Which of the through is share the data of two computer?

A.        Library

B.        Network

C.        Grouping

D.        Integrated system

 In specific, if the systems use separate protocols, which one of the following devices is used to link two systems?

A.        Repeater

B.        Gateway

C.        Bridge

D.        Hub

The private key in asymmetric key cryptography is kept by?

A.        Sender

B.        Receiver

C.        Sender and Receiver

D.        None of the these

 Which of the following algorithms is not used in asymmetric-key cryptography?

A.        RSA algorithm

B.        Diffie-Hellman algorithm

C.        Electronic code book algorithm

D.        None of the mentioned

 In the cryptography, the sequence of the letters is rearranged by?

A.        Transposition ciphers

B.        Substitution ciphers

C.        Both a and b

D.        None of these

The term IPv4 stands for?

A.        Internet Protocol Version 4

B.        Internet Programming Version 4

C.        International Programming Version 4

D.        None of these

 The term LAN stands for?

A.        Local Area Net

B.        Local Area Network

C.        Local Array Network

D.        Local Array Net

Which of these is a standard interface for serial data transmission?

A.        ASCII                                                                                                                                    

B.        RS232C

C.        2

D.        Centronics

 Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?

A.        Ring

B.        Local area

C.        Hierarchical

D.        Star

Which of the following transmission directions listed is not a legitimate channel?

A.        Simplex

B.        Half Duplex

C.        Full Duplex

D.        Double Duplex

 "Parity bits" are used for which of the following purposes?

A.        Encryption of data

B.        To transmit faster

C.        To detect errors

D.        To identify the user

What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?

A.        Unshielded twisted pair

B.        Optical fiber

C.        Coaxial cable

D.        Microwave

A collection of hyperlinked documents on the internet forms the ?

A.        World Wide Web (WWW)

B.        E-mail system

C.        Mailing list

D.        Hypertext markup language

The location of a resource on the internet is given by its?

A.        Protocol

B.        URL

C.        E-mail address

D.        ICQ

 The term HTTP stands for?

A.        Hyper terminal tracing program

B.        Hypertext tracing protocol

C.        Hypertext transfer protocol

D.        Hypertext transfer program

 A proxy server is used as the computer?

A.        with external access

B.        acting as a backup

C.        performing file handling

D.        accessing user permissions

Which software prevents the external access to a system?

A.        Firewall

B.        Gateway

C.        Router

D.        Virus checker

Which of the following best describes uploading information?

A.        Sorting data on a disk drive

B.        Sending information to a host computer

C.        Receiving information from a host computer

D.        Sorting data on a hard drive

 Which one of the following is the most common internet protocol?

A.        HTML

B.        NetBEUI

C.        TCP/IP

D.        IPX/SPX

Software programs that allow you to legally copy files and give them away at no cost are called which of the following?

A.        Probe ware

B.        Timeshare

C.        Shareware

D.        Public domain

 The term FTP stands for?

A.        File transfer program

B.        File transmission protocol

C.        File transfer protocol

D.        File transfer protection

 At what speed does tele-computed refer?

A.        Interface speed

B.        Cycles per second

C.        Baud rate

D.        Megabyte load

 Which one of the following is not a network topology?

A.        Star

B.        Ring

C.        Bus

D.        Peer to Peer

The maximum length (in bytes) of an IPv4 datagram is?

A.        32

B.        1024

C.        65535

D.        512

 The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?

A.        255.243.240

B.        255.255.0.0

C.        255.255.0

D.        255.255.255

 When the mail server sends mail to other mail servers it becomes ___ ?

A.        SMTP client

B.        SMTP server

C.        Peer

D.        Master

The length of an IPv6 address is?

A.        32 bits

B.        64 bits

C.        128 bits

D.        256 bits

 Which of the following address belongs class A?

A.        121.12.12.248

B.        130.12.12.248

C.        128.12.12.248

D.        129.12.12.248

 Which of the following IP addresses can be used as (a) loop-back addresses?

A.        0.0.0.0

B.        127.0.0.1

C.        255.255.255.255

D.        0.255.255.255

 The term WAN stands for?

A.        Wide Area Net

B.        Wide Access Network

C.        Wide Area Network

D.        Wide Access Net

 Which of the following cannot be used as a medium for 802.3 ethernet?

A.        A thin coaxial cable

B.        A twisted pair cable

C.        A microwave link

D.        A fiber optical cable

 What IP address class allocates 8 bits for the host identification part?

A.        Class A

B.        Class B

C.        Class C

D.        Class D

 The term IANA stands for?

A.        Internet Assigned Numbers Authority

B.        Internal Assigned Numbers Authority

C.        Internet Associative Numbers Authoritative

D.        Internal Associative Numbers Authority

 How many versions available of IP?

A.        6 version

B.        4 version

C.        2 version

D.        1 version

 

 How many fields are in the SMDS packet?

A.        Two

B.        Three

C.        Four

D.        Five

 What is the maximum data transfer rate of the optical fiber wire?

A.        50 kbps

B.        1000 kbps

C.        1000 Mbps

D.        None of the these

 POTS network works on the principle of ________

A.        Telephone switching

B.        Proxy server

C.        File system

D.        Circuit system

 Which of the following protocols is the bit-oriented protocol?

A.        SSL

B.        http

C.        HDLC

D.        All of the these

 SLIP stands for _______

A.        System line internet protocol

B.        Serial line internet protocol

C.        Signal line internet protocol

D.        Signal internet protocol

 The second port is used to ____________ in the two-port network.

A.        Input terminal

B.        Output terminal

C.        Signal terminal

D.        Bandwidth terminal

 Which of the following layers does the HTTP protocol work on?

A.        Physical layer

B.        Data-link layer

C.        Application layer

D.        None of the these

 Which of the following statement correct about the cipher in cryptography?

A.        It is a method for performing encryption and decryption

B.        It is used to establish the network connection

C.        It is a message event

D.        All of the these

 SONET stands for ______________.

A.        Signal Operation Network

B.        Synchronous Optical Network

C.        System Optical Network

D.        Signal Optical Network

 How many layers does the SONET contain?

A.        2 layers

B.        3 layers

C.        4 layers

D.        5 layers

 RAKE receiver designed for _____.

A.        Multipath fading

B.        Signals

C.        Data network

D.        Network connection

 What is the formula of high rate in zigzag code?

A.        J / (J * 1)

B.        -Z / (1 + J)

C.        Z * (1 + J)

D.        J / (J + 1)

 What is the size of the sender window in the Go Back N (ARQ) protocol?

A.        0

B.        1

C.        10

D.        n

 What is the efficiency of the Go back N (ARQ) protocol?

A.        N = N / (2a + 2a)

B.        N = N / (1 + 2a)

C.        N = N * (2a + 2a)

D.        N = N * (1 + 2a)

 What is the size of the destination port in the UDP protocol?

A.        8 bits

B.        16 bits

C.        20 bits

D.        32 bits

 What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages?

A.        Ping

B.        Route

C.        Traceroute

D.        Ifconfig

 A client of the DNS (Domain Name System) application is called _____.

A.        DNS server

B.        DNS Name

C.        DNS resolver

D.        DNS inquirer

 During normal IP packet forwarding by a router, which of the following fields of the IP header is updated?

A.        Repeater

B.        Source address

C.        Destination address

D.        Checksum

 MAC address is also called ______.

A.        Physical address

B.        Logical address

C.        Source address

D.        Destination address

 Which of the following addresses is 32-bit?

A.        MAC address

B.        Virtual address

C.        Source address

D.        Destination address

 EDI stands for ____.

A.        Electronic Data Interchange

B.        Electronic Digital Internet

C.        Electronic Digital Interchange

D.        Electronic Data Internet

 What is the maximum data transfer rate of the ISDN?

A.        1024 Mbps

B.        64 Mbps

C.        64 kbps

D.        1024 kbps

 What is the size of the UDP header?

A.        8 bytes

B.        16 bytes

C.        20 bytes

D.        64 bytes

 Which of the following protocols is the connection-less protocol?

A.        UDP

B.        TCP

C.        IP

D.        All of the these

 What is the maximum length of the STP wire?

A.        20 ft

B.        50 ft

C.        50 meters

D.        100 meters

 Which network is suitable for a building?

A.        WAN

B.        LAN

C.        MAN

D.        PAN

 ________ is a 2G mobile telecommunications based on the CDMA.

A.        IS-95

B.        ISO 1990

C.        IS-97

D.        None of the these

 Which of the following statements is correct about IRC?

A.        It sends the messages in virtual time

B.        It is an application layer protocol

C.        It works on the proxy model

D.        All of the these

 Which of the following devices is not a networking device?

A.        Hub

B.        Switch

C.        Bridge

D.        None of the these

Which layer of the TCP / IP stack corresponds to the OSI model transport layer?

A.        Host to host

B.        Application

C.        Internet

D.        Network Access

 An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long size. Calculate the maximum throughput.

A.        5999

B.        6900

C.        6027

D.        5027

Which of the following methods is used to broadcast two packets on the medium at a time?

A.        Collision

B.        Synchronous

C.        Asynchronous

D.        None of the above

 What is the maximum efficiency of pure aloha at G = 1/2?

A.        1.89

B.        17.99

C.        18.999

D.        18.4

 What is the maximum efficiency of slotted aloha at G = 1?

A.        36.8

B.        35.8

C.        35.5

D.        37.8

 Which of the following statement is true about error detection techniques used on communications link?

A.        Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.

B.        Error detection cannot be used on simplex links.

C.        Hamming code can detect up to 3-bit errors.

D.        All of the these

 In which of the following switching methods, the message is divided into small packets?

A.        Message switching

B.        Packet switching

C.        Virtual switching

D.        None of the these

 Which of the following switch methods creates a point-to-point physical connection between two or more computers?

A.        Message switching

B.        Packet switching

C.        Circuit switching

D.        None of the these

 What is the second name of the proxy server?

A.        Proxy tools

B.        Application proxy

C.        Application-level gateway

D.        All of the these

Which of the following devices does not require power to forward the signals?

A.        Active hub

B.        Passive hub

C.        Repeater

D.        Bridge

 How many pins does RJ-45 contain?

A.        Two

B.        Four

C.        Eight

D.        Ten