department of information technology ...kamarajengg.edu.in/it_learning/mcq/mcn.pdfdepartment of...
TRANSCRIPT
QUESTION BANK
DEPARTMENT OF INFORMATION TECHNOLOGY
Academic year : 2020-2021 Subject Code : CS8591
Year / Semester : III / VI Course Code (as
per NBA) :R17C302
Name of the Subject :COMPUTER NETWORKS
Name of Staff with
designation/Department :Ms.Kaviya.P, AP/IT
Course Outcomes (COs)
CO Code CO Statement
Blooms
Taxonomy
Level
R17C302.1
Describe the functionalities of each of the layers of
standard reference models and differentiate the types of switching mechanisms in the physical layer
K2
R17C302.2 Solve simple problems on error checking and error correction mechanisms and Explain the functionalities of the Datalink Layer in both wired and wireless medium
K2
R17C302.3 Explain network addressing protocols and solve simple problem on routing protocols
K2
R17C302.4 Compare & contrast the services of TCP and UDP protocols
K2
R17C302.5 Explain working principle of the application layer
protocols K2
Prepared by
Name &Signature of Staff member Signature of HOD
DEPARTMENT OF INFORMATION TECHNOLOGY
Subject Code: CS8591 Class: III IT
Subject Name: Computer Networks Semester: V
Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD
UNIT I - Quiz
Date: 07.08.2020 & 10.08.2020
1. The ____________ model is 7-layer architecture where each layer is having some
specific functionality to perform.
a) TCP/IP b) Cloud c) OSI d) OIS
2. The full form of OSI is OSI model is ______________.
a) Open Systems Interconnection b) Open Software Interconnection
c) Open Systems Internet d) Open Software Internet
3. The process-to-process responsibility of the entire message is the responsibility of
the ______________ layer.
a) Network b) Transport c) Application d) Physical
4. The _____________ layer is the layer closest to the transmission medium.
a) Physical b) Data link c) Network d) Transport
5. In the OSI model, encryption and decryption are functions of the ______________
layer.
a) Transport b) Session c) Presentation d) Application
6. When a host on network A sends a message to a host on network B, which address
does the router look at?
a) Port b) Logical c) Physical d) None of the these
7. To deliver a message to the correct application program running on a host, the
_____________ address must be consulted.
a) Port b) IP c) Physical d) None of these
8. The ___________ layer is responsible for moving frames from one hop (node) to the
next.
a) Physical b) Data link c) Network d) Transport
9. The ___________ layer establishes, maintains and synchronizes the interactions
between communication devices.
a) Transport b) Network c) Session d) Physical
10. The TCP/IP ____________ layer is equivalent to the combined session, presentation
and application layers of OSI model.
a) Application b) IP c) Transport d) Sub-Network
11. The ______________ address uniquely defines a host on the Internet.
a) Physical b) IP c) Port d) Specific
12. The ___________ layer ensures interoperability between communicating devices
through transformation of data into a mutually agreed upon format.
a) Transport b) Network c) Data link d) Presentation
13. Mail services are available to network users through the ____________ layer.
a) Data link b) Physical c) Transport d) Application
14. As the data packets moves from the upper to the lower layers, headers are _______.
a) Added b) Removed c) Rearranged d) Modified
15. IPv6 has ___________ -bit addresses.
a) 32 b) 64 c)128 d) Variable
16. Number of bits transmitted per second is _______________.
a) Bandwidth b) Delay c) Jitter d) Average Delay
17. _______________ is the measure of how fast we can actually send data through a
network.
a) Bandwidth b) Delay c) Jitter d) Throughput
18. ___________ defines how long it takes for an entire message to completely arrive at
the destination from the time the first bit is sent out from the source.
a) Bandwidth b) Delay c) Jitter d) Throughput
19. What is the propagation time if the distance between the two points is 24,000 km?
Assume the propagation speed to be 2.4 × 108 m/s in cable.
a) 0.05 s b) 0.1 s c) 0.5 s d) 1 s
20. What is the transmission time for a 7-MB (megabyte) message (an image) if the
bandwidth of the network is 1 Mbps? Assume that the distance between the sender
and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
a) 56 s b) 72 s c) 65 s d) 40 s
Assignment II – Crossword Puzzle
Date: 17.08.2020
Questions:
1. ____________________ is defined as a medium that can carry information from a source
to a destination.
2. Bayonet Neill-Concelman (BNC) connector used to connect ______________ cables.
3. ________________ cables accept and transport signal in the form of electrical signals.
4. _______________ made of glass or plastic and transmits signals in the form of light.
5. ________________ uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal.
6. _____________ is a strong material used in the fabrication of bulletproof vests to
strengthen fiber optic cables.
7. _________________ waves are omnidirectional.
8. _______________ need unidirectional antennas that send out signals in one direction.
9. _____________ used for short-range communication in a closed area using line-of-sight
propagation.
10. ____________ connectors used to connect Unshielded Twisted Pair wires.
Instructions
1. Left to Right
2. Left to Right
3. Top to Bottom
4. Top to Bottom
5. Top to Bottom
6. Top to Bottom
7. Top to Bottom
8. Top to Bottom
9. Right to Left
10. Left to Right
3.
6.
4.
1. 7. 5. 8.
9. 10.
2.
Answers:
1. Transmission Media
2. Coaxial
3. Twisted Pair
4. Fiber Optic
5. Single-Mode
6. Kevlar
7. Radio
8. Microwaves
9. Infrared
10. RJ-45
Assignment III – Quiz
Date: 24.08.2020
1. A ________________ network is made of a set of switches connected by physical
links, in which each link is divided into n channels.
a) Line-Switched b) Frame-Switched c) Circuit-Switched d) Packet-Switched
2. Circuit switching takes place at the ______________ layer.
a) Data link b) Physical c) Network d) Transport
3. In _________________, the resources need to be reserved during the setup phase;
the resources remain dedicated for the entire duration of data transfer phase until
the teardown phase.
a) Line-Switched b) Datagram-Switched c) Circuit-Switched d) Packet-Switched
4. In _______________, resources are allocated on demand.
a) Datagram Switched b)Line-Switched c) Frame-Switched d)Circuit-Switched
5. Datagram switching takes place at the ______________ layer.
a) Data link b) Physical c) Network d) Transport
6. A _____________________ network is a cross between a circuit-switched network
and a datagram network.
a) Virtual circuit-Switched b)Line-Switched c)Circuit-Switched d)Datagram-Switched
7. A local telephone network is an example of a ______________ network.
a) Packet-Switched b) Circuit-Switched c) Bit-Switched d) Line-Switched
8. Virtual circuit switching takes place at the ________________ layer.
a) Data link b) Physical c) Network d) Transport
9. Which frame completes the entries in the switching tables?
a) Acknowledgement frame b) Request frame c) Setup frame d) None of these
10. Virtual-Circuit networks and Datagram networks are the sub categories of _______.
a) Message-Switched b) Packet-Switched c) Circuit-Switched d) Line-Switched
DEPARTMENT OF INFORMATION TECHNOLOGY
Subject Code: CS8591 Class: III IT
Subject Name: Computer Networks Semester: V
Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD
UNIT II – Quiz
Date: 05.10.2020
1. _______________ is used to find link-layer address.
a. ARP b. RARP c. IP d. TCP
2. Which is referred as one-to-one communication?
a. Multicast Address b. Unicast Address c. Broadcast Address d. Anycast.
3. In ARP operation, which query is broadcast over the link using the link-layer broadcast
address?
a. ARP Response b. ARP Discovery c. ARP Request d. RTS
4. Two or more bits in the data unit have changed from 1 to 0 or from 0 to 1 is called
________.
a. Single-bit Error b. Burst Error c. Both a & b d. None of these
5. Data link layer translates a stream of bits from the physical layer into the larger
aggregate (or) discrete unit called _______________.
a. Frames b. Segments c. Datagram d. Message
6. _____________ is the process of adding one extra 0 whenever five consecutive 1s follow
a 0 in the data, so that the receiver does not mistake the pattern 0111110 for a flag.
a. Byte Stuffing b. Character Stuffing c. Bit Stuffing d. All of these
7. Sender sends one frame at a time stops until it receives the confirmation from the
receiver and then sends the next frame.
a. Stop and Wait b. Sliding Window c. Sender Window d. Receiver Window
8. Sender can transmit several frames continuously before needing an ACK.
a. Stop and Wait b. Sliding Window c. Sender Window d. Receiver Window
9. Sender only retransmits frames for which NAK is received.
a. Stop and Wait ARQ b. Go Back-N ARQ c. Selective Repeat ARQ
d. Sliding Window ARQ
10. _________________ is a bit-oriented protocol and uses stop and wait for
communication over point-to-point and multipoint links.
a. HDLC b. PPP c. CRC d. Hamming Distance
11. _________________ used the Character Stuffing.
a. HDLC b. PPP c. CRC d. Hamming Distance
12. Protocols used by Point-to-Point protocol are:
a. Link Control Protocol b. Authentication Protocol c. Network Control Protocol
d. All of these
13. Ethernet uses ____________________ technology.
a. ALOHA b. CSMA/CD c. CSMA/CA d. CSMA
14. ___________________ is the building blocks of a wireless LAN.
a. Basic Service Set b. Extended Service Set c. Access Point d. None
15. ________________ is made up of two or more BSSs with APs.
a. Basic Service Set b. Extended Service Set c. Access Point d. None
16. Ethernet is capable of transmit maximum of _____________ bytes.
a. 1000 b. 512 c. 1500 d. 15000
17. In Bluetooth, ________________ can have up to eight stations, one of which is called the
primary; the rest are called secondaries.
a. Scatternet b. Piconet c. Slownet d. Fastnet
18. ______________ a device that operates only in the physical layer.
a. Hub b. Switch c. Router d. Gateway
19. ____________ operates in both the physical and the data-link layers and does not
change the link-layer (MAC) addresses in a frame.
a. Hub b. Switch c. Router d. Gateway
20. ______________ a three-layer (physical, data-link, and network) device and changes the
link-layer address of the packet.
a. Hub b. Switch c. Router d. Gateway
DEPARTMENT OF INFORMATION TECHNOLOGY
Subject Code: CS8591 Class: III IT
Subject Name: Computer Networks Semester: V
Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD
UNIT III – Quiz
Date: 30.10.2020
1. The network layer is concerned with __________ of data.
a. Bits b. Frames c. Packets d. Bytes
2. Which one of the following is not a function of network layer?
a. Routing b. Inter-networking c. Congestion Control d. Error Control
3. A 4 byte IP address consists of __________.
a. Only network address b. Only host address
c. Network address & host address d. Network address & MAC address
4. In virtual circuit network each packet contains ___________.
a. Full source and destination address b. A short VC number
c. Only source address d. Only destination address
5. Which of the following routing algorithms can be used for network layer design?
a. Path Vector Routing b. Distance vector routing
c. Link state routing d. All of these
6. A subset of a network that includes all the routers but contains no loops is called
________.
a. Spanning tree b. Spider structure c. Spider tree d. Special tree
7. The network layer protocol for internet is __________.
a. Ethernet b. Internet Protocol c. HTTP d. FTP
8. ICMP is primarily used for __________.
a. Error and diagnostic functions b. Addressing
c. Forwarding d. Routing
9. The length of an IPv6 address is _______________.
a. 32 bits b. 48 bits c. 64 bits d. 128 bits
10. Which of the following address belongs class A?
a. 121.12.12.248 b. 130.12.12.248 c. 128.12.12.248 d. 129.12.12.248
11. Which of the following is correct IPv4 address?
a. 124.201.3.1.52 b. 300.142.210.64 c. 10110011.32.16.8 d. 128.64.0.0
12. Which of the following IP addresses can be used as (a) loop-back addresses?
a. 0.0.0.0 b. 127.0.0.1 c. 255.255.255.255 d. 0.255.255.255
13. A network administrator needs to configure a router with a distance vector protocol
that allows classless routing. Which of the following satisfies those requirements?
a. IGRP b. OSPF c. RIP d. EIGRP
14. What is split horizon?
a. Information about a route should not be sent back in the direction from which the
original update came
b. It splits the traffic when you have a large bus physical network
c. It holds the regular updates from broadcasting to a downed link
d. It prevents regular update messages from reinstating a route that has gone down
15. Which statement is true regarding classless routing protocols?
a. The use of discontiguous networks is not allowed
b. The use of variable length subnet masks is permitted
c. RIPv1 is a classless routing protocol
d. IGRP supports classless routing within the same autonomous system
16. The length of an IPv4 address is _______________.
a. 32 bits b. 48 bits c. 64 bits d. 128 bits
17. To configure hosts automatically _____________ protocol is used.
a. IP b. DHCP c. ICMP d. OSPF
18. In network, a node has a message to transfer group of people. Which mechanism it has
to follow?
a. Unicast b. Broadcast c. Multicast d. Anycast
19. Which protocol is an inter-domain routing protocol?
a. BGP b. RIP c. OSPF d. DVR
20. Which protocol is an intra-domain routing protocol?
a. RIP b. OSPF c. Both a & b d. None of these
DEPARTMENT OF INFORMATION TECHNOLOGY
Subject Code: CS8591 Class: III IT
Subject Name: Computer Networks Semester: V
Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD
UNIT IV – Quiz
Date: 06.11.2020
1. Which of the following are the functionalities of transport layer?
a. Process to process communication b. Flow Control
c. Congestion control d. All of these
2. In ________________, the sender can send several packets before receiving
acknowledgments, but the receiver can only buffer one packet.
a. Stop-and-wait b. Go-Back-N c. Selective Repeat d. Piggybacking
3. ___________________ technique is used to improve the efficiency of the bidirectional
protocols.
a. Stop-and-wait b. Go-Back-N c. Selective Repeat d. Piggybacking
4. Which protocol is suitable for a process that requires simple request-response
communication with little concern for flow and error control?
a. TCP b. UDP c. SCTP d. IP
5. _______________ is a connection oriented and reliable protocol.
a. TCP b. UDP c. SCTP d. IP
6. UDP Header size is _____________ bytes.
a. 10 b. 12 c. 8 d. 4
7. The process starts with the server. The server program tells its TCP that it is ready to
accept a connection. This request is called a ______________.
a. Active open b. Passive open c. Aggressive open d. Half open
8. Which flag is used to TCP connection establishment?
a. URG b. ACK c. PSH d. SYN
9. Consider a scenario, upon receiving the corresponding two ACKs, TCP increments
CongestionWindow by 2 - one for each ACK - and next sends four packets. It follows
which congestion control mechanism?
a. AIMD b. Slow start c. Self-clocking d. Fast retransmit and fast recovery
10. Which protocol is suitable for multimedia communication?
a. TCP b. UDP c. SCTP d. IP
DEPARTMENT OF INFORMATION TECHNOLOGY
Subject Code: CS8591 Class: III IT
Subject Name: Computer Networks Semester: V
Staff In-charge: KAVIYA.P Academic Year: 2020-2021 ODD
UNIT V – Quiz
Date: 13.11.2020
1. __________________ is the language used to create hypertext.
a. HTTP b. FTP c. SMTP d. DNS
2. The client and server can exchange multiple request/response messages over the same
TCP connection ________________.
a. Non-Persistent Connection b. Persistent Connection
c. Open Connection d. Closed Connection
3. To copying a file from one host to another which protocol is used?
a. TELNET b. SNMP c. FTP d. MIME
4. ________________ is used to define the format of the message being exchanged.
a. IMAP b. POP3 c. SMTP d. MIME
5. The __________________ protocol is used for message transfer.
a. IMAP b. POP3 c. SMTP d. MIME
6. ______________ protocol is used to retrieve message.
a. IMAP b. SSH c. SMTP d. MIME
7. ___________ exchange several security parameters to establish a secure channel on top
of the TCP.
a. TELNET b. SSH c. SNMP d. DNS
8. Which protocol is used to map a host name to an address?
a. FTP b. SSH c. SNMP d. DNS
9. ___________ is used for managing devices in an internet using the TCP/IP protocol
suite.
a. TELNET b. SMTP c. SNMP d. DNS
10. ____________ solves heterogeneity by defining a universal interface called the Network
Virtual Terminal (NVT) character set.
a. TELNET b. SSH c. SNMP d. DNS