CS610 Computer Network Online Solved Quizzes/MCQ's File No 1




Which one of the following is a method for computing routing table information?  Select correct option:  

 Manual entry
 Static routing (Correct)
Boot time routing
 None of the above


Thin Ethernet is known as-------------  Select correct option:  

 10Base2 (Correct)
 10Base5 
 10BaseT 
 All of above 


Which multiplexing technique shifts each signal to a different carrier frequency?  Select correct option:  

 TDM 
 FDM (Correct)
 Both a and b 
 None of the above 


The basic responsibility of NIC is ----------------  Select correct option:  

 To access medium/network 
 To resource allocation 
 To access memory 
 All of above (Correct)


How many methods exist for building routing table?  Select correct option:  

 1 
 2 (Correct)
 3 
 4 

CS610 Computer Networks 1. Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above

CS610 Computer Networks 2. The maximum cable length of a LAN is _____

Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these

CS610 Computer Networks 3. Jitter is significance for ------------------

Voice
Video
Data
All of above

CS610 Computer Networks 4.The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above

The process of forwarding the packets of information is called……….  Select correct option:  

 Routing (Correct)
 Switching
 Communication
 None of the above


The term signaling is used to describe------------  Select correct option:  

 Communication about the internet (Correct)
 Communication about the extranet 
 Communication about the network 
 None of above 


Which of the following statement is true regarding ATM?  Select correct option:  

 It is a single technology for voice, video and data
 It has low jitter and high capacity.
 It uses fixed size, small cells, 48 octet’s data
 All of the above (Correct)


An interior switch is one with which ………………….  Select correct option:  

 Computers are attached
 No computer is attached (Correct)
 Computers are attached internally
 None of the above


Network interface card acts like a (an) -----------  Select correct option:  

 Input/output device  
 Input device 
 Output device 
 All of above (Correct)



In ---------, network occupies larger areas like cities & countries.
LAN
WAN 04 page
MAN
CAN

. When an application--------------- data, it makes a copy of the data available to all other computers on the network.
Broadcasting 
Multicasting 35
Unicasting
Anycasting

NICs contain analogue circuitry and _______ that allows the NIC to operate independent of the CPU.
DMA (Direct Memory Access)
Multiplexer
Transceiver
Microprocessor 40

. In which type of topology computers are connected to a central device?
Ring
Mesh
Bus
Star  05

. IEEE LLC/SNAP header is __________which is used to specify the type of data.
8 octets
10 octets
12 bytes
16 bits

. A network which is based on packets uses a computer which may have _________, memory and__________ for switching.
Administration Rights, Algorithm
Source address, Destination address
. The next hop to which a packet is sent depends only on__________.
Packet’s destination
Packet’s original source
Path the packet has taken
Routed Protocol

. -------------- have advantages arisen from the size and ease of computation.
CRC
Parity
Checksums
VRC


1: The topology each computer is connected to a central hub is called
Star     
Ring
Mesh
Bus

A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.

Static addressing scheme        
Dynamic addressing scheme
Configured addressing scheme
None of these

According to their size there are............classifications of networks.
1
2              (LAN, WAN)     
3
4

LAN that use ATM technology have a ------------
Star topology           
Ring topology
Mesh topology
Bus topology

A network uses _______ to arrange computers to be connected in a single closed loop.

Ring Topology          
BUS topology
Mesh topology
Star topology

Hardware addresses must be ---------- on a LAN.

Unique       
Common

Computer networks are classified by.......factors
2
3
4                      
5

Hardware that calculates a CRC uses two simple components.
Shift register and XOR unit               
Shift register & AND unit
Shift register and shift XOR unit
AND unit and XOR unit

The first automated tool required to see whether the given computer is online or not was
Probing program
Ping program                 
Status program
None of these



In Point-to-Point topology there are two topologies.
Star and Tree  
Tree and Ring
Star and Ring
Star and Tree
None of the given       



------ Program sends a message to a remote computer and reports whether the computer responds.

Ping              
Traceroute
ICMP
Non of the given


------ has no way to determine the cause of the problem.

ICMP
Non of the given
Ping              
Trace route





In Point-to-Point topology there are two topologies.

       ► Tree and Ring

       ► Star and Ring

        Star
and Tree

       ► None of  the given





------ Program sends a message to a remote computer and reports whether the computer responds.

        Ping

       ► Traceroute

       ► ICMP

       ► Non of the given





------ has no way to determine the cause of the problem.


        ICMP

       ► Non of the given

       ► Ping

       ► Trace route




The term----- ------- refers to the general concept of a small block of data

        Packet


       ► Frame

       ► Data

       ► None of the given





---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

       ► Parity

       ► Checksums

       ► CRC

       ► None of given

CS610 Computer Networks 5. Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above

CS610 Computer Networks 6. If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0

CS610 Computer Networks 7. Frame forwarding of a bridge is based on _________.
Layer 3 source address

Layer 3 destination address
Layer 2 destination address
Layer 2 Source address

CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above

Question No: 6      ( Marks: 1 ) - Please choose one


Local Talk is a LAN technology that employs -------------


       ► Bus topology


       ► Ring topology

       ► None of the given

       ► Star topology





Most LANs that employ ring topology use an access mechanism known as-------


       ► CSMA/CD

       ► CSMA/CA

       ► TOKEN PASSING


       ► None of the given


CS610 Computer Networks 9. Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above

CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment


Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.


       ► 64

       ► 48

       ► 32

       ► 8

The UDP stands for__________.
Universal Datagram Protocol
User Datagram Protocol
United Datagram Protocol
None of the given

In 3-way handshake TCP requires to generate a random ________ sequence number.
30 bit
32 bit
34 bit
none of the given

TCP stands for _______
Transport control protocol
Transmission control protocol
Terminal control protocol
None of the given


Formally named __________ informally known as the thick wire Ethernet or Thick net.

       ► 10 Base 2

       ► 10 Base 5

       ► 10 Base T

       ► None of the given


NAT device stores state information in translation table.
Select correct option:
True
 False

A _____________ address-binding table is used for each physical network.
Select correct option:
 new
 similar
 separate
 old
Fragmentation when using ICMP for path MTU should be avoided.
Select correct option:
 True
 False
Static routing
_______ can be used to propagate information about remote networks.
Select correct option:
 Dynamic routing
 Static routing
 Address resolution
 None of the given

TCP stands for _______
Select correct option:
Transport control protocol
Transmission control protocol

The Universal Datagram Protocol is not an end-to-end protocol.
Select correct option:
True
False

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies

IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.
Select correct option:
 96
 100
 120
 none of the given

_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given

The Universal Datagram Protocol is a message-oriented protocol.
Select correct option:

True
False
 Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:
True 
False

which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given

Which protocol is used to test different tools.
Select correct option:
ICMP 
IGMP
TCP/IP
none of the given

HEADER LEN field gives size of extention header.
Select correct option:
False 
True

is a ____ protocol.
Select correct option:
Point-to-Point
Multi-Point
Both (a) and (b) 
None of the given
CP

NAT device stores state information in translation table.
Select correct option:
True 
False

Postfix defines how much of address used to identify network.
Select correct option:
True
False

6. CRC can detect more errors than a simple shecksum. 1
True
False
7. The network that uses a ------------- , usually consist of a single long cable to which computer attach. 1
Star topology
Bus topology
Ring topology
None of the given
8. Local Talk is a LAN technology that employs ------------- 1
Star topology
Bus topology
Ring topology
None of the given
9. LAN that use ATM tecnology have a ------------- 1
Star topology
Bus topology
Ring topology
None of the given
10. When an application--------------- data, it makes a copy of the data available to all other computers on the network. 1
Broadcasting
Multicasting
Unicasting
None of the given
11. Formally named --------------- informally known as thin wire ethernet or thin net. 1
10 Base 2
10 Base 5
10 Base T
None of the given



1. Which protocol working at the Transport layer provides a connectionless service between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: D

User Datagram Protocol is used at the Transport layer to provide a connectionless service.
Chapter: 3
2. Which protocol works at the Transport layer and provides virtual circuits between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: C

Transmission Control Protocol sets up a virtual circuit before transmitting any data. This creates a reliable session and is known as a connection-oriented session.
Chapter: 3
3. Which protocol works at the Internet layer and provides a connection service between hosts?
A. IP
B. ARP
C. TCP
D. UDP
Answer: A

Internet Protocol is used to address hosts and route packets through the internetwork. The question does not refer to a connection-oriented service, which is different from a plain connection service.

Chapter: 3
4. If a host broadcasts a frame that includes a source and destination hardware address, and its purpose is to assign IP addresses to itself, which protocol at the Network layer does the host use?
A. RARP
B. ARPA
C. ICMP
D. TCP
E. IPX
Answer: A


As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.  
Select correct option:
three 
two
four
five

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.
Select correct option: 
Least
Maximum 
Fragment
Frame

Twice NAT allows a site to run servers.
Select correct option:
True 
False

6. What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of?
A. 172.16.10.20 through 172.16.10.22
B. 172.16.10.1 through 172.16.10.255
C. 172.16.10.16 through 172.16.10.23
D. 172.16.10.17 through 172.16.10.31
E. 172.16.10.17 through 172.16.10.30
Answer: E
First start by using the 256 mask, which in this case is 256–240=16. The first subnet is 16; the second subnet is 32. This host must be in the 16 subnet; the broadcast address is 31 and the valid host range is 17–30.
Chapter: 3
7. What range of addresses can be used in the first octet of a Class B network address?
A. 1–126
B. 1–127
C. 128–190
D. 128–191
E. 129–192
F. 192–220
Answer: D
A Class B network is defined in the first octet with the numbers 128–191.
Chapter: 3
8. What range of addresses can be used in the first octet of a Class C address?
A. 1-127
B. 129-192
C. 203-234
D. 192-223
Answer: D


The maximum segment size of TCP flow control is_________ 
Select correct option:

3000 octets
2000 octets
1000 octets
none of the given

In IP routing, forwarding refers to ____ transfer.
Select correct option:
packet
datagram message
None of the given

There are _____ possibilities to detect the destination using Trace-route
Select correct option:
1

3
None of the given

A Class C network is defined in the first octet with the numbers 192-223.
Chapter: 3
9. How many bytes is an Ethernet address?
A. 3
B. 4
C. 5
D. 6
E. 7
F. 8
G. 16
Answer: D
An Ethernet (MAC) address is 6 bytes long (48 bits).
Chapter: 3
10. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP
Answer: B
Address Resolution Protocol (ARP) is used to find the hardware address from a known IP address.
Chapter: 3
11. Which of the following is the broadcast address for a Class B network ID using the default subnet mask?
A. 172.16.10.255
B. 172.16.255.255
C. 172.255.255.255
D. 255.255.255.255
Answer: B


dynamic routing, the routing table is initialized when system boots.
Select correct option:
True 
False

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.
Select correct option:
True 
False

Dotted decimal represents each octet in ______ and uses a dot to separate octets.
Select correct option:

binary
decimal
hexadecimal
Octal



The amount of buffer space available at any time is called the window.
Select correct option:
True 
False

In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.
Select correct option:
12
14
16 
none of the given

______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given

IPV6 address consists of ______ 
Select correct option:
32 Bits
64 Bits
128 Bits
none of the given

The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.
Select correct option:
16-bit
32-bit 
48-bit
64-bit

A datagram cannot be larger than ______ of a network over which it is sent.
Select correct option:
MTU
Size
IP header
None of the given

__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
Question No: 15 ( M - 1 ) .
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
    21-bit      
    22-bit      
    23-bit
    24 bit

Question No: 16 ( M - 1 ) .
ATM was designed for ________ and use a_________

Question No: 17 ( M - 1 ) .
The product of delay and throughput measures the _____ of data that can be present on the network.

► Area
► Volume
► Length
► None of the given
Question No: 18 ( M - 1 ) .
A typical port on an ATM switch operates at __________ or higher.
       ► OC-2 speed (155Mbps) 
       ► OC-3 speed (100Mbps)
       ► OC-3 speed (155Mbps)

       ► OC-3 speed (155Gbps)

An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host
Select correct option:
48-bit
32-bit
24-bit
None of the given

IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
Select correct option:
True 
False

Due to revolutionalization of IP-V6 the speed has increased from_____ 
Select correct option:
56kbps to 512kbps
512kbps to 1gbps
56kbps to 1gbps
none of the given

 _______uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given
window mechanism


Question No: 10      ( Marks: 1 ) - Please choose one


Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

       ► 10 Base 2

       ► 10 Base 5

       ► 10 Base T

       ► None of the given

UPD is operating system independent.
Select correct option:
True 
False

A________ is a special-purpose computer dedicated to the task of interconnecting networks.
Select correct option:
Router 
Bridge
Switch
None of the given

Network having short intervals has a large timeout and the network having large interval has short timeout.
Select correct option:
True 
False
_________ places the boundary between the first and second octets
Select correct option:
Class A
Class B
Class C
Class D
Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix
Select correct option:

True
False

There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing
True 
False

IPV6 128 bits address includes network prefix and ______ 
Select correct option:
Host Suffix
Host prefix
Source Prefix
none of the given

ICMP message transport is acted upon by getting ICMP_______ in IP.
Select correct option:
De-encapsulated
Encapsulated
Segmented
none of the given

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.
Select correct option:
True
False 

Twice NAT allows a site to run servers.
Select correct option:
True
False

Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given 

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False 

_________ uses window mechanism to control the flow of data.
Select correct option:
IP
UDP
TCP
none of the given 




The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.
Select correct option:
True
False

Which protocol is used to test different tools.
Select correct option:
ICMP
IGMP
TCP/IP
none of the given

________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given

The Source can configure outgoing datagram’s to avoid _________
Select correct option:
Segmentation
Defragmentation
Fragmentation
None of the given

The time for acknowledgement to arrive depends on __________
Select correct option:
Distance to destination
Current traffic conditions
Both a and b
none of the given

which is not the type of error messages defined by ICMP.
Select correct option:
Source quench
Time exceeded
Destination unreachable
none of the given 




Preliminary version of IP was called _________.
Select correct option:
IP - New Generation (IPng)
IP - Next Generation (IPng)
IP - Net Generation (IPng)
None of the given

HEADER LEN field gives size of extention header.
Select correct option:
False
True


A Class B network address is two bytes long, which means the host bits are two bytes long. The network address must be 172.16.0.0, which is all host bits off. The broadcast address is all bits on, or 172.16.255.255.
Chapter: 3
12. Which class of IP address provides a maximum of only 254 host addresses per network ID?
A. A
B. B
C. C
D. D
E. E
Answer: C
A Class C network address only has 8 bits for defining hosts. 2^8–2=254.
Chapter: 3
13. What is the broadcast address of the subnet address 10.254.255.19 255.255.255.248?
A. 10.254.255.23
B. 10.254.255.24
C. 10.254.255.255
D. 10.255.255.255
Answer: A
First start with 256 mask or in this case, 256–248=8. The first subnet is 8. The second subnet is 16, then 24. This host is in the 16 subnet, the broadcast address is 23, and the valid host range is 17–22.
Chapter: 3
14. What is the broadcast address of the subnet address 172.16.99.99 255.255.192.0?
A. 172.16.99.255
B. 172.16.127.255
C. 172.16.255.255
D. 172.16.64.127
Answer: B
First start with 256 mask or in this case, 256-192=64. 64 is the first subnet; 128 is the second subnet. This host is in the 64-subnet range, the broadcast address is 127, and the valid host range is 65-126.
Chapter: 3
15. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
A. 255.255.255.252
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.255
Answer: C

_______ shows senders preference for low latency, high Reliability.
Select correct option:
TYPE
SERVICE TYPE
SERVICE PRIORITY
None of the given

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.
Select correct option:
True
False

________ field of header indicates whether a datagram is a fragment or a complete datagram.
Select correct option:
FLAGS
FRAGMENT OFFSET
IDENTIFICATIONNo.3
None of the given (not sure) Page 105

In ______________, the protocol address assigned to a computer is chosen carefully so that computer’s hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.
Select correct option:
Address Resolution
Table Lookup
Message Exchange
Closed-form Computation Page 94



Postfix defines how much of address used to identify network.
Select correct option:
True
False

______________field tells the receiver how to order fragments within a given datagram.
Select correct option:
FLAGSNo.4
FRAGMENT OFFSET
IDENTIFICATION
None of the given (not sure) Page 105


H.LEN shows the header length in units of ____ Bits
Select correct option:
34
32 Page 105
30
None of the given

In Closed-form computation, the protocol address assigned to a computer is chosen carefully so
that computer’s hardware address can be computed from the protocol address using basic Boolean and _________ operations.
Select correct option:
arithmetic
XOR
Shift
XNORNo.5

For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.
Select correct option:
Efficiency
Security
Accuracy
Anomalies

End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless Page 120
both a and b
none of the given

CS610 Computer Networks 1. Which of the following statement is true regarding Jitter?
Jitter is used for variance in transmission delays.
Jitter can occur when a packet is delayed.
Jitter is significance for voice, video and data.
All of the above

CS610 Computer Networks 2. The maximum cable length of a LAN is _____

Fixed
Unlimited
Fixed and Unlimited in different conditions
None of these

CS610 Computer Networks 3. Jitter is significance for ------------------

Voice
Video
Data
All of above

CS610 Computer Networks 4.The routing table contains information about the ………………immediately around it.
topology of the network
destination
both of the above
none of the above

CS610 Computer Networks 5. Which of the following is called virtual channel?
Connection in VCI
Connection in ATM
Connection in virtual circuit
None of the above

CS610 Computer Networks 6. If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
3
2
1
0

CS610 Computer Networks 7. Frame forwarding of a bridge is based on _________.
Layer 3 source address


Layer 3 destination address
Layer 2 destination address
Layer 2 Source address

CS610 Computer Networks 8. The process of forwarding the packets of information is called…………….
Routing
Switching
Communication
None of the above

CS610 Computer Networks 9. Which one of the following is a property of static routing?
It is inflexible
It is done at boot time
It has low network overload
All of the above

CS610 Computer Networks 10. According to a bridges Performance, if both the sauces and destination are on the same segment
It forward the frame to the other segment
It does not forward the frame to the other segment
It does not forward the frame to the same segment
It forwards the frame to every other segment

The term----- ------- refers to the general concept of a small block of data

Packet                       
Frame
Data
None of the given


---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

Parity                     
Checksums
CRC
None of given


Local Talk is a LAN technology that employs -------------

Bus topology              
Ring topology
None of the given
Star topology


Most LANs that employ ring topology use an access mechanism known as-------

TOKEN PASSING              
CSMA/CA
TOKEN PASSING
None of the given



To span long distance or many computers, networks must replace shared medium with ………..
  •  Segment transformation
  • Fiber optics
  • Packet switches
  • None of the above

Which of the following statement is true regarding Distance-vector routing?
  •  It is very simple to implement.
  • Packet switch updates own routing table first
  • It is used in RIP
  • All of the above

What will be the bandwidth rate for 1000Base-T Gigabyte or ATM?
  •  100 MHz
  • 150 MHz
  • 200 MHz

  • 250 MHz
CBR stands for…………….
  •  Constant Byte Rate
  • Constant Bit Rate
  • Connection break Recovery
  • None of the above

The routing table in interior and exterior switches has which one of the following?
  •  It should have next hop for each possible destination
  • The next hop in table must be on shortest path to destination
  • Both (a) and (b)
  • None of the above

Which one of the following is a method for computing routing table information?
  •  Manual entry
  • Static routing
  • Boot time routing
  • None of the above

 Which one of the following is the responsibility of Djikstra’ algorithm?
  • To compute the shortest path between two nodes
  • To extract next hop information from path information
  • To insert next hop information into routing table
  • All of the above

Routing table is used to keep the information about…………….
  • Destination
  • Medium of transmission
  • Routers used in network
  • All of the above
Frame relay is………………….

  • Connection oriented service
  • Connectionless service
  • It is typically ranges from 5Mbps to 1000Mbps.
  • None of the above

Which of the following is not a guided medium?
  • Twisted-pair
  • cable Fiber-optic cable
  • Atmosphere
  • Coaxial cable


No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

       ► True

        False





------ Program sends a message to a remote computer and reports whether the computer responds.

       ► Ping
Ping

       ► Traceroute

       ► ICMP

       ► Non of the given





---------- was especially concerned about the lack of high powered computers.

       ► ARPA

       ► IEEE

       ► EIA

       ► Non of the given




The term -------- is used to denote the definition of a packet used with a specific type of network.


       ► Packet


       ► Frame


       ► Data


       ► None of the given





Computer networks are often called -------------- because they use packet technology.

       ► Ethernet


       ► Switch networks


       ► Packet networks


       ► None of the given





-------------- have advantages arisen from the size and ease of computation.

       ► CRC

       ► Parity

       ► Checksums


       ► None of given





Most LANs that employ ring topology use an access mechanism known as-------


       ► CSMA/CD

       ► CSMA/CA

       ► TOKEN PASSING


       ► None of the given





IEEE LLC/SNAP header is --------, which is used to specify the type of data.

       ► 8 octets

       ► 8 bytes

       ► 8 bits

       ► None of the given





Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

       ► 10 Base 2

       ► 10 Base 5

       ► 10 Base T

       ► None of the given





An interface for twisted pair Ethernet must have an ____________  connector , and must generate signals according to the_____________ specification.

       ► RJ-45, 10 Base T

       ► RJ-45, 10 Base 5

       ► BNC, 10 Base 2


       ► BNC, 10 Base T





A bridges function in the _________ layers(s).

       ► Physical (MAC)

       ► Data link

       ► Network

       ► Physical (MAC) and Data link





A Bridge can ________


       ► Filter a frame

       ► Forward a frame

       ► Extend a LAN

       ► Do all the above





A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________

       ► Layer 2 source address

       ► Source node’s physical address

       ► Layer 2 destination address

       ► Layer 3 destination address




________ computes shortest paths in a graph by using weights on edges as a measure of distance.

       ► Greedy algorithm

       ► Distance vector algorithm

       ► Dijksta’s algorithm

       ► Non of the given





___________ is used for audio and video, since these have predefined maximum data rates

       ► Constant Bit Rate (CBR) service

       ► Variable Bit Rate (VBR) service

       ► Available Bit Rate (ABR) service

       ► None of the given





Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

       ► Connectionless service paradigm

       ► Connection oriented service paradigm

       ► Both Connectionless and Connection-oriented service paradigm


       ► None of the given





A network with throughput T and delay D has a total of ________ bit in transit at any time.


       ► T / D

       ► T x D

       ► T + D

       ► None of the given


16. What is the port number range that a transmitting host can use to set up a session with another host?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: B
Source hosts can use any port number starting at 1024.
Chapter: 3
17. Which of the following ranges are considered well-known port numbers?
A. 1–1023
B. 1024 and above
C. 1–256
D. 1–65534
Answer: A
The port numbers 1–1023 are defined as and considered well-known port numbers.
Chapter: 3
18. What is the broadcast address of the host subnet address 10.10.10.10 255.255.254.0?
A. 10.10.10.255
B. 10.10.11.255
C. 10.10.255.255
D. 10.255.255.255
Answer: B
First start with 256-254=2. The first subnet is 2, the second subnet is 4, then 6, 8, 10, and 12. Remember that the fourth octet is host addresses. This host is a part of the subnet 10.0, the broadcast address is 11.255, and the valid host range is 10.1 through 11.254.
Chapter: 3
19. What broadcast address will the host 192.168.210.5 255.255.255.252 use?
A. 192.168.210.255
B. 192.168.210.254
C. 192.168.210.7
D. 192.168.210.15
Answer: C

A ---------- relies on the hardware manufacturer to assign a unique physical address to each network interface.
 
► Static addressing scheme
► Configurable addressing scheme
► Dynamic addressing scheme
► None of the given

Question No: 2    ( M - 1 ) .
 
An interface for thin  Ethernet must have an ____________  connector , and must  enerate signals according to the_____________ specification.
 
► RJ-45, 10 Base T
► RJ-45, 10 Base 5
► BNC, 10 Base 2
► BNC, 10 Base T

12. A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame. 1
Source address, destination adress.
Destination adress, destination address.
Destination adress, source address.
source adress, source address.
13. A Bridge can ---------------. 1
Filter a frame.
Forward a frame.
Extend LAN.
All of the given.
14. Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 1
Hierarchal address
Default route
Shortest route
None of the given
15. __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved. 1
Constant Bit Rate (CBR) service
Variable Bit Rate (VBR) service
Available Bit Rate (ABR) service
None of the given  www.vuzs.info 
16. ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 1
21-bit
22-bit
23-bit
24-bit
17. --------------- has a jitter zero 1
Virtual Private Network
Isochronous Network
Asynchronous Network
None of the given
 
Question No: 3( M - 1 ) .
 
A system with redundant bridges might have a problem with_______ in the system.
 
► Loop
► Filters
► Spanning Trees
► All given choices
 
Question No: 4( M - 1 ) .
A Bridge can ________
► Filter a frame
► Forward a frame
► Extend a LAN

► Do all the above

Start with the 256 mask or in this case, 256-252=4. This first subnet is 4. The second subnet is 8. This falls in the 4-subnet range. The broadcast address is 7, and the valid hosts are 5 and 6.
Chapter: 3
20. If you need to have a Class B network address subnetted into exactly 510 subnets, what subnet mask would you assign?
A. 255.255.255.252
B. 255.255.255.128
C. 255.255.0.0
D. 255.255.255.192
Answer: B



ATM is designed to work on___________.

       ► Twisted Pair

       ► Coaxial

       ► Radio Frequency

       ► Fiber




Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.


       ► CSMA/CD

       ► CSMA/CA

       ► TOKEN PASSING


       ► None of the given



________ is used for typical data applications (where the data rate may be unknown and bursty) and allows use of whatever bandwidth is available at a given time.
► Constant Bit Rate (CBR) service
► Variable Bit Rate (VBR) service
► Available Bit Rate (ABR) service
► None of the given
 
Question No: 6( M - 1 ) .
 
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
► 21-bit
► 22-bit
► 23-bit
► 24-bit
 The VC is identified by a 24-bit value formed from the VPI or Virtual Path Indicator (8-
bit),
Question No: 7( M - 1 ) .
 
________ of TCP/IP layering model, corresponds to basic network hardware.
 
► Physical Layer
► Network Interface Layer
► Internet Layer

► Transport Layer


FDDI can transmits data at a rate of ----------


       ► 100 million bits per second

       ► 10 million bits per second

       ► 1000 million bits per second

       ► None of the given

Which of the following statement is wrong regarding PVC?
  • PVC last as long as the customer pay the periodic fee for its use.
  • Forwarding tables are automatically restored after power of equipment failure.
  • Forwarding table entries for PVC’s are dynamically configured.
  • All of the above are wrong

Which of the following statement is true regarding ATM?
  • ATM is a single technology that is designed to meet the goals of both LANs and WANs.
  • ATM uses the concept of connection-oriented networking.
  • Both (a) and (b)
  • None of the above

UDP and TCP are both_________ layer protocols
 
► Physical
► Data link
► Network
 
Question No: 10( M - 1 ) .
 
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
 
► IP
► None of the given
► TCP
► UDP

A bridges function in the _________ layers(s).
    Physical(MAC) 
    Data Link
    Network      
    Physical (MAC) and Datalink
Question No: 12 ( M - 1 ) .
A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s__________
    Layer 2 source address
    Source node’s physical address
    Layer 3 destination address
Question No: 13 ( M - 1 ) .
The next hop to which a packet is sent depends only on
    Packet’s destination
    Packet’s original source
    Path the packet has taken
    Non of the given       

 


Question No: 11( M - 1 ) .
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
► Physical Layer
► Network Interface Layer
► Internet Layer
► Transport Layer

1. No error detection scheme is perfect because transmission errors can affect the additional information as well as the data. 1
True
False
2. In -------------, network occupies the smaller area like a room a floor or a building 1
LAN
WAN
MAN
None of the given
3. ------------- was especially concerned about the lack of high powered computers. 1
IEEE
APRA
EIA
None
4. Missing eot indicates sending computer crashed in frame format. 1
5. The -------------term refers to the general concept of a small block of data. 1
Packets
Data
Fram
None of given

 
Question No: 12( M - 1 ) .
 
________identifies which application program on receiving computer should receive the data
 
► Logical address
► Source port
► None of the given

    CRC can detect more errors than a simple checksum……
    True
    False

Question No: 5 ( M - 1 ) .
The Ethernet standard specifies that frames are sent using the --------Manchestor

Question No: 6 ( M - 1 ) .
Most LANs that employ ring topology use an access mechanism known as-------
    CSMA/CD
    CSMA/CA
    TOKEN PASSING
    None of the given
Question No: 7 ( M - 1 ) .
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
    Explicit frame type
    Ideal frame type
    Implicit frame type
    None of the given

 
Question No: 13( M - 1 ) .
________ identifies the application program that sent the data.
 
►  DestinationPort
► Logical address
► None of the given

Djikstra’s algorithm is used to compute the……………….
  • shortest path between two nodes
  • number of nodes used in the network
  • distance between different nodes
  • none of the above

Routing table is used to keep the information about…………….
  •  Destination
  • Medium of transmission
  • Routers used in network
  • All of the above

Which of the following statement is true regarding Jitter?
  •  Jitter is used for variance in transmission delays.
  • Jitter can occur when a packet is delayed.
  • Jitter is significance for voice, video and data.
  • All of the above

 The maximum cable length of a LAN is _____
  •  Fixed
  • Unlimited
  • Fixed and Unlimited in different conditions
  • None of these

Jitter is significance for ——————
  •  Voice
  • Video
  • Data
  • All of above

The routing table contains information about the ………………immediately around it.
  •  topology of the network
  • destination
  • both of the above
  • none of the above

Which of the following is called virtual channel?
  • Connection in VCI
  • Connection in ATM
  • Connection in virtual circuit
  • None of the above

If a bridge builds up address list for each segment that consists of physical addresses of the computer attached to that segment. So, when the bridge boots, the size of list will be__ for each segment.
  •  3
  • 2
  • 1
  • 0

Asynchronous Transfer Mode uses small fixed size cell. Each cell consist of ———– octets.
  •  55
  • 53
  • 52
  • 51

Which of the following statement is true regarding ATM?
  •  ATM is a single technology that is designed to meet the goals of both LANs and WANs.
  • ATM uses the concept of connection-oriented networking.
  • Both (a) and (b)
  • None of the above


Frame forwarding of a bridge is based on _________.
  • Layer 3 source address
  • Layer 3 destination address
  • Layer 2 destination address
  • Layer 2 Source address

The process of forwarding the packets of information is called…………….
  •  Routing
  • Switching
  • Communication
  • None of the above

 Which one of the following is a property of static routing?
  • It is inflexible
  • It is done at boot time
  • It has low network overload
  • All of the above

According to a bridges Performance, if both the sauces and destination are on the same segment
  •  It forward the frame to the other segment
  • It does not forward the frame to the other segment
  • It does not forward the frame to the same segment
  • It forwards the frame to every other segment

What will be the bandwidth rate for future (possibly 10 Gigabyte) Ethernet?
  •  500 MHz
  • 550 MHz
  • 600 MHz
  • 650 MHz

18. The network with Throughput T and Delay D has a total --------------- bits in transit at a time. 1
D + T
D – T
D X T
D / T
19. One repeater ---------------, two repeaters --------------- the maximum cable length limitation. 1
Double, triple
Double, 4 time
half, triple
Double, half
In broadcast topology there are two categories____.
    SATELLITE\RADIO
    RING TOPOLOGY
    Both a & b
    None of the above
Question No: 2 ( M - 1 ) .
The term ……..refers to the general concept of a small block of data
    Packet
     Frame
    Data
    None of the given
Question No: 3 ( M - 1 ) .
 The term -------- is used to denote the definition of a packet used with a specific type of network.
    Packet
     Frame
    Data
    None of the given


20. The length of time required to send a veriable length packet a veriable and does not require a complicated interrupt scheme to detect complication transmission. 1
True
False

Asynchronous Transfer Mode uses the concept of …………..
  •  Connection-less network
  • Connection-oriented network

The fiber-modem converts data into _________ then transmits cover the optional fiber
  •  Pulses of light
  • Electrons
  • Electromagnetic signals
  • None of these

 How many methods exist for computing routing table?
  •  5
  • 4
  • 3
  • 2
If a link or a packet switch fails then which one of the following would possibly be happened?
  • Link would be reestablished
  • Request to change failed hardware would appear
  • The packet switch will modify the tables
  • None of the above

 The routing contains information about immediately around it
  • Topology of the network
  • Destination
  • Both of the above
  • None of the above

SMDS is ……………………
  • Connectionless service
  • Connection oriented service
  • Used for delivering blocks of data
  • None of the above

The process of forwarding the packets of information is called
  • Routing
  • Switching
  • Communication
  • None of the above

The sharing of a medium and its link by two or more devices is called
  • modulation
  • encoding
  • line discipline
  • multiplexing
Which multiple
xing technique transmits analog signals?
  • FDM
  • TDM
  • WDM
  • (a) and (c)

Which multiplexing technique transmits digital signals?
  • FDM
  • TDM
  • WDM
  • None of above
Which multiplexing technique shifts each signal to a different carrier frequency?
  • FDM
  • TDM
  • Both (a) and (b)
  • None of above

In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
  • n
  • n+1
  • N-1
  • O to n

Which multiplexing technique involves signals composed of light beams?
  • FDM
  • TDM
  • WDM
  • None of above

_________ Utilization is the use of available bandwidth to achieve specific goals.
  • Frequency
  • Bandwidth
  • Amplitude
  • None of the above

________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
  • Efficiency; privacy and antijamming
  • Privacy and antijamming; efficiency
  • Privacy and efficiency; antijamming
  • Efficiency and antijamming; privacy


________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link.
  • 1; n
  • 1:1
  • n;1
  • n;n
The word __
____ refers to the portion of a _______ that carries a transmission.
  • channel; link
  • link; channel
  • line; channel
  • line; link

______ can be applied when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the signals to be transmitted.
  • TDM
  • FDM
  • Both (a) or (b)
  • Neither (a) or (b)

FSM is an _________technique.
  • Analog
  • Digital
  • Either (a) or b)
  • None of the above

____ is designed to use the high bandwidth capability of fiber-optic cable.
  • FDM
  • TDM
  • WDM
  • None of the above

____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
  • FDM
  • TDM
  • WDM
  • None of the above

____ is designed to use the high bandwidth capability of fiber-optic cable.
  • FDM
  • TDM
  • WDM
  • None of the above

______ is an analog multiplexing technique to combine optical signals.
  • FDM
  • TDM
  • WDM
  • None of the above

_____ is a digital process that allows several connections to share the high bandwidth of a link.
  • FDM
  • TDM
  • WDM
  • None of the above

_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate one.
  • FDM
  • TDM
  • WDM
  • None of the above

Djikstra’s algorithm is used to compute the……………….
  • shortest path between two nodes
  • number of nodes used in the network
  • distance between different nodes
  • none of the above

 Which one of the following is the responsibility of Djikstra’ algorithm
  • To compute the shortest path between two nodes
  • To extract next hop information from path information
  • To extract next hop information from path information
  • None of above

What will be the bandwidth rate for short distance 10Base-T
  • 16mhz
  • 20mhz
  • 100mhz
  • 150mhz

What will be the bandwidth rate for older, low-speed network, and analog telephones
  • 16
  • 20
  • 24
  • 30

How many methods exist for building routing table?
  • 1
  • 2
  • 3
  • 4

Which of the following statement is wrong regarding ATM?
  • It is a single technology for voice, video and data
  • it has low jitter and high capacity.
  • it uses fixed size, small cells, 48 octet’s data
  • None of the above

In Asynchronous Transfer Mode VPI/VCI fields indentify the cells
  • Source
  • Destination
  • port@
  • none

The physical addressing in a WAN is similar as in LAN in the way…………….
  • The data is transmitted in packets equivalent to frames.
  • Each packet has a format with header.
  • The packet header includes destination and source addresses.
  • All of the above

 Which one of the following is a method for computing routing table information?
  • Manual entry
  • Boot time routing
  •  Static routing
  • None of the above

All destinations on same switch have same
  • Router
  • Information
  • Next hop
  • None of the above

Which of the following statement is wrong regarding ATM?
  • It is a single technology for voice, video and data
  • It has low jitter and high capacity.
  • It uses fixed size, small cells, 48 octet’s data
  • None of the above

Which one of the following is the responsibility of Djikstra’ algorithm?
  • To compute the shortest path between two nodes
  • To extract next hop information from path information
  • To insert next hop information into routing table
  • All of the above

Which of the following statement is true regarding Link-state routing?
  • Network topology is separated from route computation.
  • Each switch builds its own routing tables.
  • Link-state routing uses Djikstra’s algorithm.
  • All of the above

Jitter is significance for ——————
  • Voice
  • Video
  • Data
  • All of above

The routing table contains information about the ………………immediately around it.

  • topology of the network
  • destination
  • both of the above
  • none of the above

 Which one of the following is a property of dynamic routing?
  • It is inflexible
  • It has low network overload
  • It can work around network failure
  • All of the above

 An exterior switch is one with which ………………….
  • Computers are attached
  • No computer is attached
  • hubs are attached externally
  • None of the above

Which of the following statement regarding ATM is true?
  • Connections in ATM are called virtual channels
  • The VC is identified by a 24-bit value formed from the VPI
  • Both (a) and (b)
  • None of the above

The fiber-modem coverts digital data into _______ then transmits over the optical fiber
  • Pulses of light
  • Electrons
  • Electromagnetic signals
  • None of these
_______network topology is a bus but wiring topology is a star
  •  10Base-T
  •  Ring
  •  10Base-W
  •  Star

Which of the following is not a guided medium?
  • Twisted-pair cable
  • Fiber-optic cable
  • Atmosphere
  • Coaxial cable

 A system with redundant bridges might have a problem with_______ in the system.
  • Select correct option:
  • Filters
  • Spanning Trees
  • Addressing
  • Loop

Repeaters are used when ______ communication is carries out
  • Optical fiber
  • Twisted Pair
  • Copper wire
  • All type of

The mechanism of extending the optical fiber across several kilometers is very successful because delays on optical fiber are very _____ and bandwidth is very _____
  • Low, High
  • High, Low
  • High, High
  • Low, Low

To span long distances or many computers, networks must replace shared medium with…………
  •  segment transformation
  •  fiber optices
  •  packet switches
  •  None of the above

Which one is incorrect statement?
  • Hub wiring centralizes electronics and connections. It makes management easier
  • No Transceiver allows computers to be powered off or disconnected from network without distracting other communication
  • Transceiver may be located in an inconvenient place in any situation
  • None of these

 An interior switch is one with which ………………….

  • Computers are attached
  • No computer is attached
  • Computers are attached internally
  • None of the above
The routers within an autonomous system use a _____________ to exchange routing information.
Interior Gateway protocols(IGPs)
Exterior Gateway protocol (EGPs)
Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)
None of the given

UDP datagram format is _____ bits.
Select correct option:
8
16
32
64




A routing table contains_______
Select correct option:
The destination network ID
The hop count to reach the network
The router ID of the next hop
All of the given

NAT device stores state information in translation table.
Select correct option:
True
False

TCP achieves _________ by retransmission.
Select correct option:
Efficiency
Accuracy
Reliability
none of the given

________ identifies the application program that sent the data.
Select correct option:
Destination Port
Source port
Logical address
None of the given

_____ Protocol provides error reporting mechanism.
Select correct option:
IGMP
SNMP
ICMP
none of the given

Routing refers to the _________ of routing information.
Select correct option:
transmission
propagation
communication
None of the given





______ layer Provides reliable delivery of datagram.
Select correct option:

Network
Transport
Datalink
none of the given

End to End delivery Service of IP datagram is _____
Select correct option:
Connection oriented
Connectionless
both a and b
none of the given




In Point-to-Point topology there are two topologies.

      Star and Tree
  ► Tree and Ring

       ► Star and Ring

        Star and Tree

       ► None of  the given





------ Program sends a message to a remote computer and reports whether the computer responds.

        Ping
       ► Ping
Ping

       ► Traceroute

       ► ICMP

       ► Non of the given





------ has no way to determine the cause of the problem.


       ► ICMP
       ► ICMP

       ► Non of the given

       ► Ping

       ► Trace route





The term----- ------- refers to the general concept of a small block of data

       ► Packet
       ► Packet


       ► Frame

       ► Data

       ► None of the given





---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

       ► Parity
       ► Parity

       ► Checksums

       ► CRC

       ► None of given





Local Talk is a LAN technology that employs -------------


       ► Bus topology
       ► Bus topology


       ► Ring topology

       ► None of the given

       ► Star topology





Most LANs that employ ring topology use an access mechanism known as-------


            ► TOKEN PASSING
  ► CSMA/CD

       ► CSMA/CA

       ► TOKEN PASSING


       ► None of the given





Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.


       ► 64
       ► 64

       ► 48

       ► 32

       ► 8





Formally named __________ informally known as the thick wire Ethernet or Thick net.

            ► 10 Base T
  ► 10 Base 2

       ► 10 Base 5

       ► 10 Base T

       ► None of the given





Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

       ► 10 Base 2
► 10 Base 2

       ► 10 Base 5

       ► 10 Base T

       ► None of the given





The maximum size of an Ethernet segment is___________

              ► 500 meters
 250 meters

       ► 500 meters

       ► 700 meters

       ► None of the given





A Bridge can ________


      ► Do all the above
 ► Filter a frame

       ► Forward a frame

       ► Extend a LAN

       ► Do all the above





________ computes shortest paths in a graph by using weights on edges as a measure of distance.

      ► Dijksta’s algorithm
 ► Greedy algorithm

       ► Distance vector algorithm

       ► Dijksta’s algorithm

       ► Non of the given





__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

       ► Constant Bit Rate (CBR) service
       ► Constant Bit Rate (CBR) service

       ► Variable Bit Rate (VBR) service

       ► Available Bit Rate (ABR) service

       ► None of the given






Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.


              ► Connection-oriented service paradigm
 Connectionless service paradigm

       ► Connection-oriented service paradigm

       ► Both Connectionless and Connection-oriented service paradigm

       ► None of the given





The product of delay and throughput measures the _____ of data that can be present on the network.


             ► None of the given
 ► Area

       ► Volume

       ► Length

       ► None of the given






A network with throughput T and delay D has a total of ________ bit in transit at any time.


             ► T x D
 ► T / D

       ► T x D

       ► T + D

       ► None of the given






One repeater _______, two repeaters ________ the maximum cable length limitation.

       ► doubles, triple
       ► doubles, triple

       ► square roots, cude roots

       ► and, triple

       ► doubles, cancel





A network uses a ------ if all computers attach to a central point


       ► Star Topology
       ► Star Topology

       ► Ring Topology

       ► Bus Topology

       ► None of the given





Computers attached to an ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.


       ► TOKEN PASSING
 CSMA/CD

       ► CSMA/CA

       ► TOKEN PASSING


       ► None of the given


Previous Post Next Post