None of these
Noise is measured in terms of the signal to noise ratio
a.
b.
c.
d.

39.

Higher frequency
Low frequency
Middle frequency
No frequency

External noise has _______ effect on higher frequencies


a.
b.
c.
d.

37.

Channels
Receivers
Transmitter
Both a & b

Computer
Person
Transmission medium can handle
All of these

Channel Bandwidth is measured in


a.
b.
c.

decibels
Hertz
Micron

d.
43.

Bandwidth is expressed as data speed in ___________ digital systems:


a.
b.
c.
d.

44.

46.

48.

decibels
Hertz
Micron
bits per second

Which gave the maximum data rate of a noiseless channel


a.
H.Nyquist in 1924
b.
H.Nyquist in 1934
c.
Peter Sain in 1932
d.
None of these
Channel latency depends on the
a.
b.
c.
d.

49.

Highest frequency
Lowest frequency
Both a & b
None of these

__________ is determined by the maximum number of bits that can be transmitted per unit time through the physical
medium:
a.
Channel Bandwidth
b.
Channel Data Transmission Rate
c.
Channel noise
d.
Channel capacity
Channel Data Transmission Rate is measured in
a.
b.
c.
d.

47.

decibels
Hertz
Micron
bits per second

In analog systems, bandwidth is expressed as the difference between the


a.
b.
c.
d.

45.

bits per second

Signal propagation speed


Media characteristics
Transmission distance
All of these

_____________ is the amount of time that is needed for the information to propagate from the source to destination through
the channel:
a.
b.
c.
d.
e.

50.

Throughput may be defined as the number of _______________ through a data communication system over a period of time:
a.
b.
c.
d.

51.

bits
characters
blocks passing
All of these

___________ may be defined as range of frequencies assigned to a channel


a.
b.
c.
d.

52.

Propagation time
Channel Latency
Channel Utilization
Both a & b

Bandwidth
Channel noise
Bit rate
Channel latency

Higher the Bandwidth,________ will be the data transmission rate or throughput

a.
b.
c.
d.
53.

54.

In transmission of a signal, the range of carrier frequencies depends on the


a.
Nature of medium
b.
Requirement of the applications supported
c.
Nature of distance
d.
Both a & b
________ may be defined as the range of frequencies being supported by a particular transmission medium
a.
b.
c.
d.

55.

62.

>1008GHz
<1018GHz
>1018GHz
<1008GHz

The most popular method for detecting errors in bit rate is ________ a parity bit alongside the data bit for a character
a.
b.
c.
d.

61.

Bit rate
Data rate
Baud rate
Pass band

What is the frequency range of gamma and cosmic rays


a.
b.
c.
d.

60.

Bandwidth
Channel
Distance
None of these

_________ is the rate over network speed which is used to detect errors while transmitting data
a.
b.
c.
d.

59.

Lesser
Greater
Medium
None of these

________ refers to the minimum or maximum spatial separation between devices over a link, in the context of a complete,
end to end circuit
a.
b.
c.
d.

58.

Baud rate
Pass band
Band data
Pass

Higher frequency signal offers _________ bandwidth


a.
b.
c.
d.

57.

Frequency
Frequency spectrum
Carrier frequency
None of these

The actual range of frequencies supporting a given communication is known as


a.
b.
c.
d.

56.

More
Less
Medium
None of these

Deleting
Inserting
Modifying
Updating

TDM means
a.
Total division multiplex
b.
Time division modem
c.
Time detect modem
d.
Time division multiplex
FEC means

a.
b.
c.
d.
63.

The net bit rate is also known as


a.
b.
c.
d.

64.

68.

TDM
FEC
Framing Bit
All of these

The FEC is also refers to


a.
Logical layer net bit rate
b.
Physical layer net bit rate
c.
Prefix layer net bit rate
d.
None of these
The size of the multimedia file is the product of _______
a.
b.
c.
d.

69.

TDM
FEC
Framing Bit
All of these

The speed of connection of bit rate is determined by


a.
b.
c.
d.

67.

Data bit rate


Useful bit rate
Network bit rate
Parity bit

The example of net bit rate are


a.
b.
c.
d.

66.

Pass bit rate


Data bit rate
Useful bit rate
Network bit rate

The incorrect bit rate is also known as


a.
b.
c.
d.

65.

Formal Error Checking


Forward Error Checking
Forward Error Character
Formal Error Character

Bit rate in bytes


Bit rate in kilobytes
Bit rate in gigabytes
None of these

The size of the multimedia file is the length of recording in seconds divided by:
a.
b.
c.
d.

4
8
12
16

70.

e.
The fundamentals of Bit rate:

70.

a.
The sample uses different number of bits
b.
The data is encoded by different number of bits
c.
The material is sampled at different frequencies
d.
The information is digitally compressed by different algorithms
e.
All of these
The bit rate is __________ for a specific network
a.
b.
c.
d.

72.

Fixed
Uniform
Fixed and Uniform
None of these

The gross bit rate is the number of bits transmitted

73.

a.
per second by an ideal transmitter
b.
per second by an ideal transistor
c.
per min by an ideal transmitter
d.
per min by an ideal transistor
The bit rate could be as high as
a.
b.
c.
d.

74.

75.

Bit rate is used to calculate the speed of time to access the network
a.
Without getting error frames
b.
Getting error frames
c.
Without getting error format
d.
Getting error format
Bit rate is always ________ to the baud rate
a.
b.
c.
d.

76.

79.

81.

International Telegraph Alphabet 1


International Telephone Alphabet 1
International Television Alphabet 1
International Telegram Alphabet 1

International Telegraph Alphabet 1 was further developed to


a.
b.
c.
d.

83.

8-key
6-key
5-key
9-key

Who modified system using keyboard using 5-key


a.
Donald Murray in 1901
b.
Donald Merry in 1902
c.
Donald Duck in 1904
d.
Donald Murray in 1902
Donald Murray modification took a shape as
a.
b.
c.
d.

82.

Less
Large
Equal
None of these

A character set was designed by


a.
Jean-Maurice-Emile Baudot in 1874
b.
Jean-Maurice-Emile Baudot in 1885
c.
John-Maurice-Emile Baudot in 1864
d.
John-Merry-Emile Baudot in 1894
Character set system was implemented using keyboard having ____
a.
b.
c.
d.

80.

Signal
Data
Symbol
None of these

Lesser bandwidth is required to move these signal units with _____ bits for an efficient system
a.
b.
c.
d.

78.

Equal
More
Equal or more
None of these

Baud rate determines the bandwidth required to transmit the ______


a.
b.
c.
d.

77.

1Gbit/s
1Mbit/s
1Mbyte/s
1Gbyte/s

ITA 1
ITA 2
ITA 3
ITA 4

In character code system, a 5-bit code is

a.
b.
c.
d.
84.

A 5-bit code is signified a


a.
b.
c.
d.

85.

87.

89.

UTF-7
UTF-8
UTF-16
UTF-32
UTF-EBCDIC
All of these

Binary Coded Decimal system makes use of a series of _____ to represent a decimal number
a.
b.
c.
d.

91.

Inside computer
Outside computer
Both a & b
None of these

The following data techniques are used


a.
Binary Coded Decimal(BCD)
b.
Extended Binary Coded Decimal Interchange Code(EBCDIC)
c.
American Standard Code for Information Interchange(ASCII)
d.
Unicode
e.
Manchester Code
f.
Differential Manchester Encoding(DME)
g.
Return to Zero(RZ)
h.
Non Return to Zero(NRZ)
i.
Non Return to Zero Invertive(NRZ-I)
j.
MLT-3
k.
4B/5B
l.
5B/6B
m. All of these
Unicode Examples are
a.
b.
c.
d.
e.
f.

90.

8 characters
16 characters
32 characters
64 characters

For covering all the characters of alphabet with special


a.
Characters
b.
Punctuation marks
c.
Other control characters
d.
Other coding technique was needed
e.
All of these
Encoding is done for data
a.
b.
c.
d.

88.

Line Feed
Light Feed
Line Format
None of these

The basic idea behind coding was really workable if number of characters it had to handle do not require more than
a.
b.
c.
d.

86.

00011
00101
00010
10101

4
8
16
32

e.
Nibble is known as series of ____
a.
b.
c.
d.

8 bits
4 bits
16 bits
32 bits

92.

93.

Extended Binary Coded Decimal Interchange Code is developed by


a.
Parallel to ASCII, IBM in 1964
b.
Parallel to ASCII, IBM in 1974
c.
Parallel to ASCII, IBM in 1962
d.
Parallel to ASCII, IBM in 1964
EBCDIC is a coding system that uses
a.
b.
c.
d.

94.

A byte in EBCDIC system of coding contained ___ nibbles


a.
b.
c.
d.

95.

Characters belong
Integers belong
String belong
None of these

ASCII is a ___ bit coding for representing characters of English alphabets


a.
b.
c.
d.

99.

Zone
Digit
Byte
Bit

First nibble represents category to which the __________


a.
b.
c.
d.

98.

Zone
Digit
Byte
Bit

Second nibble is known as


a.
b.
c.
d.

97.

3
4
2
6

First nibble is known as


a.
b.
c.
d.

96.

8 bit
4 bit
16 bit
32 bit

64 bit
7 bit
16 bit
32 bit

e.
ASCII was published in
a.
b.
c.
d.

1964
1965
1963
1966

100. Unicode was developed by


a.
b.
c.
d.

Unicode Consortium
Unique Consortium
Unicode Constant
None of these
101. Unicode is appeared in

a.
b.
c.
d.

1992
1991
1993
1994
102. The first version of Unicode

a.
b.
c.
d.

Unicode 1.0
Unicode 2.0
Unicode 3.0
None of these

103. Unicode version 5.0 appeared in


a.
b.
c.
d.

2005
2006
2007
2004

104. In Unicode there were codes for representing characters and their basic graphical representation are known as
a.
b.
c.
d.

Graphical
Graphemes
Graphs
None of these

105. The first 256 code points belong to __________ for conversion to Roman Text
a.
b.
c.
d.

ISO 5589-1
ISO 5569-1
ISO 5579-1
ISO 5559-1

106. Unicode mapping methods are of two types, namely are


a.
UTF(Unicode Transformation Format)
b.
UCS(Unicode Character Set)
c.
Both a & b
d.
None of these
107. Every communication channel has a ________ which is defined as the frequency range
a.
b.
c.
d.

Channel
Bandwidth
Carrier
Data rate

108. The bandwidth is a _________ property of a transmission medium


a.
b.
c.
d.

Physical
Logical
Both a & b
None of these

109. A telephone wire has bandwidth of ______ for short distance


a.
b.
c.
d.

1M
2M
3M
4M

110. Data rate that can be achieved using a channel depends on the _____________ of a channel
a.
b.
c.
d.

Frequency
Bandwidth
Data rate
Capacity

111. The undesirable waveform is known as


a.
b.
c.
d.

Anti-Aliasing
Aliasing
Channel
Bandwidth

112. The word PCM stands for

a.
b.
c.
d.
113. How many
a.
b.
c.
d.

Primary code mapping


Pulse code modulation
Primary channel modulation
None of these
way to communicate, display, store or manipulate information
1
2
3
4

114. The way to communicate, display, store or manipulate information are


a.
b.
c.
d.

Analog
Digital
Both a & b
None of these

115. The analog form of electronic communication represents the information in


a.
Continuous electromagnetic wave form
b.
Discrete form
c.
Both a & b
d.
None of these
116. The digital form of electronic communication represents the information in
a.
b.
c.
d.

Continuous electromagnetic wave form


Discrete form
Both a & b
None of these

117. The word AM stands for


a.
b.
c.
d.

Analog Modulation
Analog Manipulation
Amplitude Modulation
Analog Modeling

118. The word FM stands for


a.
b.
c.
d.

Frequency Modulation
Fourier Manipulation
Frequency Manipulation
Frequency Modeling

119. The bandwidth of voice grade channel is approximately


a.
b.
c.
d.

4000Hz
5000Hz
6000Hz
3000Hz

120. The bandwidth of CATV video channel is approximately


a.
b.
c.
d.

2MHz
4MHz
6MHz
8MHz

121. The advantages of FM over AM are


a.
Improved signal to noise ratio(about 25dB)
b.
Less radiated power
c.
Well defined service areas for given transmitter power
d.
Smaller geographical interference between neighboring stations
e.
All of these
122. The disadvantages of FM are
a.
b.

Much more bandwidth(as much as 20 times as much)


More Complicated receiver

c.
d.

More complicated transmitter


All of these

123. Computer are________ in nature


a.
b.
c.
d.
124. SS7 means
a.
b.
c.
d.
125. SS7 is a
a.
b.
c.
d.

Analog
Digital
Both a & b
None of these

Signal Source7
Signaling source7
Signaling system7
Signal system7

System
Source
Protocol
None of these

126. The PSTN provides a _________ path between the destination and source
a.
b.
c.
d.

Logical
Physical
Both a & b
None of these

127. The functions of SS7 are


a.
Controlling network
b.
Set up and tear down the call
c.
Handles the routines decision
d.
All of these
128. SS7 uses voice switches known as
a.
b.
c.
d.

SSWs(Service Switching websites)


SSPs(Service Switching Points)
SSNs(Service Switching Networks)
SSDs(Service Switching Data)

129. SSPs uses Query Service Control Point (SCP) database using Packet switches called
a.
b.
c.
d.

Signal Transfer Points(STPs)


SSWs(Service Switching websites)
SSPs(Service Switching Points)
SSNs(Service Switching Networks)

130. _____________ refers to correct detection by receiving equipment at the beginning and end of data that was sent from
sending equipment
a.
b.
c.
d.

Asynchronous
Synchronous
Synchronization
None of these

131. Synchronous systems can be classified into three categories:


a.
Asynchronous systems
b.
Character synchronous systems
c.
Flag Synchronous systems
d.
All of these
132. Asynchronous transmission is a _________ method of transmission in which a sign bit is added to the beginning:
a.
b.
c.
d.

Start
Stop
Start-stop
None of these

133. Manchester is also known as


a.
MPE(Manchester Phase Encoding)
b.
MPD(Manchester Phase Data)
c.
MPN(Manchester Phase Network)
d.
MPW(Manchester Phase Website)
134. Manchester coding is used in telecommunication by
a.
b.
c.
d.

Encoding standard 802.3


Ethernet standard 802.3
Ethernet standard 805.3
Encoding standard 805.3

135. For 10Mbps Ethernet carrier frequency is


a.
b.
c.
d.

20MHz
15MHz
10MHz
5MHz

e.
136. The another name of DME(Differential Manchester Encoding)
a.
CDP(Conditioned Diphase Encoding)
b.
MPE(Manchester Phase Encoding)
c.
SSWs(Service Switching websites)
d.
SSPs(Service Switching Points)
136. In DME, logical values are indicated by _______________ of transitions
a.
b.
c.
d.

Absence
Presence
Both a & b
None of these

138. In RZ, zero between each bit signifies a _____________


a.
b.
c.
d.

Rest Condition
Neutral Point
Both a & b
None of these

139. The NRZ-pulses contain ____ energy in comparison to that of a RZ code


a.
b.
c.
d.

less
more
either less or more
none of these

140. NRZ has no ___ state


a.
b.
c.
d.

Rest
Zero
Neutral
None of these

141. MLT-3 is an encoding scheme in which ____ voltage levels are used
a.
b.
c.
d.

2
3
4
5

142. Due to four transitions the maximum fundamental frequency requirement is reduced to ____

a.
One-fourth of the baud rate
b.
One-third of the baud rate
c.
One-half of the baud rate
d.
None of these
143. Who specified the committee scheme of coding
a.
b.
c.
d.

ANSI X3T9.7
ANSI X5T9.6
ANSI X3T9.5
ANSI X6T9.5

144. FDDI uses ANSI X3T9.5 for obtaining 100Mbps from a signal of ______
a.
b.
c.
d.

32.25MHz
31.25MHz
31.24MHz
32.26MHz

145. 4B/5B encoding scheme is also known as


a.
b.
c.
d.

Block coding
Bit coding
Byte coding
Block character

146. In 4B/5B scheme, we need a 125MHz clock for a signal of


a.
b.
c.
d.

1000MHz
100MHz
10MHz
99MHz

147. The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined _____ bit symbol
a.
b.
c.
d.

5
4
6
3

148. Modulation is the technique used to translate


a.
Information from source to destination
b.
Low frequency to higher frequency
c.
Source to higher frequency
d.
Low frequency to destination
149. The low frequency signal are
a.
b.
c.
d.
e.

Audio
Video
Music
Data
All of these

150. The modulation/demodulation is a


a.
b.
c.
d.

Linear process
Non-linear process
Both a & b
None of these

151. In character synchronous system ,_______ are added


a.
b.
c.
d.

Special character
Start bit
Stop bit
None of these

152. Special character are called

a.
b.
c.
d.

STN
SYN
SBN
SRN

153. The character string of the SYN character is


a.
b.
c.
d.

01001111
10001110
00010110
00110011

154. The character synchronous system receives _______ as one character


a.
b.
c.
d.

2bit
4bit
8bit
16bit

155. In the 4B/5B we need a 125MHz clock for a signal of


a.
b.
c.
d.

100MHz
10MHz
1000MHz
10000MHz

156. 5B/6B creates a data pattern that is placed with equal numbers of
a.
b.
c.
d.

1
0
Both a & b
None of these

157. How many encoding techniques we used today


a.
b.
c.
d.

10
100
1000
10000

158. Modulation is the technique used to translate low-frequency(base-band) signals like __________ to a higher frequency
a.
b.
c.
d.
e.

Audio
Music
Video
Data
All of these

159. Modulation/ demodulation is a non linear process where two different sinusoids are _________
a.
b.
c.
d.

Addition
Subtraction
Multiplied
Division

160. Angular frequency id defined as _______ the frequency of carrier signal


a.
b.
c.
d.

Once
Twice
Thrice
None of these

161. The frequencies that comprise the message (base band) are translated into a _________ range of frequencies
a.
b.

Lower
Higher

c.
d.

Zero
None of these

162. Modulation also reduces the size of antenna for higher frequencies with ________ frequency
a.
b.
c.
d.

Lower
Greater
Middle
None of these

163. The non-linearity results in several ___________ harmonics


a.
b.
c.
d.

Even
Odd
Both a & b
None of these

164. Harmonics are the _________ of the frequency, that is the message frequency
a.
b.
c.
d.

Addition
Subtraction
Multiply
Division

165. The carrier frequency may be a ___________


a.
b.
c.
d.

Radio wave
Light wave
Both a & b
None of these

166. The amplitude of carrier frequency ________ in accordance with the modulated signal
a.
b.
c.
d.

Can not change


Change
Either change or not
None of these

167. The frequency of the carrier ___________and we get a complex wave


a.
does not changed
b.
Change
c.
Either change or not
d.
None of these
168. For demodulation, it needs the carrier frequency to be generated or derived at the receiving location known as
a.
b.
c.
d.

DSB-SC
DBS-CS
BDS-SC
BSD-CS

169. The full form of DSB-SC


a.
Direct Side Band-Suppressed Carrier
b.
Direct Side Base-Suppressed Carrier
c.
Double Side Band-Suppressed Carrier
d.
Double Slide Band-Suppressed Carrier
170. One more kind of analog modulation is called
a.
b.
c.
d.

Vestigial side band modulation


Vestigial side base modulation
Vestigial slide band modulation
Vestigial slide base modulation

171. Pulse code modulation is a method by which an audio signals are represented as
a.
b.
c.
d.

Direct data
Digital data
Device data
None of these

172. Pulse Code Modulation(PCM) requires bandwidth of ________


a.
b.
c.
d.

32Kbps
64Kbps
128Kbps
256Kbps

173. PCM is a coding scheme used in digital communication because of _____ sensitive to noise
a.
b.
c.
d.

Less
Middle
High
None of these

174. In digital signal the main source of noise is ___________, which introduces as the finite number of quantization levels during
the conversion to PCM code
a.
Quantization noise
b.
Equalization noise
c.
Digital noise
d.
None of these
175. The main parameters in determining the quality of a PCM system are the
a.
b.
c.
d.

Dynamic range
Signal-to-Noise Ratio(SNR)
Both a & b
None of these

176. The maximum error occurs between the


a.
b.
c.
d.

Original level
Quantized level
Both a & b
None of these

177. The maximum error occurs when the original level falls exactly halfway between ______ quantized levels
a.
b.
c.
d.

2
3
4
1

178. The dynamic range is the ratio of the


a.
Largest possible signal magnitude
b.
Smallest possible signal magnitude
c.
Both a & b
d.
None of these
179. For a six bits system the dynamic range will be approximately equal to ___
a.
b.
c.
d.

34dB
36dB
40dB
38dB

180. In dynamic range, the largest voltage amplitude is _______ the smallest voltage amplitude
a.
b.
c.
d.

32times
64times
125times
256times

181. The disadvantages associated with the Delta Modulation PCM is


a.
Slope overload

b.

Granular noise
c.
Both a & b
d.
None of these
182. Communication channels like ____________ are usually analog media
a.

Telephone lines

b.
c.
d.

Television lines
Digital lines
None of these

183. Which is a bandwidth-limited channel


a.
b.
c.
d.

Digital media
Analog media
Both a & b
None of these

184. In the case of telephone lines, the usable bandwidth falls in the range of _______
a.
300Hz to 3000Hz
b.
300Hz to 3300Hz
c.
30Hz to 3300Hz
d.
33Hz to 3300Hz
185. Digital information signals have the shape of pulse and represented by
a.
b.
c.
d.

0
1
both a & b
none of these

186. The following types of modulation are used in modems


a.
ASK-Amplitude Shift Keying
b.
FSK-Frequency Shifted Keying
c.
PSK-Phase Shift Keying
d.
DPSK-Differential Phase Shift Keying
e.
BPSK-Binary Phase Shift Keying
f.
QPSK-Quadrature Phase Shifted Keying
g.
QAM- Quadrature Amplitude Modulation
h.
All of these
187. The main advantage of this technique, it is easy to such
a.
b.
c.
d.

Signals
Also to detect them
Both a & b
None of these

188. Telephone lines limit amplitude changes to some _________ changes per second
a.
b.
c.
d.

3000
3300
3100
3330

189. In the Frequency Shift keying, the frequency of the carrier signal is changed according to the data
a.
b.
c.
d.

Modulation
Data
Signals
None of these

190. In the Phase Shift Keying method a sine wave is transmitted and the phase of the sine wave carries the ______
a.
b.
c.
d.

Analog data
Digital data
Signal data
None of these

191. For a 0, a __ degrees phase sine wave is transmitted


a.
b.
c.
d.

0
45
90
180

192. For a 1, a __ degrees phase sine wave is transmitted

a.
b.
c.
d.

0
45
90
180

193. A sub method of the phase modulation is


a.
Differential phase modulation
b.
Direct phase modulation
c.
Double phase modulation
d.
None of these
194. Differential phase modulation technique is also called
a.
b.
c.
d.

Amplitude Shift Keying


Phase Shift Keying
Frequency Shift Keying
None of these

195. In the differential phase shift keying, For a 0 the modem shifts the phase of each succeeding signal in a certain number of
degrees
a.
b.
c.
d.

0
45
90
180

196. In the differential phase shift keying, For a 1 the modem shifts the phase of each succeeding signal and a different certain
number of degrees
a.
b.
c.
d.

0
90
180
270

197. In binary phase shift keying, the case of 4 different phase shifts, where each symbol represents ____, the modulation
technique is called quadrature PSK(QPSK)
a.
b.
c.
d.

2 bits
4 bits
8 bits
16 bits

198. In binary phase shift keying, the case of 8 different phase shifts, where each symbol represents ____, the modulation
technique is called
a.
b.
c.
d.

QPSK
8PSK
8QAM
8FSK

199. Binary Phase Shift Keying is measured in


a.
b.
c.
d.

Decibel
Baud
Hertz
bits per second

200. In QPSK, the four angle are usually out of phase by


a.
b.
c.
d.

0
45
90
180

201. The AM is considered as a


a.
b.
c.

Linear process
Non-linear process
Both a & b

d.

None of these

202. The FM is considered as a


a.
b.
c.
d.

Linear process
Non-linear process
Both a & b
None of these

203. The phase modulation is similar to the


a.
b.
c.
d.

Amplitude Modulation
Frequency Modulation
Angle Modulation
Pulse Code Modulation

204. In PM, ________ of the carrier wave changes


a.
b.
c.
d.

Frequency
Phase
Both a & b
None of these

e.
205. PCM requires bandwidth of
a.
b.
c.
d.

21Kbps
24Kbps
64Kbps
65Kbps

206. In data communication using computers ,________ signal are normally converted into PCM
a.
b.
c.
d.

Analog
Digital
Both a & b
None of these

207. The PCM is a coding scheme used in __________ communication because of less sensitive to noise
a.
b.
c.
d.

Analog
Digital
Both a &b
None of these

208. ________ is a process where multiple analog message signals or digital data streams are combined into one medium over a
shared medium
a.
b.
c.
d.

Multiplexing
Modulation
Encoding technique
De-multiplexing

209. The various ways to multiplex are


a.
Frequency Division Multiplexing(FDM)
b.
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
e.
All of these
210. In which , Multiple channels are combined onto a single aggregate signal for transmission
a.
b.
c.
d.

Frequency Division Multiplexing(FDM)


Time Division Multiplexing(TDM)
Code Division Multiplexing(CDM)
Wavelength Division Multiplexing(WDM)

211. In FDM , channels are separated in the aggregate by their

a.
b.
c.
d.

Bandwidth
Signal
Frequency
None of these

212. _________ was the foremost multiplexing scheme to have the benefits of wide scale network deployment and till today, such
systems are still in use and are used with analog transmission
a.
Frequency Division Multiplexing(FDM)
b.
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
213. The two alternative technologies of multiplexing for digital sources are
a.
b.
c.
d.
e.
f.
g.

Frequency Division Multiplexing(FDM)


Time Division Multiplexing(TDM)
Code Division Multiplexing(CDM)
Wavelength Division Multiplexing(WDM)
Both b & c
Both a & b
Both c & d

214. _______ provides a means for merging data from the varied sources into a single channel to support communication over a
microwave system , satellite system or a telephone lines
a.
b.
c.
d.

Frequency Division Multiplexing(FDM)


Time Division Multiplexing(TDM)
Code Division Multiplexing(CDM)
Wavelength Division Multiplexing(WDM)

215. The TDM are implemented in two ways are


a.
b.
c.
d.

Synchronous TDM
Asynchronous TDM
Both a & b
None of these

e.
216. In which type of TDM , a single channel is divided into time slots and each transmitting device is assigned for least one of the
time slots for its transmission
a.
b.
c.
d.

Synchronous TDM
Asynchronous TDM
Both a & b
None of these

217. The Asynchronous TDM is properly known as


a.
b.
c.
d.

Statistical TDM
Static TDM
Dynamic TDM
None of these

218. Which ways of Multiplex are more flexible


a.
b.
c.
d.

FDM
TDM
CDM
None of these

219. In which way of multiplex ,the whole amount for a certain amount of time is provided to the user and all user uses the same
frequency but at different time
a.
b.
c.
d.

FDM
TDM
CDM
None of these

220. To overcome the inefficiency of standard TDM, a technique known as

a.
b.
c.
d.

CDM
FDM
STDM
CDMA

221. The word UHF means


a.
b.
c.
d.

Ultra -High Form


Ultra Half-Form
Ultra- High-Frequency
Ultra-Half-Frequency

222. ________ may be defined as the form of multiplexing where the transmitter encodes the signal using a pseudo random
sequence
a.
b.
c.
d.

CDM
FDM
STDM
CDMA

223. The number of different frequency per bit are called


a.
b.
c.
d.

Bit rate
Data rate
Baud rate
Chip rate

224. If one or more bits are transmitted at the same frequency are called
a.
b.
c.
d.

Frequency doping
Frequency hopping
Frequency hoping
Frequency hipping

225. The main disadvantage of CDM is


a.
Protection from interference
b.
Tapping as only the sender know the spreading code
c.
Tapping as only the receiver know the spreading code
d.
All of these
226. The Code Division Multiple Access(CDMA) was widely introduced in
a.
b.
c.
d.

1963
1989
1979
1958

227. In CDMA system ,all user transmit in the ______ bandwidth simultaneously
a.
b.
c.
d.

Different
Same
Both a & b
None of these

e.
228. The spread spectrum technology of CDMA is ___________ than TDMA
a.
b.
c.
d.

More secure
Provides higher transmission quality
Both a & b
None of these

e.
229. A CDMA call starts with a standard rate of ___________ bits per second
a.
b.
c.
d.

9500
9200
9300
9600

230. The code used with the signal for spreading have
a.
Low cross-correlation values
b.
Unique to every user
c.
Higher transmission quality
d.
Both a & b
231. In spread spectrum technique, a receiver is only capable of selecting the desired signal if it has the knowledge about the
code of the intended
a.
b.
c.
d.

Receiver
Transmitter
Both a & b
Signal

232. The major advantage of spread spectrum technique may be enumerated as


a.
Low power spectral density
b.
Interference limited operation
c.
Privacy due to unknown random codes
d.
Reduction of multi path affects
e.
All of these
233.
The word FHSS stands for
a.
b.
c.
d.
234.

frequency hopping spread spectrum


file hopping spread spectrum
file hiding spread spectrum
frequency hopping special spectrum

The word DSSS stands for


a.
b.
c.
d.

digital sequence spread spectrum


direct sequence spread spectrum
digital sequence special spectrum
direct signal spread spectrum

235. The pattern of switching from one channel to another channel is known as
a.
b.
c.
d.

Hipping
Hyping
Harping
Hopping

236. ________ is best known spread spectrum technique in which a pseudo random noise code multiples the signal
a.
b.
c.
d.

FHSS
FCSS
DSSS
DHSS

237. A pseudo random noise code is a sequence of chips valued________ with noise-like properties
a.
b.
c.
d.

-1 and1(polar)
0 and 1(non-polar)
Both a & b
None of these

e.
238. ________ time is the time spent on a channel with certain frequency
a.
b.
c.
d.

FDM
Dwell
Dowel
Dowry

e.
239. FHSS includes_______ technology
a.
b.
c.

FDM
TDM
CDM

d.

Both a & b

e.
240. Individual channels are
a.
b.
c.
d.

Data
Audio
Video or their combination
All of these

241. __________ a multi-channel system in which a number of individuals channels are multiplexed for transmission
a.
b.
c.
d.

System
Carrier
Carrier system
None of these

242. T-carrier signaling scheme was developed by


a.
b.
c.
d.
243.

T1 standards is widely
a.
b.
c.
d.

Bell Laboratory
Hell Laboratory
Dull Laboratory
None of these
used in
Japan
North America
Both a & b
None of these

244. T-carrier was digital signal 1, DS1 or DS-1 which is known as


a.
b.
c.
d.

T1
E1
DS0
DS1

245. DS-1 conveys the meaning of


a.
Direct Service-Level 1
b.
Digital Service-Level 1
c.
Double Service-Level 1
d.
Digital Slide-Level 1
246. E1 signifies another carrier system that finds use outside
a.
b.
c.
d.

North America
Japan
South Korea
All of these

247. A DS1 circuit comprises ________ , each of 8 bits


a.
b.
c.
d.

24 channels
26 channels
28 channels
30 channels

248. 24 channels are also called


a.
b.
c.
d.

Timeslots
DS0
Both a & b
None of these

249. DS0 channel is a ______ that is multiplexed


a.
b.

68Kbit/s
64Kbit/s

c.
d.

62Kbit/s
70Kbit/s

250. DS1 is full-duplex circuit in which the circuit does concurrent transmission and reception at a data rate of ___
a.
b.
c.
d.

1.533Mbit/s
1.544Mbit/s
1.566Mbit/s
1.555Mbit/s

251. By sampling each 8-bit frame for 8000 times per second, total bandwidth achieved is ________
a.
b.
c.
d.

1.537Kbit/s
1.536Kbit/s
1.538Kbit/s
1.539Kbit/s

252. Framing schemes are of two types:


a.
Super Frame(SF)
b.
Extended Super Frame(ESF)
c.
Both a & b
d.
None of these

253.

Framing channel has been divided into two each with ______ in Super Frame
a.
b.
c.
d.

2Kbit/s
3Kbit/s
4Kbit/s
6Kbit/s

254. There are _____ contiguous frames of 193-bit each in a Super Frame
a.
b.
c.
d.

10
12
14
16

255. There are _____ contiguous frames of 193-bit each in a Extended Super Frame
a.
b.
c.
d.

20
22
24
26

256. Framing channel has been divided into two each with _______ in Super frame
a.
b.
c.
d.

2Kbit/s
4Kbit/s
6Kbit/s
8Kbit/s

257. One is used for alignment of ________


a.
b.
c.
d.

Terminal frame
Signaling frame
Super frame
Switching frame

e.
258. Second is used for alignment of ________
a.
b.
c.
d.
e.

Terminal frame
Signaling frame
Super frame
Switching frame

259. Alignment of terminal is carried out with frames having _______ in the super frame
a.
b.
c.
d.

Even-number
Odd-number
Prime-number
None of these

260. A frame having _________ in the super frame is used for signaling alignment of frame
a.
b.
c.
d.

Even-number
Odd-number
Prime-number
None of these

261. T1 is recognized by its original ______ line rate


a.
b.
c.
d.

1.566Mbit/s
1.544Mbit/s
1.555Mbit/s
1.533Mbit/s

262. T1 used the encoding technique _______


a.
b.
c.
d.

AMI
LAN
DS1
CEPT

263. AMI means


a.
Analog Memory Interchange
b.
Alternate Memory Interchange
c.
Alternate Mark Inversion
d.
Analog Mark Interchange
264. AMI requires less
a.
b.
c.
d.

Bandwidth
Signal
Both a & b
None of these

265. CEPT means


a.
Conference European of Postal Telecommunications
b.
European Conference of Postal and Telecommunications
c.
European Control of Postal Telecommunications
d.
None of these
266. CEPT after ten years of launch of T1 system used _____ for framing known as European E1
a.
b.
c.
d.

2bits
4bits
8bits
16bits

267. An E1 carrier carries digital information at ______


a.
b.
c.
d.

2.084Mbps
2.048Mbps
2.044Mbps
2.088Mbps

268. An E1 circuit has been divided into ____ time slots


a.
b.
c.
d.

30
32
34
36

269. 32 time slots implements an individual communication channel supporting a bit rate of ________

a.
b.
c.
d.

60Kbps
62Kbps
64Kbps
66Kbps

270. An E1 frame has a total of _________


a.
b.
c.
d.

128bits
256bits
64bits
192bits

271. Which is used to exchange information over the E1 carriers that connect remote zones
a.
b.
c.
d.

Protocols Frame Relay


Cell Relay
Both a & b
None of these

e.
272. CEPT revised and improved the technology adopted by
a.
b.
c.
d.

T-carrier system
E-carrier system
Both a & b
None of these

e.
273. Which was taken by International Telecommunications Union Telecommunication Standardization Sector(ITU-T)
a.
b.
c.
d.

T-carrier system
E-carrier system
E1 system
T1 system

274. ITU-T finds wide use all over the world except three nations namely
a.
UK, USA, Japan
b.
USA, Canada, Japan
c.
Japan, America, USA
d.
Japan, America, Canada
275. PDH means
a.
b.
c.
d.

Plesiochronous Digital Hierarchy


Plasma Digital Hierarchy
Pointer Double Hard disk
Plasma Double Hierarchy

276. In 32 timeslots of E1, only ___ are used two of these are used for framing and signalling call setup
a.
b.
c.
d.

20
15
30
40

277. High quality of call is ensured since transmission takes place with a constant
a.
b.
c.
d.

Latency
Capacity
Both a & b
None of these

278. Another timeslot is reserved for signalling purposes


a.
b.
c.
d.

TS16
TS15
TS14
TS13

279. Which is controlled some standard protocols in the field of telecommunications


a.
b.
c.
d.

Teardown
Call setup
Both a & b
None of these

280. E1 is different from earlier T-carrier systems since all ___ of every sampling are available for every call
a.
b.
c.
d.

4bits
8bits
16bits
32bits

281. There are two general categories of transmission media


a.
Bounded(guided) media
b.
Unbounded(unguided) media
c.
Both a & b
d.
None of these
282. __________ are bounded media
a.
b.
c.
d.

Twisted pair
Coaxial cable
Fibre optic cables
All of these

283. ________ are known as unbounded transmission


a.
microwave and satellite transmission
b.
both travel through the air
c.
which has no boundaries
d.
all of these
284. Wireless transmission systems do not make use of a
a.
b.
c.
d.

Physical conductor
Guide to bind the signal
Logical conductor
Both a & b

285. Energy travels through the air rather than


a.
b.
c.
d.

Copper
Glass
Both a & b
None of these

e.
286. The transmission systems addressed under this category include
a.
b.
c.
d.

Microwave
Satellite
Infrared
All of the above

287. Which are used in radio transmission in one form or another


a.
b.
c.
d.

Radio
TV
Cellular phones
All of these

288. _______ is the one example of long distance communication


a.
b.
c.
d.

Satellite signal
Satellite relay
Analog signal
Digital signal

289. The RF(Radio Frequency) is divided in different ranges starting from

a.
b.
c.
d.

290.

Very low frequency(VLF)


Extremely high frequency(EHF)
Both a & b
None of these
Two transmitters cannot share the same frequency band because of

a.
b.
c.
d.

Mutual interference
Band usage is regulated
Both a & b
None of these

291. PDAs means


a.
Personal Digital Assistants
b.
Personal Double Assistants
c.
Personal Digital Analogs
d.
Power Digital Assistants
292. ADSL means
a.
b.
c.
d.

Analogs Digital Subscriber Lines


Asymmetric Digital Subscriber Lines
Assistants Digital Subscriber Lines
Asymmetric Digital Subscriber language

293. A pair of copper wires twisted together and wrapped with a plastic coating as a twisted pair and which has a diameter of
____:
a.
b.
c.
d.

0.2-0.6
0.4-0.7
0.2-0.8
0.4-0.8

294. ______ are the substances used for insulation purposes


a.
b.
c.
d.
e.

Teflon(r)
Flouropolymer resin
Polyvinyl chloride
Polyethylene
All of these

f.
295. In modem data rate is restricted to approximately____:
a.
b.
c.
d.

24Kbps
28Kbps
30Kbps
32Kbps

e.
296. _______ was first used in telephone system by Alexander Graham Bell
a.
b.
c.
d.

Copper medium
Copper signal
Copper set up
None of these

e.
297. The unshielded twisted pair states the link between the end in the communication closet and the outlet which is further
restricted to
a.
b.
c.
d.

60metres
90metres
100metres
190metres

298. A UTP cable contains __________ twisted pairs


a.
b.

2 to 240
2 to 4200

c.
d.

2 to 2400
None of these

299. The major disadvantage of UTP is


a.
Bandwidth is lower
b.
Bandwidth is higher
c.
Bandwidth is limited
d.
Bandwidth is dynamic
300. STP stands for
a.
b.
c.
d.

Shielded twisted pair


Signal transmission pair
Shielding twisted process
Shielded transmission pair

301. 150Ohms STP contains ________IBM connector or RJ45


a.
b.
c.
d.

1 pair
2 pairs
3 pairs
4 pairs

302. 100Ohm UTP contains _________ and 8-pin modular connector(ISDN)


a.
b.
c.
d.

2 pairs
3 pairs
4 pairs
5 pairs

303. ________ contains multi-mode fibre


a.
b.
c.
d.

52.5/125
72.5/125
62.5/125
82.5/125

304. What are the biggest advantage of UTP


a.
Flexibility
b.
Cost-effective media
c.
Usability of both data communication and voice
d.
All of these
305. LED means
a.
b.
c.
d.

Light Emitting Device


Light Emitting Diode
Light Exchange Device
Light Exchange Diode

306. The effective capacity of coaxial cable depends on the


a.
b.
c.
d.
e.

Spacing of amplifiers
The length of the circuit
The gauge of the centre conductor
Other intermediate devices
All of these

307. LANs function over coaxial cable to the __________ specifications


a.
b.
c.
d.

10BASE5
10BASE2
10BASET
All of these

308. Coaxial cables are of two types


a.
b.
c.

Baseband
Broadband
Both a & b

d.

None of these

309. The gauge of coaxial cable is _____ than the twisted pair
a.
b.
c.
d.

Thicker
Thinner
Heavy
Bulky

310. Traditional coaxial cable is quite ________ of which Ethernet LAN 10Base5 is an example
a.
b.
c.
d.

Thick
Heavy
Bulky
All of these

311. Twin axial cables contains _____ such configurations within a single cable sheath
a.
b.
c.
d.

2
3
4
5

312. The mechanical protections cover the _________


a.
b.
c.
d.

Secondary buffer coating


Primary buffer coating
Both a & b
None of these

313. The bandwidth is typically ________ over a length of one kilometer of fibre expressed as MHz-Km
a.
b.
c.
d.

10 to 20
20 to 30
30 to 40
40 to 50

314. In which multimode fibre, light is refracted by an increasing amount as it moves away from the core
a.
Single mode fibre
b.
Step index multimode fibre
c.
Graded index multimode fibre
d.
All of these
315. The actual bandwidth of graded index multimode fibre depends on
a.
b.
c.
d.

How well a particular fibres index profile minimizes model dispersion


The wavelength of light launched into the fibre
Both a & b
None of these

316. The typical bandwidth of graded index multimode fibre range from
a.
b.
c.
d.

100MHz-Km to over 1GHz-Km


200 MHz-Km to over 1GHz-Km
300 MHz-Km to over 1GHz-Km
150 MHz-Km to over 1GHz-Km

317. Which multimode fibre has a thinner inner core


a.
b.
c.
d.

Single mode fibre/ Monomode fibre


Step index multimode fibre
Graded index multimode fibre
All of these

318. In which multimode fibre , different wavelength of light travel at a different speeds
a.

Single mode fibre

b.
c.
d.

Step index multimode fibre


Graded index multimode fibre
All of these

319. The single mode fibers have the


a.
b.
c.
d.

Very broadest bandwidth


Lowest cost
Lowest attenuation of any optical fibre
All of these

320. The advantage of single mode fibre are


a.
b.
c.
d.
e.
f.

Small size and light weight


Large bandwidth
Flexibility and high strength
Secure against signal leakage and interference
No short circuit problems
All of these

321. The fibre optic systems consists of a


a.
b.
c.
d.

Light sources
Cables
Light detectors
All of these

322. In a fiber optic system, ______ are opto-electric devices


a.
b.
c.
d.

Repeater
EMI
RMI
RFI

323. EMI/RFI means


a.
Electro Magnetic Interference / Radio Frequency Interference
b.
Electronics Magnetic Interference/Redundancy Frequency Interference
c.
Electro Minute Intrinsically/ Radio Fibre Interference
d.
None of these
324. Monomode fibre optic systems routinely are capable of transmitting signal over distances in excess of
a.
b.
c.
d.

250Km
350Km
225Km
325Km

325. CAD means


a.
Computer aided distribution
b.
Computer application design
c.
Computer aided design
d.
None of these
326. Bounded Media Comparison Chart

Media
Twisted pair cable

Advantages
Inexpensive, well established ,
easy to add nodes

Coaxial cable (in comparison to


twisted)

High bandwidth, long distances

Optical fibre cable

Very High bandwidth, long


distances, noise immunity, high
security, small size

Disadvantage
Sensitive to noise, short distances,
limited
bandwidth,
security
hazard
because
of
easy
interception
Physical
dimensions,
noise
immunity security is better in pair
cable
Connections, cost

327. In data communication the signal has to travel through the transmission media that may be

a.
b.
c.
d.

Wired
Wireless
Both a & b
None of these

328. There exist three causes of impairment in transmission errors


a.
b.
c.
d.

329.

Attenuation
Distortion
Noise
All of these

___________ is the loss of the signal power while traversing a transmission media including electronic circuitry
a.
b.
c.
d.

Attenuation
Distortion
Noise
None of these

330. Attenuation is measured in terms of


a.
b.
c.
d.

Hertz
Micro
decibel
Kilometer

331. Distortion is calculated as the ratio of the


a.
Signal at two different points
b.
Relative power of two signals at the same point
c.
Both a & b
d.
None of these
332. A negative value of decibel indicates _______ of signal strength
a.
b.
c.
d.

Loss
Gain
Either loss or gain
None of these

333. A positive value of decibel indicates _______ of signal strength


a.
b.
c.
d.

Loss
Gain
Either loss or gain
None of these

e.
334. The attenuation includes a number of factors like
a.
b.
c.
d.
e.
f.
334. Distortion

Transmitting and receiving antennas


Transmitter powers
Modulation techniques
Frequency of the transmission
Atmospheric conditions
All of these
is proportional to the square of the _________

a.
b.
c.
d.
334. Equalizing

Atmospheric conditions
Modulation techniques
Operating frequency
Operating system
devices are ________ at intermediate points to keep the shape of the signal intact

a.
b.
c.
d.

Created
Inserted
Modified
Deleted

337. Data processing and transmission systems experience errors due to several reasons

a.
b.

Electrostatic interference can be caused from circuits or machines lying close by


Inductance and capacitance, loss in transmission due to leakages, impulses from static in the atmosphere, etc,
lead to distortion
c.
Resistance to current in a cable can be caused due to attenuation
d.
All of these
338. The main constraints are due to the physical medium that produces
a.
b.
c.
d.
e.

Noise
Distortion
Attenuation
Dropouts
All of these

339. The digital signals do not suffer from ___________ but they are susceptible to dropouts
a.
b.
c.
d.

Noise
Distortion
Both a & b
None of these

340. The use of several parity bits are


a.
Help to detect any error
b.
Find if any bits are inverted
c.
They should be re-inverted so that the original data is restored
d.
All of these
341. SECDEC means
a.
b.
c.
d.

Single error correction, double error detection


Single exchange correction, double exchange detection
Single error code, double error detection
Single error character, double error detection

342. The types of errors are


a.
b.
c.
d.

Single Bit Errors


Burst Errors
Both a & b
None of these

e.
343. A transmission cable has
a.
b.
c.
d.

Inductance
Capacitance
Resistance
All of these

344. The inductance and capacitance tends to


a.
Causes the amplitude of the signal to reduce
b.
Distort the shape of a signal
c.
Both a & b
d.
None of these
345. The resistance tends to
a.
b.
c.
d.

Causes the amplitude of the signal to reduce and therefore loss of power
Distort the shape of a signal
Both a & b
None of these

346. Which type of error corrupt the single bits of transmission


a.
b.
c.
d.

Burst errors
Single bit errors
Both a & b
None of these

e.
347. Which type of error corrupt the multiple bits of transmission

a.
b.
c.
d.

Burst errors
Single bit errors
Both a & b
None of these

348. ENQ means


a.
b.
c.
d.

Enquiry
Encryptions
Enquire
None of these

349. BER stands for


a.
b.
c.
d.

Byte Enquiry Rate


Bit Error Rate
Burst Enquiry resistance
Burst Error Rate

350. NAK means


a.
None Acknowledge
b.
Noise Acknowledge
c.
Negative Acknowledgement
d.
Network Acknowledgement
351. The No of bits that get affected in burst errors depends upon the
a.
b.
c.
d.

Duration of the noise


Transmission time of the no of bits of the transmitted packet
Both a & b
None of these

352. The redundant bit enables


a.
b.
c.
d.

correction of errors
detection of errors
Redundancy check
All of these

353. The types of redundancy processes are


a.
b.
c.
d.

Parity check
Cyclic redundancy check
Checksum
All of these

e.
354. __________ is the technique of providing a data string that is added to information packets used to detect errors in data
packets
a.
b.
c.
d.

CRC
Parity check
Checksum
All of these

e.
355. Which redundancy process can detect the more than 95 per cent of all errors
a.
b.
c.
d.

CRC
Parity check
Checksum
All of these

356. CRC means


a.
Circuit Redundancy Check
b.
Cyclic Redundancy Check
c.
Checksum Rail Check
d.
None of these
357. The Two-dimensional parity check method can not

a.
b.
c.
d.

Correct the errors


Detect the errors
Correct and detect the errors
None of these

358. When signal amplitude degrades along a transmission medium , this is called
a.
b.
c.
d.

Signal attenuation
Signal bandwidth
Frequency
Data rate

359. The CRC is validated by using _______ conditions


a.
b.
c.
d.

1
2
3
4

360.
a.
b.
c.
d.

The two conditions of CRC are


It should possess exactly one bit less than the divisor
When CRC is appended to the end of the data stream
Both a & b
None of these

Data Communication And Networks 02


A computer network permits sharing of
Resources
Information
Both a & b
None of these
The first operational computer network in the world was the _________ for the United States Department of Defense
ARPANET
ERNET
SKYNET
DARPANET

ATM stands for


Automatic taller machine
Automated teller machine
Automatic transfer machine
Automated transfer machine
_______ is the technology that connects the machines and people within a site in a small area
LAN
MAN
WAN
None of these
______ is a network that covers geographic areas that are larger, such as districts or cities
LAN
MAN

WAN
None of these

______ is a network that this technology connects sites that are in diverse locations
LAN
MAN
WAN
None of these
______ is a collection of point-to-point links that may form a circle
LAN
MAN
WAN
Ring topology
______ refers to tone signals used for various control purposes via the telephone network
SMS
DTMF
GSM
None of these
LAN is a network that is restricted to a relatively
Small area
Large area
Both a & b
None of these
The components used by LANs can be categorized into
Hardware
Cabling protocols
Standards
All of these

The various LAN protocols are


Ethernet
Token ring
Both a & b
None of these
The Institute of Electrical and Electronics Engineers established a project named IEEE project 802 during the year _____
1990
1970
1980
1960
In 1985, the committee issued a set of ___ standards
2
3
4
5
ISO revised these standards and reintroduced them as ISO 8802 standards during ____
1977
1987
1997
1999
The following are the important standards proposed by IEEE
IEEE 802.1- overview and relationship among the various IEEE standards
IEEE 802.3 or CSMA/CD bus
IEEE 802.4 or token bus
IEEE 802.5 or token ring
IEEE 802.6 or MAN protocol
All of these
When compared with the OSI reference model, the IEEE standard contains the following layers:
Physical layer

Medium access control(MAC) equivalent to the lower part of the OSI data link layer
Logical link layer(LAC) equivalent to the upper part of the data link layer
Network layer, the OSI network layer, that performs some of the higher order layer functions
All of these
The 802.2 compatible interfaces provide two major types of services, which are
Unacknowledged
Connectionless
Both a & b
None of these
The ________ follows the ring topology
IBM of LAN
LAN of IBM
Both a & b
None of these

In a token ring, the stations are connected to the __________


Logical ring
Physical ring
Both a & b
None of these

A _________ preamble is used to synchronize the receivers clock


Four-byte
Three-byte
Two-byte
One-byte
Start of frame and end of frame are used to _______ the frame boundaries
Mark
Modify

Delete
Find
Frame control is also used to specify the ________
Frame technique
Frame type
Both a & b
None of these
The destination address and source address field is similar to
IEEE 802.3 or CSMA/CD bus
IEEE 802.4 or token bus
IEEE 802.5 or token ring
IEEE 802.6 or MAN protocol
Info field is used to ________
Send messages
Send data
Delete data
Create data
The maximum length of this field is _______ when the address is _______
8182 & 2 bits
8182 & 2 bytes
8182 & 4 bits
8182 & 4 bytes
The maximum length of this field is _______ when the address is _______
8174 bytes & 6 bits
8174 bytes & 6 bytes
8174 bytes & 8 bytes
8174 bits & 6 bytes
Check sum is used for
Error correction

Error detection
Both a & b
None of these

Solicit-successor frame contains the address of the


Sending station
Successor
Both a & b
None of these
Government agencies and local libraries often use a MAN to connect to private
Industries
Citizens
Both a & b
None of these

The geographical limit of a MAN may


Not span a city
Span a city
Either span or not
None of these
In MAN, different LANs are connected through a local _______
Telephone exchange
Computer wires
Both a & b
None of these
Some of the widely used protocols for MAN are
RS-232
X.25
Frame relay

Asynchronous transfer mode(ATM)


ISDN
OC-3lines(155 Mbps)
ADSL(asymmetric digital subscriber line)
All of the above
MAN stands for
Machine area network
Metropolitan area network
Metropolitan asynchronous network
Machine asynchronous network
WAN technologies function at the lower three layers of the OSI reference model
Physical layer
Data link layer
Network layer
All of these

WAN also uses switching technology provided by ____________


Local exchange
Long distance carrier
Both a & b
Small distance carrier
Packet switching technologies such as _____________ are used to implement WAN along with statistical multiplexing
ATM
Frame relay
Switched multimeagabit data service
X.25
All of these
MAN uses only a
Long exchange

Local carrier
Both a & b
None of these

In MAN, a network is accomplished using components


Hardware
Protocols
Both a & b
None of these

In MAN, a network is accomplished using basic components


Hardware
Protocols(software)
Applications(useful software)
All of the above
The Internet(internetworking) ha become a potent tool for
Education
Productivity
Enlightenment
All of these
The Government of India had set up ERNET in ______ to provide TCP/IP connections for education and research communities in
India
1976
1986
1996
1999
The liberalized policies encouraged many private players like
DISHNET
JAINTV
Mantra online

All of these
The other government organizations like _______________ to enter this field to bring the Internet to common people
NIC
VSNL
MTNL
All of the above

The major network infrastructure available in the country has two types of WAN
Terrestrial WAN
VSAT WAN
Both a & b
None of these

Following are different options for setting up the Intranet, education portal or e-commerce, etc.
Leased line
Dial Up connection
VSAT
Radio link
All of the above
The networks can be broadly divided into three categories namely
LAN for a single building
MAN- single city
WAN-country, continent and planet
All of the above
The host to terminal connection is a conventional type of connection between
Main frame
Dumb terminals
Both a & b
None of these

TC means
Terminal Computer
Terminal Controller
Technical Computer
None of these
A collection of interconnected networks is known as
Internetwork
Internet
Network
None of these

The type of packet format supported by X.25 are as follows


Control packet
Data packet
Both a & b
None of these
A terminal controller may be used to integrate two or more terminals for connection with a
Low speed line
High speed line
Single WAN line
Both a & b
ISDN stands for
Integrated Service Digital Network
Interaction System Digital Network
Inexpensive System Digital Network
None of these
For LAN to LAN connection, which are mainly used
ISDN
Leased Line

Frame relay
All of these

Which function allows selection of the appropriate route based on IP header information and sends packets through this route
Forwarding function
Filtering function
Both a & b
None of these
Which function allows dumping of invalid packets for a specific network instead of forwarding
Forwarding function
Filtering function
Both a & b
None of these
Routing in the same network may be termed as
Local routing
Static routing
Dynamic routing
Distributing routing
The routing table possessed by a router includes
Combination of destination address
Next hops that corresponds to that address
Both a & b
None of these
If there is a fixed route information to each router, is called
Fixed routing
Dynamic routing
Both a & b
Distributed routing
If routing information is automatically updated by routers when changes are made to the network configuration are called

Fixed routing
Dynamic routing
Both a & b
Distributed routing
The processing required to transferring a packet from the source host to the destination host or to the relaying router are called
Fixed routing
Dynamic routing
Local routing
Distributed routing

ARP stands for


Address Resolution Protocol
Address Routing Protocol
Address Routing Packet
Address Routing Program
If two or more routers are connected to the same subnet, the network administration determines which of the routers the
messages should be sent to.. to eliminate this problem._____ are used
MAC messages
ICMP messages
INDP messages
IMCP messages

If two or more routers are available in distributed routing, which route should be selected
High possible cost
Least possible cost
Link cost
Both b & c
If there is no any specific intention, the cost for a single link is usually set at ___
1

2
3
4
Multi-path routing can be achieved in
Distance-vector type
Link-state type
Both a & b
None of these
If there are two or more routes to reach the same destination at the same cost, which method is applicable to determine how to
select this route
Round robin method
Random selection method
Mixed method
All of these
The Mixed method remains _________ for the amount of processing required
Effective
Ineffective
Both a & b
None of these
A set of networks interconnected by routers within a specific area using the same routing protocol is called
Domain
Backbone
Inter-domain router
All of these
A network composed of inter-domain router is called
Domain
Backbone
Inter-domain router
All of these
A router within a specific domain is called

Domain
Backbone
Inter-domain router
All of these
Two or more domains may be further combined to form a
Domain
Backbone
Inter-domain router
Higher-order domain
Each domain is also called
Operation domain
Backbone
Inter-domain
All of these

Routing protocol in such an internet system can be broadly divided into two types named
Intra- domain routing
Inter- domain routing
Both a & b
None of these
To communication between two or more domains, which are used
Intra- domain routing
Inter- domain routing
Both a & b
None of these
Some Intra-domain protocols are
RIP(Routing Information Protocol)
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System )

All of these
________ are the algorithms are available to update contents of routing tables
Distance-Vector Protocol
Link-State Protocol
Both a & b
None of these
Distance vector protocols are
RIP
IGRP(Interior Gateway Routing Protocol )
Both a & b
None of these
RIP stands for
Routing Information Protocol
Routing Intra Protocol
Route Intermediate Protocol
Resolution Information Protocol
The Link state protocol are
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System)
Both a & b
None of these
In link state protocol, the load on router will be
Small
Large
Medium
None of these

For large load on router, the processing is


Complex

Simple
Both a & b
None of these
Which protocol are used in link state type routing protocol developed for use in large scale network
OSPF(Open Shortest Path First)
IS-IS(Intermediate System to Intermediate System)
Both a & b
None of these
The common part of OSPF packet format is
Packet type
Packet length
Router ID
Area ID
Authentication type
Authentication data
Version
Checksum
Individual information part
All of these
The router may be classified into three types named
Domain border router
Internal router
Area border router
All of these
OSPF is a hierarchical routing composed of
Intra-area routing
Inter-area routing
Inter-domain routing
All of these

The word SLIP stands for


Serial Line IP
Standard Line IP
Serial Link IP
Standard Link IP
The word PPP stands for
Point to Point Protocol
Packet to Packet Protocol
Point to Packet Protocol
Packet to Point Protocol
________ is used mainly for connection between LANs that are remotely located from one another
SLIP
PPP
Both a & b
None of these

_________ is used for connection between routers or equipment that must be highly reliable
SLIP
PPP
Both a & b
None of these
The wireless LANs offers the obvious advantage of
Avoidance of cabling cost
Provide LAN capabilities in temporary quarters
Both a & b
None of these
The bandwidth of wireless radio LAN is
24Mbps
2 Mbps

4 Mbps
8 Mbps
The frequency range of wireless LAN is
900 MHz bands
2GHz bands
5 GHz bands
All of these
A hub antennae is located at a _________ from where line-of-sight can be established with the various terminal antennae.
Highest point
Lowest point
Central point
None of these
The effective throughput is more in the range of _________ per hub
1 to 2 Mbps
2 to 3 Mbps
3 to 4 Mbps
4 to 5 Mbps
PDA stands for
Personal Device Assistant
Pointer Description Assistant
Personal Digital Assistant
Personal Description Analog
USB stands for
University System Bus
Universal System Board
University System Board
University Serial Bus
_______ are wireless network standard with a data rate of only 2Mbps
IEEE802.11a

IEEE802.11b
IEEE803.11a
IEEE803.11b
_______ are wireless network standard with a data rate of only11Mbps
IEEE802.11a
IEEE802.11b
IEEE803.11a
IEEE803.11b
IEEE802.11a and IEEE802.11b have a distance limitation up to _____ from the access point router
1000feet
100feet
101feet
110feet
IEEE802.11a and IEEE802.11b uses _____ band
1.4GHz
2.4GHz
3.4GHz
4.4GHz
________ technology allows speeds up to 54Mbps
IEEE802.11g
IEEE803.11a
IEEE803.11b
IEEE802.11a

________ allows the movement of device with or without user


User mobility
Device portability
Both a & b
None of these

A user can access to the same or similar telecommunication services at different places
User mobility
Device portability
Both a & b
None of these

A number of mobile and wireless device are


Sensor
Mobile-phone
PDA
Embedded controller
Pager
Palmtop
Notebook
All of these

The availability of _________ made the wireless communication popular among the masses.
Low cost microprocessor
Digital switching
Both a & b
None of these
Cellular radio has another popular names as
Cellular mobile
Cellular phone
Both a & b
None of these
Radio is basically a device, which has
Receiver

Transmitter
Both a & b
None of these
Wireless communication can be carried out
Use of radio
Without using radio
Both a & b
Without use of video
The term radio may be defined as consisting of ______________ of the signal
Modulation
Radiation
Both a & b
None of these

A transmitter and an antenna are used to ____________ the modulated signal within radio spectrum
Modulate
Radiate
Both a & b
None of these

In telephone system as we know that a voice with bandwidth of approximately ____ modulates the current of a telephone line
2kHz
3 kHz
4 kHz
5 kHz
Wireless ca be defined as the ____________________ by means of high frequency electrical waves without a connecting wire
Radio transmission
Reception of signals
Both a & b

None of these
The frequency of a cell may be ________ after the interference zone
Reused
Used
Not be used
Not be reused
PSTN stands for
Public Switched Transport Network
Public System Transport Network
Public System Transfer Network
Public Switched Telephone Network
The radii of a cell may vary from ___________ in a building to a city
One of meters to tens of kilometers
Tens of meters to tens of kilometers
Hundreds of meters to tens of kilometers
Hundreds of meters to hundreds of kilometers
The shape of cell mat not be a ___________ and depends up on the environment
Hexagon
Circle
Pentagon
Both a & b
SDM stands for
System Division Multiple
System Division Multiplexing
Space Division Multiplexing
System Double Multiplexing
Frequencies for communication may vary from very high frequency to ________
Medium range
Microwave range

Digital range
None of these

The signal may be analog or digital with _______


Amplitude
Frequency
Phase modulation
All of these
The multiplexing and access techniques are
SDM(Space Division Multiplexing)
FDM(Frequency Division Multiplexing)
TDM(Time Division Multiplexing)
CDM(Code Division Multiplexing)
All of these
The advantages of mobile communication may be looked into
Higher capacity
Higher number of users
Less transmission power needed
More robust
Decentralized base station deals with interference
Transmission area
All of these
The disadvantages of mobile communication are
Fixed network needed for the base stations
Handover(changing from one cell to another) necessary
Interference with other cells such as co-channel, adjacent-channel
All of these
The important issues on wireless communication are
Cell sizing

Frequency reuse planning


Channel allocation strategies
All of these
In the beginning around 1980, analog cellular telephone systems were developing in ___________
USA
UK
Europe
Japan
The proposed system was expected to meet certain as mentioned as
Good subjective speech quality
Low terminal and service cost
Support for international terminals
Spectral efficiency
ISDN compatibility
All of these
ETSI stands for
European Telecommunication Standards Institute
European Telephone Standards Institute
European Telecommunication Systems Institute
European Telecom Standards Institute
GSM(Global System for Mobile Communication) is a _______ digital mobile telephones standard using a combination Time Division
Multiple Access(TDMA) and FDMA(Frequency Division Multiple Access)
First generation
Second generation
Third generation
None of these

GSM provides only _______ data connection


8.6kbps
9.6kbps

7.6kbps
8.8kbps
The uplink and downlink frequencies for GSM are different and therefore a channel has a pair of frequencies _______ apart
70MHz
80MHz
90MHz
60MHz
The separation between uplink and downlink frequencies are called
Duplex distance
Double distance
Triplex distance
None of these
In a channel the separation between adjacent carrier frequencies is known as channel separation which is _______ in case of GSM
100kHz
200 kHz
300 kHz
400 kHz
The services supported by GSM are
Telephony
Fax and SMS
Call forwarding
Caller ID
Call waiting
All of these
GSM supports data at rates up to 9.6kbps on
POTS(Plain Old Telephone Service)
ISDN
Packet Switched Public Data Networks
Circuit Switched Public Data Networks

All of these
The access methods and protocols for GSM may be from
X.25
X.32
Both a & b
None of these
There are basic types of services offered through GSM are
Telephony or teleservices
Data or bearer services
Supplementary services
All of these
The supplementary services are used to enhance the features of
Bearer
Teleservices
Both a & b
None of these

Dual tone signals are used for various control purposes via the
Telephone network
Different from dual pulses
Both a & b
None of these
SMS(Short Message Service) is a message consisting of a maximum of ______ alphanumeric characters
150
160
170
180
GSM supports ______ Group 3 facsimile
CCIIT

CCITT
CCCIT
CCTTI
Call forwarding is a ________________
Telephony or teleservices
Data or bearer services
Supplementary services
All of these
The other services of call forwarding are
Cell broadcast, voice mail, fax mail
Barring of outgoing and incoming calls conditionally
Call hold, call waiting, conferencing
Closed user groups
All of these
GSM consists of many subsystems, such as the
Mobile station(MS)
Base station subsystem(BSS)
Network and Switching subsystem(NSS)
Operation subsystem(OSS)
All of these
Which forms a radio subsystem
Mobile station
Base station subsystem
Both a & b
None of these
The generic GSM network architecture which is composed of three subsystem are__________
Radio subsystem (RSS)
Network and switching subsystem
Operation subsystem

All of these
The RSS is basically consisting of radio specific equipment such as ____________ to control the radio link
Mobile station(MS)
Base station subsystem(BSS)
Both a & b
None of these
The chief components of RSS are
BSS
Cellular layout
Base station controller(BSC)
All of these
SIM stands for
System Identity Module
Subscriber Identity Module
Subscriber Identity Modem
Subscriber Input Modem
MS contains a SIM card in the form of a very _______ inside the equipment
Large chip
Small chip
Both a & b
None of these
Cell site is defined as the location where _______________ are placed
Base station
Antennas
Both a & b
None of these

Cells are the basic constituents of a cellular layouts with ________


Cell sites

Cell systems
Cell forwarding
None of these
A cell is simply represented by simple ____________
Pentagon
Hexagon
Both a & b
None of these

The size of cells in case of GSM and Personal Communication Service(PCS) are much smaller in the range of _______
5Kms
10Kms
15Kms
20Kms
The portions covered by the antenna are called
Portions
Sectors
Cell sector
None of these
The BTS or Base Transceiver Station is also called
RBS
PCS
GSM
SIM
BTS are housed with all radio equipments such as
Antennas
Signal processors
Amplifiers
All of these

Base station may also be placed near center of cell and known as
Excited cell
Center excited cell
Center cell
None of these
The actual cell is the _____ hexagon, with the towers at the corners
Red
Blue
Red and blue
None of these
Antenna always transmits inward to each cell and area served depends on
Topography
Population
Traffic
All of these
Network and switching subsystem is composed of the ________________
Mobile Services Switching Center(MSC)
Home Location Register(HLR)
Visitor Location Register(VLR)
All of these
The mobile stations(MS) communicates only via the
BTS
BSS
BSC
Um
A BTS is connected to a mobile station via the
BTS
BSS

Abis interface with BSC


Um interface
Both c & d
The Um interface basically consists of _________ for wireless transmission
FDMA
TDMA
CDMA
All of these
The FDMA involves the division up to the maximum of _______
bandwidth into 124 carrier frequencies spaced 200 kHz apart
25MHz
35MHz
24MHz
20MHz
The FDMA channel are further divided in time with a burst period of approximately _______ using a TDMA technique
0.277ms
0.377ms
0.477ms
0.577ms
The eight burst period are grouped into a TDMA frame which forms the basic unit for definition of
Physical channel
Logical channel
Both a & b
None of these
One _______ is one burst period per TDMA frame
Physical channel
Logical channel
Both a & b
None of these
The more channel increases the

GSM
No of base station
No of mobile station
Transmitter power
The more channel decreases the
GSM
No of base station
No of mobile station
Transmitter power
The other popular name for MSC(Mobile Switching Center ) is
BS(Base Station)
MS(Mobile Switch)
MTSO(Mobile Telecommunication Switching Office)
Both b & c
MSC is connected to a ____________ at one end
Mobile station
Base station
Transmitter station
None of these
MSC is connected to a ____________ at other end
MSCs
PSTN
ISDN
None of these
MSCs acts as a __________
Switching
Local Switching exchange
Remote Switching exchange
None of these

The MSC also provides all the functionality such as


Registration
Handover
Authentication
Location updating
Call routing to a roaming subscriber
All of these
The MSC provided to establish link with other fixed networks termed as
Local MSC
Router MSC
Gateway MSC
Remote MSC
The main task of MSC are entrusted upon as
Interworking function(IWF)
Mobility management operations
Data service unit(DSU)
SS7
All of these
Name the two chief databases
Home location register(HLR)
Visitor location register(VLR)
Both a & b
None of these
Which has its main task as associated with MSC
Home location register
Visitor location register
Both a & b
None of these

IMEI stands for


International mobile equipment identity
International mobile equipment information
Interworking mobile equipment information
Interworking management equipment information
Subscribers all administrative information along with the current location in GSM network including in database of HLR are
IMEI number
Directory number
Current city
Last visited area
The class of service subscriber
All of these
HLR keeps the ____________ of each mobile that belongs to the MSC to which it is interacting
Last location
First location
Current location
None of these
HLR performs the functions such as _____________ to subscribers at their current locations by using user profile information
Delivery of calls
Information and messages
Both a & b
None of these
HLR maintains user information in the form of
Static information
Dynamic information
Both a & b
None of these
The static information is the
International Mobile Subscriber Identity

Service subscription information authentication key


Account status
All of these
The dynamic information is the _________ area of the mobile subscriber which is the identity of the currently serving VLR
Last location
First location
Current location
None of these
The HLR handles SS7 transactions with both
MSCs
VLR nodes
Both a & b
None of these

VLR main tasks are association with


MSC
IMSI
TMSI
Roaming
All of these
In nutshell we can say that both the ___________work together to provide local connections as well as roaming outside the local
service area
HLR
VLR
Both a & b
None of these

The operations and Maintenance Center oversees the all important for__________
Proper operation
Setup of the network

Provides Telecommunication Management Network(TMN)


All of these
Operation Subsystem also provides interface NSS via O-Interface that may be __________
X.25 interface
X.32 interface
X.23 interface
None of these

Authentications Center(AuC) is used for


Authentication
Security by generating authentication algorithms
Cryptographic codes
All of these
AuC is responsible for maintaining all data needed to authenticate a call and to encrypt __________________
Voice traffic
Signaling messages
Both a & b
None of these
EIR stands for
Equipment Identification Register
Equipment Identification Remote
Equipment Information Remote
Equipment Information Register
EIR fulfills the ______________ requirement of GSM
Security
Authentication
Both a & b
None of these
SIM card has a secret key for ________________ over the radio channel

Authentication
Encryption
Both a & b
None of these

GSM network checks the __________________ of a mobile device through EIR database
Type
Serial number
Both a & b
None of these

EIR maintains a database of ______________


Manufacturing devices
Malfunctioning devices
Functioning devices
None of these
Um is the link between a
Mobile station
Base station
Both a & b
None of these

GSM 900 operates on a frequency range of _________ for uplink


890-910MHz
890-915MHz.
890-901MHz
890-911MHz

GSM 900 operates on a frequency range of _________ for downlink

935-960MHz
940-970MHz
945-950MHz
925-960MHz
FDM is used to ___________ the available frequency band in GSM
Addition
Divide
Both a & b
None of these
The GSM has many burst types such as
Normal burst
Access burst
Synchronization burst
Frequency correction burst
Dummy burst
All of these
The normal burst period lasts
Approximately 577ms or 15/26ms
Approximately 572ms
Approximately 567ms
Approximately 578ms
Which is provided to avoid overlap with other burst
Frequency space
Guard space
Information space
Bandwidth space
Which is a dedicated time slots within a data or bit stream which repeats after a certain period of time
Frequency
Amplitude

Channel
Normal burst
The channel can be further divided into
Dedicated channel
Common channel
Both a & b
None of these
Both the dedicated and common channel are allocated to a
Base station
Mobile station
Mobile switch
All of these

When a slot repeated every 4.615ms constitute a _______ channel which can be split into several logical channel
Logical
Physical
Both a & b
None of these
TDMA is used to split carrier frequency of 200kHz into_______ time slots
4
8
16
24
GSM 900 has _____ physical full duplex channels
125
124
248
247
GSM 900 has _____ physical half duplex channels

125
124
248
247
Time slot is also known as
Logical channel
Physical channel
Both a & b
None of these

A Traffic Channel(TCH) is defined for speech and data at a rates of


9.6kb/s
4.8kb/s
2.4kb/s
All of these

The length of 24 TDMA frames are kept


120ms
130ms
150ms
160ms
How many frames are included for traffic in 26TDMA frames
1
24
25
16
How many frames are included for Slow Associated Control Channel(SACCH) in 26TDMA frames
1
24

25
16
How many frames are included for currently unused in 26TDMA frames
1
24
25
16
Which are basically used to control the logical channels
CCHs
TCH
Both a & b
None of these

Depending upon the task performed by the Control Channels(CCHs),they are categorized in
Broadcast Control Channels(BCCH)
Common Control Channels(CCCH)
Dedicated Control Channels(DCCH)
All of these
The different control channel are accessed by
Idle mode
Dedicated mode mobile
Both a & b
None of these
Which is a unidirectional downlink point to multi-point signaling channel from BTS to MS
BCCH
CCCH
DCCH
All of these
Which is bi-directional point to multi-point signaling channel that exchanges the signaling information for network access
management and transport information regarding connection setup between MS and BTS

BCCH
CCCH
DCCH
All of these

Which is bidirectional and are multiplexed on a standard channel for registration, location updating and authentication in order to
set up a call or TCH
BCCH
CCCH
DCCH
All of these
GSM specifies a multiplexing scheme to integrate several frames where a periodic pattern of 26 slots occurs in all TDM frames with
a TCH , the combination of these frames are called
Multiframe
Traffic-multiframe
Multiprogramming
None of these
Out of 26 frames, 24 are used for traffic, one is used for the __________ and one is currently unused
SACCH(Slow Associated Control Channel)
FACCH(Fast Associated Control Channel)
BCCH
CCCH
GSM is already mentioned that the duration of one TDMA frame is
4.516ms
4.615ms
4.156ms
4.165ms
Control multiframe comprises of 51 TDMA frame with a duration of ________
234.5ms
233.5ms

235.4ms
235.3ms
2048 superframes constitute a ________
hyperframe
lowerframe
strongerframe
none of these
GSM has three functional layers
Physical layer
Data link layer
Layer three in correspondence with OSI model
All of these
In OSI model, the lower three layers usually terminate in the ______ but it is not true in case of GSM
Another node
Same node
Two nodes
None of these
In protocols, the RR part of layer three is spread over the
MS
BTS
BSC
MSC
All of these

Physical layer is the ___________ which provides transfer of bit streams over the physical radio links through U m interface
Lowest layer
Highest layer
First layer
None of these

Physical layer handles all radio specific functions such as ________________


Creation of bursts
Multiplexing of bursts into TDMA frame
Synchronization with BTS
Channel coding, error detection and correction
Quality control on the downlink
All of these
The digital modulation and security related issues such as encryption of digital data are carried over the radio interface between
____________
MS
BTS
Both a & b
None of these

The communication on Abis interface between _____ and BSC is established by using the standard LAPD
MS
BTS
MTS
None of these
A reliable data link service is provided between _________ through Message Transfer Part of SS7
BSC
MSC
Both a & b
None of these

The layer three chiefly comprises of _____________


RR(radio resource management)
MM(Mobility management)
CM(call control management)
All of these

What are the functions of mobility management


Location update
Authentication
Temporary Mobile Subscriber Identity
Reallocation
All of these

CM performs
Establishment
Maintenance
Termination of a circuit-switched call
All of these

CM performs other supporting


Supplementary service(SS)
Short Message Service(SMS)
Both a & b
None of these
The radio resource management sublayer terminates at the
BSC
BSS
MSC
MTS
The radio resource management is used to establish physical connections over the call-related signaling and traffic channels
between the ______________
BSC
BSS
MS
Both b & c
The RR layer is the part of RR layer is implemented in the BTS to provide functions between the ___________

BTS
BSC
MSC
Both a & b
The __________ is also responsibility of the layers
Handover
Handoff
Both a & b
None of these
Which uses signal strength measurements and cell congestion information to determine when a handoff should occur
MSC
BSS
BSC
Both a & b
Handoff notifications are sent to respective ____ which in turn forward them to HLRs
VLRs
VLCs
VCDs
LCDs
The mobility management sublayer on the _____ of the RR is terminated at the MSC
Low
Top
Center
First
MM is used to
Establish
Maintain
Release connections between the MS a
The network MSC

All of these
The Communication Management protocol controls __________ call establishment
first-to-end
end-to-end
end-to-first
first-to-first
CM protocols are used in GSM network, these are
Transaction Capabilities Application Part(TCAP) protocol
Mobile Application Part(MAP) protocol
Both a & b
None of these
MAP is used between _________in the form of query and response messages
MSC
VLR
HLR
AuC
All of these
____________ Together with the MSC. Provide the call routing and roaming capabilities of GSM where a subscriber can roam
nationally and even internationally
HLR
VLR
CLR
Both a & b
MSISDN stands for
Mobile Subscriber ISDN Number
Mobile Station ISDN Number
Mobile Switching ISDN Number
Mobile Standard ISDN Number
Which number caller used to reach a mobile subscriber
MSISDN number

IMSI number
TMSI number
MSRN
MSISDN number consists of
Country code(such as 91 for India)
National subscriber destination code
Subscriber number
All of these
Which number of MSISDN is the address of the GSM provider
Country code(such as 91 for India)
National subscriber destination code
Subscriber number
All of these
Which is a unique identification number allocated to each mobile subscriber
MSISDN Number
IMSI Number
TMSI Number
MSRN
It sits inside SIM card, which can be carried out anywhere and can be used in any MS
MSISDN Number
IMSI Number
TMSI Number
MSRN
The IMSI number consists of
MCC(Mobile Country Code consisting of three digits)
MNC(Mobile Network Code consisting of two digits)
MSIN(Mobile Subscriber Identity Number consisting of ten digits)
All of these
Which is used in the place of the IMSI for the definite identification and addressing of the mobile station

MSISDN Number
IMSI Number
TMSI Number
MSRN
In TMSI nobody can determine the identity of the subscriber by listening to the __________
Video channel
Radio channel
Audio channel
None of these

GSM used the _______ byte TMSI for local subscriber identification
2
4
6
8
Which is a temporary location-dependent ISDN number assigned by the locally responsible VLR to each mobile station in its area
MSISDN Number
IMSI Number
TMSI Number
MSRN
The MSRN consists of
VCC(Visitor country code)
VNDC(Visitor national destination code)
The identification of the current MSC along with the subscriber number(SN)
All of these
GSM call may be classified into two types namely
MTC(Mobile Terminated Call)
MOC(Mobile Originated Call)
Both a & b

None of these
___________ becomes necessary when mobile moves from area of one BSC into another area of the same or into another BSC
Handoff
Handover
Haddon
Handwork
Handover involves a number of procedures depending upon the location are
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
All of these
Which involve the transfer of connections from one channel to another channel on the same BTS
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
Which involve the transfer of the connection from one BTS to another BTS on the same BSC
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
The connections is transferred between BTS belonging to two different BSCs within one MSC is called
Intra-cell handover
Inter-cell, intra-BSC handover
Inter-BSC, intra-MSC handover
Inter MSC handover
Which involve the transfer of a connection to a BTS between two cells within another MSC
Intra-cell handover

Inter-cell, intra-BSC handover


Inter-BSC, intra-MSC handover
Inter MSC handover
A collection of interconnected networks is known as
Internet
Internetwork
Network
Internetworking
The process of interconnecting different network is called
Internet
Internetwork
Network
Internetworking
The internetworking protocol is known as
SMTP
PPP
TCP/IP
NNTP
The Network element that connects individual network is known as
Gateway
Router
TCP/IP
Both a & b
If single computer network is divided into segments and router are added between them it forms an
Internet
Internetwork
Network
Internetworking
Which was used as original term for an internetwork which meant a method for connecting networks with disparate technologies

Catenet
Bridge
PANs
Novell netware
The computer network are of different typessome are
PANs(Personal Area Networks)
Novell Netware
Both a & b
None of these
The word Internet and internet are
Different
Same
Dependent on each other
None of these
Which signifies the specific network model
internet
Internet
Both a & b
None of these
Which means generic interconnection of networks
internet
Internet
Both a & b
None of these

Which protocol provides a reliable data transfer


TCP
UDP
IP

Both a & b
Which protocol provides a unreliable data transfer
TCP
UDP
IP
Both a & b
Every computer has a unique address called
IP
UDP
TCP
None of these
The IP address lies between
0 to 245
0 to 254
0 to 255
0 to 265

DHCP stands for


Dynamic Host Configuration Protocol
Digital Host Communication Provider
Digital Host Communication Protocol
Dynamic Host Configuration Provider
__________ is used for every computer needs one protocol stack for communicating on the Internet
Protocol stack
Protocol
Transmission protocol
None of these
Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail etc
Application Layer Protocol

Transport Layer Protocol


Internet Layer Protocol
Hardware Layer
Which protocol uses TCP routes to an application on a computer by use of a port number
Application Layer Protocol
Transport Layer Protocol
Internet Layer Protocol
Hardware Layer
Which protocol moves IP packets to a specific computer by use of an IP address
Application Layer Protocol
Transport Layer Protocol
Internet Layer Protocol
Hardware Layer
Which contains network interface cards, modems for phones or wireless lines for converting binary packet data to network signals
and vice versa
Application Layer Protocol
Transport Layer Protocol
Internet Layer Protocol
Hardware Layer
Hardware layer handle raw
Bytes of data
Bits of data
Both a & b
None of these
Where is the TCP layer is situated in the application layer in the protocol stack
Below
Top
Center
None of these
TCP uses port number to route correct application on the ___________

Source computer
Destination computer
Both a & b
None of these
TCP is __________ in nature
Textual
Not textual
None of these

TCP also contains a ___ checksum


16bit
16byte
32bit
32byte
What is the port number of the HTTP
80
25
23
20/21
What is the port number of the SMTP
25
23
20/21
27960
What is the port number of the Telnet
25
23
20/21
27960

What is the port number of the FTP


25
23
20/21
27960
What is the port number of the Quake III Arena
25
23
20/21
27960
TCP is ______________
Connection-oriented
Reliable
Both a & b
None of these

IP is ___________
Connectionless
Unreliable
Both a & b
None of these

IP does not ensure movement of a packet to its destination and have no knowledge of __________
Port numbers
Connections
Both a & b
None of these

IP packets ________ arrive in the order in which it is sent

May
May not
May or may not
None of these

SMDS stands for


Switched Multiple Data Services
Switched Multimegabit Data Services
Switched Multiple Double Services
Switched Multiple Data Subscriber
SMDS is a packet switched, high speed, connectionless public data service that extends
Local Area Network
Metropolitan Area Network
Wide Area Network
All of these
In SMDS, the service follows
IEEE 802.6 DQDB(Distributed Queue Dual Bus)
IEEE 802.5 DQDB(Distributed Queue Dual Bus)
IEEE 802.4 DQDB(Distributed Queue Dual Bus)
IEEE 803.6 DQDB(Distributed Queue Dual Bus)
The SMDS is defined for MAN under_______ standard
IEEE 802.5
IEEE 802.4
IEEE 802.6
IEEE 802.2
SMDS is capable of variety of technologies including
DQDB(Distributed Queue Dual Bus)
Broadband ISDN(B-ISDN)
Both a & b

None of these
North American implementation uses DQDB with DS1 at a data rate of
1.5Mbit/s
45Mbits/s
1.6Mbit/s
46Mbit/s

North American implementation uses DQDB with DS3 at a data rate of


1.5Mbit/s
45Mbits/s
1.6Mbit/s
46Mbit/s
SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of
1.5Mbit/s
45Mbits/s
155Mbit/s
1.9Mbit/s
SMDS is a
Data service
Telephone service
Frame service
Video service
SMDS is a
Technology
Protocol
Both a & b
None of these

The word CPE means

Customer Premises Equipment


Computer Premises Equipment
Customer Packet Equipment
Customer Protocol Equipment
The SMDS is designed to handle
Continuous traffic
Finite traffic
Bursty traffic
All of these
The telephone service is designed to handle
Continuous traffic
Finite traffic
Bursty traffic
All of these
In SMDS , the telephone number consists of
Country code
Area code
Subscriber code
All of these
The SMDS can serve
Only area
Only nationally
Internationally
None of these

Address of source and destination in SMDS both consists of 4 bit code followed by a telephone no of max.
12 decimal digits
16 decimal digits
15 decimal digits

20 decimal digits

The SMDS is similar to which transfer mode


Synchronous transfer mode
Asynchronous transfer mode
Both a & b
None of these
SMDS make use of cell relay with _______ per cell
53 octets
56 octets
58 octets
55 octets

The data unit of SMDS can encapsulate frames of


IEEE802.3
IEEE802.5
FDDI
All of these
SMDS make use of
Copper
Fiber media
Both a & b
None of these
In SMDS, with a tick every 10msec user can send_________ on the average
100,000 bytes/sec
10,000 bytes/sec
100,0000 bytes/sec
100,000,00 bytes/sec
Which means the network can expand with minimal investment

SNMP
Scalability
Screening
Simple

Which is a network protocol that is based on UDP and is a component of the component of the Internet Protocol Suite, defined by
IETF(Internet Engineering Task Force)
SNMP
Scalability
Screening
Multicasting

The user can have access to high speed lines ______ connected to MAN
32Mbits/s
33Mbits/s
34Mbits/s
35Mbits/s
The user can having access capacity of ______ connected to MAN
151Mbits/s
152Mbits/s
154Mbits/s
155Mbits/s
The backbones of MAN has working data rate of ________
139Mbits/s
140Mbits/s
155Mbits/s
134Mbits/s
User is charged for maximum rate of __________ bandwidth
34Mbits/s
4Mbits/s

10Mbits/s
16Mbits/s
25Mbits/s
Except (a) all are answers
SMDS was primarily used for connecting
LAN
MAN
WAN
PAN
In SMDS, MAN interconnect
Ethernet
Token ring networks
Both a & b
None of these
SMDS networks have many underlying devices for supporting high-speed service are
Subscriber network interface(SNI)
Carrier equipment
Customer Premises Equipment (CPE)
All of these
CPE may be devices such as
PCs(Personal computers)
Intermediate nodes
Terminals
All of these

Which are intermediate nodes provided by SMDS carrier


Multiplexers
Modems
Routers

All of these
PDUs contain
Source address
Destination address
Both a & b
None of these
Addressing in SMDS has provision for
Group addressing
Security features
Both a & b
None of these
In SMDS, there are two useful security features, namely
Source address validation
Address screening
Both a & b
None of these
CCITT stands for
Consultative Committee International for Telegraphy and Telephony
International Consultative Committee for Telegraphy and Telephony
International Consultative Committee for Telephony and Telegraphy
Consultative Committee International for Telephony and Telegraphy
X.25, it was developed for computer connections used for
Timesharing connection
Terminal connection
Both a & b
None of these
X.25 provides a virtual high-quality digital network at
Low cost
High cost

Medium cost
All of these
Which is another useful characteristics of X.25
Speed
Matching
Speed matching
None of these
In X.25 DTEs are not required to use the same line speed because of the
Store
Forward nature of packet switching
Excellent flow control
All of these
In X.25, A host connected at 56kbps and communicating with numerous remote sites can be linked with cheaper______ lines
18.2kbps
19.2kbps
20.2kbps
22.2kbps
In X.25 defines the protocols from
Layer 2 to Layer 3
Layer 1 to Layer 2
Layer 1 to Layer 3
Layer 3 to Layer 2
Based on X.25 rules, how many logical channel can be set on a single physical line
256
16
4096
2556

To enable control of 4096 logical channels in X.25, there are ____ channel groups

256
16
4096
2556
Each logical channel group is divided into ____ logical channels
256
16
4096
2556
The channel grouping in X.25 are known as
Logical channel group number(LCGN)
Logical channel number(LCN)
Both a & b
None of these
X.25 is a
Protocol
Data service
Telephone service
Technology
X.25 protocol was recommended by CCITT in
1975
1976
1977
1978
X.25 protocol exchanged the data control information between
A node
A user device
Both a & b
None of these

The user device and node are properly referred to as


DTE
DCE
Both a & b
None of these
A terminal of 1.2kbit/s can communicate with host computer at _______ through the packet switched network
9600bits/s
8600bits/s
7600bits/s
6600bits/s
The transmission speed of sender should be ___________ as that of receiver in the X.25
Same
Different
Both a & b
None of these
X.25 make use of _______ service
Connectionless
Connection-oriented
Both a & b
None of these
PAD stands for
Packet Assembly and Disassembly
Procedure Assembly and Disassembly
Permanent Assembly and Disassembly
Package Assembly and Disassembly
X.25 supports two types of packet format named
Control packet
Data packet
Both a & b

None of these

A X.25 packet make up the ______ of an HDLC frame


Frame field
Data field
Information field
Both b and c are same
Maximum packet sizes in X.25 vary from
64bytes to 128bytes
64bytes to 4096 bytes
64bytes to 256bytes
32bytes to 64bytes
A X.25 protocol use
Store and forward method
Stop and wait method
Store and stop method
None of these
The advantage of X.25 are
Was developed to recover errors
Packet switching eases compatibility problems in communications between PCs
Packet switching cannot waste bandwidth
All of these
Frame relay constitutes of the OSI _____ layer
First
Second
Third
Fourth
Logical channels are identified by a number referred by
DLCI(Data Link Connection Identifier)

VLCI(Very Large Connection Identifier)


HDLC(High Level Data Link Control )
QLLC
DLCI can have a value between
0 and 1025
0 and 125
0 and 256
0 and 1023

The device which splits data into frames as well as combines frames into data is referred as
FRAD(Frame relay and Disassembly)
FDLC
HDLC
DLCI
Frame relay indicates network congestion using two flags namely ________ bits in data frames
Forward Explicit Congestion Notification(FECN)
Backward Explicit Congestion Notification(BECN)
Both a & b
None of these
Cell relay is data transmission services that uses transmission technology referred to as
ATM(Asynchronous Transfer Mode)
BTM
STM
DTM
The data transmission is a fixed length of data known as
Cell
Frame
Relay
Cell relay

Advantages of cell relay are


High-speed transmission
Multiplexing transmission
Both a & b
None of these
Disadvantages of cell relay are
Cell discarding occurs with congestion
High cost
Both a & b
None of these
The cell relay protocol corresponds to first ____ layer of OSI
One
Two
Three
Four
The part that corresponds to second layer, that is, data link layer is referred to as
DLC layer
ATM layer
STM layer
Protocol layer
In cell relay these logical channels are represented as
Virtual Channels(VCs)
Virtual Paths(VPs)
Both a & b
None of these
A VC is a virtual channel composed of
Frames
Cells
Relay

Protocol
VP is a bundle of
VCs
VCM
VCI
VIP
Identifiers are called ___________________ are used to identify VPS and VCs
VCIs
VIPs
Both a & b
None of these
In cell relay communication performed between
Two VP
Two VC
VP and VC
VP and VCI
ATM is an
International Telecommunication
International Telecommunication-Union
International Telecommunication Union-Telecommunication Standardization Sector(ITU-T)
International Telecommunication Union-Telecommunication
ATM networks are
Connectionless
Interconnected
Connection oriented
None of these
In today ATM, separate networks are used to carry _________ information mostly
Voice
Video

Data
All of these
Data traffic in ATM tend to be
Continuous
Bursty
Discontinuous
None of these
ATM cell has a fixed length of __________
52bytes
53bytes
54bytes
55bytes
Which is a portion carries the actual information
Payload(48bytes)
Payment
Payroll
None of these
The purpose of ATM is to provide
High speed
Low-delay multiplexing
Switching networks
All of these
ATM is specifically designed as ________ technology for voice, video, and data
Single
Double
Multiple
None of these
ATM can support
Different speeds

Traffic types
Quality of service attached to applications
All of these
ATM cells coming from a user are guaranteed delivery at the other end with a
High probability
Low delay
Both a & b
None of these
The characteristics of ATM are as follows
The transport speeds of most ATM applications are most often 155Mbps and 622Mbps
ATM is a flexible service made possible by the size of the packets (cells).
The small cell size allows a variety of applications to run on ATM networks including voice, video and data
All of these
Narrow band ISDN provides for the following services
Circuit-switched voice
Circuit-switched data
Low-speed packet
High-speed packet
All of these
The cell relay is considered to be the __________ of the future
Transmission service
Transport service
Transfer service
None of these
ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines, as also
other media
CCITT
ITU
Both a & b
None of these

Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less
1.533Mbps
1.544Mbps
1.555Mbps
1.552Mbps
The range of speeds for the broadband ISDN services usually range from ______ to the Gigabit range
24Mbs
25Mbs
26Mbs
27Mbs
BRA stands for
Basic Rate Access
Basic Random Assembly
Bit Rate Assembly
Bursty Rate Assembly

BRA affords an ISDN user with simultaneous access to two _____ data channels
32kbps
64kbps
128kbps
256kbps
The ISDN Internetworking Equipment devices are
Terminal Adapters(TAs)
ISDN Bridges
ISDN Routers
All of these
Advantages of ISDN internetworking are
Quality
Economy

Availability
All of these

ISDN connections mat be seen as very _______ digital conduits


High rate-of-error
Low rate-of-error
Both a & b
None of these

Each channel in BRA is referred to as


A-channel
B-channel
C-channel
F-channel
The B-channel is capable of carrying both
Voice
Data
Both a & b
None of these
The Another channel in BRA(Basic Rate Access) is referred as D-channel Functions at
12Kbps
14Kbps
16Kbps
18Kbps
The D-channel in BRA is used for sending and receiving signal between
User devices
ISDN
Both a & b
None of these

The total transmission rate of BRA workout to a combined total of


144kbit/s
145kbit/s
146kbit/s
147kbit/s
BRA is also known as ____________, as per CCITT
I.430
I.420
I.440
I.450
Which service provide up to thirty independent 64kbps B channels and a separate 64kbps D channel to carried the signaling
Basic rate access
Primary rate access
Both a & b
None of these
Primary rate access is also known as __________, as per CCITT
I.420
I.421
I.422
I.423
The CCITT eventually was reformed in to the group which is now called the ________
ITU-T
UIT-T
TIU-T
TUI-T
The two standards ISDN connectors are
RJ-45 type plug and socket uses unshielded twisted pair cable
One for accessing primary rate ISDN through a coaxial cable
Both a & b

None of these
ISDN can be accessed as per CCITT by using two service called
BRI(Basic Rate Interface)
PRI(Primary Rate Interface)
Both a & b
None of these

BRI includes ______ B channels and ________ D channel


One , two
Two, three
Two, one(may be written as 2B+D)
Three, two
BRI providing data transmission speed of
62kbps
63kbps
64kbps
65kbps
PRI is popularly referred to as ____________ due to the number of channels as per CCITT
20+D
30+D
40+D
50+D
PRI can carry up to 30 independent, ________ lines of data or voice channels

62kbps
63kbps
64kbps
65kbps

Вам также может понравиться