0% found this document useful (0 votes)
3 views

NETWORKS-and-COMMUNICATION-FINAL-EXAM%20(1)

This document is a midterm examination for the CS 02 – Networks and Communications course at Guimaras State University. It consists of multiple-choice questions covering various topics related to networking, including data frames, error control, routing protocols, and communication services. Students are required to encircle the correct answers and provide personal information such as name, course, and date.

Uploaded by

Kimberly Lobaton
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

NETWORKS-and-COMMUNICATION-FINAL-EXAM%20(1)

This document is a midterm examination for the CS 02 – Networks and Communications course at Guimaras State University. It consists of multiple-choice questions covering various topics related to networking, including data frames, error control, routing protocols, and communication services. Students are required to encircle the correct answers and provide personal information such as name, course, and date.

Uploaded by

Kimberly Lobaton
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Republic of the Philippines

State Universities and Colleges


GUIMARAS STATE UNIVERSITY
College of Science and Technology
Alaguisoc, Jordan, Guimaras

CS 02 – Networks and Communications


Midterm Examination
st
1 Semester A.Y 2022 – 2023

Mark Daniel C. Tagarda


Instructor

Name: _______________________________________________ Score: _____


Course, Year, and Section: _______________ Date: ______

MULTIPLE CHOICE. Encircle the letter of the correct answer and write your answer on the
space provided.

_____ 1. Which of the following is data frames are sent on the link, both machines must be
synchronized in order to transfer to take place?
A. Framing B. Error Control C. Addressing D.
Synchronization _____ 2. What signals may have encountered problem in transition and the
bits are flipped?
A. Flow Control B. Multi-Access C. Error control D. Flow Control
_____ 3. When host on the shared link tries to transfer the data, it has a high probability of
Collision?
A. Multi-Access B. Framing C. Flow Control D. Addressing _____
4. What controls deals with protocols, flow-control, and error control?
A. Media Access Control C. Logical Link Control B.
Media Internet Control D. Logical Access Control _____ 5.
What control deals with actual control of media?
A. Media Internet Control C. Media Access Control
B. Logical Access Control D. Logical Link Control
_____ 6. What layer is one of the most complicated layers and has complex functionalities
and
Liabilities?
A. Data Link Layer C. Media Access Layer
B. Data Communication Layer D. Logical Link Layer
_____ 7. What Frame is received with more than one bits in corrupted state?
A. Single bit error B. Multiple bits error C. Triple bits error D. Burst error
_____ 8. What types or error is only one bit, anywhere though, which is corrupt.
A. Single bit error B. Multiple bits error C. Triple bits error D. Burst error
_____ 9. What types of error if one extra bit is sent along with the original bits to make
number of 1s either even in case of even parity, or odd in case of odd parity?
A. Parity Check C. Error Correction
B. Cyclic Redundancy Check (CRC) D. Error Control
_____ 10. Which errors can receive frames are detected by means of Parity Check and Cyclic
Redundancy Check (CRC)?
A. Error Correction B. Error Detection C. Error Control D. Burst Error
_____ 11. Which of the following is receiver detects an error in the data received, it requests
back the sender to retransmit the data unit?
_____

A. Front Error Correction C. Backward Error Correction B.


Slide Error Correction D. Forward Error Correction

12. Which of following is the receiver detects some error in the data received, it executes
error correcting code, which helps it to auto-recover and to correct some kinds of
errors?
A. Front Error Correction C. Backward Error Correction
B. Slide Error Correction D. Forward Error Correction
_____ 13. Which of this Data-link layer is responsible for implementation of point-to-point flow
and error control mechanism?
A. Data Link Control and Protocols C. Network layer Introduction
B. Data Link Layer D. Network Addressing
_____ 14. What device has multiple paths to reach a destination, it always selects one path by
preferring it over others.?
A. Network layer Introduction C. Network Addressing
B. Network Routing D. Data Link Layer
_____ 15. Which of the following is most of the traffic on the internet and intranets known as
_____traffic is sent with specified destination?
A. Broadcast routing C. Multicast Routing
B. Unicast routing D. Anycast Routing
_____ 16. What packet destined to this logical address is received, it is sent to the host which
is nearest in routing topology?
A. Multicast Routing C. Broadcast routing
B. Anycast Routing D. Unicast routing
_____ 17. Which of the following is a special case of broadcast routing with significance
difference and challenges?
A. Multicast Routing C. Unicast routing
B. Broadcast routing D. Anycast Routing
_____ 18. Which of the following packets are not routed and forwarded by the routers on any
network?
A. Broadcast routing C. Unicast routing
B. Anycast Routing D. Multicast Routing

For item no.19-22. Instruction: Select the best answer inside the box, Write the letter of the
correct answer on the space provided before the number.

A. Unicast C. Broadcast
B. Multicast D. Anycast

_____ 19. Which network address can be destined to one host?


_____ 20. Which network address can be destined to nearest one?
_____ 21. Which network address can be destined to group?
_____ 22. Which network address can be destined to all?

_____ 23. Which routing protocol takes routing decision on the number of hops between source
and destination?
A. Link State Routing Protocol C. Multicast Routing
Protocols
_____

B. Unicast Routing Protocols D. Distance Vector


Routing Protocol _____ 24. Which routing protocol takes into account the states of links
of all the routers in a network.
A. Unicast Routing Protocols C. Multicast Routing Protocols
B. Distance Vector Routing Protocol D. Link State Routing Protocol
_____ 25. What mode uses source-based trees. It is used in dense environment such as LAN.
A.PIM Dense Mode C. CBT
B.PIM Sparse Mode D. MOSPF
_____ 26. What packet is received; the routers send it to all the interfaces except the one on
which it was received?
A. Shortest Path B. Flooding C. Tunneling D. Packet Fragmentation

27. What Ethernet segments have their maximum transmission unit (MTU) fixed to 1500
bytes?
A. Shortest Path C. Tunneling
B. Flooding D. Packet Fragmentation
_____ 28. If they are two geographically separate networks, which of the following will want to
communicate with each other, they may deploy a dedicated line between or they have
to pass their data through intermediate networks?
A. Shortest Path C. Tunneling
B. Flooding D. Packet Fragmentation
_____ 29. Which routing decision in networks, are mostly taken on the basis of cost between
source and destination?
A. Shortest Path C. Tunneling
B. Flooding D. Packet Fragmentation
_____ 30. What process on one host identifies its peer host on remote network by means
of TSAPs, also known as Port numbers?
A. Header C. End-to-End Communication
B. Transmission Control Protocol D. User Datagram Protocol
_____ 31. Which of the following exists in both layered Models because of its significance, of
interacting with user and user applications?
A. Client server model C. Application protocol
B. Application layer D. Network Services
_____ 32. Which Protocol is the most widely used protocol for file transfer over the network?
A. Simple Mail Transfer Protocol C. Post Office Protocol
B. File Transfer Protocol D. Hyper Text Transfer
Protocol _____ 33. Which Protocol is a simple mail retrieval protocol used by User Agents
(client email software) to retrieve mails from mail server?
A. Simple Mail Transfer Protocol C. Post Office Protocol
B. File Transfer Protocol D. Hyper Text Transfer
Protocol _____ 34. Which Protocol is used to transfer electronic mail from one user to
another?
A. Simple Mail Transfer Protocol C. Post Office Protocol
B. File Transfer Protocol D. Hyper Text Transfer
Protocol _____ 35. Which Protocol is well organized documentation system which uses
hyperlinks to link the pages in the text documents?
A. Simple Mail Transfer Protocol C. Post Office Protocol
B. File Transfer Protocol D. Hyper Text Transfer
Protocol _____ 36. Which Computer systems and computerized systems help human
beings to work efficiently and explore the unthinkable?
A. Client server model C. Application protocol
_____

B. Application layer D. Network Services _____


37. Which software services system helps to store the information, organize it, and
provides various means of accessing it?
A. File Services C. Directory Services
B. Application Services D. Communication
Services _____ 38. Which services providing network-based services to the users such as
web services, database managing, and resource sharing?
A. File Services C. Directory Services B.
Application Services D. Communication Services _____
39. Which services include sharing and transferring files over the network?
A. File Services C. Directory Services
B. Application Services D. Communication
Services _____ 40. Which Directory Services is widely used and one of the essential
services on which internet works.?
A. Authentication and Authorization C. Domain Name Services B.
Accounting D. File Sharing

41. What services are two people can communicate with each other using text-based
Internet Relay Chat services?
A. Messenger chat C. Internet chat
B. Chrome chat D. Bigo live chat
_____ 42. What Communication Services provide a mechanism to connect multiple peoples with
same interests?
A. Social Networking C. Discussion Boards
B. Email D. Internet chat
_____ 43. Which service enables user to access the data residing on the remote computer?
A. Social Networking C. Email
B. Internet chat D. Remote Access
_____ 44. What communication method and something a computer user cannot work without?
A. Email B. Social Networking C. Internet chat D. Chrome
_____ 45. Which services is used to connect to the internet, and access files and information
services provided by the internet servers?
A. Database C. Resource Sharing
B. Web Services D Social Networking
_____ 46. Which services use resources efficiently and economically; network provides a mean
to share them?
A. Database C. Resource Sharing B.
Web Services D Social Networking _____ 47.
Which application service is one of the most important services.
A. Database C. Resource Sharing
B. Web Services D Social Networking
_____ 48. What process acting as Server opens a socket using a well-known (or known by
client) port and waits until some client request come?
A. Remote Procedure Call C. Client Server
B. Sockets D. Domain Name
system _____ 49. What one remote process acts as a client and requests some resource
from another application process acting as Server?
A. Peer- to- Peer C. Client system
B. Client-Server D. Remote Access
_____ 50. Which Protocol while communicating, a host needs Layer-2 (MAC) address of the
destination machine which belongs to the same broadcast domain or network.
A. Address Resolution Protocol (ARP) C. Internet Protocol Version 4(IPv4)
B. Internet Control Message Protocol (ICMP) D. Internet Protocol Version 6(IPv6)
_____

You might also like