CS610 MidTerm MCQs by Talha Sajid
CS610 MidTerm MCQs by Talha Sajid
CS610 MidTerm MCQs by Talha Sajid
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 2 of 42
1. Program sends a message to a remote computer and reports whether the computer
responds.
a) Ping
b) Traceroute
c) ICMP
d) None of the given
2. For how much time would other computers be in wait while one computer was
transferring 56MB file with transmission speed of 56Kbps
a) 10 Sec
b) 11 Sec
c) 12 Sec
d) 13 Sec
a) Label rewriting
b) Label switching system
c) Label rewriting and label switching system
d) All of above
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 3 of 42
7. The term ________ is used to denote the definition of a packet used with a specific type
of network.
a) Packet
b) Frame
c) Data
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 4 of 42
9. SMDS is............
a) Connectionless service
b) Connection oriented service
c) Used for delivering blocks of data
d) None of the above
10. ........ is effectively a very short Ethernet with very long AUI cables. It can be connected
into larger Ethernet .
a) RJ-45
b) HUBS
c) 10Base-T
d) None of these
11. _________ have advantages arisen from the size and ease of computation.
a) CRC
b) Parity
c) Checksums
d) None of given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 5 of 42
13. places the boundary between the first and second octets
a) Class A
b) Class B
c) Class C
d) Class D
14. Router detects datagram _______than network MTU and then it splits into pieces and
each piece is _________than outbound network MTU.
a) Larger, smaller
b) Larger, larger
c) Smaller, larger
d) Smaller, smaller
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 6 of 42
17. In case TCP, retransmission, acknowledgment from a computer on LAN are expected
to arrive within
a) Seconds
b) Micro seconds
c) Milliseconds
d) Nanoseconds
18. Most LANs that employ ring topology use an access mechanism known as________
a) CSMA/CD
b) CSMA/CA
c) TOKEN PASSING
d) None of the given
19. In Direct point to point communication adding the Nth computer requires_______ new
connections.
a) None of the given
b) N2
c) N-1
d) (N2 –N)/2
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 7 of 42
21. IEEE LLC/SNAP header is _____, which is used to specify the type of data.
a) 8 octets
b) 8 bytes
c) 8 bits
d) None of the given
22. protocols of TCP/IP layering model specify how to ensure reliable transfer.
a) Physical Layer
b) Network Interface Layer
c) Internet Layer
d) Transport Layer
23. The address identifies the physical network to which the computer is attached, while
the identifies an individual computer on that network.
a) prefix , suffix
b) suffix , prefix
c) suffix , suffix
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 8 of 42
24. places the boundary between the third and fourth octets.
a) Class A
b) Class B
c) Class C
d) Class D
25. Formally named __________ informally known as the twisted pair Ethernet or TP
Ethernet.
a) 10 Base 2
b) 10 Base 5
c) 10 Base T
d) None of the given
26. The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address
a) itself
b) prefix
c) suffix
d) mask
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 9 of 42
d) C
28. An interface for twisted pair Ethernet must have an ____________ connector, and
must generate signals according to the_____________ specification.
a) RJ-45, 10 Base T
b) RJ-45, 10 Base 5
c) BNC, 10 Base 2
d) BNC, 10 Base T
31. Computer networks are often called ________ because they use packet technology.
a) Ethernet
b) Switch networks
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 10 of 42
c) Packet networks
d) None of the given
33. An_______ method, the network hardware designers specify how type information is
included in the frame and the value use to identify various frame types.
a) Explicit frame type
b) Ideal frame type
c) Implicit frame type
d) None of the given
34. An interface for thin Ethernet must have an connector, and must generate signals
according to the specification.
a) RJ-45, 10 Base T
b) RJ-45, 10 Base 5
c) BNC, 10 Base 2
d) BNC, 10 Base T
35. A Bridge forwards or filters a frame by comparing the information in its address table
to the frame’s
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 11 of 42
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 12 of 42
a) hardware
b) software
c) operating system
d) internet
40. In the 1970s large organizations began to acquire multiple networks. Each network in
the organization formed island. Employees needed to choose a computer appropriate for
each task. So they needed multiple screens, keyboards and computers.
a) False
b) True
41. A Bridge forwards or filters a frame by comparing the information in its address table
to the frame’s_____
a) Layer 2 source address
b) Source node’s physical address
c) Layer 2 destination address
d) Layer 3 destination address
42. The general form of an IP datagram is with a header followed by data. The header
contains information that controls where and how the datagram is to be sent.
a) True
b) False
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 13 of 42
b) 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
c) 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
d) 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
44. ______ computes shortest paths in a graph by using weights on edges as a measure of
distance.
a) Greedy algorithm
b) Distance vector algorithm
c) Dijksta’s algorithm
d) None of the given
45. The number of connections needed for N computer in direct point to point
communication is equal to:
a) (N2 –N)/2
b) N(N- 1)
c) N2
d) None of the given
46. A system with redundant bridges might have a problem with in the system.
a) Loop
b) Filters
c) Spanning Trees
d) All given choices
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 14 of 42
48. _________ is used for audio and video, since these have predefined maximum data
rates
a) Constant Bit Rate (CBR) service
b) Variable Bit Rate (VBR) service
c) Available Bit Rate (ABR) service
d) None of the given
49. The process of using a routing table to select a next hop for a given datagram is called
a) Encapsulation
b) Reassembling
c) Routing or forwarding
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 15 of 42
51. Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service)
offers_______.
a) Connectionless service paradigm
b) Connection oriented service paradigm
c) Both Connectionless and Connection-oriented service paradigm
d) None of the given
52. Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
a) T
b) C
c) D
d) C, D
53. We use the term ________to refer to a measure of the path that routing software use
when choosing a route.
a) routing path
b) routing metric
c) routing
d) switching
54. A network with throughput T and delay D has a total of ________ bit in transit at any
time.
a) T / D
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 16 of 42
b) T x D
c) T + D
d) None of the given
57. If a link or a packet switch fails then which one of the following would possibly
happen?
a) Link would be reestablished
b) Request to change failed hardware would appear
c) The packet switch will modify the tables
d) None of the above
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 17 of 42
b) Coaxial
c) Radio Frequency
d) Fiber
59. A _______ Relies on the hardware manufacturer to assign a unique physical address to
each network interface.
a) Static addressing scheme
b) Configurable addressing scheme
c) Dynamic addressing scheme
d) None of the given
60. Computers attached to an Ethernet use ------ in which a computer waits for the ether
to be idle before transmitting a frame.
a) CSMA/CD
b) CSMA/CA
c) TOKEN PASSING
d) None of the given
61. ATM assigns each VC a identifier that is divided two parts to produce a hierarchy.
a) 21-bit
b) 22-bit
c) 23-bit
d) 24-bit
62. identifies which application program on receiving computer should receive the data
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 18 of 42
a) Logical address
b) Source port
c) Destination Port
d) None of the given
65. No error detection scheme is perfect because transmission errors can affect the
additional information as well as the data.
a) True
b) False
66. A ---------- provide a mechanism that a customer can use to set a physical address.
a) Static addressing scheme
b) Configurable addressing scheme
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 19 of 42
68. measures distance in network hops, where each network between the source and
destination counts as single hop.
a) BGP
b) OSPF
c) RIP
d) None of the given
69. In -------------, network occupies the smaller area like a room a floor or a building
a) LAN
b) WAN
c) MAN
d) None of the given
70. Program sends a message to a remote computer and reports whether the computer
responds.
a) Ping
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 20 of 42
b) Traceroute
c) ICMP
d) Non of the given
71. _________ provide Application to application communication it also called end to end
communication
a) IP
b) TP
c) RIP
d) None of the given
74. One repeater ________, two repeaters _________ the maximum cable length
limitation.
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 21 of 42
a) Double, triple
b) Double, 4 time
c) half, triple
d) Double, half
75. Address mask defines how many bits of address are in suffix?
a) True
b) False
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 22 of 42
c) stability
d) dynamic addressing
80. The term_________ refers to the general concept of a small block of data
a) Packet
b) Frame
c) Data
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 23 of 42
84. ICMP message transport is acted upon by getting ICMP encrypted in IP.
a) True
b) False
86. The term self-identifying is used for Classful IP addresses because the class of the
address can be computed from the address
a) itself
b) prefix
c) suffix
d) mask
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 24 of 42
87. Ethernet uses a ------ bit static addressing scheme in which each device is assigned a
unique address by the manufacturer.
a) 64
b) 48
c) 32
d) 8
89. Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
a) T, D
b) c
c) T
d) T, C
90. In which method of Address Resolution Protocol the implementation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data
Exchange?
a) T, C
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 25 of 42
b) T
c) C
d) D
91. In IPv6 the type of address used for collection of computers with same prefix. Are
known as
.
a) Anycast
b) Unicast
c) Multicast
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 26 of 42
94. An ________method, the network hardware designers specify how type information is
included in the frame and the value use to identify various frame types.
a) Explicit frame type
b) Ideal frame type
c) Implicit frame type
d) None of the given
95. A Bridge forwards or filters a frame by comparing the information in its address table
to the frame’s
a) Layer 2 source address
b) Source node’s physical address
c) Layer 2 destination address
d) Layer 3 destination address
96. Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called
a) Hierarchal address
b) Default route
c) Shortest path
d) None of the given
97. Formally named __________ informally known as the thick wire Ethernet or Thick
net.
a) 10 Base 2
b) 10 Base 5
c) 10 Base T
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 27 of 42
99. protocols of TCP/IP layering model specify how to ensure reliable transfer.
a) Physical Layer
b) Network Interface Layer
c) Internet Layer
d) Transport Layer
101. ARP is almost always used to bind a bit IP address to a bit Ethernet address.
a) 32, 48
b) 24, 32
c) 32, 64
d) 32, 128
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 28 of 42
102. The number of connections needed for N computer in direct point to point
communication is equal to:
a) (N2 –N)/2
b) N(N- 1)
c) N2
d) None of the given
104. The process of using a routing table to select a next hop for a given datagram is called
a) Encapsulation
b) Reassembling
c) Routing or forwarding
d) None of the given
105. _________is used for compressed audio and video where the data rate depends on the
level of compression that can be achieved.
a) Constant Bit Rate (CBR) service
b) Variable Bit Rate (VBR) service
c) Available Bit Rate (ABR) service
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 29 of 42
106. Which method of Address Resolution Protocol is useful with any hardware?
Were "T" for Computation and "D" for Data Exchange?
a) T
b) C
c) D
d) C, D
107. We use the term to refer to a measure of the path that routing software use when
choosing a route.
a) routing path
b) routing metric
c) routing
d) switching
108. performs local multicast and uses IP-in-IP encapsulation to send multicast datagrams
from one site on the Internet to another.
a) Distance Vector Multicast Routing Protocol (DVMRP)
b) Core Based Trees (CBT)
c) Protocol Independent Multicast_ Sparse Mode (PIM-SM)
d) Protocol Independent Multicast _ Dense Mode (PIM-DM)
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 30 of 42
c) Both a & b
d) None of the above
111. The product of delay and throughput measures the _____ of data that can be present
on the network.
a) Area
b) Volume
c) Length
d) None of the given
113. An interface for thin Ethernet must have an connector, and must enerate signals
according to the specification.
a) RJ-45, 10 Base T
b) RJ-45, 10 Base 5
c) BNC, 10 Base 2
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 31 of 42
d) BNC, 10 Base T
114. One repeater _______, two repeaters ________ the maximum cable length limitation.
a) doubles, triple
b) square roots, cude roots
c) and, triple
d) doubles, cancel
115. What will be the bandwidth rate for short distance 10Base-T?
a) 16 MHz
b) 20 MHz
c) 100 MHz
d) 150 MHz
116. LAN interface may use __________ to copy frame data directly from main memory.
a) DMA
b) FDDI
c) CSMA/CD
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 32 of 42
118. The Ethernet standard specifies that frames are sent using the_______
a) Differential Manchester
b) Not Return to Zero (NRZ)
c) Manchester Encoding
d) Return to Zero (RZ)
119. For how much time would other computers be in wait while one computer was
transferring 56MB file with packet size of 1000 bytes and transmission speed of 56Kbps
a) 0.143 sec
b) 0.243 0.343
c) 0.343 0.343
d) 0.443 0.343
120. Some applications have large data transfer. In this way they hold the network for
long time. This problem can be eliminated by
a) Divide the application into small block or chunks called ‘Packets’.
b) Divide the application into small block or chunks called ‘Segments’.
c) Divide the data into small block or chunks called ‘Segments’.
d) Divide the data into small block or chunks called ‘Packets’.
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 33 of 42
123. No error detection scheme is perfect because transmission errors can affect
_________.
Select correct option:
a) Data
b) Additional Information
c) Additional information & data
d) Transmission medium
124. A network uses _______ to arrange computers to be connected in a single closed loop.
a) Star Topology
b) Dual Ring Topology
c) Ring Topology
d) Bus Topology
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 34 of 42
c) Hub
d) All the given
126. Which of the following protocols allows the sender and receiver to enforce polices.
a) RIP
b) OSPF
c) BGP
d) RIP and OSPF
127. include a 32-bits address mask with each address, which allows the address to be
classful, classless, or sub netted.
a) RIP
b) OSPF
c) BGP
d) None of the given
128. The third field of the header consists of ______bit Ethernet frame type.
a) 48
b) 32
c) 16
d) 8
129. A multicast routing scheme in which the protocol software builds a delivery tree from
a central point is called_____
a) Distance Vector Multicast Routing Protocol (DVMRP)
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 35 of 42
131. Fixed network is a type of networks which is classified with respect to the
______factor
a) Size
b) Connectivity
c) Medium
d) Mobility
132. A standalone program that has been modified to work on a LAN by including
concurrency controls such as file and record locking is an example of____
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 36 of 42
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
137. In _______, network occupies larger areas like cities & countries.
a) LAN
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 37 of 42
b) WAN
c) MAN
d) None of the given
141. Header contains all information needed to deliver datagram to the destination
computer. But which one of the following is not included:
a) Destination address
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 38 of 42
b) Source address
c) Rectifier
d) Other delivery information
142. Every hardware technology specification includes the definition of the maximum size
of the frame data area, which is called the ____________ Transmission Unit.
a) Least
b) Maximum
c) Fragment
d) Frame
143. IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
a) 96
b) 100
c) 120
d) none of the given
144. For __________, information about forwarding is stored in a routing table, which is
initialized at system initialization and must be updated as network topology changes.
a) Efficiency
b) Security
c) Accuracy
d) Anomalies
145. ________is a technique used to Limit datagram size to small MTU of any network
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 39 of 42
a) Segmentation
b) Fragmentation
c) Encapsulation
d) none of the given
146. Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service)
offers_______ .
a) Connectionless service paradigm
b) Connection oriented service paradigm
c) Both Connectionless and Connection-oriented service paradigm
d) None of the given
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 40 of 42
149. ATM assigns each VC a _____________ identifier that is divided two parts to
produce a hierarchy.
a) 21-bit
b) 22-bit
c) 23-bit
d) 24-bit
151. A datagram cannot be larger than ________ of a network over which it is sent.
a) MTU
b) Size
c) IP header
d) None of the given
152. Most WAN systems include a mechanism that can be used to eliminate the common
case of duplication routing is called___________
a) Hierarchal address
b) Default route
c) Shortest path
d) None of the give
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 41 of 42
153. A popular LAN Technology that uses a shared Bus Topology is called_____
a) WAN
b) CSMA
c) Ethernet
d) Multicast
Whatsapp 0328-4090195
Mid-Term CS610(Computer Networks) Page 42 of 42
157. When an application--------------- data, it makes a copy of the data available to all
other computers on the network.
a) Broadcasting
b) Multicasting
c) Unicasting
d) None of the given
Best of Luck
For Free help, more Mid/Final term Files and for Exam Preparation You Can
Join:
https://chat.whatsapp.com/F094bNv5NKYD23JUH7AAY8
Whatsapp 0328-4090195