0% found this document useful (0 votes)
184 views

Computer Networks Quiz Questions

The document contains a quiz with multiple choice questions related to networking concepts such as transmission rates, protocols, devices and their functions. It includes 15 questions related to topics like bandwidth, frequency, attenuation, signal-to-noise ratio and encoding schemes. The student attempted the quiz and scored 53% by answering 8 questions correctly out of 15.

Uploaded by

Devil Kali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
184 views

Computer Networks Quiz Questions

The document contains a quiz with multiple choice questions related to networking concepts such as transmission rates, protocols, devices and their functions. It includes 15 questions related to topics like bandwidth, frequency, attenuation, signal-to-noise ratio and encoding schemes. The student attempted the quiz and scored 53% by answering 8 questions correctly out of 15.

Uploaded by

Devil Kali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

Includes the set of questions related to week 1 portion

1 point
Land line telephone communication is a type of packet-switching network. True or False

false
true
Yes, the answer is correct.
Score: 1
Accepted Answers:
false
1 point
Switch is the network edge device. True/false

false
true
Yes, the answer is correct.
Score: 1
Accepted Answers:
false
The first network which uses the TCP/IP protocol is

Yes, the answer is correct.


Score: 1
Accepted Answers:
(Type: String) ARPANET
(Type: String) Advanced Research Projects Agency Network
1 point
1 point
What is the consequence of the connection fails if the devices are arranged in a bus topology?

: If one connection fails, the other connections will still be working.


The other devices will still be able to send data through the hub;
All transmission stops if the failure is in the bus.
All transmission continues without any interruption
Yes, the answer is correct.
Score: 1
Accepted Answers:
All transmission stops if the failure is in the bus.
1 point
What is the difference between half-duplex and full-duplex transmission modes?

Two way, one entity can send at a time


Two way, both entities can send at a time
One way, one entity can send at a time
One way, both entities can send at a time

No, the answer is incorrect.


Score: 0
Accepted Answers:
Two way, one entity can send at a time
1 point
What is the maximum number of symbols that can be represented by Unicode?

2^32
2^16
2^7
2^8
Yes, the answer is correct.
Score: 1
Accepted Answers:
2^32
1 point
What is the name of the network in which the communication channel is shared by by all the nodes
of the network?

Broadcast network
Anycast network
Multicast network
Unicast network
Yes, the answer is correct.
Score: 1
Accepted Answers:
Broadcast network
1 point
In 100Kbps link, the length of the packet is 52bits, the transmission delay in millisecond is

0.00052
5.2
52.0
520.0
Yes, the answer is correct.
Score: 1
Accepted Answers:
0.00052
1 point
The ....... separates the data and phone signals and sends the data into the Internet

digital subscriber line access multiplexer (DSLAM)


modulator-demodulator (MODEM)
repeater
router
No, the answer is incorrect.
Score: 0
Accepted Answers:
digital subscriber line access multiplexer (DSLAM)
1 point
In Network, packet K now start its transmission and no previous transmission in the link, which of the
delay(given below) equal to zero.

Processing delay
Propagation delay
Queuing delay
Transmission delay
No, the answer is incorrect.
Score: 0
Accepted Answers:
Queuing delay

Quiz 2
The due date for submitting this assignment has passed.

Due on 2022-03-18, 00:00 IST.


Score: 8/10=80%

Assignment submitted on 2022-03-16, 14:54 IST


1 point
Which layers in the Internet protocol stack does a router process?

Routers process network link and physical layers

Routers process network link and transport layers

Routers process network transport and application layers

Routers process network transport and physical layers


No, the answer is incorrect.
Score: 0
Accepted Answers:
Routers process network link and physical layers
1 point

Home access is provided by

All of the mentioned

Cable

DSL

FTTP
Yes, the answer is correct.
Score: 1
Accepted Answers:
All of the mentioned
1 point
Which layers does a link-layer switch process?

Link layer switches process link and network layers

Link layer switches process link and physical layers

Link layer switches process network and physical layers

Link layer switches process transport and physical layers


Yes, the answer is correct.
Score: 1
Accepted Answers:
Link layer switches process link and physical layers
1 point
Is it possible that one (or more) of these tasks could be performed by two (or more) layers?

No these tasks cannot be duplicated at different layers

Yes these tasks can be duplicated at different layers


Yes, the answer is correct.
Score: 1
Accepted Answers:
Yes these tasks can be duplicated at different layers
1 point
Which layers does a host process?

Hosts process all five layers

Hosts process top four layers

Hosts process top three layers

Hosts process top two layers


No, the answer is incorrect.
Score: 0
Accepted Answers:
Hosts process all five layers
1 point
Provide a range of transmission rates of dial-up modems used for residential access

2-10 Mbps upload and 10-20 Mbps download

up to 24 Mbps downstream and 2.5 Mbps upstream

up to 42.8 Mbps and upstream rates of up to 30.7 Mbps

up to 56 Kbps
Yes, the answer is correct.
Score: 1
Accepted Answers:
up to 56 Kbps

1 point
Mention a range of transmission rates of HFC used for residential access

2-10 Mbps upload and 10-20 Mbps download


up to 24 Mbps downstream and 2.5 Mbps upstream

up to 42.8 Mbps and upstream rates of up to 30.7 Mbps

up to 56 Kbps
Yes, the answer is correct.
Score: 1
Accepted Answers:
up to 42.8 Mbps and upstream rates of up to 30.7 Mbps
1 point
Select a range of transmission rates of DSL used for residential access

2-10 Mbps upload and 10-20 Mbps download

up to 24 Mbps downstream and 2.5 Mbps upstream

up to 42.8 Mbps and upstream rates of up to 30.7 Mbps

up to 56 Kbps
Yes, the answer is correct.
Score: 1
Accepted Answers:
up to 24 Mbps downstream and 2.5 Mbps upstream

1 point
Is HFC transmission rate dedicated or shared among users?

Yes

no
Yes, the answer is correct.
Score: 1
Accepted Answers:
Yes
1 point

Define the function of DSLAM

Amplify digital signals

Convert analog signals into digital signals

Convert digital signals into analog signals


De-amplify digital signals
Yes, the answer is correct.
Score: 1
Accepted Answers:
Convert analog signals into digital signals

Quiz 3
The due date for submitting this assignment has passed.

Due on 2022-05-06, 23:00 IST.


Score: 8/15=53%

Assignment submitted on 2022-05-06, 09:25 IST


1 point

Compute the corresponding period of the frequency 8 MHz

0.125 μs

1.25 μs

12.5 μs

125 μs
No, the answer is incorrect.
Score: 0
Accepted Answers:
0.125 μs
1 point
Compute the corresponding frequency of the period 220 ns

0.455 MHz

4.55 MHz

45.5 MHz

455 MHz
Yes, the answer is correct.
Score: 1
Accepted Answers:
4.55 MHz
1 point
What is the phase shift for a sine wave with maximum amplitude after 1/4 cycle?

0 degrees

180 degrees

360 degrees

90 degrees
No, the answer is incorrect.
Score: 0
Accepted Answers:
0 degrees
1 point
What is the bit rate for a signal in which 1 bit lasts 2 ms?

5 kbps

50 bps

500 bps

500 kbps
Yes, the answer is correct.
Score: 1
Accepted Answers:
500 bps
1 point
A device is sending out data at the rate of 1000 bps. How long does it take to send out a single
character (8 bits)?

0.8 ms

8 ms

80 ms

800 ms
No, the answer is incorrect.
Score: 0
Accepted Answers:
8 ms
1 point

A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power
is 90 W. What is the attenuation in decibels?

0.46 dB

46 dB

–0.46 dB

–4.6 dB
No, the answer is incorrect.
Score: 0
Accepted Answers:
–0.46 dB
1 point

If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of 100,000 bits out
of this device?

20 ms

20 ns

20 s

20 μs
Yes, the answer is correct.
Score: 1
Accepted Answers:
20 s

1 point
A signal has a wavelength of 1 μm in air. How far can the front of the wave travel during 1000
periods?

0.1 mm

1 mm
10 mm

100 mm
Yes, the answer is correct.
Score: 1
Accepted Answers:
1 mm
1 point
A line has a signal-to-noise ratio of 1000 and a bandwidth of 4000 KHz. What is the maximum data
rate supported by this line?

40 Gbps

40 Kbps

40 Mbps

40 bps
No, the answer is incorrect.
Score: 0
Accepted Answers:
40 Kbps
1 point

A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps channel?

289 ms

289 ns

289 s

289 μs
Yes, the answer is correct.
Score: 1
Accepted Answers:
289 s
1 point
A signal with 200 milliwatts power passes through 10 devices, each with an average noise of 2
microwatts. What is the SNR?

100.0
1000.0

10000.0

100000.0
Yes, the answer is correct.
Score: 1
Accepted Answers:
10000.0
1 point
What is the transmission time of a packet sent by a station if the length of the packet is 1 million
bytes and the bandwidth of the channel is 200 Kbps?

40 ms

40 ns

40 s

40 μs
Yes, the answer is correct.
Score: 1
Accepted Answers:
40 s
1 point
What is the length of a bit in a channel with a propagation speed of 2 × 108 m/s if the channel
bandwidth is 1 Mbps?

20 m

200 m

2000 m

20000 m
No, the answer is incorrect.
Score: 0
Accepted Answers:
200 m
1 point
How many bits can fit on a link with a 2 ms delay if the bandwidth of the link is 1 Mbps?
20 bits

200 bits

2000 bits

20000 bits
Yes, the answer is correct.
Score: 1
Accepted Answers:
2000 bits
1 point
We have a channel with 4 KHz bandwidth. If we want to send data at 100 Kbps, what is the
minimum SNRdB?

7.5

75.0

750.0

7500.0
No, the answer is incorrect.
Score: 0
Accepted Answers:
75.0
What is the average signal rate of NRZ-L & NRZ-I?

N
N/2
N/4
N/8
No, the answer is incorrect.
Score: 0
Accepted Answers:
N/2
1 point
In which of the following scheme all the signal levels are on one side of the time axis?

Unipolar
Polar
Bipolar
Multilevel
No, the answer is incorrect.
Score: 0
Accepted Answers:
Unipolar
1 point
The average signal rate of 2BIQ is

N/6
N/4
N/2
N
No, the answer is incorrect.
Score: 0
Accepted Answers:
N/4
1 point
The coding scheme that was designed to be used in combination with NRZ-I is

R8ZS
4D/5D
BSZS
None of these
No, the answer is incorrect.
Score: 0
Accepted Answers:
4D/5D
1 point
Unit of the signal rate is

Baud
Bits per second
Micro seconds
Hertz
No, the answer is incorrect.
Score: 0
Accepted Answers:
Bits per second
1 point
Line coding converts a sequence of

frames to digital signal


bytes to digital signal
bits to digital signal
packets of data to digital signals
No, the answer is incorrect.
Score: 0
Accepted Answers:
bits to digital signal
1 point
In Alternate Mark Inversion, mark means

Infinity
0
1
2
No, the answer is incorrect.
Score: 0
Accepted Answers:
1
1 point
A sequence that creates the constant zero voltage does not have

DC component
Synchronization
Error Detection
Complexity
No, the answer is incorrect.
Score: 0
Accepted Answers:
DC component
1 point
Block coding is noramlly referred to as mBlnB coding; it replaces each m-bit group with an

n-bit group
n-1 bit group
n+1 bit group
none
No, the answer is incorrect.
Score: 0
Accepted Answers:
n-bit group
1 point
Parallel transmission is good in speed but it is very

time consuming
cheap
costly
slow
No, the answer is incorrect.
Score: 0
Accepted Answers:
cheap
1 point
Bipolar 8-zero substitution(B8ZS) substitutes eight consecutive zeros with

111VB0VB
000VB0VB
000VB1VB
010VB1VB
No, the answer is incorrect.
Score: 0
Accepted Answers:
000VB0VB
1 point
RZ and NRZ-L are combined into the

Manchester
Differential Manchester
Multilevel Bipolar Transition
Multi Transition Scheme
No, the answer is incorrect.
Score: 0
Accepted Answers:
Manchester
1 point
In which Line coding scheme, the level of the voltage determines the value of the bit

NRZ-I
NRZ-L
both NRZ-I and NRZ-L
neither NRZ-I aor NRZ-L
No, the answer is incorrect.
Score: 0
Accepted Answers:
NRZ-I
1 point
Which encoding has a transition at the beginning of each 0 bit

RZ
Manchester
Differential Manchester
All the 3 schemes
No, the answer is incorrect.
Score: 0
Accepted Answers:
Differential Manchester
1 point
Block coding can help to the receiver in the form of

Synchronization
Error Detection
Attenuation
both Synchronization and Error Detection
No, the answer is incorrect.
Score: 0
Accepted Answers:
both Synchronization and Error Detection

Line coding, block coding and scrambling are the techniques of converting the

analog data to analog signals


Digital data to digital signals
analog data to digital signals
digital signals to digital data
No, the answer is incorrect.
Score: 0
Accepted Answers:
Digital data to digital signals
1 point
The actual bandwidth of a digital signal is infinite, the effective band width would be

Finite
Infinite
Always Zero
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
Finite
1 point
The technique that is most common to change an analog signal to digital data is

delta modulation
pulse code modulation
sampling
Quantizing
No, the answer is incorrect.
Score: 0
Accepted Answers:
pulse code modulation
1 point
In 8B6T, each signal pattern has a weight of 0 or

1
-1
-2
infinity
No, the answer is incorrect.
Score: 0
Accepted Answers:
1
1 point
For Pulse Code Modulation (PCM), the quantization error is much greater than

decoding
Encoding
delta modulation
multiplexing
No, the answer is incorrect.
Score: 0
Accepted Answers:
delta modulation
1 point
Block coding is normally referred to as mBlnB coding; it replaces each m-bit group with an

n-bit group
n-1 bit group
n+1 bit group
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
n-bit group
1 point
The term that refers to as mBlnB coding, it replaces each m bit group with an n bit group is called

Multilevel technique
Polar techniques
Scrambling technique
block coding scheme
No, the answer is incorrect.
Score: 0
Accepted Answers:
block coding scheme
1 point
Asynchronous, synchronous and isochronous are three subclasses of serial transmission to send

parallel data
discrete data
continuous data
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
parallel data
1 point
Transmission media are directly controlled by the
physical layer
data link layer
network layer
session layer
No, the answer is incorrect.
Score: 0
Accepted Answers:
physical layer
1 point
Guided media provides a conduit from one device to another, includes

twisted pair cable


fiber optic cable
coaxial cable
All of the options given here
No, the answer is incorrect.
Score: 0
Accepted Answers:
All of the options given here
1 point
Radio waves are

unidirectional
omnidirectional
bidirectional
directional
No, the answer is incorrect.
Score: 0
Accepted Answers:
omnidirectional
1 point
Microwaves having frequency between

1 and 300 GHz


3 kHz and 1 GHz
300 kHz and 1 GHz
1GHz and 300 GHz
No, the answer is incorrect.
Score: 0
Accepted Answers:
1 and 300 GHz
1 point
_______ is a digital multiplexing technique usually involving signals that are not in the visible light
frequencies.

FDM
TDM
WDM
MDM
No, the answer is incorrect.
Score: 0
Accepted Answers:
TDM
1 point
In_______, if a devicehas no data to send, its time slot remains empty

synchronous TDM
asynchronous TDM
FDM
WDM
No, the answer is incorrect.
Score: 0
Accepted Answers:
synchronous TDM

Assignment submitted on 2022-04-12, 09:45 IST


1 point
In a linear block code, the XOR of any two valid codewords creates another ___________ code

invalid
valid
wildcard
none of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
valid
1 point
__________codes are special linear block codes with one extra property. If a codeword is rotated,
the result is another codeword.

Non-linear
Convolution
Cyclic
none of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
Cyclic
1 point
A burst error means that two or more bits in the data unit have changed

True
False
Yes, the answer is correct.
Score: 1
Accepted Answers:
True
1 point
A generator that contains a factor of __________ can detect all odd-numbered errors.

x
x+1
1
none of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
x+1
1 point
A simple parity-check code can detect __________ errors.

an even-number of
two
no errors
an odd-number of
Yes, the answer is correct.
Score: 1
Accepted Answers:
an odd-number of
1 point
Adding 1 and 0 in modulo-2 arithmetic results in __________.

1
2
0
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
1
1 point
__________ is used in checksum

A.two's complement arithmetic


B.one's complement arithmetic
C. either (a) or (b)
D. None of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
B.one's complement arithmetic
1 point
If the Hamming distance between a dataword and the corresponding codeword is four, there are
__________ bits in error.

3
4
5
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
4
1 point
In __________ error correction, the receiver corrects errors without requesting retransmission.

backward
onward
forward
none of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
forward
1 point
In block coding, if k =3 and n =4, we have __________ invalid codewords.

8
4
2
16
No, the answer is incorrect.
Score: 0
Accepted Answers:
8
1 point
In cyclic redundancy checking, the divisor has 5 bits then the CRC contains _________ bits

3
4
5
6
No, the answer is incorrect.
Score: 0
Accepted Answers:
4
1 point
In modulo-12 arithmetic, we use only the integers in the range __________, inclusive.

0 to 10
1 to 10
0 to 11
1 to 11
No, the answer is incorrect.
Score: 0
Accepted Answers:
0 to 11
1 point
In modulo-2 arithmetic, __________ give the same results.

addition and multiplication


addition and division
addition and subtraction
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
addition and subtraction
1 point
The degree of the polinomial is the ___________ power in the polynomial

Lowest
Highest
range
none of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
Highest
1 point
The check sum of 1010 and 1111

1000
1001
1010
1111
No, the answer is incorrect.
Score: 0
Accepted Answers:
1010
The _________ layer takes the packets from network layer and encapsulate it

data link layer


physical layer
transport layer
application layer
Yes, the answer is correct.
Score: 1
Accepted Answers:
data link layer
1 point
Which sublayer of the data link layer performs error control

flow control
medium access control
data link control
error control
Yes, the answer is correct.
Score: 1
Accepted Answers:
data link control
1 point
Header of a byte-oriented protocol generally contains ___________

source address
destination address
control information
user data
No, the answer is incorrect.
Score: 0
Accepted Answers:
source address
destination address
control information
1 point
Automatic repeat request error management mechanism is provided by ________

medium access control


data link control
network interface control
application access control
Yes, the answer is correct.
Score: 1
Accepted Answers:
data link control
1 point
Which of the following is bit-oriented protocol in DLC?

CSMA/CD
CSMA/CA
Point-to-Point protocol
HDLC
No, the answer is incorrect.
Score: 0
Accepted Answers:
HDLC
1 point
Both HDLC and PPP are Data link layer protocols

True
False
Yes, the answer is correct.
Score: 1
Accepted Answers:
True
1 point
The PPP protocol _________

Is designed for simple links which transport packets between two peers
Is one of the protocols for making an Internet connection over a phone line
Is designed for simple links which transport packets between two peers and making an Internet
connection over a phone line
Is used for sharing bandwidth
No, the answer is incorrect.
Score: 0
Accepted Answers:
Is designed for simple links which transport packets between two peers and making an Internet
connection over a phone line
1 point
Choose the correct statement from the following

PPP can terminate the link at any time


PPP can terminate the link only during the link establishment phase
PPP can terminate the link during the authentication phase
PPP can terminate the link during the callback control phase
Yes, the answer is correct.
Score: 1
Accepted Answers:
PPP can terminate the link at any time
1 point
In the _________Protocol, if no acknowledgment for a frame has arrived, we resend all outstanding

Stop-and-Wait ARQ
Go-Back-N ARQ
Selective-Repeat ARQ
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
Go-Back-N ARQ
1 point
In the _________ protocol we avoid unnecessary transmission by sending only frames that are
corrupted

Stop-and-Wait ARQ
Go-Back-N ARQ
Selective-Repeat ARQ
Simplest protocol
No, the answer is incorrect.
Score: 0
Accepted Answers:
Selective-Repeat ARQ
1 point
Both Go-Back-N and Selective-Repeat Protocols use a _________

sliding frame
sliding window
sliding packet
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
sliding window
1 point
In Go-Back-N ARQ, if 4 is the number of bits for the sequence number, then the maximum size of
the send window must be _____

15
16
31
1
No, the answer is incorrect.
Score: 0
Accepted Answers:
15
1 point
The Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for ______ channels

noiseless
noisy
cumulative
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
noisy
1 point
The _________Protocol, adds a simple error control mechanism to the _______Protocol

Selective Repeat ARQ; Go-Back-N ARQ


Go-Back-N ARQ; Stop-and-Wait
Stop-and-Wait ARQ; Stop-and-Wait
none of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
Stop-and-Wait ARQ; Stop-and-Wait
1 point
In PPP, the ________ is responsible for establishing, maintaining, configuring, and terminating links

PAP
CHAP
LCP
NCP
No, the answer is incorrect.
Score: 0
Accepted Answers:
LCP
As per our records you have not submitted this assignment.
1 point
The protocol that is used to transmit data without any scheduled time is

Random access
Controlled access
Channelization
Authentication
No, the answer is incorrect.
Score: 0
Accepted Answers:
Random access
1 point
The access methods are grouped into ___________ groups

One
Two
Three
Four
No, the answer is incorrect.
Score: 0
Accepted Answers:
Three
1 point
In ______________ method, no station is superior to another station and none is assigned the
control over another Controlled access

Controlled access
Random access
Channelization
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
Random access
1 point
In ____________ , the chance of collision can be reduced if a station sense the medium before
transmit

TDMA
FDMA
CDMA
CSMA
No, the answer is incorrect.
Score: 0
Accepted Answers:
CSMA
1 point
A station cannot send unless it has been authorized by other stations in ______________ methods

Channelization
Controlled access
Random access
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
Controlled access
1 point
In the ______________ method, time is divided into intervals and in each interval comprises data
frame and reservation frame

Polling
Token passing
Reservation
None of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
Reservation
1 point
__________ is a multiple access in which the available bandwidth of a link is shared in time,
frequency, code between different stations

Channelization
Controlled access
Random access
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
Channelization
1 point
In the method __________, all data exchanges must be made through the primary device

Polling
Token passing
Reservation
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
Polling
1 point
In the ____________ method the stations in a network are organized in a logical ring

Reservation
Polling
Token passing
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
Token passing
1 point
In the _________ method, if the line is not idle then continuously sense the carrier

Nonpersistent
1-persistent
p-persistent
none
No, the answer is incorrect.
Score: 0
Accepted Answers:
1-persistent
1 point
The vulnerable time for CSMA is the ______________ propagation time

Two times
Three times
Four times
The same as
No, the answer is incorrect.
Score: 0
Accepted Answers:
The same as
1 point
The maximum throughput for pure ALOHA is

13.3 percent
18.4 percent
36.8 percent
20.3 percent
No, the answer is incorrect.
Score: 0
Accepted Answers:
18.4 percent
1 point
The maximum throughput for slotted ALOHA is

13.3 percent
18.4 percent
36.8 percent
20.3 percent
No, the answer is incorrect.
Score: 0
Accepted Answers:
36.8 percent
1 point
The availability of the link is known to Primary station

True
False
No, the answer is incorrect.
Score: 0
Accepted Answers:
True
1 point
Time and bandwidth is not shared among the station in __________ method

TDMA
FDMA
CDMA
CSMA
No, the answer is incorrect.
Score: 0
Accepted Answers:
CDMA
what is the minimum length of standard Ethernet frame in bytes

12
64
42
56
Yes, the answer is correct.
Score: 1
Accepted Answers:
64
1 point
what is the maximum length of standard Ethernet frame in bytes

1518
643
1218
1345
Yes, the answer is correct.
Score: 1
Accepted Answers:
1518
1 point
______________ uses thick coaxial cable

10Base5
10Base2
10Base-T
10Base-F
Yes, the answer is correct.
Score: 1
Accepted Answers:
10Base5
1 point
____________uses four twisted-pair cables that connect each station to a common hub
10Base5
10Base2
10Base-T
10Base-F
Yes, the answer is correct.
Score: 1
Accepted Answers:
10Base-T
1 point
The data rate supported by Fast Ethernet (in Mbps) is

10
1000
100
10000
Yes, the answer is correct.
Score: 1
Accepted Answers:
100
1 point
The auto negotiation is the new feature in _____________

Standard Ethernet
Gigabit Ethernet
Ten-Gigabit Ethernet
Fast Ethernet
Yes, the answer is correct.
Score: 1
Accepted Answers:
Fast Ethernet
1 point
which on of the following uses two pairs of twisted-pair wire in its implementation

100Base-TX
100Base-FX
100Base-T4
None
No, the answer is incorrect.
Score: 0
Accepted Answers:
100Base-TX
1 point
Data rate supported in Gigabit ethernet in Mbps is

10
100
1000
1000
Yes, the answer is correct.
Score: 1
Accepted Answers:
1000
1 point
The access method included in Ten-Gigabit Ethernet is

Half-duplex
Full-duplex
Half-duplex and Full-duplex
None of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
Full-duplex
1 point
Gigabit Ethernet access methods include _________ mode

Half-duplex
Full-duplex
Half-duplex and Full-duplex
None of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
Half-duplex and Full-duplex
1 point
_________ uses the long-wave optical fiber

1000Base-SX
1000Base-T8
1000Base-T
1000Base-LX
Yes, the answer is correct.
Score: 1
Accepted Answers:
1000Base-LX
1 point
Which one of the following uses short-wave 850nm multimode fiber

10GBase-S
10GBase-L
10GBase-E
None
Yes, the answer is correct.
Score: 1
Accepted Answers:
10GBase-S
1 point
If all bits are set to 1's then the address is

unicast
broadcast
multicast
none of the above
Yes, the answer is correct.
Score: 1
Accepted Answers:
broadcast
1 point
Which one of the following protocol defines PDU that is more or less similar to HDLC

MAC
LLU
IP
LLC
Yes, the answer is correct.
Score: 1
Accepted Answers:
LLC
1 point
Standard Ethernet uses __________ encoding

NRZ
AMI
Manchester
Differential Manchester
Yes, the answer is correct.
Score: 1
Accepted Answers:
Manchester

1 point
Which is not true about the Internet Protocol (IP)?

Host may have multiple IP addresses


IP does not ensures the delivery of packet
IP packers with same source and destination address may take different routes
Router will not drop the packets
Yes, the answer is correct.
Score: 1
Accepted Answers:
Router will not drop the packets
1 point
What is the size of IPV4 header (without options field)?

20 bytes
24 bytes
40 bytes
56 bytes
Yes, the answer is correct.
Score: 1
Accepted Answers:
20 bytes
1 point
Is Best-effort network service quarranteed the devlivery of the packet?

Yes
no
Yes, the answer is correct.
Score: 1
Accepted Answers:
no
1 point
Which layers does a host process?

Hosts process all five layers


Hosts process top four layers
Hosts process top three layers
Hosts process top two layers
No, the answer is incorrect.
Score: 0
Accepted Answers:
Hosts process all five layers
1 point
In the virtual cicuit based network service, the router forward the packets based on

Destination IP address
Source IP address
Virtual circuit number
Virtual path number
No, the answer is incorrect.
Score: 0
Accepted Answers:
Virtual circuit number
1 point
How will you refer the switching fabric with the direct control of CPU?

Switching via Bus


Switching via Crossbar
Switching via Memory
Switching via host
Yes, the answer is correct.
Score: 1
Accepted Answers:
Switching via Memory
1 point
Which method is used by the router to index the forward table to make the forwrding decision in
datagram service?

Hashing
Indexing
Longest Prefix Matching
Searching
Yes, the answer is correct.
Score: 1
Accepted Answers:
Longest Prefix Matching
1 point
Select a range of transmission rates of DSL used for residential access

2-10 Mbps upload and 10-20 Mbps download


up to 24 Mbps downstream and 2.5 Mbps upstream
up to 42.8 Mbps and upstream rates of up to 30.7 Mbps
up to 56 Kbps
No, the answer is incorrect.
Score: 0
Accepted Answers:
up to 24 Mbps downstream and 2.5 Mbps upstream
1 point
Which metric ensures the amount of data that the link layer carry?

MLC
MPU
MSS
MTU
Yes, the answer is correct.
Score: 1
Accepted Answers:
MTU
1 point
What is the theoritical maximum size of IPv4 datagram?

1024 bytes
256 bytes
65500 bytes
65535 bytes
Yes, the answer is correct.
Score: 1
Accepted Answers:
65535 bytes
You were allowed to submit this assignment only once.

Assignment submitted on 2022-05-15, 20:19 IST


1 point
Which of the following does not have a Net ID and Host ID?

Class A
Class B
Class C
Class D
Yes, the answer is correct.
Score: 1
Accepted Answers:
Class D
1 point
What is the size of the Host ID in Class C?

24 bits
8 bits
14 bits
32 bits
Yes, the answer is correct.
Score: 1
Accepted Answers:
8 bits
1 point
Which of the following is true for classless addressing?

The addresses are contiguous


The number of addresses is a power of 2, and the first address is divisible by 16
The first address, when converted to a decimal number, is 3,440,387,360, which when divided
by 16 results in 215,024,210
All of the mentioned
Yes, the answer is correct.
Score: 1
Accepted Answers:
All of the mentioned
1 point
The value ‘n’ in classless addressing is referred to as
prefix length
suffix length
intermediate length
none of the mentioned
Yes, the answer is correct.
Score: 1
Accepted Answers:
prefix length
1 point
A classless address is given as 167.199.170.82/27. Find the number of addresses.

128
64
32
16
Yes, the answer is correct.
Score: 1
Accepted Answers:
32
1 point
A classless address is given as 167.199.170.82/27. Find the last address.

167.199.170.95
167.199.170.256
167.199.170.128
167.199.170.88
Yes, the answer is correct.
Score: 1
Accepted Answers:
167.199.170.95
1 point
An ISP has requested a block of 1000 addresses. What is its prefix length?

28
22
26
24
Yes, the answer is correct.
Score: 1
Accepted Answers:
22
1 point
DHCP (dynamic host configuration protocol) provides __________ to the client.

IP address
MAC address
URL
None of the mentioned
Yes, the answer is correct.
Score: 1
Accepted Answers:
IP address
1 point
IP assigned for a client by DHCP server is

for a limited period


for an unlimited period
not time dependent
none of the mentioned
Yes, the answer is correct.
Score: 1
Accepted Answers:
for a limited period
1 point
DHCP client and servers on the same subnet communicate via

UDP broadcast
UDP unicast
TCP broadcast
TCP unicast
Yes, the answer is correct.
Score: 1
Accepted Answers:
UDP broadcast
1 point
After obtaining the IP address, to prevent the IP conflict the client may use

internet relay chat


broader gateway protocol
address resolution protocol
none of the mentioned
Yes, the answer is correct.
Score: 1
Accepted Answers:
address resolution protocol
1 point
Network Address Translation (NAT), all the outgoing packets go through

Global router
Local router
NAT router
Private router
Yes, the answer is correct.
Score: 1
Accepted Answers:
NAT router
1 point
In using One IP address for the Network Address Translation, then the translation table has

one column
two columns
three columns
four columns
Yes, the answer is correct.
Score: 1
Accepted Answers:
two columns
1 point
In IP addresses, the third-level of hierarchy is

Subnetting
No Subnetting
Supernetting
IP mask
Yes, the answer is correct.
Score: 1
Accepted Answers:
Subnetting
1 point
The Internet authorities have reserved three sets of addresses as

masknet addresses
IP addresses
private addresses
public addresses
Yes, the answer is correct.
Score: 1
Accepted Answers:
private addresses

Assignment submitted on 2022-05-22, 11:58 IST


1 point
Which is true about Link state routing?

Bellman-ford Principle
Count to Infinity Problem
Learning from neighbor
Path Oscillation problem
Yes, the answer is correct.
Score: 1
Accepted Answers:
Path Oscillation problem
1 point
Group management in multcast routing is based on IGMP. Yes/No

No
Yes
Yes, the answer is correct.
Score: 1
Accepted Answers:
Yes
1 point
Which is true about distance vactor routing

Count to infinity problem


Dijkstra's principle
Link state packets
Path Oscillation problem
Yes, the answer is correct.
Score: 1
Accepted Answers:
Count to infinity problem
1 point
Router that is responsible for forwarding the packets from one AS to another AS

Edge Router
Firewall router
Gateway router
Switch
Yes, the answer is correct.
Score: 1
Accepted Answers:
Gateway router
1 point
Which routing allows the AS to gets rid of the packet as fast as possible

Cold potato routing


Hot potato routing
Yes, the answer is correct.
Score: 1
Accepted Answers:
Hot potato routing
1 point
In Border Gateway Routing, routers exchanges the messages by creating TCP connections. Yes/No

No
Yes
Yes, the answer is correct.
Score: 1
Accepted Answers:
Yes
1 point
Which is not an interior routing protocol

AODV
BGP
OSPF
RIP
Yes, the answer is correct.
Score: 1
Accepted Answers:
BGP
1 point
If the bandwidth of the channel is 5 Kbps, how long does it take to send a frame of 100,000 bits out
of this device?

20 ms
20 ns
20 s
20 μs
Yes, the answer is correct.
Score: 1
Accepted Answers:
20 s
1 point
Nework connected with the rest of the network via two different network providers are known as,

Dual network
Multi-homed stud network
Stub network
Yes, the answer is correct.
Score: 1
Accepted Answers:
Multi-homed stud network
1 point
Which one is not an multicast routing algorithm?

DVMRP
IGMP
PIM
none
Yes, the answer is correct.
Score: 1
Accepted Answers:
IGMP
You were allowed to submit this assignment only once.

Which among the following are delivered by the transport layer in process-to-process delivery
mechanism?
Frames
Datagrams
Packets
All of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
Packets
1 point
What is the purpose of using source & destination port numbers respectively in the addressing
method of transport layer?

For Delivery & Reply operations


For Reply & Delivery operations
Only for Delivery operations
Only for Reply operations
No, the answer is incorrect.
Score: 0
Accepted Answers:
For Reply & Delivery operations
1 point
To use the services of UDP, we need _________ socket addresses. ~four =two ~three ~one }
::Week13 Q04::Transport layer protocols deals with

application to application communication


process to process communication
node to node communication
routing
No, the answer is incorrect.
Score: 0
Accepted Answers:
process to process communication
1 point
In stop and wait protocol___________

Sequence number are required


Sequence number are not required
Waiting Sequence
Ack required
No, the answer is incorrect.
Score: 0
Accepted Answers:
Sequence number are not required
1 point
Multiplexing done at _______ side.

Sender
Receiver
Channel
Routing
No, the answer is incorrect.
Score: 0
Accepted Answers:
Sender
1 point
For Stop-and-Wait ARQ, for 10 data packets sent, _______ acknowledgments are needed.

exactly 10
less than 10
more than 10
only one
No, the answer is incorrect.
Score: 0
Accepted Answers:
exactly 10
1 point
Transport layer aggregates data from different applications into a single stream before passing it to
__________

data link layer


application layer
physical layer
network layer
No, the answer is incorrect.
Score: 0
Accepted Answers:
network layer
1 point
Each segment as an independent packet and delivers it to the transport layer at the destination
machine is called_____
Connection Oriented
Connectionless
Segmentation
Reassembly
No, the answer is incorrect.
Score: 0
Accepted Answers:
Connectionless
1 point
_______ control refers to a set of procedures used to restrict the amount of data that the sender can
send before waiting for acknowledgment.

Flow
Error
Transmission
Data
No, the answer is incorrect.
Score: 0
Accepted Answers:
Flow
1 point
The sending side of rdt simply accepts data from the upper layer via the __________ event

rdt_rcv()
rdt_rcv(data)
udt_send(data)
rdt_send(data)
No, the answer is incorrect.
Score: 0
Accepted Answers:
rdt_send(data)
1 point
Demultiplexing done at _______ side.

Sender
Receiver
Both side
Channel
No, the answer is incorrect.
Score: 0
Accepted Answers:
Receiver
1 point
A _______________ protocol provides logical communication between processes running on
different hosts.

transport-layer
application-layer
network-layer
session-layer
No, the answer is incorrect.
Score: 0
Accepted Answers:
transport-layer
1 point
In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers?

0 to 63
0 to 64
1 to 63
1 to 64
No, the answer is incorrect.
Score: 0
Accepted Answers:
0 to 63
1 point
In Go-Back-N ARQ, if frames 4, 5, and 6 are received successfully, the receiver may send an ACK
_________ to the sender.

5
6
7
any of the above
No, the answer is incorrect.
Score: 0
Accepted Answers:
7
Which of the following is false with respect to UDP?
Connection oriented
Unreliable
Transport layer protocol
Low overhead
No, the answer is incorrect.
Score: 0
Accepted Answers:
Connection oriented
1 point
Return value of the UDP port “Chargen” is _______

String of characters
String of integers
Array of characters with integers
Array of zero’s and one’s
No, the answer is incorrect.
Score: 0
Accepted Answers:
String of characters
1 point
Beyond IP, UDP provides additional services such as _______

Routing and switching


Sending and receiving of packets
Multiplexing and demultiplexing
Demultiplexing and error checking
No, the answer is incorrect.
Score: 0
Accepted Answers:
Multiplexing and demultiplexing
1 point
Port number used by Network Time Protocol (NTP) with UDP is ________

161
123
162
124
No, the answer is incorrect.
Score: 0
Accepted Answers:
123
1 point
What is the header size of a UDP packet?

8 bytes
8 bits
16 bytes
124 bytes
No, the answer is incorrect.
Score: 0
Accepted Answers:
8 bytes
1 point
Which of the following is false with respect to TCP?

Connection oriented
Process to process
Transport layer protocol
Unreliable
No, the answer is incorrect.
Score: 0
Accepted Answers:
Unreliable
1 point
In TCP, sending and receiving data is done as _______

Stream of bytes
Sequence of characters
Lines of data
Packets
No, the answer is incorrect.
Score: 0
Accepted Answers:
Stream of bytes
1 point
TCP process may not write and read data at the same speed. So we need __________ for storage

Packets
Buffers
Segments
Stacks
No, the answer is incorrect.
Score: 0
Accepted Answers:
Buffers
1 point
TCP groups a number of bytes together into a packet called _______

Packet
Buffer
Segment
Stack
No, the answer is incorrect.
Score: 0
Accepted Answers:
Segment
1 point
Communication offered by TCP is ________

Full duplex
Half duplex
Semi duplex
Byte by byte
No, the answer is incorrect.
Score: 0
Accepted Answers:
Full duplex
1 point
Two broad categories of congestion control are

Open loop and Closed loop


Open control and Closed control
Active control and Passive control
Active loop and Passive loop
No, the answer is incorrect.
Score: 0
Accepted Answers:
Open loop and Closed loop
1 point
In open-loop control, policies are applied to __________

Remove after congestion occurs


Remove after sometime
Prevent before congestion occurs
Prevent before sending packets
No, the answer is incorrect.
Score: 0
Accepted Answers:
Prevent before congestion occurs
1 point
Retransmission of packets must not be done when _______

Packet is lost
Packet is corrupted
Packet is needed
Packet is error free
No, the answer is incorrect.
Score: 0
Accepted Answers:
Packet is error free
1 point
In Go-Back-N window, when the timer of the packet times out, several packets have to be resent
even some may have arrived safe. Whereas in Selective Repeat window, the sender resends
___________

Packet which are not lost


Only those packets which are lost or corrupted
Packet from starting
All the packets
No, the answer is incorrect.
Score: 0
Accepted Answers:
Only those packets which are lost or corrupted
1 point
Discarding policy is mainly done by _______

Sender
Receiver
Router
Switch
No, the answer is incorrect.
Score: 0
Accepted Answers:
Router

1 point
The first line of HTTP request message is called _____________

Request line
Header line
Status line
Entity line
Yes, the answer is correct.
Score: 1
Accepted Answers:
Request line
1 point
The values GET, POST, HEAD etc are specified in ____________ of HTTP message

Request line
Header line
Status line
Entity body
Yes, the answer is correct.
Score: 1
Accepted Answers:
Request line
1 point
Find the oddly matched HTTP status codes

200 OK
400 Bad Request
301 Moved permanently
304 Not Found
Yes, the answer is correct.
Score: 1
Accepted Answers:
304 Not Found
1 point
The _______________ is a repository of information linked together from all over the world

WWW
HTTP
HTML
FTP
Yes, the answer is correct.
Score: 1
Accepted Answers:
WWW
1 point
The ____________ is a standard for specifying any kind of information on the internet

ULR
URL
ALU
RLU
Yes, the answer is correct.
Score: 1
Accepted Answers:
URL
1 point
In a URL, the ___________ is the computer on which the information is located

Path
Protocol
Host
None
Yes, the answer is correct.
Score: 1
Accepted Answers:
Host
1 point
The documents in the WWW can be grouped into __________ broad categories

One
Two
Three
Four
Yes, the answer is correct.
Score: 1
Accepted Answers:
Three
1 point
Expansion of FTP is __________

Fine Transfer Protocol


File Transfer Protocol
First Transfer Protocol
Fast Transfer Protocol
Yes, the answer is correct.
Score: 1
Accepted Answers:
File Transfer Protocol
1 point
FTP is built on _____ architecture

Client-server
P2P
Data centric
Service oriented
Yes, the answer is correct.
Score: 1
Accepted Answers:
Client-server
1 point
_____________ is a language for creating web pages

HTTP
FTP
TFTP
HTML
Yes, the answer is correct.
Score: 1
Accepted Answers:
HTML
1 point
____________ is a technology that creates and handles dynamic documents

GIC
CGI
GCI
None
Yes, the answer is correct.
Score: 1
Accepted Answers:
CGI
1 point
The entire hostname has a maximum of ___________

255 characters
127 characters
63 characters
31 characters
Yes, the answer is correct.
Score: 1
Accepted Answers:
255 characters
1 point
A DNS client is called _________

DNS updater
DNS resolver
DNS handler
None
Yes, the answer is correct.
Score: 1
Accepted Answers:
DNS resolver
1 point
Servers handle requests for other domains _______

directly
by contacting remote DNS server
it is not possible
None
Yes, the answer is correct.
Score: 1
Accepted Answers:
by contacting remote DNS server
1 point
What does MIME stands for?

Multipurpose Internet Mail Extra


Multipurpose Internet Mail End
Multipurpose Internet Mail Extensions
None
Yes, the answer is correct.
Score: 1
Accepted Answers:
Multipurpose Internet Mail Extensions

You might also like