Вы находитесь на странице: 1из 2

CAREER ORIENTED PROGRAMME ADVANCED NETWORKING[CODE: 07CSC09] II MCA - I INTERNAL TEST Time: 3 Hours Section A (20 * 1 = 20) Answer

All CHOOSE THE BEST ANSWER: 1. A _____ program is called as browser. (a) client (b) server (c) client/server Max Marks: 75

(d) none

2. FTP stands for ________________. (a) File Transfer Protocol (b)Field Transport Port (c) File Transport Program (d) Field Transfer Port 3. MIME stands for ____________________. (a) Multipurpose Internet Mail Extensions (b) Multiple Interconnect Mid Extraction (c) Multi Interaction Mime Example (d) None 4. IRC stands for ________________. (a) Internet Relay Chat (b) Interconnection Record chain (c) Intranet Random chat (d) Interface Rate Chain 5. DNS stands for ________________. (a) Domain Name System (b) Directory Name System (c) Domain Nano seconds (d) none 6. URL stands for ________________. (a) Uniform Resource Locator (b) Universal Resource Locator (c) Union Reading Lab (d) none 7. UDP stands for _________________. a) User Defined Program c) User Datagram Protocol 8. TGS stands for _________________. a)Ticket Guaranteed Service c)Ticket Granting Service 9. CRC stands for ____________________. (a) Circuit (c) Connection Redundancy Check b) User Data Performance d)User Defined Protocol b) Ticket Grant sequence d) Ticket Granting sequence (b) Cyclic Redundancy Check (d) Connectionless Redundancy Check

10. ATM stands for _______________________. (a) Asynchronous Transfer Mode (b) Alternate Technique Method (c) Anti Transfer Method (d) None MATCH THE FOLLOWING 11. 1) link to other data 2) discussion groups 3) delivery of mail 4) post office mail a) USE NET b) hypertext c) snail mail d) SMTP

12. 1) 2) 3) 4)

veronica inline image FTP ATM

a) cells b) copy files from one computer to another c) part of web page d) search engine a) b) c) d) authentication service directory service secret entry point hidden code

13. 1) Trap door 2) Trojan horse 3) X.509 4) kerberos 14. 1) 2) 3) 4) 802.3 ATM FDDI Packet Switches

a) connectionless b) counter rotation c) connection oriented technology d) IEEE standard for internet

FILL IN THE BLANKS 15. Modem speeds are measured in ___________. 16. _________ number identifies the position in the senders byte stream. 17. VPI stands for _____________________. 18. Data divided into small pieces called ______________. 19. Certificates of X generated by other CAs are called ________________. 20. MPEG stands for ________________. SECTION - B ( 5 X 4 = 20 MARKS) 21.a) Write short notes on FTP. (OR) b) List some of the HTML tags and its uses with example 22.a) Discuss about two approaches to network communication. (OR) b) Write about cross section of coaxial cable. 23. a)List some properties of Ethernet. (OR) b)Explain about collision detection and recovery in Ethernet. 24. a) Write about TCP segment format. (OR) b)Write notes on Checksum computation in TCP. 25. a) Write short notes on Intruders Techniques. (OR) b) Write short notes on the Types of Viruses SECTION - C ( 7 X 5 = 35 MARKS) 26. a) Explain briefly about the tour of the internet. (OR) b)Explain a brief note on Internet Service Providers. 27. a) Discuss about Mail. (OR) b) Write about a. URLs and Schemes b. URLs and Host Names c. URLs and Port Numbers 28. a) Write a HTML program to create your college website. (OR) b) Explain Kerbereos. 29. a) Explain about FDDI. (OR) b) Explain briefly about Ethernet technology. 30. a) Explain X.509. (OR) b) Explain in detail about trusted system

Вам также может понравиться