CN MID-1 OBJ Question Bank
CN MID-1 OBJ Question Bank
CN MID-1 OBJ Question Bank
UNIT-1
1. Which of the following is required to communicate between two computers [d ]
(a) Software (b) Protocol
(c) Hardware (d) All
2. OSI stands for [a ]
(a) open system interconnection (b) operating system interface
(c) optical service implementation (c) none of the mentioned
3. Which layer is responsible for process to process delivery? [b ]
(a) Network Layer (b)Transport Layer
(c) Session Layer (d) Data Link Layer
4. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers
are [a ]
(a) Added (b) Removed
(c) Rearranged (d) Modified
5. Which one of the following is a transport layer protocol used in networking?[c ]
(a) TCP (b) UDP
(c) Both TCP and UDP (d) None of the above
6. A set of rules that governs data communication [b ]
(a) Standards (b) Protocols
(c) RFCs (d) None of the mentioned
7. Encryption and Compression is provided by [c ]
(a) Data Link layer (b) Transport layer
(c) Presentation layer (d) Application layer
8. A set of layers and protocols is called [a ]
(a) Network architecture (b) Protocol Architecture
(c) Protocol Stack (d) None of the above
9. User Datagram Protocol is [b ]
(a) Connection oriented protocol (b) Connectionless Protocol
(c) both a and b (d) None
10.The layers which deal with physical aspects of moving data from one device to another
device
[a ]
(a)Network support layers. (b) User support layers
(c) both a and b (d) None
11.The data link layer takes the packets from __network layer_______ and encapsulates them
into frames for transmission.
12.In OSI architecture the routing is performed by network___ Layer.
13.TCP/IP model was developed _prior to____ the OSI model.
14.TCP/IP model does not have _session_____ layer but OSI model have this layer
15.The _interface_______ defines which primitive operations and services the lower layer offers
to the upper one.
16.The network layer adds a header to the packet of upper layer includes the
_logical___________ address of sender and receiver.
17._optical fiber______________transmission media has the highest transmission speed in a
network
18.__coaxial_______ cable consists of an inner copper core and a second conducting outer sheath.
19.TCP/IP stands for __transmission control protocol/internet
protocol_____________________________
20. UDP stands for ___user datagram protocol____________________________
KEY
1. D
2. A
3. B
4. A
5. C
6. B
7. C
8. A
9. B
10.A
11.Network Layer
12.Network
13.prior to
14.session layer
15.Interface
16.Logical address
17.optical fiber
18. Coaxial
19. Transmission Control Protocol/Internet Protocol
20. User datagram protocol
UNIT-2
1. The data link layer takes the packets from _________ and encapsulates them into frames for
transmission [ ]
(a) network layer (b) transport layer
(c)session layer (d) application layer
2. The protocol that has no flow or error control is called [ ]
(a) Stop and Wait (b) simplest protocol
(c) Go Back-N ARQ (d) Selective repeat ARQ
3. In pure ALOHA, the vulnerable time is ______ the frame transmission time [ ]
(a) the same as (b) two times
(c) three times (d) none of the above
4. Header of a frame generally contains __________ [ ]
(a) synchronization bytes (b) frame identifier
(c) Addresses (d) all of the mentioned
5. Which of the following tasks is not done by data link layer? [ ]
(a) framing (b) error control
(c) flow control (d) channel coding
6. Which of the following is the multiple access protocol for channel access control?[ ]
(a) HDLC (b) CSMA/CD
(c) CSMA/CA (d) Both CSMA/CD & CSMA/CA
7. How error detection and correction is done? [ ]
(a) By passing it through equalizer (b) By passing it through filter
(c) By adding redundancy bits (d) By amplifying it
8. Which can detect two bit errors? [ ]
(a) CRC (b) Parity check
(c) Parity & Cyclic redundancy check(c) None of the mentioned
9. Which of the following is a data link protocol? [ ]
(a) Ethernet (b) point to point protocol
(c) HDLC (d) all of the mentioned
10. Which sublayer of the data link layer performs data link functions that depend upon the type
of medium? [ ]
(a) media access control sublayer (b) logical link control sublayer
(c) network interface control sublayer (d) error control sublayer
11. CRC stands for __________
12. The maximum throughput for pure ALOHA is ________ percent
13. MAC address is of ___________ bits
14. We add r redundant bits to each block to make the length n = k + r. The resulting n-bit blocks
are called _________.
15. In _________ each station sends a frame whenever it has a frame to send.
16. The _________Protocol, adds a simple error control mechanism to the Stop-and-Wait
Protocol
17. The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
18. The protocol that is used to transmit data without any schedule time is ___________
19. The technique of temporarily delaying outgoing acknowledgements so that they can be
hooked onto the next outgoing data frame is called ____________
20. When 2 or more bits in a data unit has been changed during the transmission, the error is
called ____________
Key
1. A
2. B
3. B
4. D
5. D
6. D
7. C
8. A
9. D
10. A
11. Cyclic redundancy check
12. 18.4
13. 48
14. Codewords
15. Pure ALOHA
16. Stop-and-Wait ARQ
17. Network Layer
18. Random access
19. Piggybacking
20. burst error
UNIT-3
1. Which one of the following is not a function of network layer? [ ]
(a) routing (b) inter-networking
(c) congestion control (d) error control
2. A 4 byte IP address consists of __________ [ ]
(a) only network address (b) only host address
(c) network address & host address(d) network address & MAC address
3. Which of the following routing algorithms can be used for network layer design? [ ]
(a) shortest path algorithm (b) distance vector routing
(c) link state routing (d) all of the mentioned
4. ICMP is primarily used for __________ [ ]
(a) error and diagnostic functions (b) addressing
(c) forwarding (d) routing
5. The network layer protocol for internet is __________ [ ]
(a) Ethernet (b) internet protocol
(c) hypertext transfer protocol (d) file transfer protocol
6. The ___________ algorithms aim to find the optimal paths between the network nodes so
that routing cost is minimized
7. ICMP Stands for _______________________
8. A subset of a network that includes all the routers but contains no loops is called ________
9. The network layer is concerned with __________ of data.
10. A router creates a data packet and then sends it to each host one by one is called________
KEY
1. D
2. C
3. D
4. A
5. B
6. Shortest path
7. Internet Control Message Protocol
8. spanning tree
9. packets
10. broadcast