Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Bluetooth and Data Communication: Quiz Questions, Schemes and Mind Maps of Network Technologies and TCP/IP

This document consists of a series of multiple-choice questions related to Bluetooth technology and data communication concepts such as network layers, addressing, and error control. The questions cover topics like the definition of Bluetooth, packet forwarding, physical and logical addressing, Manchester encoding, and the OSI model.

Typology: Schemes and Mind Maps

2019/2020

Uploaded on 09/16/2022

divya-chaudhari-2
divya-chaudhari-2 🇮🇳

6 documents

1 / 26

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
B.E.Sixth Semester Computer Technology
Subject: Computer Networks
Multiple choice questions
UNIT I
Q. No.
Question
Options
Correct
option
1
In the layer hierarchy as the data packet moves
from the upper to the lower layers, headers are
___________.
A. Added
B. Removed
C. Rearranged
D. Modified
A
2
The structure or format of data is called
___________.
A. Syntax
B. Semantics
C. Struct
D. Formatting
A
3
Communication between a computer and a
keyboard involves ______________
transmission.
A. Automatic
B. Half-duplex
C. Full-duplex
D. Simplex
D
4
The first Network was called ________
A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
D
5
A _______ is the physical path over which a
message travels.
A. Path
B. Medium
C. Protocol
D. Route
B
6
A _________ set of rules that governs data
communication.
A. Protocol
B. Standards
C. RFCs
D. Servers
A
7
Three or more devices share a link in ________
connection.
A. Unipoint
B. Multipoint
C. Point to point
D. Simplex
B
8.
Bluetooth is an example of __________
A. personal area network
B. local area network
C. virtual private network
D. wide area network
A
9
A __________ is a device that forwards packets
between networks by processing the routing
information included in the packet.
A. Bridge
B. Firewall
C. Router
D. Hub
C
10
Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes
A. in case of traffic
overloading
B. when a system
terminates
A
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a

Partial preview of the text

Download Bluetooth and Data Communication: Quiz Questions and more Schemes and Mind Maps Network Technologies and TCP/IP in PDF only on Docsity!

B.E.Sixth Semester Computer Technology

Subject: Computer Networks

Multiple choice questions

UNIT I

Q. No. Question Options Correct option 1 In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________. A. Added B. Removed C. Rearranged D. Modified

A

2 The structure or format of data is called ___________. A. Syntax B. Semantics C. Struct D. Formatting

A

3 Communication between a computer and a keyboard involves ______________ transmission. A. Automatic B. Half-duplex C. Full-duplex D. Simplex

D

4 The first Network was called ________ A. CNNET B. NSFNET C. ASAPNET D. ARPANET

D

5 A _______ is the physical path over which a message travels. A. Path B. Medium C. Protocol D. Route

B

6 A _________ set of rules that governs data communication. A. Protocol B. Standards C. RFCs D. Servers

A

7 Three or more devices share a link in ________ connection. A. Unipoint B. Multipoint C. Point to point D. Simplex

B

8. Bluetooth is an example of __________ A. personal area network

B. local area network

C. virtual private network

D. wide area network

A

9 A __________ is a device that forwards packets between networks by processing the routing information included in the packet.

A. Bridge

B. Firewall

C. Router

D. Hub

C

10 Network congestion occurs _________ a) in case of traffic overloading b) when a system terminates c) when connection between two nodes

A. in case of traffic

overloading

B. when a system

terminates

A

terminates d) in case of transfer failure

C. when connection

between two nodes terminates

D. in case of transfer

failure 11 Physical or logical arrangement of network is


A. Topology B. Routing C. Networking D. Control

A

12 Which network topology requires a central controller or hub? A. Star B. Mesh C. Ring D. Bus

A

13 Data communication system spanning states, countries, or the whole world is ________

A. LAN

B. WAN

C. MAN

D. PAN

B

14 Data communication system within a building or campus is________

A. LAN

B. WAN

C. MAN

D. PAN

A

14 _______cable consists of two insulated copper wires twisted together. A. Coaxial B. Fiber-optic C. Twisted-pair D. None

C

15 ______cable can carry signals of higher frequency ranges than _____ cable. A. Twisted pair;fiber- optic B. Coaxial; fiber-optic C. Coaxial; twisted-pair D. None

C

14 _____________encoding has a transition at the middle of each bit.

A. RZ

B. Manchester C. Differential Manchester D. All the above

D

15 Unipolar, bipolar, and polar encoding are types of _______ encoding. A. line B. block C. NRZ D. Manchester

A

16 Which lines are utilized during the enable state of hardware flow control in DTE and DCE devices of RS232?

A. CD & IR

B. DSR & DTR

C. RTS & CTS

D. None of the above

C

17 OSI stands for __________ A. open system interconnection B. operating system interface

A

D. channel coding 3 Which sublayer of the data link layer performs data link functions that depend upon the type of medium? A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. error control sublayer

B

4 Which of the following is the multiple access protocol for channel access control?

A. CSMA/CD

B. CSMA/CA

C. Both CSMA/CD & CSMA/CA D. HDLC

C

5 The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called


A. Piggybackin B. cyclic redundancy check C. fletcher’s checksum D. parity check

A

6 _________ control refers to a set of procedures used to restrict the amount of data that the sender can send before waiting for acknowledgment. A. Flow B. Error C. Transmission D. none of the above

A

7 _________framing uses two categories of protocols: character-oriented and bit-oriented. A. Fixed-size B. Variable-size C. Standard D. None of the above

B

8 ARQ stands for _________. A. Automatic repeat quantization B. Automatic repeat request C. Automatic retransmission request D. Acknowledge repeat request

B

9 Bit stuffing means adding an extra 0 to the data section of the frame when there is a sequence of bits with the same pattern as the _________. A. Header B. trailer C. flag D. none of the above

C

10 Both Go-Back-N and Selective-Repeat Protocols use a _________. A. sliding frame B. sliding window C. sliding packet D. none of the above

B

11 Data link control deals with the design and procedures for _________ communication. A. node-to-node B. host-to-host C. process-to-process

A

D. none of the above 12 For Stop-and-Wait ARQ, for 10 data packets sent, _________ acknowledgments are needed. A. exactly 10 B. less than 10 C. more than 10 D. none of the above

A

13 HDLC is an acronym for _________. A. High-duplex line communication B. High-level data link control C. Half-duplex digital link combination D. Host double-level circuit

B

14 High-level Data Link Control (HDLC) is a _________ protocol for communication over point-to-point and multipoint links. A. bit-oriented B. byte-oriented C. character-oriented D. none of the above

A

15 In _________ framing, there is no need for defining the boundaries of frames. A. fixed-size B. variable-size C. standard D. none of the above

A

16 In _________ protocols, we use _________. A. character-oriented; byte stuffing B. character-oriented; bit stuffing C. bit-oriented; character stuffing D. none of the above

A

17 In _________, the configuration is balanced. The link is point-to-point, and each station can function as a primary and a secondary.

A. ABM

B. NRM

C. ARM

D. NBM

A

18 In________ the station configuration is unbalanced. We have one primary station and multiple secondary stations

A. ABM

B. NRM

C. ARM

D. NBM

B

19 In a _________ protocol, the data section of a frame is a sequence of bits. A. byte-oriented B. bit-oriented C. either A or B D. none of the above

B

20 In a _________ protocol, the data section of a frame is a sequence of characters. A. bit-oriented B. character-oriented C. either A or B D. none of the abov

B

21 In a Go-Back-N ARQ, if the window size is 63, what is the range of sequence numbers? A. 0 to 63 B. 0 to 64 C. 1 to 63 D. 1 to 64

A

33 The _________Protocol has both flow control and error control. A. Stop-and-Wait B. Go-Back-N ARQ C. Selective-Repeat ARQ D. both B and C

D

34 The Simplest Protocol and the Stop-and-Wait Protocol are for _________ channels. A. Noisy B. noiseless C. either A or B D. neither A nor B

B

35 he Stop-And-Wait ARQ, Go-Back-N ARQ, and the Selective Repeat ARQ are for _________ channels. A. Noisy B. noiseless C. either A or B D. neither A nor B

A

36 A burst error means that two or more bits in the data unit have changed. A. double-bit B. burst C. single-bit D. none of the above

B

37 A generator that contains a factor of __________ can detect all odd-numbered errors. A. x B. x + 1 C. 1 D. none of the above

B

38 A simple parity-check code can detect __________ errors. A. an even-number of B. two C. no errors D. an odd-number of

D

39 Checksums use __________ arithmetic. A. two's complement arithmetic B. one's complement arithmetic C. either A or B D. none of the above

B

40 n cyclic redundancy checking, the divisor is __________ the CRC. A. The same size as B. one bit less than C. one bit more than D. none of the above

C

41 In cyclic redundancy checking, what is the CRC? A. The divisor B. The quotient C. The dividend D. The remainder

D

43 n modulo-11 arithmetic, we use only the integers in the range __________, inclusive. A. 1 to 10 B. 1 to 11 C. 0 to 10 D. none of the above

C

44 e __________ between two words is the number of differences between corresponding bits. A. Hamming code B. Hamming distance C. Hamming rule D. none of the above

B

45 he __________ of a polynomial is the highest power in the polynomial. A. Range B. degree C. power

B

D. none of the above 46 the __________ of errors is more difficult than the __________. A. correction; detection B. detection; correction C. creation; correction D. creation; detection

A

47 The checksum of 0000 and 0000 is __________.

A. 1111

B. 0000

C. 1110

D. 0111

A

48 The divisor in a cyclic code is normally called the __________. A. Degree B. generator C. redundancy D. none of the above

B

49 The Hamming distance between 100 and 001 is __________.

A. 2

B. 0

C. 1

D. none of the above

A

50 The Hamming distance between equal codewords is __________.

A. 1

B. n C. 0 D. none of the above

C

_______ is the most widely used local area network protocol. A. Token Ring B. Token Bus C. Ethernet D. None

C

Unit III (^1) Which of the following describe router function? A. Packet filtering B. Internetwork communication C. Packet switching D. All of the above

D

2 There are two popular approaches to ________switching;the datagram approach and the virtual circuit approach. A. Circuit B. packet C. message D. none

B

3 In __________, each packet is treated independently of all others. A. circuit switching B. datagram switching C frame switching D none of the above

B

4 The network layer in the Internet is designed as a __________ network. A. circuit-switched B. datagram C. virtual-circuit D. none of the above

B

5 Which of the following is the broadcast address for a Class B network ID using the default subnetmask?

A. .172.16.10.

B. 255.255.255.

C. 172.16.255.

C

14 Count-to-Infinity problem occurs in ..................... (A) distance vector routing (B) short path first (C) link state routing (D) hierarchical routing

A

15 In Which routing method do all the routers have a common database? (A) Distance Vector (B) Link Vector (C) Shortest path (D) Link State

D

16 In distance vector routing algorithm, the routing tables are updated ..................... (A) by exchanging information with the neighbours (B) automatically (C) using the backup database (D) by the server

A

17 Distance vector routing algorithm is implemented in Internet as ........................

(A) OSPF

(B) RIP

(C) ARP

(D) APR

B

18 Two broad categories of congestion control are A. Open-loop and Closed-

loop

B. Open-control and

Closed-control

C. Active control and

Passive control

D. Active loop and

Passive loop

A

19 In open-loop control, policies are applied to


A. Remove after congestion occurs B. Remove after sometime C. Prevent before congestion occurs D. Prevent before sending packets

C

20 Retransmission of packets must not be done when _______ A. Packet is lost B. Packet is corrupted C. Packet is needed D. Packet is error-free

D

21 Closed-Loop control mechanisms try to


A. Remove after congestion occurs B. Remove after sometime

A

C. Prevent before congestion occurs D. Prevent before sending packets 22 The technique in which a congested node stops receiving data from the immediate upstream node or nodes is called as


A. Admission policy B. Backpressure C. Forward signalling D. Backward signaling

B

23 Backpressure technique can be applied only to


A. Congestion networks B. Closed circuit networks C. Open circuit networks D. Virtual circuit networks

D

24 The packet sent by a node to the source to inform it of congestion is called _______ A. Explicit B. Discard C. Choke D. Backpressure

C

UNIT IV

1 Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer As

  1. Which of the following are transport layer protocols used in networking? A. TCP and FTP B. UDP and HTTP C.TCP and UDP D. HTTP and FTP

C

3 User datagram protocol is called connectionless because ___________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

A

4 Trans6mission control protocol ___________ A. is a connection- oriented protocol B. uses a three way handshake to establish a connection C. receives data from application as a single stream D. all of the mentioned

D

12 “Total length” field in UDP packet header is the length of _________ A.Only UDP header B. Only data C. Only checksum
D. UDP header plus data

D

13 Which is the correct expression for the length of UDP datagram? A. UDP length = IP length

  • IP header’s length B. UDP length = UDP length – UDP header’s length C. UDP length = IP length
  • IP header’s length D. UDP length = UDP length + UDP header’s length

A

14 The ______ field is used to detect errors over the entire user datagram. A. udp header B. checksum C. source porr D. destination port

B

15 _______is not suitable for interactive multimedia traffic because we cannot allow retransmission of packets.

A. TCP

B. UDP

C. RTP

D. NONE

A

16 Which of the following is not a characteristic attributed to a data flow?. A. Reliability B. Delay C. Bandwidth D. All are correct

D

27 Which of the following method is used to improve QoS A. Scheduling B. Resource reservation C. Traffic shaping or policing D. All

D

18 A _______algorithm is a policing technique that shapes the bursty traffic into fixed- rate traffic by averaging the data rate, but it does not give credit to the user using idle periods.

. A. .leaky bucket B. Token bucket C. Priority queuing D. Weighted fair queing

A

19 In _________, when a source makes a reservation, it needs to define a flow specification A. Integrated services B. Differentiated services C. Connectionless D. Connectiin- oriented

A

20 The _______ bucket algorithm allows idle hosts to accumulate credit for the future in the form of tokens. A) leaky B) token C) either A or B

B

D) neither A nor B UNIT V 1 Which of the following protocols below work in the application layer?

A. POP

B. PPP

C. FTP

D. Both A and C

D

2 What is the port number for HTTP? A. 25 B. 80 C. 21 D. 65

B

3 From the options below, which suits best for MODEM? A. a device that modulates an analog carrier signal to encode digital information B. a device that modulates a digital carrier signal to encode analog information C. a device that modulates an analog carrier signal to decode digital information D. a device that modulates a digital carrier signal to decode analog information

A

4 UDP is an unreliable protocol. A. True B. False

A

5 Which of the following protocol below are suited for email retrieval?

A. POP

B. IMAP

C. FTP

D. Both and b above

D

6 TELNET used _________ protocol for data connection

A. TCP

B. UDP

C. IP

D. DHCP

A

7 What is the full form of URL? A. Uniform routing locator B. Uniform Resource Locator C. Universal Resource Locator D. Uniform router locator

B

8 56. Which port is reserved for use of the SMTP protocol?

A. 21

B. 23

C. 25

D. 53

C

19 Which one of the following allows client to update their DNS entry as their IP address change? A. dynamic DNS B. mail transfer agent C. authoritative name server D. none of the mentioned

A

20 Wildcard domain names start with label


A. @

B. *

C. &

D.

B

21 The domain name system is maintained by


A. distributed database system B. a single server C. a single computer D. none of the mentioned

A

22 One commonly used public-key cryptography method is the ______ algorithm.

A) RSS

B) RAS

C) RSA

D) RAA

C

23 A(n) ______ algorithm transforms ciphertext to plaintext. A) encryption B) decryption C) either (a) or (b) D) neither (a) nor (b)

B

24 The ________ is the message after transformation. A) ciphertext B) plaintext C) secret-text D) none of the above

A

25 The ________ method provides a one-time session key for two parties. A) Diffie-Hellman B) RSA C) DES D) AES

A

26 A ________ cipher replaces one character with another character. A) substitution B) transposition C) either A or B D) neither A nor B

A

27 The ________ cipher reorders the plaintext characters to create a ciphertext. A) substitution B) transposition C) either A or B D) neither A nor B

B

28 In an asymmetric-key cipher, the receiver uses the ______ key. A) private B) public C) either A or B D) neither A nor B

A

29 DES is a(n) ________ method adopted by the U.S. government. A) symmetric-key B) asymmetric-key C) either A or B D) neither A nor B

A

30 DES uses a key generator to generate sixteen _______ round keys. A) 32-bit B) 48-bit C) 54-bit D) 42-bit

B

31 The Caesar cipher is a _______cipher that has a key of 3. A) transposition B) additive C) shift D) none of the above

C

  1. In a(n) ________ cipher, the same key is used by both the sender and receiver. A) symmetric-key B) asymmetric-key C) either A or B D) neither A nor B

A

33 _________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic. A) Substitution B) Transposition C) either A or B D) neither A nor B

A

34 The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26. A) transposition B) additive C) shift D) none of the above

C

35 In an asymmetric-key cipher, the sender uses the__________ key. A) private B) public C) either A or B D) neither A nor B

B

46 Digital signature cannot provide ________ for the message. A) integrity B) confidentiality C) nonrepudiation D) authentication

B

47 To authenticate the data origin, one needs a(n) _______.

A) MDC

B) MAC

C) either A or B D) neither A nor B

B

48 A(n) _________ can be used to preserve the integrity of a document or a message. A) message digest B) message summary C) encrypted message D) none of the above

A

49 A digital signature needs a(n)_________ system. A) symmetric-key B) asymmetric-key C) either A or B D) neither A nor B

B

50 Message ________ means that the sender and the receiver expect privacy. A) confidentiality B) integrity C) authentication D) none of the above

A

51 In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses. A) message authentication B) entity authentication C) message confidentiality D) message integrity

B

52 _________ means that a sender must not be able to deny sending a message that he sent. A) Confidentiality B) Integrity C) Authentication D) Nonrepudiation

D

53 ________________ is the kind of firewall is connected between the device and the network connecting to internet. A. Hardware Firewall B. Software Firewall C. Stateful Inspection Firewall D. Microsoft Firewall

A

54 _________ is software that is installed using an internet connection or they come by-default with operating systems. A. Hardware Firewall B. Software Firewall C. Stateful Inspection Firewall D. Microsoft Firewall

B

55 Network layer firewall works as a __________ A. Frame filter B. Packet filter C. Content filter D. Virus filter

B

56 Network layer firewall has two sub-categories as _________ A. State full firewall and stateless firewall B. Bit oriented firewall and byte oriented firewall C. Frame firewall and packet firewall D. Network layer firewall and session layer firewall

A

57 A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as


A. Chock point B. Meeting point C. Firewall point D. Secure point

A

58 Which of the following is / are the types of firewall? A. Packet Filtering Firewall B. Dual Homed Gateway Firewall C. Screen Host Firewall D. Dual Host Firewall

A

59 A proxy firewall filters at _________ A. Physical layer B. Data link layer C. Network layer D. Application layer

D

60 A packet filter firewall filters at __________ A. Physical layer B. Data link layer C. Network layer or Transport layer D. Application layer

C

61 What tells a firewall how to reassemble a data stream that has been divided into packets? A. The source routing feature B. The number in the header’s identification field C. The destination IP address D. The header checksum field in the packet header

A