0% found this document useful (0 votes)
20 views5 pages

BIT 244 TCPIP Mid Exam

This document is an examination paper for the Bachelor of Information Technology (Hons) module on TCP IP, consisting of multiple-choice questions worth 30 marks. Candidates are instructed to use blue or black pen, and electronic devices are prohibited. The paper includes questions covering various networking concepts, protocols, and technologies.

Uploaded by

senzoempty.ac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views5 pages

BIT 244 TCPIP Mid Exam

This document is an examination paper for the Bachelor of Information Technology (Hons) module on TCP IP, consisting of multiple-choice questions worth 30 marks. Candidates are instructed to use blue or black pen, and electronic devices are prohibited. The paper includes questions covering various networking concepts, protocols, and technologies.

Uploaded by

senzoempty.ac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

BACHELOR OF INFORMATION TECHNOLOGY (HONS)

MID SEMESTER EXAMINATION 2024

MODULE TITLE : TCP IP

MODULECODE : BIT 244

TIME: 1 HOUR

THIS QUESTION PAPER CONSISTS OF ONE (1) SECTION:


SECTION A: MULTIPLE CHOICE QUESTIONS (MCQ) (30 Marks)

INSTRUCTION TO CANDIDATES:
1. Write in BLUE or BLACK pen ONLY.
2. Dictionary and electronic devices ARE PROHIBITED in the Examination Hall.
3. No scripts or answer sheets are to be taken out of the Examination Hall.
4. A candidate who is caught cheating in examinations is liable to be expelled from the
University.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of 06 pages

Page 1
Section A
Select the correct Answer. (1 X 30 = 30 MARKS)

1. Which of the following is a characteristic of a peer-to-peer network?


a) Centralized administration
b) All nodes are equal
c) Requires a dedicated server
d) High security

2. What is the primary purpose of a router in a network?


a) To store data
b) To connect devices in a local area network
c) To forward data packets between networks
d) To amplify signals

3. What is the primary function of a DNS (Domain Name System)?


a) Translate IP addresses to domain names
b) Translate domain names to IP addresses
c) Encrypt network traffic
d) Manage network connections

4. Which layer of the OSI model is responsible for end-to-end communication?


a) Application layer
b) Network layer
c) Transport layer
d) Data link layer

5. Which device operates at the Data Link layer of the OSI model?
a) Router
b) Switch
c) Modem
d) Hub

6. Which protocol is used to access the World Wide Web?


a) FTP
b) SMTP
c) HTTP
d) SNMP

7. What is data communication?


a) The process of storing data in computers
b) The process of moving data from one place to another through a transmission system
c) The process of converting data into signals
d) The process of encrypting data for secure transfer

Page 2
8. What does baseband signaling allow?
a) Multiple signals at a time on the network medium
b) Signals to traverse over fiber optics only
c) One signal at a time on the network medium
d) Wireless transmission only

9. Which type of signaling divides the network medium into multiple channels?
a) Baseband
b) Broadband
c) Twisted pair
d) Optical fiber

10. Which cable type uses RJ-45 (Registered Jack) connectors?


a) Coaxial cables
b) Fiber optic cables
c) Twisted pair cables
d) USB cables

11. What is the maximum distance for optical fiber cables?


a)180m
b) 500m
c) 2000m
d) Unlimited

12. Which of the following is a characteristic of coaxial cables?


a) Easy to handle
b) Used in satellite and cable TV connections
c) Maximum distance up to 2000m
d) Inexpensive and low bandwidth

13. Which technology focuses on wide-area wireless networks and is defined by IEEE 802.16
standards?
a) WiFi
b) Ethernet
c) WiMAX
d) Bluetooth

14. What is a key difference between WiFi and WiMAX?


a) WiMAX is slower than WiFi
b) WiFi is used for long-distance communication
c) WiMAX delivers metro area broadband wireless access
d) WiMAX is less scalable than WiFi

15. Which medium transmits signals as light beams?


a) Coaxial cable
b) Twisted pair cable
c) Fiber optic cable
d) Wireless

Page 3
16. The commonly used topologies in a LAN are_____.
a) Star, tree and mesh
b) Bus, tree and ring
c) Mesh, tree and Ring
d) Bus, star and ring

17. FDDI is used in the ________ topology?


a) Bus
b) Star
c) Ring
d) None

18. FTP stands for ___________.


a) Form transmission protocol
b) File transmission protocol
c) Form transfer protocol
d) File transfer protocol

19. What is the term for unsolicited Email?


a) News group
b) Usenet
c) Spam
d) Promotions

20. What does the term "topology" refer to in networking?


a) The type of network cables used
b) The shape or layout of a network
c) The speed of the network
d) The protocol used for communication

21.Which protocol is used in bus topology to avoid collisions?


a) TCP/IP
b) CSMA/CD
c) Token Ring
d) Ethernet

22. What happens in a broadcast topology?


a) Nodes communicate in a sequential order
b) A host broadcasts messages to all other hosts on the network segment
c) Each host receives data only if addressed specifically
d) Communication occurs only in pairs

23. SMTP is a
a) Networking protocol
b) Protocol used for transferring message between end user and Mail Server
c) Encryption standard
d) Protocol used for smart card message interchange

Page 4
24. What is the main purpose of the secondary ring in FDDI?
a) To improve speed
b) To transmit data faster
c) To provide backup if the primary ring fails
d) To manage token distribution

25. What is the data transfer rate supported by Gigabit Ethernet?


a) 10 Mbps
b) 100 Mbps
c) 1 Gbps
d) 10 Gbps

26. Which access method does Ethernet use to handle simultaneous demands?
a) Token passing
b) CSMA/CD
c) Frequency modulation
d) Duplex communication

27. Which type of topology is best suited for large businesses which must carefully control and
coordinate the operation of distributed branch outlets?
a) Ring
b) Local area
c) Hierarchical
d) Star

28. What is the purpose of an IP address?


a) To encrypt network data
b) To identify machines on a network uniquely
c) To determine the speed of a network
d) To restrict network access

29. Which class of IP addresses is reserved for large networks or governments?


a) Class A
b) Class B
c) Class C
d) Class D

30. What does the term CIDR stand for?


a) Classless Inter-Domain Routing
b) Cross-Internet Data Routing
c) Class-Integrated Data Routing
d) Common IP Domain Routing

-End of paper-

Page 5

You might also like