Computer Concept Question bank

advertisement
1.
a.
b.
c.
d.
A number system that uses only two digits, 0 and 1 is called the___________:
Octal number system
Binary number system
Decimal number system
Hexadecimal number system
2.
In which computers, the binary
flip flop:
a.
b.
c.
d.
Microcomputer
Personal computer
Digital computer
All of these
3.
A binary
a.
b.
c.
d.
Binary number
Octal number
Decimal number
Hexadecimal number
4.
Which system is used to refer amount of things:
a.
b.
c.
d.
Number system
Number words
Number symbols
All of these
5.
_________are made with some part of body, usually the hands:
a.
b.
c.
d.
Number words
Number symbols
Number gestures
All of these
6.
a.
b.
c.
d.
number are represented by a set of binary storage device such as
number can be converted into _________:
__________are marked or written down:
Number system
Number words
Number symbols
Number gestures
7.
A number symbol is called a ___________:
a.
b.
c.
d.
Arabic numerals
Numerals
Both
None of these
8.
0,1,2 ,3 ,4,5,6 ,7,8 and 9 numerals are called:
a.
b.
c.
d.
Arabic numerals
String numerals
Digit numerals
None of these
9.
How many system of arithmetic, which are often used in digital system:
a.
b.
c.
d.
5
6
3
4
10.
a.
b.
c.
d.
e.
11.
Which are the system of arithmetic, which are often used in digital system:
Binary digit
Decimal digit
Hexadecimal digit
Octal digit
All of these
In any system, there is an ordered set of symbols also known as___________:
a.
b.
c.
d.
Digital
Digit
Both
None of these
12. Which is general has two parts in number system:
a.
b.
c.
Integer
Fraction
Both
d.
None of these
13. MSD stand for:
a.
b.
c.
d.
Most significant digit
Many significant digit
Both a and b
None of these
14. LSD stand for:
a.
b.
c.
d.
Less significant digit
Least significant digit
Loss significant digit
None of these
15. The _____ and ________ of a number is defined as the number of different digits which can occur in
each position in the system:
a.
b.
c.
d.
Base
Radix
Both
None of these
16. Which system has a base or radix of 10:
a.
b.
c.
d.
Binary digit
Hexadecimal digit
Decimal digit
Octal digit
17. Each of the ten decimal digits__________:
a.
b.
c.
d.
1 through 10
0 through 9
2 through 11
All of these
18. The binary
number system is also called a __________:
a.
b.
c.
d.
Base one system
Base two system
Base system
Binary system
19. The two symbols 0 and 1 are known as:
a.
b.
c.
d.
20.
a.
b.
c.
d.
Bytes
Bits
Digit
All of these
In which counting, single digit are used for none and one:
Decimal counting
Octal counting
Hexadecimal counting
Binary counting
21. In which numeral every position has a value 2 times the value f the position to its right:
a.
b.
c.
d.
Decimal
Octal
Hexadecimal
Binary
22. A binary number with 4 bits is called a_________:
a.
b.
c.
d.
Bit
Bytes
Nibble
None of these
23. A binary
a.
b.
c.
Bytes
Bits
Nibble
number with 8 bits is called as a___________:
d.
All of these
24. In which digit the value increases in power of two starting with 0 to left of the binary
decreases to the right of the binary point starting with power -1:
a.
b.
c.
d.
point and
Hexadecimal
Decimal
Binary
Octal
25. Which system is used in digital computers because all electrical and electronic circuits can be made
to respond to the states concept:
a.
b.
c.
d.
Hexadecimal number
Binary number
Octal number
Decimal number
26. Which addition is performed in the same manner as decimal addition:
a.
b.
c.
d.
Binary
Decimal
Both
None of these
27. ______in all digital systems actually performs addition that can handle only two number at a time:
a.
b.
c.
d.
Register
circuit
digital
All of these
28. Which machine can perform addition operation in less than 1 ms:
a.
b.
c.
d.
Digital machine
Electronic machine
Both
None of these
29. ________is the inverse operation of addition:
a.
b.
c.
d.
Addition
Multiply
Subtraction
Divide
30. ________of a number from another can be accomplished by adding the complement of the
subtrahend to the minuend:
a.
b.
c.
d.
Subtraction
Multiply
Divide
All of these
31. Complement the subtrahend by converting all __________and all __________:
a.
b.
c.
d.
1’s to 0’s
0’s to 1’s
Both
None of these
32. Each device represent :
a.
b.
c.
d.
1 bit
2 bit
3 bit
4 bit
33. A 0 in the sign bit represents a _____________ and a 1 in the sign bit represents a ____________:
a.
b.
c.
d.
Positive number
Negative number
Both
None of these
34. How many main sign number binary
a.
4
codes are used:
b.
c.
d.
5
3
6
35. Which are the types of binary
a.
b.
c.
d.
codes number:
Sign magnitude
1’s complement code
2’s complement code
All of these
36. How many types of addition in the 2’s complement system:
a.
b.
c.
d.
3
4
5
6
37.
a.
b.
c.
d.
e.
38.
Which are the types of addition in the 2’s complement system:
Both number positive
A Positive number and a smaller negative number
A negative number and a smaller positive number
Both number negative
All of these
How many important ideas to notice about these odometer readings:
a.
b.
c.
d.
1
2
3
4
39.
a.
b.
c.
d.
40.
Which are the types of important ideas to notice about these odometer readings:
The MSB is the sign bit :0 for a +sign and 1 for a – sign
The negative number represent the 2’s complement of the positive number
Both
All of these
Which is an algorithm or techniques used to multiply two numbers:
a.
b.
c.
d.
Addition algorithm
Subtraction algorithm
Multiplication algorithm
All of these
41. Which algorithm are used depending on the size of the numbers:
a.
b.
c.
d.
Simple algorithm
Specific algorithm
Both
None of these
42. Which algorithm is named after Volker Strassen:
a.
b.
c.
d.
Strassen algorithm
Matrix algorithm
Both
None of these
43. Strassen algorithm was published in ___________:
a.
b.
c.
d.
1967
1969
1987
1980
44. Which algorithm is used for matrix multiplication:
a.
b.
c.
d.
Simple algorithm
Specific algorithm
Strassen algorithm
Addition algorithm
45.
a.
b.
c.
d.
46.
a.
b.
c.
d.
47.
Which algorithm is a divided and conquer algorithm that is asymptotically faster:
Simple algorithm
Specific algorithm
Strassen algorithm
Addition algorithm
Which method required 8 multiplication and 4 addition:
Multiplication
Usual multiplication
Both
None of these
Which algorithm is a multiplication algorithm which multiplies two signed binary
complement notation:
numbers in 2’s
a.
b.
c.
d.
Usual multiplication
Booth’s multiplication
Both
None of these
48. Which algorithm includes repeated addition of two predetermined values A and S to a product P
and then performs a rightward arithmetic shift on P:
a.
b.
c.
d.
Booth’s algorithm
Usual algorithm
Multiplication algorithm
None of these
49. Which algorithm in mathematics expresses the outcome of the process of division of integers by
another:
a. Addition algorithm
b. Multiplication algorithm
c. Division algorithm
d. None of these
50.
Which algorithm is used to find GCD of two integers:
a.
b.
c.
d.
Multiplication algorithm
Division algorithm
Addition algorithm
Simple algorithm
51. Which algorithm is used as a general variant of a theorems, in the domain of integral numbers:
a.
b.
c.
d.
Multiplication algorithm
Division algorithm
Addition algorithm
Simple algorithm
52. How many main approaches to algorithm for division:
a.
b.
c.
d.
2
3
4
5
53. How many algorithm based on add/subtract and shift category:
a.
b.
c.
d.
2
4
3
6
54. Which are the algorithm based on add/subtract and shift category:
a.
b.
c.
d.
Restoring division
Non-restoring division
SRT division
All of these
55.
a.
b.
c.
d.
56.
Several methods for converting a ___________:
Decimal number to a binary number
Binary number to a decimal number
Octal number to a decimal number
Hexadecimal number to a binary number
A popular method knows as double-dabble method also knows as _________:
a.
b.
c.
d.
Divided-by-one method
Divided-by-two method
Both
None of these
57. Which method is used to convert a large decimal number into its binary equivalent:
a.
b.
c.
d.
Double dabble method
Divided-by-two-method
Both
None of these
58. In this method, the decimal number is _________:
a.
b.
c.
d.
Repeatedly divided by 4
Repeatedly divided by 2
Repeatedly divided by 1
None of these
59. The conversion of decimal fraction to binary fraction may be accomplished by using ___________:
a.
b.
c.
d.
Several techniques
Simple techniques
Both
None of these
60. Which system was used extensively by early mini computers:
a.
b.
c.
d.
Decimal number
Octal number
Hexadecimal number
Binary number
61. 3 bit binary
a.
b.
c.
d.
numbers can be represented by ____________:
Binary number
Decimal number
Hexadecimal number
Octal number
62. A number system that uses eight digits,0,1,2,3,4,5,6, and 7 is called an ________:
a.
b.
c.
d.
Binary number system
Decimal number system
Octal number system
None of these
63. Which system each digit has a weight corresponding to its position:
a.
b.
c.
d.
Hexadecimal number system
Binary number system
Decimal number system
Octal number system
64. Which odometer is a hypothetical device similar to the odometer of a car:
a.
b.
c.
d.
Binary
Decimal
Hexadecimal
Octal
65. An __________can be easily converted to its decimal equivalent by multiplying each octal digit by
positional weight:
a.
b.
c.
d.
Binary number
Octal number
Hexadecimal number
Decimal number
66. The simple procedure is to use ___________ :
a.
b.
c.
d.
Binary -triplet method
Decimal-triplet method
Octal-triplet method
All of these
67. Which system groups number by sixteen and power of sixteen:
a.
b.
c.
d.
Binary
Hexadecimal
Octal
None of these
68. Which number are used extensively in microprocessor work:
a.
b.
c.
d.
Octal
Hexadecimal
Both
None of these
69. Which number is formed from a binary number by grouping bits in groups of 4-bit each starting at
the binary point:
a.
b.
c.
Binary
Octal
Decimal
d.
Hexadecimal
70.
a.
b.
c.
d.
71.
Which number system has a base of 16 :
Binary number system
Octal number system
Decimal number system
Hexadecimal number system
Counting in hex, each digit can be increment from__________:
a.
b.
c.
d.
0 to F
0 to G
0 to H
0 to J
72. Which number can be converted into binary
bits binary equivalent using the code:
a.
b.
c.
d.
numbers by converted each hexadecimal digit to 4
Binary number
Decimal number
Octal number
Hexadecimal number
73. One way to convert from decimal to hexadecimal is the _________:
a.
b.
c.
d.
Double dabble method
Hex dabble method
Binary dabble method
All of these
74. Binary numbers can also be expressed in this same notation by _________representation:
a.
b.
c.
d.
Floating point
Binary point
Decimal point
All of these
75. How many parts of floating point representation of a number consists:
a.
b.
4
2
c.
d.
3
5
76. The first part of floating point represents a signed fixed point number called:
a.
b.
c.
d.
Exponent
Digit
Number
Mantissa
77. The second part of floating point designates the position of the decimal point and is called:
a.
b.
c.
d.
Mantissa
Binomial
Octal
Exponent
78. The fixed point mantissa may be _______or__________:
a.
b.
c.
d.
Fraction
Integer
Both
None of these
79. The number of bit required to express_________ and _______ are determined by the accuracy
desired from the computing system :
a.
b.
c.
d.
Exponent
Mantissa
Both
None f these
80. Which part is not physically indicated in the register:
a.
b.
c.
d.
Binary
Decimal
Octal
None of these
e.
81. The exponent contains the decimal number :
a.
b.
c.
d.
+05
+03
+04
+07
82. The first or the integer part is known as________:
a.
b.
c.
d.
Exponent
Integer
Binomial
None of these
83. How many bits of mantissa :
a.
b.
c.
d.
4
8
10
16
84. How many bit of exponent:
a.
b.
c.
d.
4
6
8
10
85. Which number is said to be normalized if the more significant position of the mantissa contains a
non zero digit:
a.
b.
c.
d.
Binary point number
Mantissa point number
Floating point number
None of these
86. Which operation with floating point numbers are more complicated then arithmetic operation with
fixed point number :
a.
b.
c.
d.
Logical operation
Arithmetic operation
Both
None of these
1.
Which is an important data transfer technique :
a.
b.
c.
d.
CPU
DMA
CAD
None of these
2.
Which device can be thought of as transducers which can sense physical effects and convert them
into machine-tractable data:
a.
b.
c.
d.
Storage devices
Peripheral devices
Both
None
3.
Which devices are usually designed on the complex electromechanical principle:
a.
b.
c.
d.
Storage devices
Peripheral devices
Input devices
All of these
4.
Which disk is one of the important I/O devices and its most commonly used as permanent storage
devices in any processor:
a.
b.
c.
d.
Hard disk
Optical disk
Magneto disk
Magneto Optical disk
5.
In storage devices PC have hard disk having capacities in the range of _____:
a.
b.
12GB to 15GB
15GB to 20GB
c.
d.
20GB to 80GB
80GB to 85GB
6.
Which disk is a 3.5-inch diskette with a capacity of 1.44MB:
a.
b.
c.
d.
Soft disk
Floppy disk
Both
None
7.
Which has a large storage capacity of 2 to8GB:
a.
b.
c.
d.
Magnetic tape
Magnetic disk
Soft disk
Floppy disk
8.
Which disk read the data by reflecting pulses of laser beams on the surface:
a.
b.
c.
d.
Magnetic disk
Soft disk
Floppy disk
Optical disk
9.
a.
b.
c.
d.
10.
Data access time of optical disk varies from 200 to 350minutes with transfer rate of ________:
130KB/s to 400KB/s
130KB/s to 500KB/s
150KB/s to 600KB/s
150KB/s to 800KB/s
NAND type flash memory data storage devices integrated with a _______ interface:
a.
b.
c.
d.
ATM
LAN
USB
DBMS
11. Which disk is based on the same principle as the optical disk:
a.
b.
Optical disk
Magnetic disk
c.
d.
Magneto-optical disk
All of these
12. WAN stands for:
a.
b.
c.
d.
Wide area network
Word area network
World area network
Window area network
13. The human-interactive I/O devices can be further categorized as____:
a.
b.
c.
d.
Direct
Indirect
Both
None
14. I/O devices are categorized in 2 parts are:
a.
b.
c.
d.
Character devices
Block devices
Numeral devices
Both a & b
15.
a.
b.
c.
d.
16.
UART stands for:
Universal asynchronization receiver/transmitter
Universal asynchronous receiver/transmitter
United asynchronous receiver/transmitter
Universal automatic receiver/transmitter
Which are following pointing devices:
a.
b.
c.
d.
Light pen
Joystick
Mouse
All of these
17.
a.
b.
c.
d.
Full form of LED:
Light emitting diode
Light encounter destination
Live emitting diode
None of these
18. In_______ mouse we use pair of LED:
a.
b.
c.
d.
Optical
Digital
Analog
All of these
19. ______is device that is designed for gaming purposes and based on principle of electricity:
a.
b.
c.
d.
Joy
Stick
Joystick
None of these
20. Joystick uses shaft potentiometers for:
a.
b.
c.
d.
X-Y DIRECTION
Only X direction
Only Y direction
All of these
21.
a.
b.
c.
d.
22.
Full form of ADC:
Analog to digital converter
Digital to analog converter
Accumulator digital converter
All of these
A system that enables computer to recognize human voice called:
a.
b.
c.
d.
Voice system
Voice input system
Input system
None of these
23. 2 commonly used voice input systems are:
a.
b.
c.
d.
Micro
Microphone
Voice recognition software
Both b & c
24. Optical scanner devices are:
a.
b.
c.
d.
MICR
OMR
OCR
All of these
25.
a.
b.
c.
d.
26.
MICR stands for:
Magnetic ink character recognition
Magnetic initiate character recognition
Both a & b
None of these
_______technique is used in evaluating objective answer sheets:
a.
b.
c.
d.
Optical Mark Reader
Optical Marker Reader
Optical Marker Reading
All of these
27. _______technique help in banking sector:
a.
b.
c.
d.
OCR
OMR
MICR
None of these
28. ______camera records image, converts it into digital format via ADC and stores it on a frame
buffer:
a.
b.
c.
d.
Video
Without video
Audio
None of these
29. Sensors are______ type of devices:
a.
b.
c.
d.
Interactive
Non-interactive
Interaction
Intermediate
30. Output devices commonly referred as:
a.
b.
c.
d.
Terminals
Host
Receivers
Senders
31. Terminals classified in to 2 types are:
a.
b.
c.
d.
Hard copy
Soft copy
Both a & b
None of these
32. VDU stands for:
a.
b.
c.
d.
Video display unit
Visual display unit
Visual data unit
None of these
33. A monitor consists of :
a.
b.
c.
d.
ARU
BRT
CRT
ARU
34.
a.
b.
c.
d.
35.
LCD stands for:
Liquid crystal display
Liquid catalog display
Liquid crystal data
Liquid code display
The size of monitor ranges from:
a.
b.
c.
d.
12-12 inch
12-21 inch
21-12 inch
21-11 inch
36.
a.
b.
c.
d.
37.
Range of color depends on:
Number of bits code lines with each pixel
Number of bits associated with each pixel
Number of instructions associated with each pixel
Number of code associated with each pixel
Which parameter defines number of times electron beam scans screen in a second:
a.
b.
c.
d.
Refresh rate
Data transfer rate
Pitch rate
All of these
38. Refresh rate refresh screen up to:
a.
b.
c.
d.
30 Hz per frame
33 Hz per frame
44 Hz per frame
20 Hz per frame
39. Printer speed is ______pages per minute:
a.
b.
c.
d.
13
12
11
10
40. Printer is a:
a.
b.
c.
d.
Hardcopy
Softcopy
Both a & b
None of these
41. Laser printer is type of:
a.
b.
c.
d.
Impact printer
Non-impact printer
Both a & b
None of these
42. ______printer print 120 to 200 characters per second:
a.
b.
c.
d.
Dot-matrix
Laser
Line
None of these
43. In_______ printing, each character is printed on the paper by striking a pin or hammer against an
inked ribbon:
a.
b.
c.
d.
Non-impact printing
Impact printing
Both a & b
None of these
44. Dot matrix printer is 2 types is:
a.
b.
c.
d.
Daisy wheels
Matrix printer
High quality matrix printer
Both a & c
45. In daisy wheel printer can print 40 character/second and bold characters are achieved by
overprinting the text:
a.
b.
c.
d.
Four times
Double
Once
Thrice
46.
_______printers spray tiny droplets of coloured inks on the paper and pattern depends on how
nozzle sprays the ink:
a.
b.
c.
d.
Inkjet printer
Laser printer
Daisy wheel
Dot matrix printer
47. Laser printer is a type of :
a.
b.
c.
d.
Impact printing
Non-impact printing
Both a & b
None of these
48. ______are used for printing big charts, drawings, maps and 3 dimensional illustrations specially for
architectural and designing purposes:
a.
b.
c.
d.
Printers
Plotters
Speakers
Mouse
49.
a.
b.
c.
d.
50.
DAC stands for:
Digital to analog converter
Analog to digital converter
Only digital converter
Only analog converter
In text to speech, speech is synthesized using lookup table of______ and these clubbed together
to form_______:
a.
b.
c.
d.
Phonemes, Words
Phonemes, Sentences
Character, Phonemes
Word, Character
51. ______interface is an entity that controls data transfer from external device, main memory and or
CPU registers:
a.
b.
c.
d.
I/O interface
CPU interface
Input interface
Output interface
52. The operating mode of I/O devices is_______ for different device:
a.
b.
c.
Same
Different
Optimum
d.
Medium
53. To resolve problems of I/O devices there is a special hardware component between CPU
and_______ to supervise and synchronize all input output transfers:
a.
b.
c.
d.
Software
Hardware
Peripheral
None of these
54.
a.
b.
c.
d.
e.
f.
55.
I/O modules are designed with aims to:
Achieve device independence
Handle errors
Speed up transfer of data
Handle deadlocks
Enable multi-user systems to use dedicated device
All of these
IDE is a_________ controller:
a.
b.
c.
d.
Disk
Floppy
Hard
None of these
56. In devices, controller is used for______:
a.
b.
c.
d.
Buffering the data
Manipulate the data
Calculate the data
Input the data
57.
a.
b.
c.
d.
58.
By which signal flow of traffic between internal and external devices is done:
Only control signal
Only timing signal
Control and timing signal
None of these
In devices 2 status reporting signals are:
a.
b.
c.
d.
BUSY
READY
Both a & b
None of these
59. I/O module must recognize a______ address for each peripheral it controls:
a.
b.
c.
d.
Long
Same
Unique
Bigger
60. Each interaction b/w CPU and I/O module involves:
a.
b.
c.
d.
Bus arbitration
Bus revolution
Data bus
Control signals
61.
a.
b.
c.
d.
62.
a.
b.
c.
d.
63.
Which are 4 types of commands received by an interface:
Control, status, data output, data input
Only data input
Control, flag, data output, address arbitration
Data input, data output, status bit, decoder
Two ways in which computer buses can communicate with memory in case of I/O devices by using:
Separate buses for memory and I/O device
Common bus for memory and I/O device
both a & b
none of these
There are 2 ways in which addressing can be done in memory and I/O device:
a.
b.
c.
d.
Isolated I/O
Memory-mapped I/O
Both a & b
None of these
64.
a.
b.
c.
d.
65.
Advantages of isolated I/O are:
Commonly usable
Small number of I/O instructions
Both a & b
None of these
In _______ addressing technique separate address space is used for both memory and I/O device:
a.
b.
c.
Memory-mapped I/O
Isolated I/O
Both a & b
d.
None of these
66. _______is a single address space for storing both memory and I/O devices:
a.
b.
c.
d.
Memory-mapped I/O
Isolated I/O
Separate I/O
Optimum I/O
67.
a.
b.
c.
d.
68.
Following are the disadvantages of memory-mapped I/O are:
Valuable memory address space used up
I/O module register treated as memory addresses
Same machine intersection used to access both memory and I/O device
All of these
Who determine the address of I/O interface:
a.
b.
c.
d.
Register select
Chip select
Both a & b
None of these
69. 2 control lines in I/O interface is:
a.
b.
c.
d.
RD, WR
RD,DATA
WR, DATA
RD, MEMORY
70. In I/O interface RS1 and RS0 are used for selecting:
a.
b.
c.
d.
Memory
Register
CPU
Buffer
71. If CPU and I/O interface share a common bus than transfer of data b/w 2 units is said to be:
a.
b.
c.
Synchronous
Asynchronous
Clock dependent
d.
Decoder independent
72. All the operations in a digital system are synchronized by a clock that is generated by:
a.
b.
c.
d.
Clock
Pulse
Pulse generator
Bus
73.
a.
b.
c.
d.
74.
Asynchronous means:
Not in step with the elapse of address
Not in step with the elapse of control
Not in step with the elapse of data
Not in step with the elapse of time
________is a single control line that informs destination unit that a valid is available on the bus:
a.
b.
c.
d.
Strobe
Handshaking
Synchronous
Asynchronous
75.
a.
b.
c.
d.
76.
What is disadvantage of strobe scheme:
No surety that destination received data before source removes it
Destination unit transfer without knowing whether source placed data on data bus
Can’t said
Both a & b
In_______ technique has 1 or more control signal for acknowledgement that is used for intimation:
a.
b.
c.
d.
Handshaking
Strobe
Both a & b
None of these
77. The keyboard has a__________ asynchronous transfer mode:
a.
b.
c.
d.
Parallel
Serial
Optimum
None
78. In _______transfer each bit is sent one after the another in a sequence of event and requires just
one line:
a.
b.
c.
d.
Serial
Parallel
Both a & b
None of these
79.
a.
b.
c.
d.
e.
80.
Modes of transfer b/w computer and I/O device are:
Programmed I/O
Interrupt-initiated I/O
DMA
Dedicated processor such as IOP and DCP
All of these
______operations are the results of I/O operations that are written in the computer program:
a.
b.
c.
d.
Programmed I/O
DMA
Handshaking
Strobe
81.
a.
b.
c.
d.
82.
a.
b.
c.
d.
83.
_______is a dedicated processor that combines interface unit and DMA as one unit:
Input-Output Processor
Only input processor
Only output processor
None of these
______is a special purpose dedicated processor that is designed specially designed for data transfer
in network:
Data Processor
Data Communication Processor
DMA Processor
Interrupt Processor
______processor has to check continuously till device becomes ready for transferring the data:
a.
b.
c.
d.
Interrupt-initiated I/O
DMA
IOP
DCP
84. Interrupt-driven I/O data transfer technique is based on______ concept:
a.
b.
On demand processing
Off demand processing
c.
d.
Both a & b
None of these
85. Which technique helps processor to run a program concurrently with I/O operations:
a.
b.
c.
d.
Interrupt driven I/O
DMA
IOP
DCP
86. 3 types of exceptions are:
a.
b.
c.
d.
Interrupts
Traps
System calls
All of these
87. Which exception is also called software interrupt:
a.
b.
c.
d.
88.
a.
b.
c.
d.
Interrupt
System calls
Traps
All of these
User programs interact with I/O devices through:
Operating system
Hardware
Cpu
Microprocessor
89. Which table handle store address of interrupt handling subroutine:
a.
b.
c.
d.
Interrupt vector table
Vector table
Symbol link table
None of these
90. Which technique is used that identifies the highest priority resource by means of software:
a.
b.
c.
d.
Daisy chaining
Polling
Priority
Chaining
91. ________interrupt establishes a priority over the various sources to determine which request
should be entertained first:
a.
b.
c.
d.
Priority interrupt
Polling
Daisy chaining
None of these
92. _____method is used to establish priority by serially connecting all devices that request an
interrupt:
a.
b.
c.
d.
Polling
Daisy chaining
Priority
None of these
93. In daisy chaining device 0 will pass signal only if it has:
a.
b.
c.
d.
Interrupt request
No interrupt request
Both a & b
None of these
94. VAD stands for:
a.
b.
c.
d.
Vector address
Symbol address
Link address
None of these
95. _______interrupt method uses a register whose bits are set separately by interrupt signal for each
device:
a. Parallel priority interrupt
b. Serial priority interrupt
c. Both a & b
d. None of these
96. ______register is used whose purpose is to control status of each interrupt request in parallel
priority interrupt:
a.
b.
c.
d.
Mass
Mark
Make
Mask
97. The ANDed output of bits of interrupt register and mask register are set as input of:
a.
b.
c.
d.
Priority decoder
Priority encoder
Priority decoder
Multiplexer
98. Which 2 output bits of priority encoder are the part of vector address for each interrupt source in
parallel priority interrupt:
a.
b.
c.
d.
99.
A0 and A1
A0 and A2
A0 and A3
A1 and A2
What is the purpose
100.
of A0 and A1 output bits of priority encoder in parallel priority:
a. Tell data bus which device is to entertained and stored in VAD
b. Tell subroutine which device is to entertained and stored in VAD
c. Tell subroutine which device is to entertained and stored in SAD
d. Tell program which device is to entertained and stored in VAD
101.
When CPU invokes a subroutine it performs following functions:
a. Pushes updated PC content(return address) on stack
b. Loads PC with starting address of subroutine
c. Loads PC with starting address of ALU
d. Both a & b
102.
DMAC stands for:
a. Direct memory access controller
b. Direct memory accumulator controller
c. Direct memory access content
d. Direct main access controller
103.
IOP stands for:
a. Input output processor
104.
DCP stands for:
a. Data communication processor
105.
Which may be classified as a processor with the direct memory access capability that
communicates with I/O devices:
a.
b.
c.
d.
DCP
IOP
Both
None
106.
The processor that communicates with remote terminals like telephone or any other serial
communication media in serial fashion is called ______:
a.
b.
c.
d.
107.
a.
b.
c.
d.
108.
a.
b.
c.
d.
DCP
IOP
Both
None
Instruction that are used for reading from memory by an IOP called _______:
Commands
Block diagram
Interrupt
None of these
Data communication with a remote device a special data communication is used_______:
Multiprocessor
Serial communication
DCP
IOP
109.
CRC stands for:
a. Cyclic redundancy check
110.
Which is used for synchronous data, PID is process ID, followed by message, CRC code and EOP
indicating end of block:
a.
b.
c.
d.
DCP
CRC
IOP
SYNC
111.
Which is commonly used in high –speed devices to realize full efficiency of communication link:
a. Transmission
b. Synchronous communication
c. Multiprocessor
d. All of these
112.
Multiprocessor use ________ than two CPUs assembled in single system unit:
a.
b.
c.
d.
113.
a.
b.
c.
d.
114.
a.
b.
c.
d.
One or More
Two or More
One or One
Two or Two
Which refers the execution of various software process concurrently:
Multiprocessor
Serial communication
DCP
IOP
Which is used for this and known as high speed buffer exist with almost each process?
Primary
RAM
Cache
None of these
115.
Data and instructions are accessed from local memory and global memory that is used by_____:
a. Internetworking facilities
b. Interconnection facilities
c. Both a & b
d. None of these
116.
Multiprocessor uses large caches but limited process that shares________
a. Memory bus
b. Single memory bus
c. Double memory bus
d. None of these
117.
Distributed are shares also referred to as tightly coupled and loosely coupled multiprocessor
respectively and hence called __________
a. Coupled multiprocessor
b. Shared multiprocessor
c. Distributed multiprocessor
d. None of these
118.
Which consist if a numbers of processor can be accessed among various shared memory
modules?
a. Coupled memory multiprocessor
b. Shared memory multiprocessor
c. Distributed memory multiprocessor
d. None of these
119.
Which keeps a number of processors in which virtual storage space is assigned for redundant
execution:
a. Coupled memory multiprocessor
b. Shared memory multiprocessor
c. Distributed memory multiprocessor
d. None of these
120.
The memory capacity in system is considered because the connecting processors are
used______:
a.
b.
c.
d.
121.
a.
b.
c.
d.
Network
Internet
Intranet
None of these
Intercrosses arbitration system for multiprocessor shares a _________:
Primary bus
Common bus
Domain bus
All of these
122.
Which is used to decentralize the decision to avail greater flexibility to the system that makes
processor or microprocessor in a very short:
a.
b.
c.
d.
123.
a.
b.
c.
d.
Arbitration
Centralized
Both a & b
None of these
Which is signal tells that an arbitration of the access bus is possible during interprocessing:
DBA
BAP
BNA
None of these
124.
a.
b.
c.
d.
Which signal bus request :
BAP
BNA
BAL
DBA
125.
a.
b.
c.
d.
126.
a.
b.
c.
d.
Which signal on the bus indicates that request from process arbitration is to be processed:
BAL
BREQ
BM4
DBA
Which signal is exchange information by bus:
BECH
BM4
BAL
All of these
127.
Which signal on bus applies +1 to the priority of resolution circuits of the arbitration designate
a new arbitration:
a.
b.
c.
d.
128.
a.
b.
c.
d.
BM4
BAL
BNA
DBA
Which signal create 3 lines of bus in which signals from the encoded number of processors:
BM1 to BM3
BAL
Both
None of these
129.
Which signal request the validation signal make active if its logic level is 0 and validate signals
from BM1 to BM3:
a.
b.
c.
d.
BAL
BM4
BNA
All of these
130.
Which signal represents synchronization signal decided by interprocess arbitration with a
certain delay or signal DMA:
a.
b.
c.
d.
131.
a.
b.
c.
d.
132.
a.
b.
c.
d.
133.
a.
b.
c.
d.
BAL
BNA
Both
None of these
In which condition only one process holds a resource at a given time:
Mutual exclusion
Hold and wait
Both
None of these
In which condition one process holds the allocated resources and other waits for it:
No preemption
Hold and wait
Mutual exclusion
All of these
In which condition resource is not removed from a process holding:
Synchronization problem
No preemption
Hold and wait
None of these
134.
In which condition busy waiting, programmer error, deadlock or circular wait occurs in
interprocessing:
a.
b.
c.
Synchronization problem
No preemption
Hold and wait
d.
135.
a.
b.
c.
d.
None of these
Mechanism can be referred to as adding a new facility to the system hence known as _______:
Process
Arbitration
Both a & b
None of these
136.
Which is a mechanism used by the OS to ensure a systematic sharing of resources amongst
concurrent resources:
a.
b.
c.
d.
Process synchronous
Process system
Process synchronization
All of these
137.
_________ is basically sequence of instructions with a clear indication of beginning and end for
updating shared variables
a.
b.
c.
d.
138.
a.
b.
c.
d.
Critical section
Entry section
Remainder section
All of these
Which provides a direct hardware support to mutual exclusion
Test-and-set(TS)
Swap instruction
Wait instruction
Signal instruction
139.
A process waiting to enter its critical section may have to wait for unduly_______:
a. Short time or may have to wait forever
b. Long time or may have to wait forever
c. Short time or may have to wait for long time
d. Long time or may have to wait for short time
140.
Which is a modified version of the TS instruction which is designed to remove busy- waiting:
a.
Swap instruction
b.
c.
d.
Wait instruction
Signal instruction
Both b & c
141.
PCB stands for:
a. Process control block
142.
____ gets activated whenever the process encounters a busy condition code:
a.
b.
c.
d.
143.
a.
b.
c.
d.
Wait instruction
Signal instruction
Both a & b
None of these
_____ are new and mutually exclusive operation:
Wait instruction
Signal instruction
Both a & b
None of these
144.
_______ gets activated whenever a process leaves the critical region and the flag is set to
false:
a.
b.
c.
d.
145.
a.
b.
c.
d.
Wait instruction
Signal instruction
Both a & b
None of these
Which represent an abstraction of many important ideas in mutual exclusion:
Process synchronous
Process system
Semaphores
All of these
146.
A semaphore is a ______ integer variable upon which two atomic operations wait and signal are
defined:
a. Negative integer
b. Non- Negative integer
c. Positive integer
d. None of these
147.
a.
b.
c.
d.
Which operation is executed as soon as a process exits from a critical section:
Wait
Signal
Both a & b
None of these
148.
CCR stands for:
a. Conditional critical region
149.
________ is a control structure in a high-level programming language:
a.
b.
c.
d.
150.
a.
b.
c.
d.
CPU
ALU
DDR
CCR
The exclusion between processes is ensured by a third semaphore called______:
Mutex
Mutual
Memory
All of these
151.
______ semaphore provides mutual exclusion for accesses to the buffer pool and is initialized
to the value:
a.
b.
c.
d.
152.
a.
b.
c.
d.
Mutex
Mutual
Memory
All of these
Which processes access and manipulate the shared data concurrently:
Micro processes
Several processes
Both
None of these
153.
Which section is basically a sequence of instruction with a clear indication of beginning and end
for updating shared variables:
a.
b.
c.
d.
Racing section
Critical section
Both
None of these
154.
In which section only one process is allowed to access the shared variable and all other have to
wait:
a.
b.
c.
d.
155.
a.
b.
c.
d.
Critical section
Racing section
Entry section
Remainder section
Which are the problem of critical section:
Mutual exclusion
Progress
Bounded wait
All of these
156.
Which section refer to the code segment of a process that is executed when the process
intends to enter its critical section:
a.
b.
c.
d.
157.
a.
b.
c.
d.
158.
a.
Critical section
Entry section
Reminder section
None of these
Which section refer to the code segment where a shared resource is accessed by the process:
Reminder section
Entry section
Both
None of these
Which section is the remaining part of a process’s code:
Racing section
b.
c.
d.
Critical section
Entry section
Reminder section
159.
a.
b.
c.
d.
160.
a.
b.
c.
d.
161.
a.
b.
c.
d.
162.
a.
b.
c.
d.
How many conditions for controlling access to critical section:
2
4
3
5
Which instruction provides a direct hardware support to mutual exclusion:
SP instruction
TS instruction
Both
None of these
Which instruction also improves the efficiency of the system:
Swap instruction
TS instruction
Both
None of these
Which instruction allows only one concurrent process to enter the critical section:
RP instruction
SP instruction
TS instruction
None of these
163.
Which section problem can be solved simply in a uniprocessor environment if the we are able to
prevent the occurrence of interrupt during the modification of a shared variable:
a.
b.
c.
d.
Entry section
Critical section
Non-critical section
None of these
e.
164.
a.
b.
c.
d.
The problem of readers and writers was first formulated by ________:
P.J. Courtois
F.Heymans
D.L. Parnas
All of these
165.
a.
b.
c.
d.
Which is a situation in which some process wait for each other’s actions indefinitely:
Operating system
Deadlock
Mutex
None of these
166.
a.
b.
c.
d.
_________system handles only deadlocks caused by sharing of resources in the system:
Operating system
Deadlock
Mutex
None of these
167.
a.
b.
c.
d.
168.
a.
b.
c.
d.
e.
169.
A deadlocks occurs when the how many conditions are met:
1
2
3
4
Which are the characteristics of deadlocks:
Mutual exclusion
Hold and wait
No pre-emption
Circular wait
All of these
RAG stands for:
a. Resource allocation graph
170.
How many events concerning RAG can occur in a system:
a.
b.
c.
d.
1
2
3
4
171.
a.
b.
c.
d.
Which are the events concerning RAG can occur in a system:
Request for a resource
Allocation of a resource
Release of resource
All of these
172.
a.
b.
c.
d.
How many methods for handling deadlocks:
1
2
3
4
173.
a.
b.
c.
d.
Which are the method for handling deadlocks:
Deadlock prevention
Deadlock avoidance
Deadlock detection
All of these
174.
a.
b.
c.
d.
175.
a.
How many condition that should be met in order to produce a deadlock:
2
4
6
8
Which are the condition that should be met in order to produce a deadlock:
Mutual exclusion
b.
c.
d.
e.
Hold and Wait
No preemption
Circular wait
All of these
176.
a.
b.
c.
d.
In protocol each process can make a request only in an ________:
Increasing order
Decreasing order
Both a & b
None of these
177.
In protocol above mentioned ________protocol are used then the circular wait-condition can
not hold:
a.
b.
c.
d.
178.
a.
b.
c.
d.
1
2
3
4
Which state refers to a state that is not safe not necessarily a deadlocked state:
Safe state
Unsafe state
Both a & b
None of these
179.
________ a direct arrow is drawn from the process to the resource rectangle to represent each
pending resource request:
a.
b.
c.
d.
TS
SP
CCR
RAG
180.
The attributes of a file are:
a. Name
b. Identifier
c. Types
d. Location
e. Size
f. Protection
g. Time, date and user identification
h. All of these
181.
The various file operation are:
a. Crating a file
b. Writing a file
c. Reading a file
d. Repositioning within a file
e. Deleting a file truncating a file
f. All of these
182.
Which operations are to be performed on a directory are:
a.
b.
c.
d.
e.
f.
g.
183.
a.
b.
c.
d.
184.
a.
b.
c.
d.
Search for a file
Create a file
Delete a file
List a directory
Rename a file
Traverse the file system
All of these
Which memory is assembled between main memory and CPU:
Primary memory
Cache memory
Both a & b
None of these
Which is considered as semi-conductor memory , which is made up of static RAM:
Primary memory
Cache memory
Both a & b
None of these
185.
Which is one of the important I/O devices and is most commonly used as permanent storage
device in any processor:
a.
b.
c.
d.
Soft disk
Hard disk
Both a & b
None of these
186.
______ can read any printed character by comparing the pattern that is stored in the
computer:
a.
b.
c.
d.
SP
CCR
RAG
OCR
187.
Which system is a typical example of the readers and writers problem:
a. Airline reservation system
b. Airport reservation system
c. Both
d. None of these
188.
Which lock can arise when two processes wait for phone calls from one another:
a.
b.
c.
d.
Spine lock
Dead lock
Both
None of these
189.
Which lock is more serious than indefinite postponement or starvation because it affect more
than one job:
a.
b.
c.
d.
Deadlock
Spinelock
Both
None of these
1.
Which is a type of microprocessor that is designed with limited number of instructions:
a.
b.
c.
d.
CPU
RISC
ALU
MUX
2.
Which unit is a pipeline system helps in speeding up processing over a non pipeline system:
a.
b.
c.
d.
CPU
RISC
ALU
MUX
3.
The group of binary
bits assigned to perform a specified operation is known as:
a.
b.
c.
d.
Stack register
Control word
Both
None
4.
How many binary
a.
b.
c.
d.
1
7
14
28
5.
In control word three fields contain how many bits:
a.
b.
c.
d.
1
2
3
4
6.
Three fields contains three bits each so one filed has how many bits in control word:
a.
b.
c.
d.
2
4
5
6
7.
How is selects the register that receives the information from the output bus:
a.
b.
c.
d.
Decoder
Encoder
MUX
All of these
8.
A bus organization for seven _____register:
selection inputs in the control word:
a.
b.
c.
d.
ALU
RISC
CPU
MUX
9.
How many source register propagate through the multiplexers:
a.
b.
c.
d.
1
2
3
4
10. How many bits of OPR select one of the operations in the ALU:
a.
b.
c.
d.
2
3
4
5
11. five bits of OPR select one of the operation in the ____ in control register:
a.
b.
c.
d.
CPU
RISC
ALU
MUX
12. The OPR field has how many bits:
a.
b.
c.
d.
2
3
4
5
13. In stack organization the insertion operation is known as ____:
a.
b.
c.
d.
Pop
Push
Both
None
14. In stack organization the deletion operation is known as ____:
a.
b.
c.
d.
Pop
Push
Both
None
15. A stack in a digital computer is a part of the_____:
a.
b.
c.
d.
ALU
CPU
Memory unit
None of these
16. In stack organization address register is known as the:
a.
b.
c.
d.
Memory stack
Stack pointer
Push operation
Pop operation
17. In register stack a stack can be organized by a ______number of register:
a.
b.
c.
d.
Infinite number
Finite number
Both
None
18. Which operation are done by increment or decrement the stack pointer:
a.
b.
c.
d.
Push
Pop
Both
None
19. In register stack a stack can be a finite number of_____:
a.
b.
c.
d.
Control word
Memory word
Transfer word
All of these
20. The stack pointer contains the address of the word that is currently on____:
a.
b.
c.
d.
Top of the stack
Down of the stack
Top and Down both
None
21. In register stack items are removed from the stack by using the ____operation:
a.
b.
c.
d.
Push
Pop
Both
None
22. Which register holds the item that is to be written into the stack or read out of the stack:
a.
b.
c.
d.
SR
IR
RR
DR
23. In register stack the top item is read from the stack into:
a.
b.
c.
d.
SR
IR
RR
DR
24. In conversion to reverse polish notation the ____and____ operations are performed at the end:
a.
b.
c.
d.
Add and subtract
Subtract and multiplication
Multiplication and subtract
All of these
25. RPN stands for:
a.
b.
c.
d.
Reverse polish notation
Read polish notation
Random polish notation
None of these
26. Instruction formats contains the memory address of the______:
a.
b.
c.
d.
Memory data
Main memory
CPU
ALU
27. In instruction formats instruction is represent by a________ of bits:
a.
b.
c.
d.
Sequence
Parallel
Both
None
28. In instruction formats the information required by the ______ for execution:
a.
b.
c.
d.
ALU
CPU
RISC
DATA
29. The operation is specified by a binary code known as the_____:
a.
b.
c.
d.
Operand code
Opcode
Source code
All of these
30. Which are contains one or more register that may be referenced by machine instruction:
a.
b.
c.
d.
Input
Output
CPU
ALU
31. Memory –mapped ___is used this is just another memory address:
a.
b.
c.
d.
Input
Output
Both
None
32. Which operation use one operand or unary operations:
a.
b.
c.
d.
Arithmetic
Logical
Both
None
33.
a.
b.
c.
d.
34.
a.
b.
c.
d.
35.
3-Address format can be represented as :
dst<-[src1][src2]
dst ->[src1][src2]
dst<->[src1][src2]
All of these
2- Address format can be represented as:
dst ->[dst]*[src]
dst<-[dst]*[src]
dst<->[dst]*[src]
All of these
In 1-address format how many address is used both as source as well as destination:
a.
b.
c.
d.
1
2
3
4
36. The stack pointer is maintained in a____:
a.
b.
c.
d.
Data
Register
Address
None of these
37. ___ mode of addressing is a form of implied addressing:
a.
b.
c.
d.
Stack
Array
Queue
Binary
38. Stack uses RPN to solve ______expression:
a.
b.
c.
d.
Logical
Arithmetic
Both
None
39. In the RPN scheme the numbers and operators are listed__________:
a.
b.
c.
d.
One after another
One before another
Another after one
Another before one
40. In addressing modes instruction has primarily how many components:
a.
b.
c.
d.
1
2
3
4
41. EA stands for:
a.
b.
c.
d.
Effective add
Effective absolute
Effective address
End address
42. In which addressing the operand is actually present in instruction:
a.
b.
c.
d.
Immediate addressing
Direct addressing
Register addressing
None of these
43. In which addressing the simplest addressing mode where an operand is fetched from memory
is_____:
a.
b.
c.
d.
Immediate addressing
Direct addressing
Register addressing
None of these
44. which addressing is a way of direct addressing:
a.
b.
c.
d.
Immediate addressing
Direct addressing
Register addressing
None of these
45. In which mode the main memory location holds the EA of the operand:
a.
b.
c.
d.
Immediate addressing
Direct addressing
Register addressing
Indirect addressing
46. Which addressing is an extremely influential way of addressing:
a.
b.
c.
d.
Displacement addressing
Immediate addressing
Direct addressing
Register addressing
47. In the base –register addressing the register reference may be _____:
a.
b.
c.
d.
Implicit
Explicit
Both
None
48. In post –indexing the indexing is performed_____
a.
b.
c.
d.
Before the indirection
After the indirection
Same time indirection
All of these
49. In post-indexing the contents of the address field are used to access a memory location containing
a___ address:
a.
b.
c.
d.
Immediate addressing
Direct addressing
Register addressing
None of these
50. In pre –indexing the indexing is performed_____
a.
b.
c.
d.
Before the indirection
After the indirection
Same time indirection
All of these
51.
a.
b.
c.
d.
52.
The final addressing mode that we consider is______:
Immediate addressing
Direct addressing
Register addressing
Stack addressing
In data transfer manipulation designing as instruction set for a system is a complex_____ :
a.
b.
c.
d.
Art
System
Computer
None of these
53. Which addressing is an extremely influential way of addressing:
a.
b.
c.
Immediate addressing
Direct addressing
Register addressing
d.
Displacement addressing
54.
a.
b.
c.
d.
55.
Which addressing offset can be the content of PC and also can be negative:
Relative addressing
Immediate addressing
Direct addressing
Register addressing
The length of instruction set depends on:
a.
b.
c.
d.
Data size
Memory size
Both
None
56. In length instruction some programs wants a complex instruction set containing more instruction,
more addressing modes and greater address rang, as in case of_____:
a.
b.
c.
d.
RISC
CISC
Both
None
57. In length instruction other programs on the other hand, want a small and fixed-size instruction set
that contains only a limited number of opcodes, as in case of_____:
a.
b.
c.
d.
RISC
CISC
Both
None
58.
a.
b.
c.
d.
59.
The instruction set can have variable-length instruction format primarily due to:
Varying number of operands
Varying length of opcodes in some CPU
Both
None
An instruction code must specify the address of the____:
a.
b.
c.
d.
Opecode
Operand
Both
None
60. A simple ____ differs widely from a Turing machine:
a.
b.
c.
d.
CISC
RISC
CPU
ALU
61. How many types of basically Data manipulation:
a.
b.
c.
d.
1
2
3
4
e.
62.
a.
b.
c.
d.
63.
a.
b.
c.
d.
64.
Which is data manipulation types are:
Arithmetic instruction
Shift instruction
Logical and bit manipulation instructions
All of these
Arithmetic instruction are used to perform operation on:
Numerical data
Non-numerical data
Both
None
How many basic arithmetic operation:
a.
b.
c.
d.
1
2
3
4
65. which are arithmetic operation are:
a.
b.
c.
d.
e.
f.
Addition
Subtraction
Multiplication
Division
All of these
None of these
66.
a.
b.
c.
d.
67.
a.
b.
c.
d.
68.
In which instruction are used to perform Boolean operation on non-numerical data:
Logical and bit manipulation
Shift manipulation
Circular manipulation
None of these
Which operation is used to shift the content of an operand to one or more bits to provide necessary
variation:
Logical and bit manipulation
Shift manipulation
Circular manipulation
None of these
________is just like a circular array:
a.
b.
c.
d.
Data
Register
ALU
CPU
69. Which control refers to the track of the address of instructions:
a.
b.
c.
d.
Data control
Register control
Program control
None of these
70. In program control the instruction is set for the statement in a:
a.
b.
c.
d.
Parallel
Sequence
Both
None
71. How many types of unconditional jumps used in program control are follows:
a.
b.
c.
d.
1
2
3
4
72. Which are unconditional jumps used in program control are follows:
a.
b.
c.
d.
Short jump
Near jump
Far jump
All of these
73. Which instruction is used in program control and used to decrement CX and conditional jump:
a.
b.
c.
d.
Loop
Shift manipulation
Circular manipulation
None of these
74. Which is always considered as short jumps:
a.
b.
c.
d.
Conditional jump
Short jump
Near jump
Far jump
75. Who change the address in the program counter and cause the flow of control to be altered:
a.
b.
c.
d.
Shift manipulation
Circular manipulation
Program control instruction
All of these
76. Which is the common program control instructions are:
a.
b.
c.
d.
e.
f.
Branch
Jump
Call a subroutine
Return
All of these
None of these
77. Which is a type of microprocessor that is designed with limited number of instructions:
a.
CISC
b.
c.
d.
RISC
Both
None
78. SMP Stands for:
a.
b.
c.
d.
System multiprocessor
Symmetric multiprocessor
Both
None
79. UMA stands for:
a.
b.
c.
d.
Uniform memory access
Unit memory access
Both
None
80.
a.
b.
c.
d.
81.
a.
b.
c.
d.
82.
a.
b.
c.
d.
83.
NUMA stands for:
Number Uniform memory access
Not Uniform memory access
Non Uniform memory access
All of these
SIMD stands for:
System instruction multiple data
Single instruction multiple data
Symmetric instruction multiple data
Scale instruction multiple data
MIMD stands for:
Multiple input multiple data
Memory input multiple data
Multiple instruction multiple data
Memory instruction multiple data
HLL stands for:
a.
b.
c.
d.
High level languages
High level line
High level logic
High level limit
84. Which is a method of decomposing a sequential process into sub operations:
a.
b.
c.
d.
Pipeline
CISC
RISC
Database
85. How many types of array processor:
a.
b.
c.
d.
1
2
3
4
86. Which are the types of array processor:
a.
b.
c.
d.
Attached array processor
SIMD array processor
Both
None
87. Which are the application of vector processing:
a.
b.
c.
d.
e.
f.
g.
h.
i.
Weather forecasting
Artificial intelligence
Experts system
Images processing
Seismology
Gene mapping
Aerodynamics
All of these
None of these
88. Which types of jump keeps a 2_byte instruction that holds the range from- 128to127 bytes in the
memory location:
a.
b.
c.
d.
Far jump
Near jump
Short jump
All of these
89. Which types of register holds a single vector containing at least two read ports and one write
ports:
a.
b.
c.
d.
Data system
Data base
Memory
Vector register
90. Parallel computing means doing several takes simultaneously thus improving the performance of
the________:
a.
b.
c.
d.
Data system
Computer system
Memory
Vector register
91. Which is used to speed-up the processing:
a.
b.
c.
d.
Pipeline
Vector processing
Both
None
92. Which processor is a peripheral device attached to a computer so that the performance of a
computer can be improved for numerical computations:
a.
b.
c.
d.
Attached array processor
SIMD array processor
Both
None
93. Which processor has a single instruction multiple data stream organization that manipulates the
common instruction by means of multiple functional units:
a.
b.
c.
d.
Attached array processor
SIMD array processor
Both
None
94. Which carry is similar to rotate without carry operations:
a.
b.
c.
d.
Rotate carry
Rotate through carry
Both
None
95. In the case of a left arithmetic shift , zeros are Shifted to the ______:
a.
b.
c.
d.
Left
Right
Up
Down
96.
a.
b.
c.
d.
In the case of a right arithmetic shift the sign bit values are shifted to the_____:
Left
Right
Up
Down
Computer System Architecture MCQ 03
1.
_______is the first step in the evolution of programming languages:
a.
b.
c.
d.
machine language
assembly language
code language
none of these
2.
Mnemonic refers to:
a.
b.
c.
d.
Instructions
Code
Symbolic codes
Assembler
3.
Mnemonic represent:
a.
b.
c.
d.
Operation codes
Strings
Address
None of these
4.
To represent addresses in assembly language we use:
a.
b.
c.
d.
String characters
Arrays
Structure
Enum
5.
a.
b.
c.
d.
6.
Assembler works to convert assembly language program into machine language :
Before the computer can execute it
After the computer can execute it
In between execution
All of these
________generation computers use assembly language:
a.
b.
c.
d.
First generation
Third generation
second generation
fourth generation
7.
Assembly language program is called:
a.
b.
c.
d.
Object program
Source program
Oriented program
All of these
8.
To invoke assembler following command are given at command line:
a.
b.
c.
d.
$ hello.s -o hello.o
$as hello.s –o o
$ as hello –o hello.o
$ as hello.s –o hello.o
9.
By whom address of external function in the assembly source file supplied by ______ when
activated:
a.
b.
c.
d.
Assembler
Linker
Machine
Code
10. An______ -o option is used for:
a.
b.
c.
d.
Input file
External file
Output file
None of these
11. The assembler translates ismorphically______ mapping from mnemonic in these statements to
machine instructions:
a.
b.
c.
d.
1:1
2:1
3:3
4:1
12. Assembler works in______ phases:
a.
b.
c.
d.
1
3
2
4
13. The assembler in first pass reads the program to collect symbols defined with offsets in a
table_______:
a.
b.
c.
d.
Hash table
Symbol table
Both a& b
None of these
14. In second pass, assembler creates _______in binary format for every instruction in program and
then refers to the symbol table to giving every symbol an______ relating the segment.
a.
b.
c.
d.
Code and program
Program and instruction
Code and offset
All of these
15. which of the 2 files are created by the assembler:
a.
b.
c.
d.
List and object file
Link and object file
Both a & b
None of these
16. In which code is object file is coded:
a.
b.
c.
d.
Link code
Decimal code
Assembly code
Binary code
17. which type of errors are detected by the assembler:
a.
b.
c.
d.
syntax error
logical error
run time error
none of these
18.
a.
b.
c.
d.
19.
a.
b.
c.
d.
20.
MOVE AX BX in this LINES OF CODE what type of error is declared:
Undeclared identifier MOVE
undeclared identifier AX
Accept as a command
Not look in symbol table
In given lines of code MOV AX,BL have different type of operands according to assembler for 8086
architecture these identifiers must be of:
Different type only in byte
Same type either in word or byte
Both a & b
None of these
What type of errors are not detected by assemblers:
a.
b.
c.
d.
Syntax error
Run time error
Logical error
All of these
21. ______serves as the purpose of documentation only:
a.
b.
c.
d.
List
object
link
code
22. An assembler is a utility program that performs:
a. Isometric translation
b. Isomorphic translation
c. Isochoric translation
d. None of these
23. Assemblers are of 2 types:
a.
b.
c.
d.
1 pass
2 pass
both a & b
none of these
24. CP/CMS assembly language was written in ________assembler:
a.
b.
c.
d.
S/340
S-350
S/320
S/360
25. ASM-H widely used _____assembler:
a.
b.
c.
d.
S/370
S/380
S/390
S/360
26. Assembler is a_______:
a.
b.
c.
d.
Interpreter
Translator
Exchanger
None of these
27. A_______ processor controls repetitious writing of sequence:
a.
b.
c.
d.
Macro
Micro
Nano
All of these
28. IBM-360 type language is example which supporting______ language:
a.
b.
Micro
Macro
c.
d.
Both a & b
None of these
29. _________ is attached to using macro instruction definition:
a.
b.
c.
d.
Name
Definition
Identifier
All of these
30. END of macro definition by:
a.
b.
c.
d.
NAME
MEND
DATA
MEMORY
31. Process of replacing the sequence of lines of codes is known as:
a.
b.
c.
d.
Expanding die macro
Expanding tri macro
Tetra macro
None of these
32. A program that links several programs is called:
a.
b.
c.
d.
Linker
Loader
Translator
None of these
33. _______address is not assigned by linker:
a.
b.
c.
d.
Absolute
Relative
Both a & b
None of these
34. ________address is provided by linker to modules linked together that starting from______:
a.
b.
c.
d.
Absolute and 0
Relative and 0
Relative and 1
Relative and 3
35. A linker is also known as:
a.
b.
c.
d.
Binder
Linkage editor
Both a & b
None of these
36. Loading is _______ with the task of storage management of operating system and mostly preformed
after assembly:
a.
b.
c.
d.
Bound
Expanded
Overlaps
All of these
37. _______contain library program have to be indicated to the loader:
a.
b.
c.
d.
Externally defined
Internally defined
Executable file
All of these
38. It is the task of the ________to locate externally defined symbols in programs, load them in to
memory by placing their _______of symbols in calling program:
a.
b.
c.
d.
Loader and name
Linker and values
Linker and name
Loader and values
39. Linker creates a link file containing binary codes and also produces_______ containing address
information on linked files:
a.
b.
c.
d.
Link map
Map table
Symbol map
None of these
40. how many types of entities contained by assembler to handle program:
a.
b.
c.
d.
4
2
3
5
41. which of the following are types of assembler entities:
a.
b.
c.
d.
Absolute entities
Relative entities
Object program
All of these
42. ________have addresses where instructions are stored along with address of working storage:
a.
b.
c.
d.
Relative entities
Absolute entities
Both a & b
None of these
43. Absolute entities are __________whom value signify storage locations that are independent of
resulting machine code:
a. Numeric constants
b. String constants
c. Fixed addresses
d. Operation codes
e. All of these
44. A module contains machine code with specification on______:
a.
b.
c.
d.
Relative addresses
Absolute addresses
Object program
None of these
45. After actual locations for main storage are known, a ______adjusts relative addresses to these
actual locations:
a.
b.
c.
Relocating loader
Locating loader
Default loader
d.
None of these
46. If there is a module from single source-language only that does not contain any external references,
it doesn’t need a linker to load it and is loaded______:
a.
b.
c.
d.
Indirectly
Directly
Extending
None of these
47. Modern assemblers for RISC based architectures make optimization of instruction scheduling to
make use of CPU _______efficiently:
a.
b.
c.
d.
Pipeline
Without pipeline
Both a & b
None of these
48.
a.
b.
c.
d.
e.
49.
which are of the following modern assemblers:
MIPS
Sun SPARC
HP PA-RISC
x86(x64)
all of these
How many types of loop control structures in C language:
a.
b.
c.
d.
4
5
2
3
50. Types of loop control statements are:
a.
b.
c.
d.
For loop
While loop
Do-while loop
All of these
51. <Initial value> is_______ which initializes the value of variable:
a.
b.
Assignment expression
Condition value
c.
d.
Increment/decrement
None of these
52. The format “%8d” is used to print_______ values in a line:
a.
b.
c.
d.
11
10
9
12
53. <Condition> is a _________expression which will have value true or false:
a.
b.
c.
d.
Relational
Logical
Both a & b
None of these
54. <Increment> is the________ value of variable which will be added every time:
a.
b.
c.
d.
Increment
Decrement
Expanding
None of these
55. _______is the statement block of for loop lies inside block of another for loop:
a.
b.
c.
d.
Nested for loop
Nested while loop
Nested do-while loop
None of these
56.
a.
b.
c.
d.
57.
a.
b.
c.
d.
58.
SPARC stands for:
Scalable programmer architecture
Scalable processor architecture
Scalable point architecture
None of these
Full form of MIPS assembler is:
Microprocessor without interlocked pipeline stage
Microprocessor with interlocked pipeline stage
Both a & b
None of these
_______ statement block is executed atleast once for any value of the condition:
a.
b.
c.
d.
For statement
Do-while statement
While statement
None of these
59. _______statement is an unconditional transfer of control statement:
a.
b.
c.
d.
Goto
Continue
Switch
All of these
60. In Goto statement the place to which control is transferred is identified by a statement______:
a.
b.
c.
d.
Label
Display
Break
None of these
61. The continue statement is used to transfer the control to the________ of a statement block in a
loop:
a.
b.
c.
d.
End
Beginning
Middle
None of these
62. The__________ statement is used to transfer the control to the end of statement block in a loop:
a.
b.
c.
d.
Continue
Break
Switch
Goto
63. ________function is used to transfer the control to end of a program which uses one argument( )
and takes value is zero for_______ termination and non-zero for _______termination:
a.
b.
c.
d.
Exit( ),normal, abnormal
Break, normal, abnormal
Both a & b
None of these
64. To design a program it requires_______:
a.
b.
c.
d.
Program specification
Code specification
Instruction specification
Problem specification
65.
a.
b.
c.
d.
66.
Testing helps to ensure _______of the program for use within a system:
Quality, accuracy and except
Quality, accuracy and acceptance
Design, assurance and acceptance
Quality, accuracy and development
An unstructured program uses a ________ approach to solve problems:
a.
b.
c.
d.
Linear
Top down
Both a & b
None of these
67. In a complex program, the ______overlaps:
a.
b.
c.
d.
Branching
Condition
Both a & b
None of these
68. How many structures structured programs are written:
a.
b.
c.
d.
3
2
1
6
69. following are structured programs written in simple structures:
a.
b.
c.
d.
Sequence
Selection
Iteration
All of these
70. Iteration also called:
a.
b.
c.
d.
Repetition
Straight
Selection
Sequence
71. In ________instructions are followed one after the other in the preset order in which they appear
within program:
a.
b.
c.
d.
Sequence
Selection
Break
Iteration
72. _______means that one of two alternative sequences of instruction is chosen based on logical
condition:
a.
b.
c.
d.
Sequence
Selection
Repetition
None of these
73. _________is sequence of instructions is executed and repeated any no. of times in loop until logical
condition is true:
a.
b.
c.
d.
Iteration
Repetition
Both a & b
None of these
74. A ________is a small program tested separately before combining with final program:
a.
b.
c.
d.
Module
Block
selection
none of these
75. _______uses various symbols to represent function within program and is _______representation:
a.
b.
c.
d.
Flowchart, pictorial
Algorithm, pictorial
Pictorial, flowchart
None of these
76. ______Avoid crossing flow lines:
a.
b.
c.
d.
Flowchart
Algorithm
Both a & b
None of these
77. A flow chart is drawn from top to bottom and_____:
a.
b.
c.
d.
Right to left
Only right
Left to right
Only left
78. Flowchart that exceed page should be properly linked using ________to portions of flowchart on
different pages:
a.
b.
c.
d.
Connectors
Interconnections
Connections
None of these
79. ________is useful to prepare detailed program documentation:
a.
b.
c.
d.
Flowchart
Algorithm
Both a & b
None of these
80. Pseudo means:
a.
b.
c.
d.
Imitation
Imitate
In imitation
None of these
81. Preparing the pseudocode requires _______time than drawing flowchart:
a.
Less
b.
c.
d.
More
Optimum
None of these
82. There is _____standard for preparing pseudocode instructions:
a.
b.
c.
d.
No
4
2
6
83. ______are used to translate high level language instructions to a machine code:
a.
b.
c.
d.
Translators
Interpreters
Compilers
None of these
84. The compiler _______translate a program code with any syntax error:
a.
b.
c.
d.
Can
Cannot
Without
None of these
85. Before checking the program for errors in translating code into machine language the high level
language code is loaded into_________:
a.
b.
c.
d.
Register
Memory
Data
CPU
86. After compilation of the program ,the operating system of computer activates:
a.
b.
c.
d.
Loader
Linker
Compiler
None of these
87. The linker has utilities needed for ________within the translated program:
a.
b.
c.
d.
Input
Output
Processing
All of these
88. Flowchart is a_______ representation of an algorithm:
a.
b.
c.
d.
Symbolic
Diagrammatic
Both a & b
None of these
89. In flow chart symbols the _______operation represents the direction of flow:
a.
b.
c.
d.
Connector
Looping
Arrows
Decision making
90. Which register is memory pointer:
a.
b.
c.
d.
Program counter
Instruction register
Stack pointer
Source index
91. How many approaches are used to design control unit:
a.
b.
c.
d.
2
3
4
5
92. Which are the following approaches used to design control unit:
a.
b.
c.
d.
Hardwired control
Microprogrammed control
Both a & b
None of these
93. Cache memory is located between main memory and_____:
a.
b.
c.
d.
CPU
Memory
Both a & b
None of these
e.
94. _______arrow represents the value obtained by evaluating right side expression/variable to the left
side variable:
a.
b.
c.
d.
Forth
Inbetween
Back
None of these
95. A ________ is written as separate unit, apart from main and called whenever necessary:
a.
b.
c.
d.
Subroutine
Code
Block
None of these
96. _______uses the stack to store return address of subroutine:
a.
b.
c.
d.
CPU
Microprocessor
register
memory
97. A subroutine is implemented with 2 associated instructions:
a.
b.
c.
d.
CALL
RETURN
Both a & b
None of these
98. Call instruction is written in the ______program:
a.
b.
Main
Procedures
c.
d.
Program
Memory
99. Return instruction is written in_______ to written to main program:
a.
b.
c.
d.
Subroutine
Main program
Both a & b
None of these
100.
When subroutine is called contents of program counter is location address of
_______instruction following call instruction is stored on ________and program execution is
transferred to______ address:
a. Non executable, pointer and subroutine
b. Executable, Stack and Main program
c.
Executable, Queue and Subroutine
d. Executable, Stack and Subroutine
101.
A subroutine called by another subroutine is called:
a.
b.
c.
d.
Nested
For loop
Break
Continue
102.
The extent nesting in subroutine is limited only by:
a. Number of available Stack locations
b. Number of available Addressing locations
c. Number of available CPU locations
d. Number of available Memory locations
103.
Which are of the following instructions of hardware subroutines:
a.
b.
c.
d.
104.
a.
b.
c.
d.
SCAL
SXIT
Both a & b
None of these
Importance in local variable and index registers in subroutine does_____:
Alter
Not alter
Both a & b
None of these
105.
a.
b.
c.
d.
Markers in subroutine cannot be accepted as limits whereas this markers stands for:
Top of stack
Bottom of stack
Middle of stack
All of these
106.
Subroutines are placed in identical section to caller so that SCAL and SXIT _______overpass
divison limits:
a.
b.
c.
d.
107.
a.
b.
c.
d.
Don’t
Does
Cross
By
_________subroutine declaration come after procedure announcement:
Global
Local
Both a & b
None of these
108.
subroutines are invoked by using their________ in a subroutine call statement and replacing
formal parameters with________ parameters:
a.
b.
c.
d.
109.
a.
b.
c.
d.
110.
a.
b.
Identifier and formal
Identifier and actual
Expression and arguments
None of these
Parameters can be stacked by ________just as with procedures:
Asterisk(*)
Arrow
Line
Pipeline
The subroutines are determined by functioning of ________instructions:
SCAL and SXIT
only SCAL
c.
d.
111.
a.
b.
c.
d.
112.
a.
b.
c.
d.
113.
a.
b.
c.
d.
114.
a.
b.
c.
d.
only SXIT
none of these
Call is________ subroutine call:
Conditional
Unconditional
Both a & b
None of these
A flag is a _________that keep track of a changing condition during computer run:
Memory
Register
Controller
None of these
When a subroutine is ________the parameters are loaded onto the stack and SCAL is executed:
Executed
Invoked
Ended
Started
Subroutine is called _______:
In Same program
In external program
Both a & b
None of these
115.
If internal subroutine is called global data is used to pass values defining parameters between
_________program and defined _______:
a.
b.
c.
d.
Main and subroutine
Local and subroutine
Global and subroutine
Global and main
116.
In what type of subroutine actual parameters are passed through the main program to formal
parameters in the related subroutine:
a.
b.
c.
d.
Internal
External
Both a & b
None of these
117.
By defining the _________register as last in first out stack the sequence can handle nested
subroutines:
a.
b.
c.
d.
S
J
R
T
118.
The ______stack can be 4-word memory addressed by 2 bits from an up/down counter known
as the stack pointer:
a.
b.
c.
d.
FIFO
PIPO
SISO
LIFO
119.
getchar :: IO char in this given function what is indicated by IO char:
a. when getchar is invoked it returns a character
b. when getchar is executed it returns a character
c. both a & b
d. none of these
120.
If we define putchar function in putchar :: char -> IO ( ) syntax than character input as an
argument and returns_____:
a.
b.
c.
d.
Useful value
Get output
Get no output
None of these
121.
The front panel display provides lights as green LED represent _____ and red LED represent
_____for device programmer who writes input/output basic:
a.
b.
c.
d.
Busy and Error
Error and Busy
Busy and Busy
Error and Error
122.
a.
b.
c.
d.
The input data for processing uses the standard input device which by default is a ________:
Mouse
Scanner
Keyboard
Monitor
123.
The processed data is sent for output to standard ________device which by default is
computer screen:
a.
b.
c.
d.
124.
a.
b.
c.
d.
125.
a.
b.
c.
d.
126.
a.
b.
c.
d.
Input
Output
Both a & b
None of these
Each instruction is executed by set of micro operations termed as:
Micro instructions
Mini instructions
Both a & b
None of these
For each micro operation the control unit generates set of______ signals:
Control
Address
Data
None of these
Sequence of microinstructions is termed as micro program or________:
Hardware
Software
Firmware
None of these
127.
The micro program is an ________written in microcode and stored in firmware which is also
referred as___________:
a. Interpreter and control memory
b. Translator and control store
c. Translator and control memory
d. Interpreter and Translator
128.
a.
b.
c.
d.
129.
a.
b.
c.
d.
Compared to hardware, firmware is ________to design micro programmed organization:
Difficult
Easier
Both a& b
None of these
Compared to software, firmware is _______to write:
Easier
Difficult
Mediator
Optimum
130.
_________program converts machine instructions into control signals:
a. Control memory program
b. Control store program
c. Both a & b
d. Only memory
131.
who coined the term micro program in 1951:
a.
b.
c.
d.
T.V. Wilkes
M.V. Wilkes
S.V. Wilkes
D.V. Wilkes
132.
what is full form of EDSAC:
a. Electronic delay source accumulator calculator
b. Electronic delay storage automatic code
c. Electronic destination source automatic calculator
d. Electronic delay storage automatic calculator
133.
Who led to development of read –only magnetic core matrix for use in control unit of small
computer at IBM’s laboratory:
a.
b.
c.
d.
John Fairclough’s
Johnyfairclough
Mr. Redcliff
M.V. Wilkes
134.
From1961-1964 John fairclough’s research played an important role to pursue full range of
compatible computers as system:
a.
System/360
b.
c.
d.
135.
a.
b.
c.
d.
System/460
System/560
System/780
Each microinstructions cycle is made of 2 parts:
Fetch
Execute
Code
Both a & b
136.
One of use of microprogramming to implement ________ of processor in Intel 80x86 and
Motorola 680x0 processors whose instruction set are evolved from 360 original:
a.
b.
c.
d.
137.
a.
b.
c.
d.
Control structure
Without control
Control unit
Only control
The function of these microinstructions is to issue the micro orders to______:
CPU
Memory
Register
Accumulator
138.
Micro-orders generate the_______ address of operand and execute instruction and prepare for
fetching next instruction from the main memory:
a.
b.
c.
d.
139.
a.
b.
c.
d.
Physical
Effective
Logical
all of above
Which of the following 2 task are performed to execute an instruction by MCU:
Microinstruction execution
Microinstruction sequencing
Both a & b
None of these
140.
What is the purpose of microinstruction executions:
a. Generate a control signal
b. Generate a control signal to compile
c. Generate a control signal to execute
d. All of these
141.
Which microinstruction provide next instruction from control memory:
a. Microinstruction execution
b. Microinstruction Buffer
c. Microinstruction decoder
d. Microinstruction Sequencing
142.
Which are the following components of microprogramed units to implement control process:
a. Instruction register
b. Microinstruction address generation
c. Control store microprogram memory
d. Microinstruction Buffer
e. Microinstruction decoder
f. All of these
143.
Microcodes are stored as firmware in _______:
a.
b.
c.
d.
144.
a.
b.
c.
d.
Memory chips
Registers
accumulators
none of these
A control memory is______ stored in some area of memory:
Control instruction
Memory instruction
Register instruction
None of these
145.
A computer having writable control memory is known as_________:
a. Static micro programmable
b. Dynamic micro programmable
c. Both a & b
d. None of these
146.
The control memory contains a set of words where each word is:
a.
b.
c.
d.
Microinstruction
Program
Sets
All of these
147.
During program execution content of main memory undergo changes and, but control memory
has______ microprogram:
a.
b.
c.
d.
Static
Dynamic
Compile time
Fixed
148.
What happens if computer is started :
a. It executes “CPU” microprogram which is sequence of microinstructions stored in ROM
b. It executes “code” microprogram which is sequence of microinstructions stored in ROM
c. It executes “boot” microprogram which is sequence of microinstructions stored in ROM
d. It executes “strap loader” microprogram which is sequence of microinstructions stored in ROM
149.
Control memory is part of ______ that has addressable storage registers and used as temporary
storage for data:
a.
b.
c.
d.
ROM
RAM
CPU
Memory
150.
a.
b.
c.
d.
151.
a.
b.
c.
d.
152.
a.
b.
c.
d.
153.
How many modes the address in control memory are divided:
2
3
5
7
which of the following is interrupt mode:
Task mode
Executive mode
Both a & b
None of these
Mode of addresses in control memory are:
Executive mode
Task mode
Both a & b
None of these
Addresses in control memory is made by____ for each register group:
a.
b.
c.
d.
Address select logic
Data select logic
Control select logic
All of these
154.
a.
b.
c.
d.
155.
a.
b.
c.
d.
There are how many register groups in control memory:
3
5
6
8
What type of circuit is used by control memory to interconnect registers:
Data routing circuit
Address routing circuit
Control routing circuit
None of the these
156.
Which memory is used to copy instructions or data currently used by CPU:
a. Main memory
b. Secondary memory
c. Cache memory
d. None of these
157.
a.
b.
c.
d.
158.
a.
b.
c.
d.
159.
Copy of instruction in cache memory is known as:
Execution cache
Data cache
Instruction cache
All of these
Copy of data in cache memory is called:
Data cache
Execution cache
Address cache
Control cache
What are 2 advantages of cache memory:
a. Reduction of average access time for CPU memory
b. Reduction of bandwidth of available memory of CPU
c. Both a & b
d. None of these
160.
On what method search in cache memory used by the system:
a.
b.
c.
d.
161.
a.
b.
c.
d.
162.
a.
b.
c.
d.
Cache directing
Cache mapping
Cache controlling
Cache invalidation
______process starts when a cpu with cache refers to a memory:
Main memory
External memory
Cache
All of these
When cache process starts hit and miss rate defines in cache directory:
during search reads
during search writes
during replace writes
during finding writes
163.
In cache memory hit rate indicates:
a. Data from requested address is not available
b. Data from requested address is available
c. Control from requested address is available
d. Address from requested address is not available
164.
In cache memory miss rate indicates:
a. Availability of requested data
b. Availability of requested address
c. Non-Availability of requested data
d. Non-Availability of requested address
165.
Which 3 areas are used by cache process:
a. Search, updating, invalidation
b. Write, updating, invalidation
c. Search, read, updating
d. Invalidation, updating, requesting
166.
Updating writes to cache data and also to _______:
a.
b.
Directories
Memory
c.
d.
167.
a.
b.
c.
d.
Registers
Folders
Invalidation writes only to_____ and erases previously residing address in memory:
Folders
Memory
Directory
Files
168.
_______machine instruction creates branching to some specified location in main memory if
result of last ALU operation is Zero or Zero flag is set:
a.
b.
c.
d.
Branch on One
Branch on Three
Branch on Nine
Branch on Zero
169.
Full form of CAR:
a. Control address register
b. Content address register
c. Condition accumulator resource
d. Code address register
170.
Two types of microinstructions are:
a.
b.
c.
d.
171.
a.
b.
c.
d.
172.
a.
b.
c.
Branching
Non-branching
Both a & b
None of these
Which are 3 ways to determine address of next micro instruction to be executed:
Next sequential address
Branching
Interrupt testing
All of these
Branching can be________:
Conditional
Unconditional
Both a & b
d.
173.
a.
b.
c.
d.
None of these
In which branching condition is tested which is determined by status bit of ALU:
Unconditional
Conditional
Both a & b
None of these
174.
a.
b.
c.
d.
175.
a.
b.
c.
d.
176.
a.
b.
c.
d.
177.
a.
b.
c.
d.
which branch is achieved by fixing status bit that output of multiplexer is always one:
Unconditional
Conditional
Looping
All of these
Which register is used to store addresses of control memory from where instruction is fetched:
MAR
BAR
CAR
DAR
Control ROM is the control memory that holds:
Control words
Memory words
Multiplexers
Decoders
Opcode is the machine instruction obtained from decoding instruction stored in:
Stack pointer
Address pointer
Instruction register
Incrementer
178.
Branch logic determines which should be adopted to select the next______ value among
possibilities:
a.
b.
c.
d.
CAR
GAR
HAR
TAR
179.
a.
b.
c.
d.
________ generates CAR+1 as possibility of next CAR value:
Decrementer
Incrementer
Postfix
Prefix
180.
a.
b.
c.
d.
________used to hold return address for operations of subroutine call branch:
TBR
HDR
SDR
SBR
181.
Which of following 2 types of computer system considered by micro programmed unit:
a. Micro level computers
b. Machine level computers
c. Both a & b
d. None of these
182.
Following are the components of micro programmed control unit:
a. Subroutine register
b. Control address register
c. Memory Of 128 words with 20 bits per words
d. All of these
183.
Various machine level components are:
a. Address register
b. Program counter
c. Data register
d. Accumulator register
e. Memory of 2K,16 bits/word RAM
f. Multiplexers
g. All of these
184.
Data transfers are done using:
a. Multiplexer switching
b. Demultiplexer switching
c. Adder switching
d. Subtractor switching
185.
PC can be loaded from_____:
a.
BR
b.
c.
d.
CR
AR
TR
186.
Which functions are performed by CU:
a. Data exchange b/w CPU and memory or I/O modules
b. External operations
c. Internal operations inside CPU
d. Both a & c
187.
Which are internal operations inside CPU:
a. Data transfer b/w registers
b. Instructing ALU to operate data
c. Regulation of other internal operations
d. All of these
188.
How many paths taken by movement of data in CU:
a.
b.
c.
d.
189.
a.
b.
c.
d.
190.
a.
b.
c.
d.
3
4
5
2
2 data paths in CU are:
Internal data paths
External data paths
Both a & b
None of these
_______is the data paths link CPU registers with memory or I/O modules:
External data paths
Internal data paths
Boreal data paths
Exchange data paths
191.
______is data paths there is movement of data from one register to another or b/w ALU and a
register:
a.
b.
c.
d.
External
Boreal
Internal
Exchange
192.
Which is the input of control unit:
a. Master clock signal
b. Instruction register
c. Flags
d. Control signals from bus
e. All of these
193.
If _______flag is set then control unit issues control signals that causes program counter to be
incremented by 1:
a.
b.
c.
d.
Zero
One
Three
Eight
194.
Which control unit is implemented as combinational circuit in the hardware:
a. Microprogrammed control unit
b. Hardwired control unit
c. Blockprogrammed control unit
d. Macroprogrammed control unit
195.
Microprograms are usually stored in:
a.
b.
c.
d.
196.
a.
b.
c.
d.
197.
a.
b.
c.
d.
198.
a.
ROM
RAM
SAM
SAN
Among them which is the faster control unit:
Hardwired
Microprogrammed
Both a & b
None of these
For CISC architecture_______ controllers are better:
Microprogrammed
Hardwired
Betterwired
None of these
Full form of FSM is:
Finite state machine
b.
c.
d.
199.
a.
b.
c.
d.
Fix state machine
Fun source metal
All of these
Rules of FSM are encoded in:
ROM
Random logic
Programmable logic array
All of these
200.
In RISC architecture access to registers is made as a block and register file in a particular
register can be selected by using:
a.
b.
c.
d.
201.
a.
b.
c.
d.
e.
f.
g.
h.
202.
a.
b.
c.
d.
203.
a.
b.
c.
Multiplexer
Decoder
Subtractor
Adder
Outputs of instruction/data path in CU are:
Reg R/W
Load/Reg-Reg
ALU function select
Load control
Read control
IR Latch
JUMP/Branch/Next PC
All of these
One last bit of control output is for control of_______ state:
Minor
Major
Mixer
None of these
Following are 4 major states for ‘load’ are:
Fetch
Decode
Memory
d.
e.
Write back
All of these
204.
a.
b.
c.
d.
Jump has 3 major states are:
Fetch
Decode
Complete
All of these
205.
a.
b.
c.
d.
________ state keeps track of position related to execution of an instruction:
Major
Minor
Both a & b
None of these
206.
a.
b.
c.
d.
An instruction always starts with state___:
1
2
3
0
207.
Decoding of an instruction in RISC architecture means decision on working of control unit for:
a. Remainder of instructions
b. Divisor of instructions
c. Dividend of instructions
d. None of these
208.
Which control is used during starting of instruction cycle:
a.
b.
c.
d.
Write
Read
R/W
None of these
209.
________function select takes op code in IR translating to function of ALU and it may be
compact binary code or one line per ALU:
a.
b.
c.
ALU
CPU
Memory
d.
Cache
210.
a.
b.
c.
d.
________is dependent on instruction type in CU:
Jump
Branch
NextPC
All of these
211.
__________dependent on instruction and major state and also comes in starting of data fetch
state as well as write back stage in CU:
a.
b.
c.
d.
Register read
Register write
Register R/W
All of these
212.
a.
b.
c.
d.
_______dependence over op-code in CU:
Load register
Load Reg/Reg
Only Load
None of these
213.
Full form of PLA in CU:
a. Progrmmable Logic Array
b. Programs Load Array
c. Programmable Logic Accumulator
d. all of these
214.
Which are tasks for execution of CU or MCU:
a.
b.
c.
d.
Microinstruction execution
Microinstruction sequencing
Both a & b
None of these
215.
a.
b.
c.
d.
Branching is implemented by depending on output of:
CD
RG
CC
CR
216.
Who determine under what conditions the branching will occur and when:
a. By combination of CD and BT
b. By combination of CD and BR
c. By combination of CD and CR
d. By combination of TD and BR
217.
The character U is used to indicate:
a.
b.
c.
d.
Undefined transfers
Unfair transfers
Unconditional transfers
All of these
218.
a.
b.
c.
d.
Which field is used to requests for branching:
DR
CR
TR
BR
219.
a.
b.
c.
d.
220.
which field is used to determine what type of transfer occurs:
CR
SR
BR
MR
Source statements consist of 5fields in microinstruction source code are:
a.
b.
c.
d.
e.
f.
Lable
Micro-ops
CD-spec
BR-spec
Address
All of these
Computer System Architecture MCQ 02
1.
_____ is a command given to a computer to perform a specified operation on some given data:
a.
b.
c.
d.
An instruction
Command
Code
None of these
2.
An instruction is guided by_____ to perform work according:
a.
b.
c.
d.
PC
ALU
Both a and b
CPU
3.
Two important fields of an instruction are:
a.
b.
c.
d.
Opcode
Operand
Only a
Both a & b
4.
Each operation has its _____ opcode:
a.
b.
c.
d.
Unique
Two
Three
Four
5.
which are of these examples of Intel 8086 opcodes:
a.
b.
MOV
ADD
c.
d.
SUB
All of these
6.
a.
b.
c.
d.
7.
_______specify where to get the source and destination operands for the operation specified by
the _______:
Operand fields and opcode
Opcode and operand
Source and destination
Cpu and memory
The source/destination of operands can be the_______ or one of the general-purpose register:
a.
b.
c.
d.
Memory
One
both
None of these
8.
The complete set of op-codes for a particular microprocessor defines the______ set for that
processor:
a.
b.
c.
d.
Code
Function
Module
Instruction
9.
Which is the method by which instructions are selected for execution:
a.
b.
c.
d.
Instruction selection
Selection control
Instruction sequencing
All of these
10. The simplest method of controlling sequence of instruction execution is to have each instruction
explicitly specify:
a. The address of next instruction to be run
b. Address of previous instruction
c. Both a & b
d. None of these
11. As the instruction length increases ________ of instruction addresses in all the instruction
is_______:
a. Implicit inclusion
b. Implicit and disadvantageous
c. Explicit and disadvantageous
d. Explicit and disadvantageous
12. ______is the sequence of operations performed by CPU in processing an instruction:
a.
b.
c.
d.
Execute cycle
Fetch cycle
Decode
Instruction cycle
13. The time required to complete one instruction is called:
a.
b.
c.
d.
Fetch time
Execution time
Control time
All of these
14. _____is the step during which a new instruction is read from the memory:
a.
b.
c.
d.
Decode
Fetch
Execute
None of these
15. ________is the step during which the operations specified by the instruction are executed:
a.
b.
c.
d.
Execute
Decode
Both a& b
None of these
16. Decode is the step during which instruction is______:
a.
b.
c.
d.
Initialized
Incremented
Decoded
Both b & c
17. The instruction fetch operation is initiated by loading the contents of program counter into
the______ and sends_____ request to memory:
a. Memory register and read
b. Memory register and write
c. Data register and read
d. Address register and read
18. The contents of the program counter is the _______ of the instruction to be run:
a.
b.
c.
d.
Data
Address
Counter
None of these
19. The instruction read from memory is then placed in the_______ and contents of program counter
is______ so that it contains the address of_______ instruction in the program:
a. Program counter, incremented and next
b. Instruction register, incremented and previous
c. Instruction register, incremented and next
d. Address register, decremented and next
20. Execution of instruction specified by instruction to perform:
a.
b.
c.
d.
Operation
Operands
Both a & b
None of these
21. _______ is a symbolic representation of discrete elements of information:
a.
b.
c.
d.
Data
Code
Address
Control
22. Group of binary bits(0&1) is known as:
a.
b.
c.
d.
Binary code
Digit code
Symbolic representation
None of these
23. A group of 4 binary bits is called:
a.
b.
c.
d.
Nibble
Byte
Decimal
Digit
24. BCD uses binary number system to specify decimal numbers:
a.
1-10
b.
c.
d.
1-9
0-9
0-10
25. The ______ are assigned according to the position occupied by digits:
a.
b.
c.
d.
Volume
Weight
Mass
All of these
26. what is the BCD for a decimal number 559:
a.
b.
c.
d.
[0101 0101 1001]BCD
[0101 0001 1010]
[0101 1001 1001]
[1001 1010 0101]
27. ________are the codes that represent alphabetic characters, punctuation marks and other special
characters:
a.
b.
c.
d.
Alphanumeric codes
ASCII codes
EBCDIC codes
All of these
28.
a.
b.
c.
d.
29.
Abbreviation ASCII stands for:
American standard code for information interchange
Abbreviation standard code for information interchange
Both
None of these
How many bit of ASCII code:
a.
b.
c.
d.
6
7
5
8
30. Which code used in transferring coded information from keyboards and to computer display and
printers:
a.
ASCII
b.
c.
d.
EBCDIC
Both
None of these
31. Which code used to represent numbers, letters, punctuation marks as well as control characters:
a.
b.
c.
d.
ASCII
EBCDIC
Both
None of these
32.
a.
b.
c.
d.
33.
abbreviation EBCDIC stand for:
Extended binary coded decimal interchange code
External binary coded decimal interchange code
Extra binary coded decimal interchange code
None of these
How many bit of EBCDIC code:
a.
b.
c.
d.
7
8
5
9
34. Which code the decimal digits are represented by the 8421 BCD code preceded by 1111:
a.
b.
c.
d.
ASCII
EBCDIC
Both
None of these
35. _________ has the property that corrupting or garbling a code word will likely produce a bit string
that is not a code word:
a.
b.
c.
d.
Error deleting codes
Error detecting codes
Error string codes
None of these
36. Which is method used most simple and commonly:
a.
b.
Parity check method
Error detecting method
c.
d.
Both
None of these
37. Which is the method of parity:
a.
b.
c.
d.
Even parity method
Odd parity method
Both
None of these
38. The ability of a code to detect single errors can be stated in term of the _________:
a.
b.
c.
d.
Concept of distance
Even parity
Odd parity
None of these
39. The first n bit of a code word called __________ may be any of the 2 n n- bit string minimum error
bit:
a.
b.
c.
d.
Information bits
String bits
Error bits
All of these
40. A code in which the total number of 1s in a valid (n+1) bit code word is even, this is called an
__________:
a.
b.
c.
d.
Even parity code
Odd parity code
Both
None of these
41. A code in which the total number of 1s in a valid (n+1)bit code word is odd and this code is called
an__________:
a.
b.
c.
d.
Error detecting code
Even parity code
Odd parity code
None of these
42. a code is simply a subset of the vertices of the _____:
a.
b.
c.
d.
n bit
n cube
n single
n double
43.
a.
b.
c.
d.
44.
a.
b.
c.
d.
45.
Which method is used to detect double errors and pinpoint erroneous bits:
Even parity method
Odd parity method
Check sum method
All of these
A code that is used to correct error is called an _________:
Error detecting code
Error correcting code
Both
None of these
A received ___________with a bit error will be closer to the originally transmitted code word than
to any other code word:
a.
b.
c.
d.
Code word
Non code word
Decoding
All of these
46. Which code word was originally transmitted to produce a received word is called:
a.
b.
c.
d.
Non code word
Code word
Decoding
None of these
47.
a.
b.
c.
d.
48.
The hardware that does this is an ________:
Error detecting decoder
Error correcting decoder
Both
None of these
Hamming codes was developed in __________:
a.
b.
c.
d.
1953
1950
1945
1956
49. ____________ between two code words is defined as the number of bits that must be changed for
one code to another:
a.
b.
c.
d.
Hamming codes
Hamming distance
Both
None of these
50. It is actually a method for constructing codes with a minimum distance of ____:
a.
b.
c.
d.
2
4
3
5
51. The bit position in a ___________ can be numbered from 1 through 2 i-1:
a.
b.
c.
d.
Hamming code word
Hamming distance word
Both
None of these
52. Each check bit is grouped with the information bits as specified by a____________:
a.
b.
c.
d.
Parity check code
Parity check matrix
Parity check bit
All of these
53. The pattern of groups that have odd parity called the _________must match one of the of columns
in the parity check matrix:
a.
b.
c.
d.
Syndrome
Dynodes
Both
None of these
54. Which are designed to interpret a specified number of instruction code:
a.
b.
Programmer
Processors
c.
d.
Instruction
Opcode
55. Which code is a string of binary digits:
a.
b.
c.
d.
Op code
Instruction code
Parity code
Operand code
56. The list of specific instruction supported by the CPU is termed as its ____________:
a.
b.
c.
d.
Instruction code
Parity set
Instruction set
None of these
57. __________is divided into a number of fields and is represented as a sequence of bits:
a.
b.
c.
d.
instruction
instruction set
instruction code
parity code
58. Which unit is necessary for the execution of instruction:
a.
b.
c.
d.
Timing
Control
Both
None of these
59. Which unit provide status , timing and control signal:
a.
b.
c.
d.
Timing and control unit
Memory unit
Chace unit
None of these
60. Which unit acts as the brain of the computer which control other peripherals and interfaces:
a.
b.
c.
d.
Memory unit
Cache unit
Timing and control unit
None of these
61. It contains the ____________stack for PC storage during subroutine calls and input/output
interrupt services:
a.
b.
c.
d.
Seven- level hardware
Eight- level hardware
One- level hardware
Three- level hardware
62. Which unit works as an interface between the processor and all the memories on chip or off- chip:
a.
b.
c.
d.
Timing unit
Control unit
Memory control unit
All of these
63. The maximum clock frequency is_______:
a.
b.
c.
d.
45 MHZ
50 MHZ
52 MHZ
68 MHZ
64. ________ is given an instruction in machine language this instruction is fetched from the memory by
the CPU to execute:
a.
b.
c.
d.
ALU
CPU
MU
All of these
65. Which cycle refers to the time period during which one instruction is fetched and executed by the
CPU:
a.
b.
c.
d.
Fetch cycle
Instruction cycle
Decode cycle
Execute cycle
66. How many stages of instruction cycle:
a.
b.
c.
d.
5
6
4
7
67. Which are stages of instruction cycle:
a.
b.
c.
d.
e.
Fetch
Decode
Execute
Derive effective address of the instruction
All of these
68.
a.
b.
c.
d.
69.
Which instruction are 32 bits long , with extra 16 bits:
Memory reference instruction
Memory reference format
Both
None of these
Which is addressed by sign extending the 16-bit displacement to 32-bit:
a.
b.
c.
d.
Memory address
Effective memory address
Both a and b
None of these
70.
a.
b.
c.
d.
71.
Which are instruction in which two machine cycle are required:
Instruction cycle
Memory reference instruction
Both
None of these
Which instruction are used in multithreaded parallel processor architecture:
a.
b.
c.
d.
Memory reference instruction
Memory reference format
Both
None of these
72. Which instruction are arranged as per the protocols of memory reference format of the input file
in a simple ASCII sequence of integers between the range 0 to 99 separated by spaces without
formatted text and symbols:
a.
b.
c.
d.
Memory reference instruction
Memory reference format
Both
None of these
73. ____________ is an external hardware event which causes the CPU to interrupt the current
instruction sequence:
a.
b.
c.
d.
Input interrupt
Output interrupt
Both
None of these
74.
a.
b.
c.
d.
75.
ISR stand for:
Interrupt save routine
Interrupt service routine
Input stages routine
All of these
Which interrupt services save all the register and flags:
a.
b.
c.
d.
Save interrupt
Input/output interrupt
Service interrupt
All of these
76. IRET stand for:
a.
b.
c.
d.
Interrupt enter
Interrupt return
Interrupt delete
None of these
77.
a.
b.
c.
d.
78.
a.
b.
c.
d.
79.
Which are benefit of input/output interrupt:
It is an external analogy to exceptions
The processor initiates and perform all I/O operation
The data is transferred into the memory through interrupt handler
All of these
Which are the not causes of the interrupt:
In any single device
In processor poll devices
It is an external analogy to exception
None of these
Which are the causes of the interrupt:
a.
b.
c.
d.
80.
a.
b.
c.
d.
81.
In any single device
In processor poll devices
In a device whose ID number is stored on the address bus
All of these
Which are the functioning of I/O interrupt:
The processor organizes all the I/O operation for smooth functioning
After completing the I/O operation the device interrupt the processor
Both
None of these
_________with which computers perform is way beyond human capabilities:
a.
b.
c.
d.
Speed
Accuracy
Storage
Versatility
82. _________ of a computer is consistently:
a.
b.
c.
d.
Speed
Accuracy
Storage
Versatility
83. GIGO stand for:
a.
b.
c.
d.
Garbage-in-garbage-out
Garbage-in garbage-occur
Both
None of these
84. How many basic operations of versatility:
a.
b.
c.
d.
5
6
4
7
85.
a.
b.
c.
d.
86.
Which are the operation of versatility:
exchange of information with the outside world via I/O device
Transfer of data internally with in the central processing unit
Performs of the basic arithmetic operations
All of these
____________ of information in a human brain and a computer happens differently:
a.
b.
c.
d.
Intelligence
Storage
Versatility
Diligence
87. Which are the basic operation for converting:
a.
b.
c.
d.
e.
f.
Inputting
Storing
Processing
Outputting
Controlling
All of these
88. The control unit and arithmetic logic unit are know as the ___________:
a.
b.
c.
d.
Central program unit
Central processing unit
Central primary unit
None of these
89. Which unit is comparable to the central nervous system in the human body:
a.
b.
c.
d.
Output unit
Control unit
Input unit
All of these
90. ___________ of the primary memory of the computer is limited:
a.
b.
c.
d.
Storage capacity
Magnetic disk
Both
None of these
91. Information is handled in the computer by _________:
a.
b.
c.
d.
Electrical digit
Electrical component
Electronic bit
None of these
92. 0 and 1 are know as ___________:
a.
b.
c.
d.
Byte
Bit
Digits
Component
93. 0 and 1 abbreviation for:
a.
b.
c.
d.
Binary digit
Octal digit
Both
None of these
94. How many bit of nibble group:
a.
b.
c.
d.
5
4
7
8
95. How many bit of bytes:
a.
b.
c.
d.
3
4
6
8
96. Which is the most important component of a digit computer that interprets the instruction and
processes the data contained in computer programs:
a.
b.
c.
MU
ALU
CPU
d. PC
97. Which part work as a the brain of the computer and performs most of the calculation:
a.
b.
c.
MU
PC
ALU
d.
CPU
98. Which is the main function of the computer:
a.
b.
c.
d.
Execute of programs
Execution of programs
Both
None of these
99. How many major component make up the CPU:
a.
b.
c.
d.
100.
a.
b.
c.
d.
101.
a.
b.
c.
d.
102.
4
3
6
8
Which register holds the current instruction to be executed:
Instruction register
Program register
Control register
None of these
Which register holds the next instruction to be executed:
Instruction register
Program register
Program control register
None of these
Each instruction is also accompanied by a___________:
a. Microprocessor
b. Microcode
c. Both
d. None of these
103.
Which are microcomputers commonly used for commercial data processing, desktop publishing
and engineering application:
a.
b.
c.
Digital computer
Personal computer
Both
d. None of these
104.
Which microprocessor has the control unit, memory unit and arithmetic and logic unit:
a.
b.
c.
d.
Pentium IV processor
Pentium V processor
Pentium III processor
None of these
105.
a.
b.
c.
d.
Clock speed
Motorola
Cyrix
None of these
106.
a.
b.
c.
d.
Which microprocessor is available with a clock speed of 1.6 GHZ:
Pentium III
Pentium II
Pentium IV
All of these
107.
a.
b.
c.
d.
The processing speed of a computer depends on the __________of the system:
Which processor are used in the most personal computer:
Intel corporation’s Pentium
Motorola corporation’s
Both
None of these
Computer System Architecture MCQ 01
1.
RTL stands for:
a.
b.
c.
d.
Random transfer language
Register transfer language
Arithmetic transfer language
All of these
2.
Which operations are used for addition, subtraction, increment, decrement and complement
function:
a.
b.
c.
d.
Bus
Memory transfer
Arithmetic operation
All of these
3.
a.
b.
c.
d.
4.
a.
b.
c.
d.
5.
Which language is termed as the symbolic depiction used for indicating the series:
Random transfer language
Register transfer language
Arithmetic transfer language
All of these
The method of writing symbol to indicate a provided computational process is called as a:
Programming language
Random transfer language
Register transfer language
Arithmetic transfer language
In which transfer the computer register are indicated in capital letters for depicting its function:
a.
b.
c.
d.
Memory transfer
Register transfer
Bus transfer
None of these
6.
The register that includes the address of the memory unit is termed as the ____:
a.
b.
c.
d.
MAR
PC
IR
None of these
7.
The register for the program counter is signified as_____:
a.
b.
c.
d.
MAR
PC
IR
None of these
8.
In register transfer the instruction register as:
a.
b.
c.
d.
MAR
PC
IR
None of these
9.
In register transfer the processor register as:
a.
b.
c.
d.
MAR
PC
IR
RI
10. How many types of micro operations:
a.
b.
c.
d.
2
4
6
8
11. Which are the operation that a computer performs on data that put in register:
a.
b.
c.
d.
Register transfer
Arithmetic
Logical
All of these
12. Which micro operations carry information from one register to another:
a.
b.
c.
d.
Register transfer
Arithmetic
Logical
All of these
13. Micro operation is shown as:
a.
b.
c.
d.
R1->R2
R1<-R2
Both
None
14. In memory transfer location address is supplied by____ that puts this on address bus:
a.
b.
c.
d.
ALU
CPU
MAR
MDR
15. How many types of memory transfer operation:
a.
b.
c.
d.
1
2
3
4
16. Operation of memory transfer are:
a.
b.
c.
d.
Read
Write
Both
None
17. In memory read the operation puts memory address on to a register known as :
a.
b.
c.
d.
PC
ALU
MAR
All of these
18. Which operation puts memory address in memory address register and data in DR:
a.
b.
c.
d.
Memory read
Memory write
Both
None
19. Arithmetic operation are carried by such micro operation on stored numeric data available in_____:
a.
b.
c.
d.
Register
Data
Both
None
20. In arithmetic operation numbers of register and the circuits for addition at _____:
a.
b.
c.
d.
ALU
MAR
Both
None
21. Which operation are implemented using a binary counter or combinational circuit:
a.
b.
c.
d.
Register transfer
Arithmetic
Logical
All of these
22.
a.
b.
c.
d.
23.
Which operation are binary type, and are performed on bits string that is placed in register:
Logical micro operation
Arithmetic micro operation
Both
None
A micro operation every bit of a register is a:
a.
b.
c.
d.
Constant
Variable
Both
None
24.
a.
b.
c.
d.
25.
Which operation is extremely useful in serial transfer of data:
Logical micro operation
Arithmetic micro operation
Shift micro operation
None of these
Which language specifies a digital system which uses specified notation:
a.
b.
c.
d.
Register transfer
Arithmetic
Logical
All of these
26.
a.
b.
c.
d.
27.
IR stands for:
Input representation
Intermediate representation
Both
None
HDL stands for:
a.
b.
c.
d.
28.
a.
b.
c.
d.
29.
Human description language
Hardware description language
Hardware description land
None of these
VPCC stands for:
Variable portable C compiler
Very portable C compiler
Both
None
In register transfer which system is a sequential logic system in which flip-flops and gates are
constructed:
a.
b.
c.
d.
Digital system
Register
Data
None
30. High level language C supports register transfer technique for______ application:
a.
b.
c.
d.
Executing
Compiling
Both
None
31. A counter is incremented by one and memory unit is considered as a collection of _______:
a.
b.
c.
d.
Transfer register
Storage register
RTL
All of these
32. Which is the straight forward register transfer the data from register to another register
temporarily:
a. Digital system
b. Register
c. Data
d. Register transfer operations
33. In organization of a digital system register transfer of any digital system therefore it is called:
a.
b.
c.
d.
Digital system
Register
Data
Register transfer level
34. The binary information of source register chosen by:
a.
b.
c.
d.
Demultiplexer
Multiplexer
Both
None
35. Which control transfer passes the function via control______:
a.
b.
c.
d.
Logic
Operation
Circuit
All of these
36. Register are assumed to use positive-edge-triggered _____:
a.
b.
c.
d.
Flip-flop
Logics
Circuit
Operation
37.
a.
b.
c.
d.
38.
a.
b.
c.
d.
39.
IDE stands for:
Input device electronics
Integrated device electronic
Both
None
ATA stands for:
Advance technology attachment
Advance teach attachment
Both
None
The memory bus is also referred as______:
a.
b.
c.
d.
Data bus
Address bus
Memory bus
All of these
40. How many parts of memory bus:
a.
b.
c.
2
3
5
d.
6
41. A three state gate defined as:
a.
b.
c.
d.
Analog circuit
Analog fundamentals
Both a&b
Digital circuit
42. In 3 state gate two states act as signals equal to:
a.
b.
c.
d.
Logic 0
Logic 1
None of these
Both a & b
43. In 3 state gate third position termed as high impedance state which acts as:
a.
b.
c.
d.
Open circuit
Close circuit
None of these
All of above
44. In every transfer, selection of register by bus is decided by:
a.
b.
c.
d.
Control signal
No signal
All signal
All of above
45. every bit of register has:
a.
b.
c.
d.
2 common line
3 common line
1 common line
none of these
46. DDR2 stands for:
a.
Double data rate 2
b.
c.
d.
Data double rate 2
Dynamic data rate 2
Dynamic double rate 2
47.
a.
b.
c.
d.
48.
SDRAM stands for:
System dynamic random access memory
Synchronous dynamic random access memory
Both
None
Which is referred as a sequential circuit which contains the number of register as per the protocol:
a.
b.
c.
d.
RTL
RAM
MAR
All of these
49.
a.
b.
c.
d.
50.
Which operation refer bitwise manipulation of contents of register:
Logical micro operation
Arithmetic micro operation
Shift micro operation
None of these
Which symbol will be used to denote an micro operation:
a.
b.
c.
d.
(^)
(v)
Both
None
51. which symbol will be denote an AND micro operation:
a.
b.
c.
d.
(^)
(v)
Both
None
52.
a.
b.
c.
d.
53.
Which operation are associated with serial transfer of data:
Logical micro operation
Arithmetic micro operation
Shift micro operation
None of these
The bits are shifted and the first flip-flop receives its binary information from the_____:
a.
b.
Serial output
Serial input
c.
d.
Both
None
54. How many types of shift micro operation:
a.
b.
c.
d.
2
4
6
8
55. Which shift is a shift micro operation which is used to shift a signed binary number to the left or
right:
a.
b.
c.
d.
Logical
Arithmetic
Both
None of these
56. which shift is used for signed binary number:
a.
b.
c.
d.
Logical
Arithmetic
Both
None of these
57. Arithmetic left shift is used to multiply a signed number by_____:
a.
b.
c.
d.
One
Two
Three
All of these
58. The variable of_______ correspond to hardware register:
a.
b.
c.
d.
RAM
RTL
ALU
MAR
59. In which shift is used to divide a signed number by two:
a.
Logical right-shift
b.
c.
d.
60.
Arithmetic right shift
Logical left shift
Arithmetic left shift
How evolved in register transfer language and where:
a.
b.
c.
d.
e.
f.
g.
Chirsfraser 1980
J.davidson 1980
Chirsfraser 1920
J.davidson 1920
A and B
B and C
C and D
Data Communication And Networks 05
1.
Which protocol was based on the specification called the Ethernet
a.
b.
c.
d.
IEEE 802.3
CSMA/CD
Both a & b
None of these
2.
MAC(Medium Access Control)sub layer is between the
a.
b.
c.
d.
Physical layer
Data Link layer
Both a & b
None of these
3.
a.
b.
c.
d.
e.
4.
a.
b.
c.
d.
e.
5.
Depending on the transmission media used, the Ethernet can be classified into following categories
are
Thick Ethernet or 10base5
Cheaper Net or Thin Net(10base2)
Star LAN(10baseT)
Optical Fibre CSMA/CD LAN (10baseF)
All of these
The characteristics of the Thick Ethernet cable are
Provides connectivity to max of 1024 stations
Cable supports a max distance of 500meters
Max distance covered by a network using Thick Ethernet is 2.5Km
Max no of stations supported by the Ethernet is 1024
All of these
A 10 Mbps cable is like a
a.
b.
c.
d.
Blue hose
Yellow hose
Black hose
None of these
6.
All stations in a Thick Ethernet is connected to a
a.
b.
c.
d.
Twisted pair cable
Coaxial cable
CSMA/CD
Transceiver
7.
A group of stations connected to a cable forms a
a.
b.
c.
d.
Repeater
Transceiver
Segments
Groups
8.
Which device is used to link two network segments, which are separated by a long distance
a.
b.
c.
d.
Repeater
Transceiver
Segments
Groups
9.
Each cable is connected to a Ethernet cable through a
a.
b.
c.
d.
Repeater
Transceiver
Segments
Groups
10. A repeater consists of _______ transceiver
a.
b.
c.
d.
1
2
3
4
e.
11. The functions performed by physical layer are
a.
b.
c.
d.
Encoding the data
Medium access
Data encapsulation
Both a & b
12. The functions performed by logical layer are
a.
b.
c.
d.
Data encapsulation
Link management
Medium access
Both a & b
e.
13. The computer or station is connected to a Ethernet card, Ethernet card consists of
a.
b.
c.
d.
Station interface
Data packet generator
A link management unit
All of these
14. The output of a Ethernet card is connected to the data encoder/decoder, which in turn is
connected to the transmission cable through a
a.
b.
c.
d.
Repeater
Transceiver
Segments
Groups
15.
a.
b.
c.
d.
e.
f.
g.
h.
16.
The IEEE802.3 Ethernet frame format are
Preamble-7byte
Start of frame-1byte
Destination address-6byte
Source address-6byte
Length-2byte
Information field-46to 1500bytes
Frame check sequencer-4byte
All of these
The local area networks that do not require the capabilities of complete Ethernet system, the
IEEE802.3 standard committee has created a new standard called
a.
b.
c.
d.
Thin net
Star LAN
Optical fibre CSMA/CD
None of these
17.
a.
b.
c.
d.
e.
f.
g.
18.
The characteristics of thin net or cheaper net is
Max distance is up to 200meters
Max no of nodes is 30
Max stations per network is 1024
Node spacing is 0.5meters
Cable diameter is 0.25inches
BNC-T-connector is used to connect cables and N-series connector
All of these
The third variation of IEEE802.3 standard was a
a.
b.
c.
d.
Thin net
Star LAN
Optical fibre CSMA/CD
None of these
19. The characteristics of Star LAN are
a. It operates data rate up to 1Mbps
b. The configuration contains up to 5 upward levels of hubs
c.
d.
e.
f.
20.
a.
b.
c.
d.
e.
f.
21.
a.
b.
c.
d.
22.
Twisted pair cable already used in telephone lines for transmission media
Each group of stations is connected to a local hub
The hubs are connected in the form of tree
All of these
The characteristics of optical fibre CSMA/CD LAN are
Good immunity to the electromagnetic interference
Low loss of power
High bandwidth
Less weight
High transmission security
All of these
The optical fibre version of CSMA/CD LAN has a no of advantage than the
Coaxial cable version of Ethernet
Twisted cable version of Ethernet
Both a & b
None of these
A token ring is a ring topology created by IBM in
a.
b.
c.
d.
1960
1990
1970
1980
e.
23. A stream of data is called a
a.
b.
c.
d.
Token
Frame
Token Ring
None of these
24. A central hub called _______ is used to connect each station in a star type of topology
a.
b.
c.
d.
MSAU(Multi Station Access Unit )
CSAU
SSAU
None of these
25.
a.
b.
c.
d.
26.
a.
The advantage of Token ring mechanism is
It prevents collision by ensuring that only one station at a time is transmitting
Ensures delivery of frame
Both a & b
None of these
Which uses electromechanical relays to make the physical star into a logical ring
b.
c.
d.
e.
MSAU(Multi Station Access Unit )
CSAU
SSAU
None of these
27.
a.
b.
c.
d.
28.
NAUN stands for
Nearest Active Upstream Neighbour
Network Active Upstream Neighbour
Network administrator Upstream Neighbour
None of these
IBM token ring products were available with speeds of
a.
b.
c.
d.
4Mbps
16Mbps
Both a & b
None of these
e.
29. High-Speed Token Ring(HSTR) technology is also available with speed of
a.
b.
c.
d.
100Mbps
1Gbps
Both a & b
None of these
30. The frame format of a token ring in a ring topology is
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
Preamble
Start Delimiter
Frame Control
Destination Address
Source Address
Date
FCS
End Delimiter
Frame status
All of these
31. In a token ring , stations are connected to a
a.
b.
c.
d.
Physical ring
Logical ring
Both a & b
None of these
32. How many modes a ring interface can operate
a.
b.
c.
d.
1
2
3
4
33. A ring interface can operate different modes
a.
Listen mode
b.
c.
d.
Talk mode
Both a & b
None of these
34. In physical layer of token ring , signal speed of this media is
a.
b.
c.
d.
1Mbps
4Mbps
Both a & b
None of these
35. IBM released a token ring version that can operate at a speed of ______
a.
b.
c.
d.
4Mbps
6Mbps
8Mbps
16Mbps
36.
a.
b.
c.
d.
37.
Differential_______ encoding schema is used for encoding the digital data
Manchester
Multi programming
Multi processor
None of these
The MAC sub layer is on the____ of the physical layer
a.
b.
c.
d.
Bottom
Mid
Top
None of these
38. When there is no traffic on the ring______ token circulates continuously until some station grabs it
a.
b.
c.
d.
3-byte
5-byte
7-byte
9-byte
39. The length of the frame_________________
a.
b.
c.
d.
Short
Long
May be long or short
None of these
40. The maximum time a station is permitted to hold the token is known as________
a.
b.
c.
d.
Token time
Token holding time
Token ring
None of these
41.
a.
b.
c.
d.
e.
f.
42.
The IEEE802.5 token frame format are
Start of frame and end of frame
Access control
Frame control
Source address and destination address
Checksum
All of these
The token ring management activities are
a.
b.
c.
d.
e.
Monitor stations
Ring initialization
Lost tokens
Orphan frames
All of these
43. The stations crashed after transmitting a short frame form
a.
b.
c.
d.
e.
f.
Monitor stations
Ring initialization
Lost tokens
Orphan frames
All of these
44.
a.
b.
c.
d.
45.
The FDDI network stands for
Fibre Distributed Data Incorporation
Fibre Distributed Data Institute
Fibre Distributed Data Interface
Fibre Distributed Dual Incorporation
The FDDI network is a
a.
b.
c.
d.
High-speed
High-bandwidth
Both a & b
None of these
46. The FDDI network is based on the
a.
b.
c.
d.
Physical transmission
Optical transmission
Logical transmission
None of these
e.
47.
a.
b.
c.
d.
e.
f.
The characteristics of FDDI network are
It transport data at a rate of 100Mbps
It can support up to 500stations on a single network
This network is used for connecting high-end computers
Rapid transfer of large amount of data
FDDI network consists of two counter-rotating rings
It was designed to run through fibre cables or copper media
g.
h.
i.
It was based on ring topology with token passing
It helps and support extend the capabilities of older LANs , such as Ethernet and token ring
It provides a reliable infrastructure for businesses ,moving even mission-critical applications to
networks
j. Easier to maintain
k. Compatible to standard-based components and various operating systems
l.
All of these
48. The ANSI began working on the FDDI-standard in
a.
b.
c.
d.
1980
1981
1982
1983
49. The FDDI specification was released in
a.
b.
c.
d.
1982
1983
1984
1986
50. The most key elements of FDDI was defined in
a.
b.
c.
d.
1986
1982
1985
1989
51. The FDDI considered as a _______ of IEEE802.5standard
a.
b.
c.
d.
Predecessor
Successor
Tool
None of these
e.
52. FDDI network comprises 2 bottom layer in ISOs OSI model namely
a.
b.
c.
d.
Physical layer
Data link layer
Both a & b
None of these
e.
53. The physical layers are
a.
b.
c.
d.
PMD
PHY
Both a & b
None of these
e.
54.
a.
b.
c.
d.
55.
a.
b.
c.
d.
56.
The ANTC stands for
Advanced Network Test Center
American National Test Center
American National Token Center
None of these
The word EANTC stands for
European ANTC
Easily ANTC
Efficient ANTC
None of these
The FDDI is
a.
b.
c.
d.
More than LAN
Less than WAN
Less than LAN
Both a & b
57. The FDDI network can easily be added to network topologies such as
a.
b.
c.
d.
Ethernet
Token ring
Both a & b
None of these
58.
a.
b.
c.
d.
e.
59.
a.
b.
c.
d.
60.
The FDDI supports four different types of cables as
Multimode fibre optic cable
Single mode fibre optic cable
Unshielded twisted-pair copper wiring
Shielded twisted-pair copper wiring
All of these
The PMD stands for
Physical Medium Dependent
Physical Medium Distance
Physical Media Dependent
Permitting Medium Dependent
For optical fibre media , which PMD is used
a.
b.
c.
d.
TP-PMD
Fibre PMD
Both a & b
None of these
e.
61. For copper media , which PMD is used
a.
b.
c.
d.
TP-PMD
Fibre PMD
Both a & b
None of these
e.
62.
a.
b.
c.
d.
63.
Other two significant PMD are
SMF-PMD(Single Mode Fibre-PMD)
LCF-PMD(Low Cost Fibre-PMD)
Both a & b
None of these
The fibre PMD-ANSI X3T9.5/48 describes the physical layer that uses
a.
b.
c.
d.
Fibre components
Optical components
Both a & b
None of these
64.
a.
b.
c.
d.
e.
f.
g.
h.
i.
65.
a.
b.
c.
d.
66.
The characteristics and parameters of the optical fibre cable allowed for FDDI are
Wavelength of light(normal is 1300nm)
Attenuation and bandwidth
Max bit error rate
Dispersion of optical media
Numerical aperture(normal is 0.275)
Intensity of light
Jitter of pulse
Allowed power between two stations
All of these
The PHY are
Data link layer protocol
Physical layer protocol
Network protocol
None of these
The micrometer graded index fibre are
a.
b.
c.
d.
e.
62.5/125
85/125
50/125
100/140
All of these
67. The max number of PHYs pre FDDI are
a.
b.
c.
d.
200
500
1000
1800
e.
68.
a.
b.
c.
d.
69.
a.
The DAS stands for
Dual Access Station
Dual Attachment Station
Data Access Station
Data Attachment Station
SAS stands for
Single Access Station
b.
c.
d.
70.
Single Attachment Station
Single Attached Station
None of these
Which standard is applied in the LLC(Logical Link Control) layer
a.
b.
c.
d.
IEEE802.5
IEEE802.2
IEEE802.6
IEEE802.4
71.
a.
b.
c.
d.
72.
The MAC layer specifies how to handle
Synchronous data traffic
Asynchronous Data traffic
Both a & b
None of these
IEEE802.2 standard works on ______________ modes
a.
b.
c.
d.
Connectionless
Connection-oriented
Both a & b
None of these
73. If the received data is damaged or lost, the destination machine to retransmit the data known as
_____________
a.
b.
c.
d.
SNAP
ARQ
LLC
MAC
74.
a.
b.
c.
d.
75.
a.
b.
c.
d.
76.
ARQ stands for
Array Repeat Request
Automatic Repeat Request
Automatic Request Repeat
Acknowledgement Repeat Request
SNAP stands for
Subnetwork Access Package
Subnetwork Access Packet
Structured Access Protocol
Subnetwork Access Protocol
LLC header contains _______ additional eight-bit address fields known as service access points or
SAPs to request SNAP service
a.
b.
c.
d.
1
2
3
4
77. PDU stands for
a. Packet Device Unit
b. Protocol Device Unit
c. Protocol Data Unit
d. Protocol Data Universal
78. IEEE802.3 Ethernet has become one of the most used ________
a.
b.
c.
d.
WAN media
LAN media
MAN media
None of these
79. Around 1984, DIX(a consortium of Digital, Intel and Xerox) and IEEE created standards for Ethernet,
which are popularly known as the ________
a. IEEE802.3
b. IEEE802.1
c. IEEE802.2
d. IEEE802.3
80. Which another group took the responsibility for developing medium access protocols
a.
b.
c.
d.
DLMAC
ARQ
LAN
SNAP
81.
a.
b.
c.
82.
a.
b.
c.
d.
83.
Ethernet is the ______ expensive high-speed LAN alternative
More
Least
None of these
Ethernet transmits and receives data at a speed of ___________
5 million bits per second
10 million bits per second
15 million bits per second
20 million bits per second
In Ethernet, Data is transferred between wiring closets using either a __________
a.
b.
c.
d.
Heavy coaxial cable
Thick net
Fibre optic cable
All of these
e.
84. Ethernet was first designed and installed by Xerox Corporation at its Palo Alto Research
Center(PARC) in the mid _________________
a.
b.
c.
d.
1960s
1970s
1980s
1965s
85. In 1980, ____________ came out with a joint specification which has become the de facto standard
a.
b.
DEC
Intel
c.
d.
Xerox
All of these
86. Ethernet frames travel at the data link layer of the OSI model and must be a minimum of ________
a.
b.
c.
d.
32bytes
64bytes
128bytes
256bytes
87. Ethernet frames travel at the data link layer of the OSI model and must be a maximum of ________
a.
b.
c.
d.
1515bytes
1516bytes
1517bytes
1518bytes
88.
a.
b.
c.
d.
89.
a.
b.
c.
d.
90.
FCS stands for
Frame Check System
Frame Check Sequence
Frame Cyclic Sequence
Frame Checksum Sequence
Ethernet IEEE802.3 frame description of each field in ___________________
Preamble (P)
Start Frame Delimiter (SFD)
Destination Address
All of these
The need for devising a mechanism to avoid such deadlocks, some of the important methods are
listed below:
a.
b.
c.
d.
e.
CSMA/CD
CSMA/CA
Token passing
Polling
All of these
91. _________ cable is used widely as a backbone technology
a.
b.
c.
d.
TV
Fibre
Fibre optic cable
None of these
e.
92. Which are used to connect LANs and LAN segments in a campus environment
a.
b.
Microwave
Infrared systems
c.
d.
Both a & b
None of these
93. The advantages of coaxial cable include high bandwidth in the range of ________ and more, better
error performance and lack of severe distance limitation
a.
b.
c.
d.
200MHz
300MHz
400MHz
500MHz
94. The disadvantage of coaxial cable have been mitigated to a _______ through the development of
new coaxial designs
a.
b.
c.
d.
Small extent
Large extent
Either large or small
None of these
e.
95. Which uses traditional thick baseband coaxial cable in a bus topology to connect multiple
computers, this single line transmission is called a Segment
a. 10Base2(Thick Net/Yellow Ethernet)
b. 10Base5(Thick Net/Yellow Ethernet)
c. 10Base2(Thin Net/Black Ethernet)
d. 10Base5(Thin Net/Black Ethernet)
96. A coaxial cable _______ in diameter known as thick coaxial cable is used as a transmission line
a.
b.
c.
d.
5mm
10mm
15mm
20mm
97. A transceiver is used to connect a ____________________
a.
b.
c.
d.
Coaxial cable
Terminals
Transmitter
Both a & b
98. A transceiver cable also referred to as an __________ cable and is used to connect a transceiver
and the NIC
a.
b.
c.
d.
ALU
AUI(Attachment Unit Interface)
LAN
MAN
99. In 10Base5(Thick Net/ Yellow Ethernet) the maximum length of this cable is ______, up to 100
transceivers can be connected to each segment
a.
b.
c.
d.
40 metres
45 metres
50 metres
55 metres
100.
In 10Base5(Thick Net/ Yellow Ethernet) the minimum allowable distance between transceivers
is _______
a.
b.
c.
d.
1.5 metres
2.5 metres
3.5 metres
4.5 metres
e.
101.
10Base stands for ___________
a. 10Mbps
b. Baseband transmission system
c. Both a & b
d. None of these
102.
The 5 of 10Base5 signify a maximum of _________ segment length
a.
b.
c.
d.
103.
a.
b.
c.
d.
50- metre
500- metre
5000- metre
550- metre
The 5 of 10Base5 segment may be extended up to ______ by using repeaters
500 metres
1000 metres
1500 metres
2000 metres
104.
Which uses thinner baseband coaxial cable in a bus topology so that multiple computers can be
connected to a single transmission line
a. 10Base2(Thick Net/Yellow Ethernet)
b. 10Base5(Thick Net/Yellow Ethernet)
c. 10Base2(Thin Net/Black Ethernet)
d. 10Base5(Thin Net/Black Ethernet)
105.
In 10Base2(Thin Net/Black Ethernet) a coaxial cable of thinner gauge of _______ in diameter
a.
b.
c.
d.
5mm
10mm
15mm
20mm
106.
The thinner cable is less costly to acquire and deploy, although its performance is less in terms
of transmission distance because of its cost it is sometimes called ___________
a.
b.
Chaplet
Cheapnet
c.
None of these
107.
10Base2 signifies in the same manner as 10Base5 except 2 is signified here as _______
maximum segment length(actually 185 metres)
a.
b.
c.
d.
100 metres
200 metres
250 metres
300 metres
108.
BNC stands for
a. Bayonet Neil Connection
b. Bayonet Neil Connector
c. Bayonet Neil Connectionless
d. Bayonet Network Connection
109.
Which is used to connect a cable and terminals or terminators
a.
b.
c.
d.
110.
a.
b.
c.
d.
111.
a.
b.
c.
d.
BNC
T-connector
Both a & b
None of these
Only up to ______ per segment can be connected to a T-connector
10 nodes
20 nodes
30 nodes
40 nodes
The minimum allowable distance is ____ between consecutive connections
0.2 metres
0.5 metres
1.5 metres
2.5 metres
112.
UTP stands for
a. Universal Twisted Pair
b. Unshielded Twisted Pair
c. Universal Transmission Pair
d. Unique Twisted Pair
113.
STP stands for
a.
b.
c.
d.
114.
a.
System Twisted Pair
Shielded Twisted Pair
System Twisted Panel
Subscriber Twisted Protocol
UTP has been proved to perform at very high data rates _____ over short distances
50Mbps
b.
c.
d.
100Mbps
150Mbps
200Mbps
115.
a.
b.
c.
d.
10BASET(twisted pair Ethernet) uses _______________
Cat 3
Cat 4
5 UTP
All of these
116.
Ethernet Specifications
Transmission speed
Transmission
medium
Maximum segment
length
Maximum
node/segment
Minimum length
between node
Repeaters/Series
Maximum network
length
117.
a.
b.
c.
d.
118.
a.
b.
c.
d.
10Base5
10Mbps
Coaxial cable
10Base2
10Mbps
Coaxial cable
10BaseT
10Mbps
UTP Cat 3,4,5
500 metre
185 metre
100 metre
100
30
-
2.5 metre
2.5 metre
-
4
2500 metre
4
925 metre
4
500 metre
The two general types of token passing schemes are
Token ring
Token bus
Both a & b
None of these
A DQDB(Distributed Queue Dual Bus) provides service over cable interface for
LAN
MAN
WAN
All of these
e.
119.
The DQDB supports _______ based on cell switching technology similar to Asynchronous
Transfer Mode(ATM)
a.
b.
c.
d.
120.
Data
Voice
Video transmission
All of these
The Asynchronous Transfer Mode(ATM) is an _________ for cell relay
a. ITU-TSS(International Telecommunication Union-Telecommunication Standardization Sector)
b. TIU-ESS
c. PTU-DSS
d. None of these
121.
The ATM networks are
a. Connection-less service
b. Connection oriented service
c. Both a & b
d. None of these
122.
The ATM cell has a fixed length of
a.
b.
c.
d.
123.
a.
b.
c.
d.
124.
a.
b.
c.
d.
125.
a.
b.
c.
d.
e.
126.
a.
b.
c.
d.
127.
a.
b.
c.
d.
51bytes
62bytes
53bytes
63bytes
The cell is broken into the two main sections called
Header
Payload
Both a & b
None of these
Which sections of cell carries the actual information(voice, data or video)
Header
Payload(48bytes)
Both a & b
None of these
Which sections of cell is the addressing mechanism
Header(5bytes)
Payload(48bytes)
Both a & b
None of these
The disadvantage of DQDB is to have
Fluctuating data rate
High bandwidth
High susceptibility to error
Fixed bandwidth distribution
The frame format of DQDB are
Header
ST(Segment Type)
MID(Message Identifier)
Information
e.
f.
g.
LEN(Data Length)
CRC(Cyclic Redundancy Check)
All of these
128.
GPS stands for
a. Global Partition System
b. General Partition System
c. Global Positioning System
d. General Positioning System
129.
Which satellite communication involve a satellite relay station that is launched into a
geostationary, geosynchronous, or geostatic orbit
a.
b.
c.
d.
e.
130.
a.
b.
c.
d.
Temporary
Contemporary
Permanent
None of these
The contemporary satellite communication launched into a
Geostationary orbit
Geosynchronous orbit
Geostatic orbit
All of these
131.
The contemporary satellite communication are called
a. Geostationary satellite
b. Geostatic satellite
c. Geosynchronous satellite
d. All of these
132.
In case of satellite communication two different frequencies are used as carrier frequency to
avoid interference b/w incoming and outgoing signals are
a. Uplink frequency
b. Downlink frequency
c. Both a & b
d. None of these
133.
Which frequency is used to transmit signal from the earth station to satellite
a.
b.
c.
d.
e.
134.
a.
b.
c.
d.
Uplink frequency
Downlink frequency
Broadcast
None of these
Which frequency is used to transmit signal from the satellite to earth station
Uplink frequency
Downlink frequency
Broadcast
None of these
e.
135.
In which manner, satellite can serve a point-to-multipoint network requirement through a
single uplink station and multiple downlink stations
a.
b.
c.
d.
Uplink frequency
Downlink frequency
Broadcast
None of these
136.
The general properties of satellite communication______________
a. Each signal travel 36,000 km in each direction
b. The cost of satellite communication is quite high
c. Security must be imposed through encryption
d. Satellite provides increment in bandwidth
e. Satellite provides extensive error detection and correction capabilities
f. All of these
137.
TDMA stands for
a. Time Division Multiplexing Access
b. Time Dynamically Multiple Access
c. Time Division Multiple Access
d. Time Division Multiple Assigning
138.
The most commonly used satellite access schemes are
a. TDM/TDMA
b. Fixed assigned TDMA
c. Slotted ALOHA
d. Dynamic reservation
e. All of these
139.
The VSAT stands for
a. Very Small Accessing Terminal
b. Very Small Access Topology
c. Very Small Aperture Terminal
d. None of these
140.
The VSAT technology is based on the
a. Wired satellite technology
b. Wireless satellite technology
c. Both a & b
d. None of these
141.
The VSAT networks offer value added satellite based services capable of supporting the
a. Internet
b. Data
c. Satellite based video
d. Audio LAN
e. Voice or fax communication
f. Provide powerful, dependable, private and public network comm n solutions
g. All of these
142.
The VSAT system operates in two different bands named
a.
b.
c.
d.
Ku-band
C-band
Both a & b
None of these
e.
143.
a.
b.
c.
d.
144.
a.
b.
c.
d.
e.
145.
a.
b.
c.
d.
146.
a.
b.
c.
d.
147.
a.
b.
c.
d.
148.
a.
b.
c.
d.
149.
a.
b.
c.
d.
The VSAT system operates under C-band frequency are
5.925to 6.425 GHz
3.700to 4.200GHz
Both a & b
None of these
The VSAT system operates under Ext-Cbandfrequency are
6.725 to 7.025GHz
4.500 to 4.800GHz
Both a & b
None of these
The VSAT system operates under Ku-Band 1 frequency are
4.000 to 14.500GHz
10.950 to 11.700GHz
Both a & b
None of these
The Ku-band networks are commonly used in
Europe and North America
Asia and Africa
Latin America
Both a & b
The C-band networks are commonly used in
Europe and North America
Asia and Africa
Latin America
Both b & c
Which band of frequencies require the large VSAT antenna
Ku-band
C-band
Both a & b
None of these
Which band of frequencies require the smaller VSAT antenna
Ku-band
C-band
Both a & b
None of these
e.
150.
a.
b.
c.
d.
The components of VSAT network are
Master earth station
Remote earth station
Satellite
All of these
151.
a.
b.
c.
d.
The first component-master earth station is also known as
Central hub station
Central satellite
Backbone
All of these
152.
a.
b.
c.
d.
The master earth station has a large _______ meter antenna
3
6
5
4
153.
The hub earth station consists of
a. Radio frequency(RF)
b. Intermediate frequency(IF)
c. Base-band equipment
d. All of these
154.
The RF equipment consists of the following sub-systems are
a. Antenna
b. Low noise amplifier(LNA)
c. Down converter, up converter
d. High-power amplifier
e. All of these
155.
The IF and base-band equipment consists of
a. IF combiner/divider
b. Modulator and demodulator
c. Customer equipment interface
d. Processing equipments
e. All of these
156.
The customer equipment interface unit provides the interface to the
a. Customer host equipment
b. Protocol emulation
c. Both a & b
d. None of these
157.
The remote earth station of VSAT comprises of
a.
b.
c.
d.
Outdoor unit(ODU)
Indoor unit(IDU)
Inter-facility link(IFL)
All of these
158.
a.
b.
c.
d.
The outdoor unit is generally installed in the
Ground
Indoor unit
Both a & b
None of these
159.
The VSAT outdoor unit consists of
a. Standard 1.8 meter offset feed antenna
b. Solid-state amplifier(SSPA)
c. Low Noise Amplifier(LNA)
d. Feed horn
e. All of these
160.
The indoor unit functions as a
a.
b.
c.
d.
Amplifier
Modem
PCs
None of these
Data Communication And Networks 04
1.
The device used for splits data into frames and then combines frames into data in
frame relay is termed as
2.
3.
4.
a.
FRAD(Frame Relay And Disassembly)
b.
Framing
c.
Both a & b
d.
Slipping Window Protocol
The Error controls involves
a.
Sequencing of control frame
b.
Sending of control frame
c.
Both a & b
d.
None of these
During communication, a channel that is noisy may causes
a.
Loss of bits from a frame
b.
Flips of bits
c.
Complete disappearance of frames
d.
Introduction of new bits in the frame
e.
All of these
The data link layer encapsulates each packet in a frame by adding
a.
Header
b.
Trailer
c.
Both a & b
d.
5.
None of these
The Frame format of framing are
a.
DLCI-10bits
b.
EA-2location(First one is fixed at 0 and second at 1)
c.
DE-1 is set for the part that can be discarded first when congestion occurs
d.
Data size-vary up to 4096bytes
e.
All of these
6.
Which is a simple data link protocol based on certain ideal assumptions to explain
the working of the data link layer
7.
8.
a.
Stop ARQ
b.
Wait ARQ
c.
Go back-N ARQ
d.
Both a & b
The assumptions of Stop and Wait ARQ are as
a.
Infinite buffer size
b.
Half Duplex
c.
Does not produce any error
d.
Network layers are always ready
e.
All of these
The protocol based on the assumption are called
a.
Elementary data link protocol
b.
Data link protocol
c.
Sliding Window Protocol
d.
HDLC
9.
The basic objective of computer communication in a network environment is to
send an infinitely long message from the ____________
10.
11.
a.
Source node to the source node
b.
Destination node to the destination node
c.
Source node to the destination node
d.
None of these
In stop and wait protocol
a.
Sequence number are required
b.
Sequence number are not required
c.
Both a & b
d.
None of these
The stop and wait protocol is
a.
easy to Implement
b.
Does not call for congestion
c.
Both a & b
d.
12.
None of these
The disadvantage of stop and wait protocol is
a.
Error free communication channel does not exist
b.
Acknowledgement may get lost
c.
Deadlock situation may occur
d.
All of these
13.
Which protocol enables the source machine to possess more than one outstanding
frame at a time by using buffers
14.
a.
Stop ARQ
b.
Wait ARQ
c.
Go back-N ARQ
d.
Both a & b
The Go back-N ARQ overcomes the problem of
a.
PAR
b.
PER
c.
PRA
d.
DAR
15.
Another important issue in the design if the data link is to control the rate of data
transmission between _____________
16.
17.
a.
Source and destination host
b.
Two source and destination host
c.
Three source and destination host
d.
None of these
Which one is the important protocol used by the data link layer
a.
Sliding protocol
b.
Sliding Window protocol
c.
Stop sliding approach
d.
None of these
The sender keeps a list o consecutive sequence numbers is known as
a.
Window
b.
Sending window
c.
Stop and wait ARQ
d.
Sliding window
18.
Which protocol is for data transmission and is bi-directional, used in the data link
layer that corresponds to layer 2 of OSI model
a.
Sending window
b.
Sliding window protocol
c.
Stop and wait ARQ
d.
Sliding window
19.
Sliding window protocol keeps record of frame sequences sent and acknowledged
when communication takes place between ____________
20.
a.
Users
b.
Two users
c.
More users
d.
None of these
Sliding window protocol is also used by most of the _______________________
a.
Connection oriented protocols
b.
Connection oriented network protocols
c.
Connection network protocols
d.
None of these
21.
Which is used by many users to establish their home PC to the Internet via a phoneline connection
a.
FTP
b.
PPP
c.
OSI
d.
PAR
e.
22.
Sliding window protocol works on _________ in which there is simultaneous twoway communication
a.
no duplex
b.
half duplex
c.
full duplex
d.
single duplex
e.
23.
Sliding window protocol makes use of two types of frames namely
a.
Data frame
b.
Acknowledgement frame
c.
Both a & b
d.
None of these
24.
Another improvement is done over this ‘stop and wait’ type protocol by use of
________
a.
Back
b.
Piggybacking
c.
Piggy
d.
None of these
25.
A technique in which acknowledgement is temporarily delayed and then hooked
onto next outgoing frame is known as
a.
26.
27.
28.
29.
b.
Back
c.
Piggybacking
d.
Piggy
e.
None of these
RTT stands for
a.
Robin time taken
b.
Round trip time
c.
Round time trip
d.
Round time trip
The variants of sliding window protocol are
a.
Go back n
b.
Selective repeat
c.
Selective reject
d.
All of these
The sliding window protocol employs ___________
a.
A wait approach
b.
A stop approach
c.
Both a & b
d.
None of these
HDLC is a __________ synchronous data link layer protocol
a.
Bit-oriented
b.
Byte-oriented
c.
Both a & b
d.
None of these
e.
30.
31.
32.
HDLC provides
a.
Switched protocol
b.
Non- Switched protocol
c.
Both a & b
d.
None of these
HDLC is a superset of ___________
a.
ADCCP
b.
SDLC
c.
ISO
d.
OSI
HDLC also has a subset of ______________
a.
ADCCP
b.
SDLC
c.
ISO
d.
FRAD
33.
Which is another subset of HDLC that finds use in packet switched networks of ITUTS X.25
34.
35.
a.
ADCCP
b.
SDLC
c.
LAP-B(Link Access Protocol-Balanced)
d.
None of these
In HDLC three types of stations are specified by the data link layer
a.
Primary Station
b.
Secondary Station
c.
Combined Station
d.
All of these
HDLC works on three different types of configurations namely
a.
Balanced configurations
b.
Unbalanced configurations
c.
Symmetrical configurations
d.
All of these
36.
Frames of secondary station are known as _________ are sent only on request by
the primary station
a.
Response
b.
Responses frame
37.
c.
Both a & b
d.
None of these
Which is a unit of data transmission
a.
Frame
b.
Stop and wait ARQ
c.
HDLC
d.
Frame relay
38.
A configuration has at least two combined stations in which every station has equal
and complimentary responsibility known as __________________
39.
a.
Balanced configurations
b.
Unbalanced configurations
c.
Symmetrical configurations
d.
None of these
Balanced configurations find use only in the such cases as given below
a.
Operation: Full or half duplex
b.
Network: Point to Point
c.
Both a & b
d.
None of these
40.
A configuration has one primary station and at least one secondary station , and it
exists as one station exercises control over other stations known as ________
41.
a.
Balanced configurations
b.
Unbalanced configurations
c.
Symmetrical configurations
d.
None of these
Symmetrical configurations comprises of _________________________
a.
Two independent
b.
Unbalanced stations
c.
Connected point to point
d.
All of these
e.
42.
Logically, every station is considered as __________ stations
a.
1
b.
2
c.
3
d.
4
e.
43.
The protocol and data are totally independent, this property known as
____________
44.
45.
46.
a.
Transmission
b.
Transparency
c.
Transparent
d.
Transport
In HDLC, problems like _______________ do not occur
a.
Data loss
b.
Data duplication
c.
Data corruption
d.
All of these
How many modes of operations are defined for the HDLC protocol
a.
2
b.
3
c.
4
d.
5
Three modes of operations are defined for the HDLC protocol
a.
Normal Response Mode(NRM)
b.
Asynchronous Response Mode(ARM)
c.
Synchronous Balanced Mode(ABM)
d.
All of these
47.
In primary station initializes links for controlling the data flow between
___________
48.
49.
a.
Primary and secondary stations
b.
Error control
c.
Logical disconnection of the second stations
d.
All of these
The ABM mode is suitable only to __________ environment
a.
Point
b.
Point-to-point
c.
First-to-end-point
d.
None of these
In the HDLC protocol, frame consists of __________
a.
Three fields
b.
Four fields
c.
Five fields
d.
Six fields
e.
50.
51.
52.
53.
54.
55.
A special eight-bit sequence ________ is referred to as a flag
a.
01111111
b.
01111110
c.
11101110
d.
11101110
In the HDLC protocol, every frame consists of __________ with a flag
a.
Starts
b.
End
c.
Both a & b
d.
None of these
A 8-bit address is used when the total number of stations exceeds _______
a.
64
b.
128
c.
256
d.
None of these
Data can be arbitrarily ______
a.
Long
b.
Empty
c.
Full
d.
Both a & b
The HDLC procedure uses a flag synchronous system, these are
a.
Bit order of transmission (information frame)
b.
Bit order of transmission (supervisor frame)
c.
Both a & b
d.
None of these
FCS (frame check sequence) is a _______ sequence for error control
a.
4bit
b.
16bit
c.
32bit
d.
64bit
56.
57.
The disadvantage of SLIP are as follows
a.
No error check function is available
b.
Protocols other than IP cannot be used
c.
No function is available to authenticate link level connections
d.
No function is available to detect loops
e.
All of these
PPP has several advantages over non-standard protocol such as
a.
SLIP
b.
X.25
c.
Both a & b
d.
None of these
e.
58.
PPP was designed to work with layer 3 network layer protocols including
___________
59.
60.
a.
IP
b.
IPX
c.
Apple talk
d.
All of these
PPP can connect computers using _________
a.
Serial cable, phone line
b.
Trunk line, cellular telephone
c.
Specialized radio links
d.
Fiber optic links
e.
All of these
Most dial-up access to Internet is accomplished by using _____
a.
HDLC
b.
PPP
c.
IP
d.
IPX
61.
RAS has an important role in the proliferation of Internet based services in the form
of _________________
a.
VoIP
b.
Data over IP
c.
Both a & b
d.
None of these
62.
Which is opening new challenges in the development of RAS where VoIP enabled
RAS are the need of time
63.
64.
65.
66.
67.
68.
a.
Voice convergence
b.
Data convergence
c.
Voice and data convergence
d.
None of these
Remote access is possible through an __________________
a.
Internet service provider
b.
Dial up connection through desktop
c.
Notebook over regular telephone lines
d.
Dedicated line
e.
All of these
A remote access server also known as ____________________
a.
Communication
b.
Communication server
c.
Layer
d.
None of these
RAS technology can be divided into two segments _________
a.
Enterprise
b.
Infrastructure
c.
Both a & b
d.
None of these
VPN stands for
a.
Virtual Public networking
b.
Virtual private networking
c.
Virtual package networking
d.
Virtual packet networking
PPP provides three principal components
a.
Encapsulating datagrams
b.
Establishment, configurations and testing
c.
Establishment and configurations
d.
All of these
PPP is able to function across any _______ interface
a.
DTE
b.
DCE
c.
Both a & b
d.
None of these
69.
PPP may include
a.
RS232C
b.
RS-423
c.
Both a & b
d.
None of these
e.
70.
In PPP, the default maximum length of the information field is ________
a.
1000bytes
b.
1500bytes
c.
2000bytes
d.
2500bytes
e.
71.
72.
73.
74.
75.
The protocols that are differentiate PPP from HDLC are the
a.
Link Control Protocol(LCP)
b.
Network Control Protocol(NCP)
c.
Both a & b
d.
None of these
For terminate PPP ,the four steps are
a.
Link establishment
b.
Link configuration negotiation
c.
Configuration acknowledgement frame
d.
Configuration terminates
e.
All of these
The LCP can terminates the link at any time is done by
a.
Request to the user
b.
Not Request to the user
c.
Both a & b
d.
None of these
The termination of link may happen
a.
Due to physical event
b.
Due to logical event
c.
Due to window event
d.
None of these
The three classes of LCP frames are
a.
Link establishment frame
b.
Link termination frame
c.
Link maintenance frame
d.
All of these
76.
The NCP phase in PPP link connection process is used for establishing and
configuring different network layer protocols such as
77.
78.
79.
80.
81.
a.
IP
b.
IPX
c.
AppleTalk
d.
All of these
In NCP, The link traffic consists of any possible combination of
a.
NCP
b.
LCP
c.
Network-layer protocol packets
d.
All of these
The IP control Protocol(IPCP) is the
a.
IP-specific LCP protocol
b.
IP-specific NCP protocol
c.
Both a & b
d.
None of these
If the calling peer has an IP address, it tells the
a.
Called peer What it is
b.
The called peer can assign the caller one from a pool of addresses
c.
Both a & b
d.
None of these
If the calling peer does not have an IP address, it tells the
a.
Called peer What it is
b.
The called peer can assign the caller one from a pool of addresses
c.
Both a & b
d.
None of these
The authentication process involves transmission of password information between
a.
RADIUS server
b.
RAS(Remote Access Server)
c.
Both a & b
d.
None of these
82.
The Authentication transaction used between a Remote access user and RAS can be
divided into two categories are
a.
PAP(Password Authentication Protocol)
b.
CHAP(Challenge Handshake Authentication Protocol)
c.
Both a & b
d.
None of these
83.
The digest is a
a.
One-way encryption
b.
Two- way encryption
c.
Three- way encryption
d.
Four- way encryption
84.
The technology which is useful for creating Virtual Private Networks (VPNs) has
been developed by
a.
85.
86.
are
87.
88.
89.
Microsoft Corporation
b.
U.S. Robotics
c.
Several remote access vendor companies, known as PPTP forum
d.
All of these
PPTP means
a.
Point-to-Point Tunneling Protocol
b.
Point-to-Point Termination Protocol
c.
Private-to-Private termination protocol
d.
Private-to-Private Tunneling Protocol
The PPTP is used to ensure that message transmitted from one VPN node to another
a.
Not secure
b.
Secure
c.
Networks
d.
IPX
What is the extension of PPTP
a.
PPP
b.
RAS
c.
L2TP(Layer Two Tunneling Protocol)
d.
None of these
The two main components that make up L2TP are the
a.
L2TP Access Concentrator(LAC)
b.
L2TP Network Server(LNS)
c.
Both a & b
d.
None of these
A user connects to NAS through
a.
ADSL
b.
Dialup POTS
c.
ISDN
d.
Other service
e.
All of these
90.
Which is a platform on which Internet service providers(ISP) and other service
providers enables their user to access the various internet based services
a.
RAS
b.
TCP
c.
ARQ
d.
SLIP
Data Communication And Networks 03
1.
2.
3.
4.
5.
6.
ISO stands for
a.
International Organization for Standardization
b.
Internet Organization for Standardization
c.
International Organization Standardization
d.
International for Organization Standardization
The main principle of layered architecture is
a.
Separation of responsibility
b.
Addition of responsibility
c.
Subtraction of responsibility
d.
None of these
Which type of network operating system in Novell Netware
a.
Client
b.
Server
c.
Both a & b
d.
None of these
How many layers a Novell Netware protocol stack uses
a.
3
b.
4
c.
5
d.
6
TCP/IP model is the _______ , which is used in the OSI model
a.
Oldest protocol
b.
Not so old protocol
c.
Newly established protocol
d.
None of these
In layered architecture, each layer is responsible for a ________ amount of work
a.
Infinite
b.
Finite
c.
Large
d.
None of these
7.
Layering the communications process means breaking down the communication
process into______ and _____ to handle interdependent categories
8.
a.
Smaller
b.
Easier
c.
Both a & b
d.
None of these
The convention and rules used in such communications are collectively known as
a.
Peer
b.
Layer protocol
c.
Network
d.
None of these
9.
The entities comprising the corresponding layers on different computers are called
________ which communicate by using layer protocol
a.
Peer
b.
Layer protocol
c.
Network
d.
None of these
e.
10.
11.
OSI has two meanings refers to
a.
OSI basic reference model
b.
Protocol that are authorized by ISO
c.
Both a & b
d.
None of these
Network is the term used for a group of
a.
protocols
b.
layers
c.
Both a & b
d.
None of these
12.
The groups of layers provides information to allows _________, which correctly
obeys the appropriate protocol
a.
Hardware implementation
b.
Software implementation
c.
Both a & b
d.
None of these
13.
Which are never form a part of the architecture because they are not visible from
the outside
a.
Interface specification
b.
Implementation details
c.
Both a & b
d.
None of these
e.
14.
The information exchanged between two computers is physically carried by means
of _________ with the help of certain coding method
15.
16.
a.
Electronics signal
b.
Electrical signal
c.
Physical signal
d.
Physical circuits
For two computers to reliably exchange data, they must have a
a.
compatible implementation of encoding
b.
interpreting data carrying electrical signals
c.
Both a & b
d.
None of these
Transmission media deals with the types of medium used , which is dictated by the
a.
Desirable bandwidth
b.
Immunity to noise
c.
Attenuation properties
d.
All of these
e.
17.
The data communication process allocates memory resources, commonly known
as___________ for the sake of transmission and reception of data
a.
Communication buffers
b.
Communication media
c.
Both a & b
d.
None of these
omputer must be capable of distinguishing between information
Carrying signal and mere noise
19.
20.
21.
a.
Error control
b.
Logical channels
c.
Routing
d.
All of these
In error control, this corruption could be in the form of ________________
a.
Noise
b.
Electromagnetic interference
c.
Both a & b
d.
None of these
Protocols should provide at least ______ logical channels per connection
a.
2
b.
3
c.
4
d.
5
Data exchange can take place between any _____ workstations
a.
1
b.
2
c.
3
d.
4
22.
Depending on the nature of the involved application in layered architecture, the
dialog type may be
23.
24.
the
a.
Duplex
b.
Half duplex
c.
Simplex mode
d.
All of these
The session recovery can be achieved by providing a
a.
Checkpoint
b.
Check mechanism
c.
Character encoding
d.
Terminal emulation
The check pointing circumvent session recovery requirement by retransmitting only
a.
Affected files
b.
Saving time
c.
Bandwidth
d.
All of these
e.
25.
Some good examples of presentation problems are the existing
incompatibilities between the__________ standard of character encoding
a.
ASCII
b.
EBCDIC
c.
Both a & b
d.
None of these
e.
26.
27.
28.
This is the entities in the same layers but on different computers
a.
Peer entities
b.
Entities
c.
Service provider
d.
SAP
Which function of the layer provides certain services
a.
Peer entities
b.
Entities
c.
Service provider
d.
SAP
Which function of the layer uses certain services
a.
Peer entities
b.
Entities
c.
Service provider
d.
Service user
29.
Which is the point from where services can be accessed .each point is the unique
address
a.
Peer entities
b.
Entities
c.
Service provider
d.
SAP
30. Which are the active elements such as processes, IO chips in every layers
31.
32.
a.
Peer entities
b.
Entities
c.
Service provider
d.
SAP
Which is the reliable connectionless service with acknowledgement
a.
Registered E-mail
b.
Junk E-mail
c.
Both a & b
d.
None of these
Which is the unreliable connectionless service without acknowledgement
a.
Registered E-mail
b.
Junk E-mail
c.
Both a & b
d.
None of these
e.
33.
In which model, Request-reply command is example of connectionless service
a.
Client-server model
b.
User model
c.
Server model
d.
None of these
34.
Which service is specified by a set of primitives available to a service user
to interact with the service provider
35.
a.
connection-oriented
b.
connectionless
c.
Both a & b
d.
None of these
Which are parameters to define conditions
a.
Protocol
b.
Primitives
c.
Confirmed service
d.
SAP
36.
A confirmed services is defined with a
a.
Request
b.
Confirm
c.
Response
d.
Indication
e.
Primitives
f.
All of these
g.
37.
38.
The Service primitives are the part of
a.
Protocol
b.
Primitives
c.
Confirmed service
d.
SAP
An unconfirmed is defined with a
a.
Request
b.
Indication
c.
Confirm
d.
Response
e.
Both a & b
f.
All of these
39.
Which are the distinct concepts and are important to release connections between
sender and receiver
a.
Services
b.
Protocol
c.
Both a & b
d.
None of these
e.
40.
41.
Which is provided to the upper layer by an immediate lower layer
a.
Protocol to service
b.
Service to protocol
c.
Service primitives
d.
None of these
The characteristic of each layer are as
a.
Name
b.
Content
c.
Function
d.
Total no of layers depend on type of network
e.
All of these
f.
42.
The basic function of each single layer is to provides service to the
a.
Layer of the top
b.
Layer of the bottom
c.
Layer above it
d.
Layer below it
43.
________ the protocol can make communication between the two either difficult or
impossible
44.
45.
a.
Breaching
b.
Branching
c.
Broaching
d.
Brunching
The network architecture can be termed as a
a.
Set of layers
b.
Set of protocols
c.
Set of machines
d.
Both a & b
The hectic task of designing the whole network can be distributed in the
a.
Smaller
b.
Easier
c.
Simpler design problems
d.
All of these
46.
Which is the computers from the same manufacturer it was not possible to run
both_______ solution and _______ simultaneously
a.
IBM
b.
DEC
c.
Both a & b
d.
None of these
47.
ISO-OSI reference model these could only be run one at a time by the
end__________
48.
a.
1969s
b.
1971s
c.
1970s
d.
1972s
Which is a reliable connection-oriented service has two subparts
a.
Message sequences
b.
Byte streams
c.
Both a & b
d.
None of these
e.
49.
Which is similar to postal system where every message contains the complete
destination address and is mapped through the system, free of all the others
a.
Connection-oriented services
b.
Connectionless services
c.
Both a & b
d.
None of these
50.
The various types of services provided by the interface to the layers above them
are listed as follows
51.
52.
a.
Connection-oriented services
b.
Connectionless services
c.
Both a & b
d.
None of these
The connectionless services can be further sub-divided into many categories
a.
Unreliable datagram
b.
Acknowledged datagram
c.
Both a & b
d.
None of these
Unreliable connectionless service can be also termed as
a.
Datagram service
b.
Data service
c.
Byte stream service
d.
None of these
53.
By the end of _________, the Open System Interconnection model was developed
by the International Organization for Standardization to break the barrier
54.
55.
56.
a.
1980
b.
1970
c.
1990
d.
1960
The first and the lowest layer is called the ___________________________
a.
Physical layer
b.
Supporting rules for low-level signaling
c.
Hardware implementation
d.
All of these
The seventh and the highest layer is the application layer that deals with the
a.
User interface
b.
Applications
c.
Both a & b
d.
None of these
In moving from layer one to layer seven, the level of abstraction ________
a.
Increases
b.
Decreases
c.
May be increases or decreases
d.
None of these
e.
57.
58.
The first layer deals with the actual ____________
a.
Hardware of networks
b.
The specific methods of sending bits from one device to another
c.
Both a & b
d.
None of these
The second layer also deals with ________________
a.
Signaling
b.
Hardware
c.
Both a & b
d.
None of these
e.
59.
The transport layer is the one, which links the communication process to this
_________________
60.
61.
62.
63.
64.
65.
a.
Hardware-oriented protocol
b.
Software-oriented protocol
c.
Both a & b
d.
None of these
Which is collectively known as a protocol data unit(PDU)
a.
Data
b.
Header
c.
Both a & b
d.
None of these
The seventh layer does not deal with __________ concepts very much
a.
Hardware
b.
Even operating system
c.
Both a & b
d.
None of these
The basic philosophy of the seven-layer model is that each layer may be defined
a.
Dependently of every other layer
b.
Independently of every other layer
c.
Dependent on same layer
d.
None of these
The seven layers of the OSI model are categorized into ________ groupings
a.
2
b.
3
c.
4
d.
5
The lower layers are layers
a.
1,2,3
b.
1,2,3,4
c.
1,2,3,4,5
d.
2,3,4,5,6
The upper layers are layers
a.
5,6
b.
5,7
c.
6,7
d.
5,6,7
66.
The lower layers are implemented by using ______________ with the incidence of
hardware ‘reducing’ to software from layer 1 to layer 4
a.
Software
b.
Hardware
c.
Both a & b
d.
None of these
e.
67.
68.
The upper layers are not expected to know anything about ____________
a.
Networking
b.
Network addresses
c.
Both a & b
d.
None of these
The bottom four layers take the responsibility of _________________
a.
Networking
b.
Network addresses
c.
Both a & b
d.
None of these
e.
69.
The OSI interface is a process of communication between adjacent layers in which
data is passed between
70.
a.
Layer n
b.
Layer n-1
c.
Layer n+1
d.
All of these
The layers 3 and 4 interface are used by protocol to _____________
a.
Pass control
b.
Pass Data information
c.
Both a & b
d.
None of these
71.
This refers to communication up and down the protocol stack every time any data is
sent received across the network
a.
Vertical communication
b.
Horizontal communication
c.
Protocols
d.
OSI interfaces
72.
Which is a communication process running at a particular layer on one host machine
can accomplish logical communication with a similar process running at the same layer on
another host machine
a.
Vertical communication
b.
Horizontal communication
c.
Protocols
d.
OSI interfaces
73.
Which OSI model supports the interconnection of different implementations of
various autonomous layers
a.
Modularity
b.
Inter-layer interactions
c.
Both a & b
d.
None of these
e.
74.
The functions of the OSI layer model are
1
2
Layers
Physical
Data link
3
Network
4
Transport
5
Session
Functions
It moves bits between devices by using media
It tends to assemble packets into bytes and bytes into frames
and provides access to media by using MAC address
It is responsible for providing logical addressing which
routers use for path determination and routing
It provides reliable or unreliable delivery and performs error
correction before retransmit. It is also responsible for endto-end connection
It aims to keep different applications data separately and
6
Presentation
7
Application
75.
76.
77.
78.
79.
provides dialog control
It provides rules to present data, handle processing like
encryption, compression and translation services
It aims to provide a user interface like file, print, message,
database and application services
A number of transmission media exist, some of them are
a.
Open wire circuits
b.
Twisted pair cables
c.
Coaxial cables
d.
Fiber optic cables
e.
Wireless
f.
All of these
The physical layer specifies the representation of each bit as a
a.
Voltage
b.
Current
c.
Phase or frequency
d.
All of these
The physical layer uses four types of bit signaling approaches these are
a.
RZ(return to zero) by using pulse signaling
b.
NRZ(non return to zero) transmission by using level signaling
c.
Manchester encoding by using phase signaling
d.
NRZ-I(non return to zero-invertive) by using bandwidth
e.
All of these
What are the two types of systems that are used to provide timing signal
a.
Asynchronous communications
b.
Synchronous communications
c.
Both a & b
d.
None of these
The timing signal identifies the boundaries between the
a.
Bytes
b.
Bits
c.
Gigabyte
d.
Megabyte
80.
Which bit stream is to be transmitted with the objective that when the sending side
sends _____ bit
a.
1
b.
0
c.
1,0
d.
None of these
81.
Which bit stream is to be transmitted with the objective that when the received by
the receiving side as 1 bit, not as ___ bit
a.
1
b.
0
c.
1,0
d.
None of these
82.
It defines the electrical and mechanical aspects of interfacing to a physical medium
for transmitting data ________________________________
83.
a.
As well as setting up
b.
Maintaining
c.
Disconnecting physical links
d.
All of these
The functions of the physical layer are
a.
Describing hardware specifications
b.
Encoding and signaling
c.
Data transmission and reception
d.
All of these
84.
The physical layer supports various encoding and signaling functions to convert
data, from bit stream to frame and vice versa, to send across the network
85.
86.
a.
Describing hardware specifications
b.
Encoding and signaling
c.
Data transmission and reception
d.
None of these
What is an example of a physical layer definition
a.
RS-323C/D
b.
RS-232C/D
c.
RS-233C/D
d.
RS-322C/D
Examples of data link layers are
a.
HDLC
b.
Ethernet
c.
Both a & b
d.
87.
88.
as
89.
90.
91.
None of these
The functions of the data link layer are
a.
Logical Link control(LLC)
b.
Media Access Control(MAC)
c.
Data framing
d.
Addressing
e.
Error detection and handling
f.
All of these
The data link layer also deals with the issue of addressing what is popularly known
a.
Hardware
b.
Address
c.
MAC address
d.
All of these
Some of the examples of MAC are
a.
CSMA/CD for Ethernet
b.
Token passing for the Token Ring network
c.
Both a & b
d.
None of these
The functions of the Network layer are
a.
Logical addressing
b.
Routing
c.
Datagram encapsulation
d.
Fragmentation and reassembly
e.
All of these
The routing of network layer may be
a.
Static
b.
Dynamic
c.
Both a & b
d.
None of these
e.
92.
The network layer uses which service for delivering packets across the network
a.
Connection-oriented
b.
Connectionless service
c.
Both a & b
d.
None of these
93.
In broadcast network ,the routing problem is ________, so the network layer is
often thin or even nonexistent
a.
Complex
b.
Simple
c.
Both a & b
d.
None of these
94.
The transport layer provides the necessary function to enable communication
between _____________ processes on different computers
a.
Software application
b.
Hardware application
c.
Both a & b
d.
None of these
e.
95.
The transport layer accepts data from the ______ and splits it up into smaller units
so that it can be passed to the network layer
96.
97.
a.
Network layer
b.
Session layer
c.
Presentation layer
d.
Physical layer
Which protocol uses the transport layer
a.
FTP
b.
TFTP
c.
HTTP
d.
TCP/IP
The functions of transport layer are
a.
Process-level addressing
b.
Multiplexing and de-multiplexing
c.
Segmentation, packaging and reassembly
d.
Connection establishment , management and termination
e.
Acknowledgements and retransmission
f.
Flow control
g.
All of these
98.
The session layer is responsible for _______________ the dialogues between
communicating applications
a.
Establishing
b.
Maintaining
c.
Arbitrating
d.
All of these
e.
99. The session layer provides enhanced useful services in some applications such as
100.
a.
Remote login
b.
Remote file transfer
c.
Both a & b
d.
None of these
Some examples of APIs are
a.
NetBIOS
b.
TCP/IP sockets
c.
Remote Procedure Calls (RPCs)
d.
All of these
101.
Which enable an application to complete specified high level communications over
the network successfully and easily with the help of a standardized set of services
a.
RPCs
b.
APIs
c.
d.
102.
103.
TCP/IP
All of these
The data link layer is also known as
a.
Link layer
b.
Data layer
c.
Open layer
d.
None of these
Some example of data link layers are
a.
HDLC
b.
Ethernet
c.
Both a & b
d.
None of these
104.
Which provides link to many wireless and wired local area networking (LAN) like
Ethernet ,FDDI, IEEE802.11 etc to function
105.
106.
a.
Physical layer
b.
Data link layer
c.
Transport layer
d.
Presentation layer
Which layer is responsible for the reliable transfer of data across the physical link
a.
Physical layer
b.
Data link layer
c.
Transport layer
d.
Presentation layer
The responsibility of data link layer include functions such as
a.
Data flow control
b.
Breaking the input data
c.
Frame formatting
d.
Transmission of the frame sequence
e.
Error detection
f.
Link management
g.
All of these
107.
Which layer performs functions relative to the syntax and semantics of the
information transmitted
108.
a.
Physical layer
b.
Data link layer
c.
Transport layer
d.
Presentation layer
The types of data handling issue that presentation layer provides are as follows
a.
Translation
b.
Compression
c.
Encryption
d.
All of these
109.
In translation, different types of computers like _____________in an Inter-network
have many distinct characteristics and represent data in different ways
a.
PCs
110.
111.
112.
113.
b.
Macintoshes
c.
UNIX systems
d.
AS/400 servers
e.
All of these
Which layer allows the user to use the network
a.
Physical layer
b.
Data link layer
c.
Application layer
d.
Presentation layer
The application layer provides network-based services to the user are
a.
Distributed database
b.
Electronic mail
c.
Resource sharing
d.
File transfer
e.
Remote file access
f.
Network management
g.
All of these
Which layer provides user interface to communicate with a computer
a.
Physical layer
b.
Application layer
c.
Transport layer
d.
Presentation layer
The most popular application layer protocols are
a.
HTTP, FTP
b.
SMTP, DHCP
c.
NFS, Telnet
d.
SNMP, POP3
e.
NNTP, IRC
f.
All of these
114.
Which model is considered the oldest protocol of all computer networks like the
ARPANET and its successor, the Internet
a.
TCP/IP Reference model
b.
SMTP model
c.
Telnet model
d.
NNTP model
e.
115.
Most users rely on ______ for the purpose of file transfers, electronic mail(e-mail)
and remote login services
a.
TCP/IP
b.
SMTP
c.
DHCP
d.
NFS
e.
116.
117.
118.
119.
How many layers TCP/IP model has
a.
2
b.
3
c.
4
d.
5
TCP/IP layer specifies the __________ layer
a.
Physical layer
b.
Application layer
c.
Transport layer
d.
Presentation layer
TCP/IP defines a four-layer model consisting of the
a.
Internet layer
b.
Transport layer
c.
Application layer
d.
Network interface layer
e.
All of these
TCP/IP architecture is based on the three sets of interdependent processes are
a.
Application-specific processes
b.
Host-specific processes
c.
Network-specific processes
d.
All of these
120.
Which TCP/IP standards define protocols for TCP/IP networks for layer two
implementation to fill the gap between the network layer and the physical layer
a.
Serial Line Internet Protocol(SLIP)
121.
122.
123.
124.
b.
Point-to-Point Protocol(PPP)
c.
Both a & b
d.
None of these
The Internet layer of the TCP/IP matches with the which layer of the OSI model
a.
Network layer
b.
Physical layer
c.
Session layer
d.
Data link layer
The Packet format and protocol at internet layer is called
a.
Network protocol
b.
Internet protocol
c.
OSI protocol
d.
None of these
Which protocols are found in a Internet Layer of TCP/IP model
a.
IP
b.
ICMP
c.
RIP
d.
BGP
e.
All of these
Which protocols are found in a Network interface Layer of TCP/IP model
a.
Ethernet
b.
FDDI
c.
Token Ring
d.
All of these
e.
125.
126.
Which protocols are found in a Transport Layer of TCP/IP model
a.
TCP
b.
UDP
c.
FDDI
d.
Both a & b
Which protocols are found in a Application Layer of TCP/IP model
a.
FTP
b.
TFTP
127.
c.
SMTP
d.
NFS
e.
TELNET
f.
SNMP
g.
All of these
h.
None of these
The UDP Protocols are
a.
Reliable
b.
Connection-oriented
c.
Connectionless
d.
Unreliable
i. Both a & b
ii. Both c & d
iii. None of these
128.
129.
130.
Which protocols are found in the application layer
a.
Numerous
b.
UDP
c.
TCP
d.
IP
Which other function include __________________and identification of port number
a.
Sequence control
b.
Error recovery and control
c.
Flow control
d.
All of these
TCP layer is a
a.
Service
b.
Connection type service
c.
Connectionless type service
d.
None of these
131.
The basic functions of application layer are _____________ that wish to
communicate with one another
a.
To identify the source machine
b.
To identify the destination machine
c.
Both a & b
d.
None of these
132.
133.
The Internet has definite standards for FTP that connects to a
a.
Remote machine
b.
Sends an arbitrary file
c.
Fetches an arbitrary file
d.
All of these
FTP addresses the
a.
Issues of authentication
b.
Listing of directory contents
c.
ASCII or binary files
d.
All of these
134.
Another aspect of the application layer is to __________ ,this application is called
telnet
135.
a.
Login remotely
b.
Logout
c.
Remotely
d.
None of these
TCP connection with another location and then pass keystrokes from the _______
a.
Remote host to local host
b.
Local host to remote host
c.
remote host to remote host
d.
Local host to Local host
136.
Similarly, there are many other applications such as NNTP enabling communication
between a ___________
137.
a.
News server
b.
News client
c.
Web(HTTP)-based protocol for communication on the WWW
d.
All of these
FTP is among the oldest protocols used in the_____
a.
Internet
b.
Web
c.
Both a & b
d.
None of these
138.
Which is a file server access protocol that enables a user to transfer files between
two hosts
a.
SMTP
b.
TCP
c.
FTP
d.
NNTP
139.
FTP is widely available on almost all-browsers indicating that all computing
platforms, including _________
140.
a.
DOS
b.
OS/2
c.
UNIX and up to the mainframe level have this service available
d.
All of these
Which dose not require any familiarity with the remote operating system
a.
SMTP
b.
TCP
c.
FTP
d.
NNTP
e.
141.
142.
Modern FTP servers known as _______
a.
TCPD
b.
FTPD
c.
SMTD
d.
CTPD
FTPD support two different TCP connections namely_______
a.
Control connection
b.
Data connection
c.
Both a & b
d.
None of these
e.
143.
144.
Which is invoked for the entire duration of transfer of file or FTP session
a.
Control connection
b.
Data connection
c.
Both a & b
d.
None of these
Which connection is establish as and when it is required
a.
Control connection
b.
Data connection
c.
Both a & b
d.
None of these
e.
145.
The main function of data connection is to facilitate transfer of file and directory
to and from the________
146.
a.
Clients at the server’s request
b.
Clients at the client’s request
c.
Server at the server’s request
d.
Server at the client’s request
TFTP stands for
a.
Transfer file trivial protocol
b.
Transfer file transfer protocol
c.
Trivial file trivial protocol
d.
Trivial file transfer protocol
147.
Which is also an internet service intended for the transfer of files from one
computer to another over a network
148.
149.
150.
a.
TFTP
b.
FTP
c.
Both a & b
d.
None of these
TFTP does not provide _____________
a.
Password protection
b.
User directory capability
c.
Both a & b
d.
None of these
TFTP is simpler than the ___________ but less capable
a.
FTP
b.
SMTP
c.
NNTP
d.
FTPD
Which is one of the most popular network services
a.
Electronic message
b.
Electronic mail
c.
Electric mail
d.
None of these
e.
151.
152.
153.
Electronic mail works like an
a.
Post mail
b.
Postal mail
c.
Post card
d.
None of these
E-mail has two parts namely
a.
User agent
b.
Message Transfer agent
c.
Both a & b
d.
None of these
MTA stands for
a.
Message Transmission Agent
b.
Machine Transfer Agent
c.
Message Transfer Agent
d.
Mobile Transfer Agent
154.
Which is a software package that transports the message created by a user to
destination mailboxes possibly on remote machines
155.
a.
User agent
b.
MTA
c.
Both a & b
d.
None of these
The MTA has to perform more complex jobs than other applications
a.
MTA distinguishes between local and remote recipients
b.
MTA needs to deliver copies of a message to several machines
c.
MTA allows mixing of text, voice appending documents, files and video in a
message
d.
MTA handles temporary failures when a destination machine is temporarily
unavailable
e.
156.
157.
All of these
In MTA, e-mail address consist of the following components
a.
Mailbox names
b.
Symbolic names
c.
Group names(mail exploders)
d.
All of these
Which is the user interface to the mail system
158.
a.
User agent
b.
MTA
c.
Both a & b
d.
None of these
Which refers to the name of a service rather than a specific user
a.
Mailbox names
b.
Symbolic names
c.
Group names(mail exploders)
d.
All of these
159.
Which refers to an alias for a set of recipients, that consults an internal database to
specify the mail addresses
a.
Mailbox names
b.
Symbolic names
c.
Group names(mail exploders)
d.
All of these
160.
There are a number of e-mail packages available. Some of them are free like
____________________, while some are paid
a.
Google mail
b.
Yahoo mail
c.
Hotmail
d.
All of these
161.
In MTA, all of them are also not alike but most of the e-mail software have common
basic functionality these are
162.
a.
Send and receive mail messages
b.
Save your messages in a file
c.
Print mail messages
d.
Forward a mail message to other recipients
e.
Reply to mail messages
f.
Attach a file to a mail message
g.
All of these
E-mail address has three parts
a.
A user identity or name
b.
An ‘at’ sign(@)
c.
The domain name, which basically specifies the address of the user’s mail
server
d.
163.
All of these
SMTP is the ________ standard for an electronic mail service provider
a.
dee facto
b.
de facto
164.
165.
166.
167.
168.
c.
de fact
d.
none of these
SMTP uses ______ transport for the reliably delivery of mail messages
a.
FTP
b.
TCP
c.
MTA
d.
FTPD
The SMTP server also allows _____
a.
NNTP
b.
Telnet service
c.
FTPD
d.
none of these
SMTP can be considered as a complement of ______
a.
UUDP
b.
UUCP
c.
UCCP
d.
UCPD
SMTP commands consist of human-readable __________
a.
EBCDIC strings
b.
ASCII strings
c.
Both a & b
d.
None of these
MIME stands for
a.
Multipurpose Internet Machine Extensions
b.
Multiprogramming Internet Machine Extensions
c.
Multipurpose Internet Mail Extensions
d.
Multipurpose Internet Mail Exchange
169.
________ standards were used to encode binary files for transfer through SMTP,
which has now become a standard with its varied version
a.
FTPD
b.
FTP
c.
MIME
d.
UUCP
e.
170.
171.
172.
173.
174.
POP3 stands for
a.
Postal Office Protocol
b.
Post Office Protocol
c.
Post Office Program
d.
Posting of Protocol
IMAP stands for
a.
Internet Machine Access Protocol
b.
Internet Message Access Protocol
c.
Internet Multipurpose Access Protocol
d.
Inkjet Message Access Protocol
Which one is a push kind of protocol
a.
SMTP
b.
POP3
c.
IMAP
d.
All of these
Which one is a pull kind of protocol
a.
SMTP
b.
POP3
c.
IMAP
d.
Both b & c
Telnet can also be used to connect other ports serving as _____________
a.
User-defined services
b.
Well-known services
c.
Both a & b
d.
None of these
175.
Telnet works as a _____________ model where it establishes a virtual connection
by using the TCP transport protocol
a.
User-defined
b.
Well-known
c.
Client-server
d.
All of these
e.
176.
The Telnet program requires two arguments
a.
The name of a computer on which the server runs
177.
b.
The protocol port number of the server
c.
Both a & b
d.
None of these
______________ to support centralized terminal management can support
a.
Transfer binary data
b.
Support byte macros
c.
Emulate graphics terminals
d.
Convey information
e.
All of these
178.
Telnet service is unique in the manner that is ___________ like other TCP/IP
services
179.
a.
Platform-specific
b.
Not platform-specific
c.
Platform-service
d.
None of these
0Some of the Telnet commands are as follows
Interrupt Process(IP)
Abort output(AO)
Are You there(AYT)
Erase character(EC)
Erase line(EL)
Synchronize
Break
It terminates the running program
It refers to discarding of any buffered output
This command allows a client to send an out-of-band query to
verify whether the remote end is still there
It refers to the erasing of the previous character
It deletes the entire current line
It clears the data path to the remote party
It is equivalent to the BREAK or ATTENTION key
180.
Novell NetWare is a ___________ network operating system that was created by
Novell, Inc
181.
182.
a.
Client type
b.
Server type
c.
Both a & b
d.
None of these
Novell NetWare uses a protocol stack having _____
a.
3 layers
b.
4 layers
c.
5 layers
d.
6 layers
IPX stands for
a.
Internet Packet Exchange
b.
Inter-network Packet Exchange
c.
Inter-network Protocol Exchange
d.
Internet Package Exchange
183.
_______ is a networking protocol used by the Novell NetWare operating systems for
performing connectionless communication
184.
185.
a.
NVT
b.
IPX
c.
IP
d.
FTP
The rise 1985 saw the rise of Novell NetWare when _____________ were launched
a.
NetWare 286 2.0a
b.
Intel 80,286 16-bit processor
c.
Both a & b
d.
None of these
Two methods of operation were supported by NetWare 286 2.x namely are
a.
Dedicated
b.
Non-dedicated
c.
Both a & b
d.
None of these
e.
186.
Beginning with NetWare 3.x, assistance for _____ protected mode was included,
removing the 16MB memory limit of NetWare 286
a.
16-bit
b.
32-bit
c.
64-bit
d.
128-bit
187.
Which managed all functions and was activated at startup or at the time of
requirement
188.
a.
NLM(NetWare Loadable Module)
b.
FTP
c.
SMTP
d.
FTPD
A set of protocols used in the communication network can be termed as
a.
Protocol
b.
Protocol stack
c.
Protocol layer
d.
None of these
e.
189.
According to RFC 1122 the TCP/IP consists of ________
a.
2 layers
b.
3 layers
c.
4 layers
d.
5 layers
e.
190.
The lowest layers of the TCP/IP establishes communication with
a.
Upper layer
b.
Physical media
c.
Next layer
d.
Protocol
191.
When data travels downwards from upper the layer in TCP/IP, each upper layer
attaches a
a.
Footer
b.
Header
c.
Standard
d.
None of these
e.
192.
After the transmission of data in bit form to another machine it travels upward,
____________ the header till data reaches the application layer
a.
Stripping in
b.
Stripping off
c.
Tackling off
d.
Tackling in
e.
193.
194.
In which year, Netware directory service were added to the Netware version 4
a.
1993
b.
1996
c.
1998
d.
2001
In which year. Version 4.11 was launched by Novell
195.
196.
a.
1993
b.
1996
c.
1998
d.
2001
In which year, NetWare5 was launched in October
a.
1993
b.
1996
c.
1998
d.
2001
In which year, NetWare6 was launched
a.
1993
b.
1996
c.
1998
d.
2001
e.
197.
Every protocol with a certain from of contact is known as
a.
Protocol stack
b.
Protocol suite
c.
Stack
d.
Suite
198.
Which is a file server access protocol that enables a user to transfer file between
two hosts, across the network or Internet using TCP
a.
FTPD
b.
FTP
c.
Telnet
d.
PPP
199.
Which is a remote terminal protocol that enables a user at one location to
establish a TCP connection with another location
a.
FTPD
b.
FTP
c.
Telnet
d.
PPP
200.
Which protocol is used by network computers operating system for sending error
messages
a.
b.
c.
d.
FTPD
FTP
Telnet
ICMP
Data Communication And Networks 02
1.
A computer network permits sharing of
a.
Resources
b.
Information
c.
Both a & b
d.
None of these
2.
The first operational computer network in the world was the _________ for the
United States Department of Defense
a.
ARPANET
b.
ERNET
c.
SKYNET
d.
DARPANET
e.
3.
ATM stands for
a.
Automatic taller machine
b.
Automated teller machine
c.
Automatic transfer machine
d.
Automated transfer machine
4.
_______ is the technology that connects the machines and people within a site in a
small area
a.
LAN
b.
MAN
c.
WAN
d.
None of these
5.
______ is a network that covers geographic areas that are larger, such as districts
or cities
a.
LAN
b.
MAN
c.
WAN
d.
None of these
e.
6.
7.
______ is a network that this technology connects sites that are in diverse locations
a.
LAN
b.
MAN
c.
WAN
d.
None of these
______ is a collection of point-to-point links that may form a circle
a.
LAN
b.
MAN
c.
WAN
d.
Ring topology
8.
______ refers to tone signals used for various control purposes via the telephone
network
9.
10.
a.
SMS
b.
DTMF
c.
GSM
d.
None of these
LAN is a network that is restricted to a relatively
a.
Small area
b.
Large area
c.
Both a & b
d.
None of these
The components used by LANs can be categorized into
a.
Hardware
b.
Cabling protocols
c.
Standards
d.
All of these
e.
11.
The various LAN protocols are
a.
Ethernet
b.
Token ring
c.
Both a & b
d.
None of these
12.
The Institute of Electrical and Electronics Engineers established a project named
IEEE project 802 during the year _____
13.
14.
____
15.
a.
1990
b.
1970
c.
1980
d.
1960
In 1985, the committee issued a set of ___ standards
a.
2
b.
3
c.
4
d.
5
ISO revised these standards and reintroduced them as ISO 8802 standards during
a.
1977
b.
1987
c.
1997
d.
1999
The following are the important standards proposed by IEEE
a.
IEEE 802.1- overview and relationship among the various IEEE standards
b.
IEEE 802.3 or CSMA/CD bus
c.
IEEE 802.4 or token bus
d.
IEEE 802.5 or token ring
e.
IEEE 802.6 or MAN protocol
f.
All of these
16.
When compared with the OSI reference model, the IEEE standard contains the
following layers:
a.
Physical layer
b.
Medium access control(MAC) equivalent to the lower part of the OSI data
link layer
c.
Logical link layer(LAC) equivalent to the upper part of the data link layer
d.
Network layer, the OSI network layer, that performs some of the higher
order layer functions
e.
17.
All of these
The 802.2 compatible interfaces provide two major types of services, which are
a.
Unacknowledged
b.
Connectionless
18.
c.
Both a & b
d.
None of these
The ________ follows the ring topology
a.
IBM of LAN
b.
LAN of IBM
c.
Both a & b
d.
None of these
e.
19.
In a token ring, the stations are connected to the __________
a.
Logical ring
b.
Physical ring
c.
Both a & b
d.
None of these
e.
20.
21.
22.
23.
A _________ preamble is used to synchronize the receiver’s clock
a.
Four-byte
b.
Three-byte
c.
Two-byte
d.
One-byte
Start of frame and end of frame are used to _______ the frame boundaries
a.
Mark
b.
Modify
c.
Delete
d.
Find
Frame control is also used to specify the ________
a.
Frame technique
b.
Frame type
c.
Both a & b
d.
None of these
The destination address and source address field is similar to
a.
IEEE 802.3 or CSMA/CD bus
b.
IEEE 802.4 or token bus
c.
IEEE 802.5 or token ring
d.
IEEE 802.6 or MAN protocol
24.
25.
26.
27.
Info field is used to ________
a.
Send messages
b.
Send data
c.
Delete data
d.
Create data
The maximum length of this field is _______ when the address is _______
a.
8182 & 2 bits
b.
8182 & 2 bytes
c.
8182 & 4 bits
d.
8182 & 4 bytes
The maximum length of this field is _______ when the address is _______
a.
8174 bytes & 6 bits
b.
8174 bytes & 6 bytes
c.
8174 bytes & 8 bytes
d.
8174 bits & 6 bytes
Check sum is used for
a.
Error correction
b.
Error detection
c.
Both a & b
d.
None of these
e.
28.
29.
Solicit-successor frame contains the address of the
a.
Sending station
b.
Successor
c.
Both a & b
d.
None of these
Government agencies and local libraries often use a MAN to connect to private
a.
Industries
b.
Citizens
c.
Both a & b
d.
None of these
e.
30.
The geographical limit of a MAN may
31.
32.
33.
34.
a.
Not span a city
b.
Span a city
c.
Either span or not
d.
None of these
In MAN, different LANs are connected through a local _______
a.
Telephone exchange
b.
Computer wires
c.
Both a & b
d.
None of these
Some of the widely used protocols for MAN are
a.
RS-232
b.
X.25
c.
Frame relay
d.
Asynchronous transfer mode(ATM)
e.
ISDN
f.
OC-3lines(155 Mbps)
g.
ADSL(asymmetric digital subscriber line)
h.
All of the above
MAN stands for
a.
Machine area network
b.
Metropolitan area network
c.
Metropolitan asynchronous network
d.
Machine asynchronous network
WAN technologies function at the lower three layers of the OSI reference model
a.
Physical layer
b.
Data link layer
c.
Network layer
d.
All of these
e.
35.
WAN also uses switching technology provided by ____________
a.
Local exchange
b.
Long distance carrier
c.
Both a & b
d.
Small distance carrier
36.
Packet switching technologies such as _____________ are used to implement WAN
along with statistical multiplexing
37.
a.
ATM
b.
Frame relay
c.
Switched multimeagabit data service
d.
X.25
e.
All of these
MAN uses only a
a.
Long exchange
b.
Local carrier
c.
Both a & b
d.
None of these
e.
38.
In MAN, a network is accomplished using components
a.
Hardware
b.
Protocols
c.
Both a & b
d.
None of these
e.
39.
40.
In MAN, a network is accomplished using basic components
a.
Hardware
b.
Protocols(software)
c.
Applications(useful software)
d.
All of the above
The Internet(internetworking) ha become a potent tool for
a.
Education
b.
Productivity
c.
Enlightenment
d.
All of these
41.
The Government of India had set up ERNET in ______ to provide TCP/IP connections
for education and research communities in India
a.
1976
b.
1986
c.
1996
d.
1999
42.
The liberalized policies encouraged many private players like
a.
DISHNET
b.
JAINTV
c.
Mantra online
d.
All of these
43.
The other government organizations like _______________ to enter this field to
bring the Internet to common people
a.
NIC
b.
VSNL
c.
MTNL
d.
All of the above
e.
44.
The major network infrastructure available in the country has two types of WAN
a.
Terrestrial WAN
b.
VSAT WAN
c.
Both a & b
d.
None of these
e.
45.
Following are different options for setting up the Intranet, education portal or ecommerce, etc………….
46.
47.
a.
Leased line
b.
Dial Up connection
c.
VSAT
d.
Radio link
e.
All of the above
The networks can be broadly divided into three categories namely
a.
LAN for a single building
b.
MAN- single city
c.
WAN-country, continent and planet
d.
All of the above
The host to terminal connection is a conventional type of connection between
a.
Main frame
b.
Dumb terminals
c.
Both a & b
d.
None of these
48.
49.
TC means
a.
Terminal Computer
b.
Terminal Controller
c.
Technical Computer
d.
None of these
A collection of interconnected networks is known as
a.
Internetwork
b.
Internet
c.
Network
d.
None of these
e.
50.
The type of packet format supported by X.25 are as follows
a.
Control packet
b.
Data packet
c.
Both a & b
d.
None of these
51.
A terminal controller may be used to integrate two or more terminals for
connection with a
52.
53.
a.
Low speed line
b.
High speed line
c.
Single WAN line
d.
Both a & b
ISDN stands for
a.
Integrated Service Digital Network
b.
Interaction System Digital Network
c.
Inexpensive System Digital Network
d.
None of these
For LAN to LAN connection, which are mainly used
a.
ISDN
b.
Leased Line
c.
Frame relay
d.
All of these
e.
54.
Which function allows selection of the appropriate route based on IP header
information and sends packets through this route
a.
Forwarding function
b.
Filtering function
c.
Both a & b
d.
None of these
55.
Which function allows dumping of invalid packets for a specific network instead of
forwarding
56.
57.
58.
a.
Forwarding function
b.
Filtering function
c.
Both a & b
d.
None of these
Routing in the same network may be termed as
a.
Local routing
b.
Static routing
c.
Dynamic routing
d.
Distributing routing
The routing table possessed by a router includes
a.
Combination of destination address
b.
Next hops that corresponds to that address
c.
Both a & b
d.
None of these
If there is a fixed route information to each router, is called
a.
Fixed routing
b.
Dynamic routing
c.
Both a & b
d.
Distributed routing
59.
If routing information is automatically updated by routers when changes are made
to the network configuration are called
a.
b.
Fixed routing
c.
Dynamic routing
d.
Both a & b
e.
Distributed routing
60.
The processing required to transferring a packet from the source host to the
destination host or to the relaying router are called
a.
Fixed routing
b.
Dynamic routing
c.
Local routing
d.
Distributed routing
e.
61.
ARP stands for
a.
Address Resolution Protocol
b.
Address Routing Protocol
c.
Address Routing Packet
d.
Address Routing Program
62.
If two or more routers are connected to the same subnet, the network
administration determines which of the routers the messages should be sent to.. to
eliminate this problem._____ are used
a.
MAC messages
b.
ICMP messages
c.
INDP messages
d.
IMCP messages
e.
63.
If two or more routers are available in distributed routing, which route should
be selected
64.
65.
a.
High possible cost
b.
Least possible cost
c.
Link cost
d.
Both b & c
If there is no any specific intention, the cost for a single link is usually set at ___
a.
1
b.
2
c.
3
d.
4
Multi-path routing can be achieved in
a.
Distance-vector type
b.
Link-state type
c.
Both a & b
d.
None of these
66.
If there are two or more routes to reach the same destination at the same cost,
which method is applicable to determine how to select this route
67.
a.
Round robin method
b.
Random selection method
c.
Mixed method
d.
All of these
The Mixed method remains _________ for the amount of processing required
a.
Effective
b.
Ineffective
c.
Both a & b
d.
None of these
68.
A set of networks interconnected by routers within a specific area using the same
routing protocol is called
69.
70.
71.
72.
a.
Domain
b.
Backbone
c.
Inter-domain router
d.
All of these
A network composed of inter-domain router is called
a.
Domain
b.
Backbone
c.
Inter-domain router
d.
All of these
A router within a specific domain is called
a.
Domain
b.
Backbone
c.
Inter-domain router
d.
All of these
Two or more domains may be further combined to form a
a.
Domain
b.
Backbone
c.
Inter-domain router
d.
Higher-order domain
Each domain is also called
a.
Operation domain
b.
Backbone
c.
Inter-domain
d.
All of these
e.
73.
Routing protocol in such an internet system can be broadly divided into two types
named
74.
75.
76.
77.
78.
a.
Intra- domain routing
b.
Inter- domain routing
c.
Both a & b
d.
None of these
To communication between two or more domains, which are used
a.
Intra- domain routing
b.
Inter- domain routing
c.
Both a & b
d.
None of these
Some Intra-domain protocols are
a.
RIP(Routing Information Protocol)
b.
OSPF(Open Shortest Path First)
c.
IS-IS(Intermediate System to Intermediate System )
d.
All of these
________ are the algorithms are available to update contents of routing tables
a.
Distance-Vector Protocol
b.
Link-State Protocol
c.
Both a & b
d.
None of these
Distance vector protocols are
a.
RIP
b.
IGRP(Interior Gateway Routing Protocol )
c.
Both a & b
d.
None of these
RIP stands for
a.
Routing Information Protocol
b.
Routing Intra Protocol
c.
d.
79.
80.
Route Intermediate Protocol
Resolution Information Protocol
The Link state protocol are
a.
OSPF(Open Shortest Path First)
b.
IS-IS(Intermediate System to Intermediate System)
c.
Both a & b
d.
None of these
In link state protocol, the load on router will be
a.
Small
b.
Large
c.
Medium
d.
None of these
e.
81.
For large load on router, the processing is
a.
Complex
b.
Simple
c.
Both a & b
d.
None of these
82.
Which protocol are used in link state type routing protocol developed for use in
large scale network
83.
84.
a.
OSPF(Open Shortest Path First)
b.
IS-IS(Intermediate System to Intermediate System)
c.
Both a & b
d.
None of these
The common part of OSPF packet format is
a.
Packet type
b.
Packet length
c.
Router ID
d.
Area ID
e.
Authentication type
f.
Authentication data
g.
Version
h.
Checksum
i.
Individual information part
j.
All of these
The router may be classified into three types named
85.
86.
87.
a.
Domain border router
b.
Internal router
c.
Area border router
d.
All of these
OSPF is a hierarchical routing composed of
a.
Intra-area routing
b.
Inter-area routing
c.
Inter-domain routing
d.
All of these
The word SLIP stands for
a.
Serial Line IP
b.
Standard Line IP
c.
Serial Link IP
d.
Standard Link IP
The word PPP stands for
a.
Point to Point Protocol
b.
Packet to Packet Protocol
c.
Point to Packet Protocol
d.
Packet to Point Protocol
88.
________ is used mainly for connection between LANs that are remotely located
from one another
a.
SLIP
b.
PPP
c.
Both a & b
d.
None of these
e.
89.
_________ is used for connection between routers or equipment that must be
highly reliable
90.
a.
SLIP
b.
PPP
c.
Both a & b
d.
None of these
The wireless LANs offers the obvious advantage of
a.
Avoidance of cabling cost
b.
Provide LAN capabilities in temporary quarters
91.
92.
c.
Both a & b
d.
None of these
The bandwidth of wireless radio LAN is
a.
24Mbps
b.
2 Mbps
c.
4 Mbps
d.
8 Mbps
The frequency range of wireless LAN is
a.
900 MHz bands
b.
2GHz bands
c.
5 GHz bands
d.
All of these
93.
A hub antennae is located at a _________ from where line-of-sight can be
established with the various terminal antennae.
94.
95.
96.
97.
a.
Highest point
b.
Lowest point
c.
Central point
d.
None of these
The effective throughput is more in the range of _________ per hub
a.
1 to 2 Mbps
b.
2 to 3 Mbps
c.
3 to 4 Mbps
d.
4 to 5 Mbps
PDA stands for
a.
Personal Device Assistant
b.
Pointer Description Assistant
c.
Personal Digital Assistant
d.
Personal Description Analog
USB stands for
a.
University System Bus
b.
Universal System Board
c.
University System Board
d.
University Serial Bus
_______ are wireless network standard with a data rate of only 2Mbps
98.
a.
IEEE802.11a
b.
IEEE802.11b
c.
IEEE803.11a
d.
IEEE803.11b
_______ are wireless network standard with a data rate of only11Mbps
a.
IEEE802.11a
b.
IEEE802.11b
c.
IEEE803.11a
d.
IEEE803.11b
99.
IEEE802.11a and IEEE802.11b have a distance limitation up to _____ from the
access point router
100.
101.
a.
1000feet
b.
100feet
c.
101feet
d.
110feet
IEEE802.11a and IEEE802.11b uses _____ band
a.
1.4GHz
b.
2.4GHz
c.
3.4GHz
d.
4.4GHz
________ technology allows speeds up to 54Mbps
a.
IEEE802.11g
b.
IEEE803.11a
c.
IEEE803.11b
d.
IEEE802.11a
e.
102.
________ allows the movement of device with or without user
a.
User mobility
b.
Device portability
c.
Both a & b
d.
None of these
e.
103.
A user can access to the same or similar telecommunication services at different
places
a.
User mobility
b.
Device portability
c.
Both a & b
d.
None of these
e.
104.
A number of mobile and wireless device are
a.
Sensor
b.
Mobile-phone
c.
PDA
d.
Embedded controller
e.
Pager
f.
Palmtop
g.
Notebook
h.
All of these
i.
105.
The availability of _________ made the wireless communication popular among the
masses.
106.
107.
108.
a.
Low cost microprocessor
b.
Digital switching
c.
Both a & b
d.
None of these
Cellular radio has another popular names as
a.
Cellular mobile
b.
Cellular phone
c.
Both a & b
d.
None of these
Radio is basically a device, which has
a.
Receiver
b.
Transmitter
c.
Both a & b
d.
None of these
Wireless communication can be carried out
109.
a.
Use of radio
b.
Without using radio
c.
Both a & b
d.
Without use of video
The term radio may be defined as consisting of ______________ of the signal
a.
Modulation
b.
Radiation
c.
Both a & b
d.
None of these
e.
110.
A transmitter and an antenna are used to ____________ the modulated signal
within radio spectrum
a.
Modulate
b.
Radiate
c.
Both a & b
d.
None of these
e.
111.
In telephone system as we know that a voice with bandwidth of approximately ____
modulates the current of a telephone line
a.
2kHz
b.
3 kHz
c.
4 kHz
d.
5 kHz
112.
Wireless ca be defined as the ____________________ by means of high frequency
electrical waves without a connecting wire
113.
a.
Radio transmission
b.
Reception of signals
c.
Both a & b
d.
None of these
The frequency of a cell may be ________ after the interference zone
a.
Reused
b.
Used
c.
Not be used
d.
114.
115.
116.
117.
118.
Not be reused
PSTN stands for
a.
Public Switched Transport Network
b.
Public System Transport Network
c.
Public System Transfer Network
d.
Public Switched Telephone Network
The radii of a cell may vary from ___________ in a building to a city
a.
One of meters to tens of kilometers
b.
Tens of meters to tens of kilometers
c.
Hundreds of meters to tens of kilometers
d.
Hundreds of meters to hundreds of kilometers
The shape of cell mat not be a ___________ and depends up on the environment
a.
Hexagon
b.
Circle
c.
Pentagon
d.
Both a & b
SDM stands for
a.
System Division Multiple
b.
System Division Multiplexing
c.
Space Division Multiplexing
d.
System Double Multiplexing
Frequencies for communication may vary from very high frequency to ________
a.
Medium range
b.
Microwave range
c.
Digital range
d.
None of these
e.
119.
120.
The signal may be analog or digital with _______
a.
Amplitude
b.
Frequency
c.
Phase modulation
d.
All of these
The multiplexing and access techniques are
a.
SDM(Space Division Multiplexing)
b.
FDM(Frequency Division Multiplexing)
c.
TDM(Time Division Multiplexing)
121.
122.
123.
d.
CDM(Code Division Multiplexing)
e.
All of these
The advantages of mobile communication may be looked into
a.
Higher capacity
b.
Higher number of users
c.
Less transmission power needed
d.
More robust
e.
Decentralized base station deals with interference
f.
Transmission area
g.
All of these
The disadvantages of mobile communication are
a.
Fixed network needed for the base stations
b.
Handover(changing from one cell to another) necessary
c.
Interference with other cells such as co-channel, adjacent-channel
d.
All of these
The important issues on wireless communication are
a.
Cell sizing
b.
Frequency reuse planning
c.
Channel allocation strategies
d.
All of these
124.
In the beginning around 1980, analog cellular telephone systems were developing in
___________
125.
126.
a.
USA
b.
UK
c.
Europe
d.
Japan
The proposed system was expected to meet certain as mentioned as
a.
Good subjective speech quality
b.
Low terminal and service cost
c.
Support for international terminals
d.
Spectral efficiency
e.
ISDN compatibility
f.
All of these
ETSI stands for
a.
European Telecommunication Standards Institute
b.
European Telephone Standards Institute
c.
European Telecommunication Systems Institute
d.
European Telecom Standards Institute
127.
GSM(Global System for Mobile Communication) is a _______ digital mobile
telephones standard using a combination Time Division Multiple Access(TDMA) and
FDMA(Frequency Division Multiple Access)
a.
First generation
b.
Second generation
c.
Third generation
d.
None of these
e.
128.
GSM provides only _______ data connection
a.
8.6kbps
b.
9.6kbps
c.
7.6kbps
d.
8.8kbps
129.
The uplink and downlink frequencies for GSM are different and therefore a channel
has a pair of frequencies _______ apart
130.
a.
70MHz
b.
80MHz
c.
90MHz
d.
60MHz
The separation between uplink and downlink frequencies are called
a.
Duplex distance
b.
Double distance
c.
Triplex distance
d.
None of these
131.
In a channel the separation between adjacent carrier frequencies is known as
channel separation which is _______ in case of GSM
132.
a.
100kHz
b.
200 kHz
c.
300 kHz
d.
400 kHz
The services supported by GSM are
a.
Telephony
b.
Fax and SMS
133.
134.
135.
136.
c.
Call forwarding
d.
Caller ID
e.
Call waiting
f.
All of these
GSM supports data at rates up to 9.6kbps on
a.
POTS(Plain Old Telephone Service)
b.
ISDN
c.
Packet Switched Public Data Networks
d.
Circuit Switched Public Data Networks
e.
All of these
The access methods and protocols for GSM may be from
a.
X.25
b.
X.32
c.
Both a & b
d.
None of these
There are basic types of services offered through GSM are
a.
Telephony or teleservices
b.
Data or bearer services
c.
Supplementary services
d.
All of these
The supplementary services are used to enhance the features of
a.
Bearer
b.
Teleservices
c.
Both a & b
d.
None of these
e.
137.
Dual tone signals are used for various control purposes via the
a.
Telephone network
b.
Different from dual pulses
c.
Both a & b
d.
None of these
138.
SMS(Short Message Service) is a message consisting of a maximum of ______
alphanumeric characters
a.
150
b.
160
c.
170
d.
180
139.
140.
141.
142.
143.
GSM supports ______ Group 3 facsimile
a.
CCIIT
b.
CCITT
c.
CCCIT
d.
CCTTI
Call forwarding is a ________________
a.
Telephony or teleservices
b.
Data or bearer services
c.
Supplementary services
d.
All of these
The other services of call forwarding are
a.
Cell broadcast, voice mail, fax mail
b.
Barring of outgoing and incoming calls conditionally
c.
Call hold, call waiting, conferencing
d.
Closed user groups
e.
All of these
GSM consists of many subsystems, such as the
a.
Mobile station(MS)
b.
Base station subsystem(BSS)
c.
Network and Switching subsystem(NSS)
d.
Operation subsystem(OSS)
e.
All of these
Which forms a radio subsystem
a.
Mobile station
b.
Base station subsystem
c.
Both a & b
d.
None of these
144.
The generic GSM network architecture which is composed of three subsystem
are__________
a.
Radio subsystem (RSS)
b.
Network and switching subsystem
c.
Operation subsystem
d.
All of these
145.
The RSS is basically consisting of radio specific equipment such as ____________ to
control the radio link
a.
Mobile station(MS)
b.
Base station subsystem(BSS)
c.
Both a & b
d.
146.
147.
148.
149.
None of these
The chief components of RSS are
a.
BSS
b.
Cellular layout
c.
Base station controller(BSC)
d.
All of these
SIM stands for
a.
System Identity Module
b.
Subscriber Identity Module
c.
Subscriber Identity Modem
d.
Subscriber Input Modem
MS contains a SIM card in the form of a very _______ inside the equipment
a.
Large chip
b.
Small chip
c.
Both a & b
d.
None of these
Cell site is defined as the location where _______________ are placed
a.
Base station
b.
Antennas
c.
Both a & b
d.
None of these
e.
150.
151.
Cells are the basic constituents of a cellular layouts with ________
a.
Cell sites
b.
Cell systems
c.
Cell forwarding
d.
None of these
A cell is simply represented by simple ____________
a.
Pentagon
b.
Hexagon
c.
Both a & b
d.
None of these
e.
152.
The size of cells in case of GSM and Personal Communication Service(PCS) are much
smaller in the range of _______
153.
154.
155.
a.
5Kms
b.
10Kms
c.
15Kms
d.
20Kms
The portions covered by the antenna are called
a.
Portions
b.
Sectors
c.
Cell sector
d.
None of these
The BTS or Base Transceiver Station is also called
a.
RBS
b.
PCS
c.
GSM
d.
SIM
BTS are housed with all radio equipments such as
a.
Antennas
b.
Signal processors
c.
Amplifiers
d.
All of these
e.
156.
157.
Base station may also be placed near center of cell and known as
a.
Excited cell
b.
Center excited cell
c.
Center cell
d.
None of these
The actual cell is the _____ hexagon, with the towers at the corners
a.
Red
b.
Blue
c.
Red and blue
d.
None of these
158.
159.
160.
161.
162.
Antenna always transmits inward to each cell and area served depends on
a.
Topography
b.
Population
c.
Traffic
d.
All of these
Network and switching subsystem is composed of the ________________
a.
Mobile Services Switching Center(MSC)
b.
Home Location Register(HLR)
c.
Visitor Location Register(VLR)
d.
All of these
The mobile stations(MS) communicates only via the
a.
BTS
b.
BSS
c.
BSC
d.
Um
A BTS is connected to a mobile station via the
a.
BTS
b.
BSS
c.
Abis interface with BSC
d.
Um interface
e.
Both c & d
The Um interface basically consists of _________ for wireless transmission
a.
FDMA
b.
TDMA
c.
CDMA
d.
All of these
163.
The FDMA involves the division up to the maximum of _______
bandwidth into 124 carrier frequencies spaced 200 kHz apart
a.
25MHz
b.
35MHz
c.
24MHz
d.
20MHz
164.
The FDMA channel are further divided in time with a burst period of approximately
_______ using a TDMA technique
a.
0.277ms
b.
0.377ms
c.
0.477ms
d.
0.577ms
165.
The eight burst period are grouped into a TDMA frame which forms the basic unit
for definition of
166.
167.
168.
169.
170.
a.
Physical channel
b.
Logical channel
c.
Both a & b
d.
None of these
One _______ is one burst period per TDMA frame
a.
Physical channel
b.
Logical channel
c.
Both a & b
d.
None of these
The more channel increases the
a.
GSM
b.
No of base station
c.
No of mobile station
d.
Transmitter power
The more channel decreases the
a.
GSM
b.
No of base station
c.
No of mobile station
d.
Transmitter power
The other popular name for MSC(Mobile Switching Center ) is
a.
BS(Base Station)
b.
MS(Mobile Switch)
c.
MTSO(Mobile Telecommunication Switching Office)
d.
Both b & c
MSC is connected to a ____________ at one end
a.
Mobile station
b.
Base station
171.
172.
173.
174.
175.
176.
c.
Transmitter station
d.
None of these
MSC is connected to a ____________ at other end
a.
MSCs
b.
PSTN
c.
ISDN
d.
None of these
MSCs acts as a __________
a.
Switching
b.
Local Switching exchange
c.
Remote Switching exchange
d.
None of these
The MSC also provides all the functionality such as
a.
Registration
b.
Handover
c.
Authentication
d.
Location updating
e.
Call routing to a roaming subscriber
f.
All of these
The MSC provided to establish link with other fixed networks termed as
a.
Local MSC
b.
Router MSC
c.
Gateway MSC
d.
Remote MSC
The main task of MSC are entrusted upon as
a.
Interworking function(IWF)
b.
Mobility management operations
c.
Data service unit(DSU)
d.
SS7
e.
All of these
Name the two chief databases
a.
Home location register(HLR)
b.
Visitor location register(VLR)
c.
Both a & b
d.
None of these
177.
Which has its main task as associated with MSC
a.
Home location register
b.
Visitor location register
c.
Both a & b
d.
None of these
e.
178.
IMEI stands for
a.
International mobile equipment identity
b.
International mobile equipment information
c.
Interworking mobile equipment information
d.
Interworking management equipment information
179.
Subscriber’s all administrative information along with the current location in GSM
network including in database of HLR are
a.
IMEI number
b.
Directory number
c.
Current city
d.
Last visited area
e.
The class of service subscriber
f.
All of these
180.
HLR keeps the ____________ of each mobile that belongs to the MSC to which it is
interacting
a.
Last location
b.
First location
c.
Current location
d.
None of these
181.
HLR performs the functions such as _____________ to subscribers at their current
locations by using user profile information
182.
a.
Delivery of calls
b.
Information and messages
c.
Both a & b
d.
None of these
HLR maintains user information in the form of
a.
Static information
b.
Dynamic information
c.
Both a & b
d.
None of these
183.
The static information is the
a.
International Mobile Subscriber Identity
b.
Service subscription information authentication key
c.
Account status
d.
All of these
184.
The dynamic information is the _________ area of the mobile subscriber which is
the identity of the currently serving VLR
185.
a.
Last location
b.
First location
c.
Current location
d.
None of these
The HLR handles SS7 transactions with both
a.
MSCs
b.
VLR nodes
c.
Both a & b
d.
None of these
e.
186.
VLR main tasks are association with
a.
MSC
b.
IMSI
c.
TMSI
d.
Roaming
e.
All of these
187.
In nutshell we can say that both the ___________work together to provide local
connections as well as roaming outside the local service area
a.
HLR
b.
VLR
c.
Both a & b
d.
None of these
e.
188.
The operations and Maintenance Center oversees the all important
for__________
a.
Proper operation
b.
Setup of the network
c.
Provides Telecommunication Management Network(TMN)
d.
All of these
189.
Operation Subsystem also provides interface NSS via O-Interface that may be
__________
a.
X.25 interface
b.
X.32 interface
c.
X.23 interface
d.
None of these
e.
190.
Authentications Center(AuC) is used for
a.
Authentication
b.
Security by generating authentication algorithms
c.
Cryptographic codes
d.
All of these
191.
AuC is responsible for maintaining all data needed to authenticate a call and to
encrypt __________________
192.
193.
194.
a.
Voice traffic
b.
Signaling messages
c.
Both a & b
d.
None of these
EIR stands for
a.
Equipment Identification Register
b.
Equipment Identification Remote
c.
Equipment Information Remote
d.
Equipment Information Register
EIR fulfills the ______________ requirement of GSM
a.
Security
b.
Authentication
c.
Both a & b
d.
None of these
SIM card has a secret key for ________________ over the radio channel
a.
Authentication
b.
Encryption
c.
Both a & b
d.
None of these
e.
195.
GSM network checks the __________________ of a mobile device through EIR
database
a.
Type
b.
Serial number
c.
Both a & b
d.
None of these
e.
196.
197.
EIR maintains a database of ______________
a.
Manufacturing devices
b.
Malfunctioning devices
c.
Functioning devices
d.
None of these
Um is the link between a
a.
Mobile station
b.
Base station
c.
Both a & b
d.
None of these
e.
198.
GSM 900 operates on a frequency range of _________ for uplink
a.
890-910MHz
b.
890-915MHz.
c.
890-901MHz
d.
890-911MHz
e.
199.
200.
201.
GSM 900 operates on a frequency range of _________ for downlink
a.
935-960MHz
b.
940-970MHz
c.
945-950MHz
d.
925-960MHz
FDM is used to ___________ the available frequency band in GSM
a.
Addition
b.
Divide
c.
Both a & b
d.
None of these
The GSM has many burst types such as
202.
203.
a.
Normal burst
b.
Access burst
c.
Synchronization burst
d.
Frequency correction burst
e.
Dummy burst
f.
All of these
The normal burst period lasts
a.
Approximately 577ms or 15/26ms
b.
Approximately 572ms
c.
Approximately 567ms
d.
Approximately 578ms
Which is provided to avoid overlap with other burst
a.
Frequency space
b.
Guard space
c.
Information space
d.
Bandwidth space
204.
Which is a dedicated time slots within a data or bit stream which repeats after a
certain period of time
205.
206.
a.
Frequency
b.
Amplitude
c.
Channel
d.
Normal burst
The channel can be further divided into
a.
Dedicated channel
b.
Common channel
c.
Both a & b
d.
None of these
Both the dedicated and common channel are allocated to a
a.
Base station
b.
Mobile station
c.
Mobile switch
d.
All of these
e.
207.
When a slot repeated every 4.615ms constitute a _______ channel which can be
split into several logical channel
208.
209.
210.
211.
a.
Logical
b.
Physical
c.
Both a & b
d.
None of these
TDMA is used to split carrier frequency of 200kHz into_______ time slots
a.
4
b.
8
c.
16
d.
24
GSM 900 has _____ physical full duplex channels
a.
125
b.
124
c.
248
d.
247
GSM 900 has _____ physical half duplex channels
a.
125
b.
124
c.
248
d.
247
Time slot is also known as
a.
Logical channel
b.
Physical channel
c.
Both a & b
d.
None of these
e.
212.
A Traffic Channel(TCH) is defined for speech and data at a rates of
a.
9.6kb/s
b.
4.8kb/s
c.
2.4kb/s
d.
All of these
e.
213.
The length of 24 TDMA frames are kept
214.
a.
120ms
b.
130ms
c.
150ms
d.
160ms
How many frames are included for traffic in 26TDMA frames
a.
1
b.
24
c.
25
d.
16
215.
How many frames are included for Slow Associated Control Channel(SACCH) in
26TDMA frames
216.
217.
a.
1
b.
24
c.
25
d.
16
How many frames are included for currently unused in 26TDMA frames
a.
1
b.
24
c.
25
d.
16
Which are basically used to control the logical channels
a.
CCHs
b.
TCH
c.
Both a & b
d.
None of these
e.
218.
Depending upon the task performed by the Control Channels(CCHs),they are
categorized in
219.
a.
Broadcast Control Channels(BCCH)
b.
Common Control Channels(CCCH)
c.
Dedicated Control Channels(DCCH)
d.
All of these
The different control channel are accessed by
220.
to MS
a.
Idle mode
b.
Dedicated mode mobile
c.
Both a & b
d.
None of these
Which is a unidirectional downlink point to multi-point signaling channel from BTS
a.
BCCH
b.
CCCH
c.
DCCH
d.
All of these
221.
Which is bi-directional point to multi-point signaling channel that exchanges the
signaling information for network access management and transport information regarding
connection setup between MS and BTS
a.
b.
BCCH
c.
CCCH
d.
DCCH
e.
All of these
f.
222.
Which is bidirectional and are multiplexed on a standard channel for registration,
location updating and authentication in order to set up a call or TCH
a.
BCCH
b.
CCCH
c.
DCCH
d.
All of these
223.
GSM specifies a multiplexing scheme to integrate several frames where a periodic
pattern of 26 slots occurs in all TDM frames with a TCH , the combination of these frames
are called
a.
Multiframe
b.
Traffic-multiframe
c.
Multiprogramming
d.
None of these
224.
Out of 26 frames, 24 are used for traffic, one is used for the __________ and one is
currently unused
a.
SACCH(Slow Associated Control Channel)
225.
226.
227.
228.
b.
FACCH(Fast Associated Control Channel)
c.
BCCH
d.
CCCH
GSM is already mentioned that the duration of one TDMA frame is
a.
4.516ms
b.
4.615ms
c.
4.156ms
d.
4.165ms
Control multiframe comprises of 51 TDMA frame with a duration of ________
a.
234.5ms
b.
233.5ms
c.
235.4ms
d.
235.3ms
2048 superframes constitute a ________
a.
hyperframe
b.
lowerframe
c.
strongerframe
d.
none of these
GSM has three functional layers
a.
Physical layer
b.
Data link layer
c.
Layer three in correspondence with OSI model
d.
All of these
229.
In OSI model, the lower three layers usually terminate in the ______ but it is not
true in case of GSM
230.
a.
Another node
b.
Same node
c.
Two nodes
d.
None of these
In protocols, the RR part of layer three is spread over the
a.
MS
b.
BTS
c.
BSC
d.
MSC
e.
All of these
231.
Physical layer is the ___________ which provides transfer of bit streams over the
physical radio links through Uminterface
232.
a.
Lowest layer
b.
Highest layer
c.
First layer
d.
None of these
Physical layer handles all radio specific functions such as ________________
a.
Creation of bursts
b.
Multiplexing of bursts into TDMA frame
c.
Synchronization with BTS
d.
Channel coding, error detection and correction
e.
Quality control on the downlink
f.
All of these
233.
The digital modulation and security related issues such as encryption of digital data
are carried over the radio interface between ____________
a.
MS
b.
BTS
c.
Both a & b
d.
None of these
e.
234.
The communication on Abis interface between _____ and BSC is established by using
the standard LAPD
a.
MS
b.
BTS
c.
MTS
d.
None of these
235.
A reliable data link service is provided between _________ through Message
Transfer Part of SS7
a.
BSC
b.
MSC
c.
Both a & b
d.
None of these
e.
236.
The layer three chiefly comprises of _____________
a.
RR(radio resource management)
b.
MM(Mobility management)
c.
CM(call control management)
d.
237.
All of these
What are the functions of mobility management
a.
Location update
b.
Authentication
c.
Temporary Mobile Subscriber Identity
d.
Reallocation
e.
All of these
f.
238.
CM performs
a.
Establishment
b.
Maintenance
c.
Termination of a circuit-switched call
d.
All of these
e.
239.
240.
CM performs other supporting
a.
Supplementary service(SS)
b.
Short Message Service(SMS)
c.
Both a & b
d.
None of these
The radio resource management sublayer terminates at the
a.
BSC
b.
BSS
c.
MSC
d.
MTS
241.
The radio resource management is used to establish physical connections over the
call-related signaling and traffic channels between the ______________
a.
BSC
b.
BSS
c.
MS
d.
Both b & c
242.
The RR layer is the part of RR layer is implemented in the BTS to provide functions
between the ___________
a.
BTS
243.
b.
BSC
c.
MSC
d.
Both a & b
The __________ is also responsibility of the layers
a.
Handover
b.
Handoff
c.
Both a & b
d.
None of these
244.
Which uses signal strength measurements and cell congestion information to
determine when a handoff should occur
245.
HLRs
246.
247.
248.
a.
MSC
b.
BSS
c.
BSC
d.
Both a & b
Handoff notifications are sent to respective ____ which in turn forward them to
a.
VLRs
b.
VLCs
c.
VCDs
d.
LCDs
The mobility management sublayer on the _____ of the RR is terminated at the MSC
a.
Low
b.
Top
c.
Center
d.
First
MM is used to
a.
Establish
b.
Maintain
c.
Release connections between the MS a
d.
The network MSC
e.
All of these
The Communication Management protocol controls __________ call establishment
249.
250.
a.
first-to-end
b.
end-to-end
c.
end-to-first
d.
first-to-first
CM protocols are used in GSM network, these are
a.
Transaction Capabilities Application Part(TCAP) protocol
b.
Mobile Application Part(MAP) protocol
c.
Both a & b
d.
None of these
MAP is used between _________in the form of query and response messages
a.
MSC
b.
VLR
c.
HLR
d.
AuC
e.
All of these
251.
____________ Together with the MSC. Provide the call routing and roaming
capabilities of GSM where a subscriber can roam nationally and even internationally
252.
253.
254.
a.
HLR
b.
VLR
c.
CLR
d.
Both a & b
MSISDN stands for
a.
Mobile Subscriber ISDN Number
b.
Mobile Station ISDN Number
c.
Mobile Switching ISDN Number
d.
Mobile Standard ISDN Number
Which number caller used to reach a mobile subscriber
a.
MSISDN number
b.
IMSI number
c.
TMSI number
d.
MSRN
MSISDN number consists of
a.
Country code(such as 91 for India)
b.
National subscriber destination code
c.
Subscriber number
d.
All of these
255.
256.
257.
MS
258.
Which number of MSISDN is the address of the GSM provider
a.
Country code(such as 91 for India)
b.
National subscriber destination code
c.
Subscriber number
d.
All of these
Which is a unique identification number allocated to each mobile subscriber
a.
MSISDN Number
b.
IMSI Number
c.
TMSI Number
d.
MSRN
It sits inside SIM card, which can be carried out anywhere and can be used in any
a.
MSISDN Number
b.
IMSI Number
c.
TMSI Number
d.
MSRN
The IMSI number consists of
a.
MCC(Mobile Country Code consisting of three digits)
b.
MNC(Mobile Network Code consisting of two digits)
c.
MSIN(Mobile Subscriber Identity Number consisting of ten digits)
d.
All of these
259.
Which is used in the place of the IMSI for the definite identification and addressing
of the mobile station
a.
MSISDN Number
b.
IMSI Number
c.
TMSI Number
d.
MSRN
260.
In TMSI nobody can determine the identity of the subscriber by listening to the
__________
a.
Video channel
b.
Radio channel
c.
Audio channel
d.
None of these
e.
261.
GSM used the _______ byte TMSI for local subscriber identification
a.
2
b.
4
c.
6
d.
8
262.
Which is a temporary location-dependent ISDN number assigned by the locally
responsible VLR to each mobile station in its area
263.
264.
a.
MSISDN Number
b.
IMSI Number
c.
TMSI Number
d.
MSRN
The MSRN consists of
a.
VCC(Visitor country code)
b.
VNDC(Visitor national destination code)
c.
The identification of the current MSC along with the subscriber number(SN)
d.
All of these
GSM call may be classified into two types namely
a.
MTC(Mobile Terminated Call)
b.
MOC(Mobile Originated Call)
c.
Both a & b
d.
None of these
265.
___________ becomes necessary when mobile moves from area of one BSC into
another area of the same or into another BSC
266.
a.
Handoff
b.
Handover
c.
Haddon
d.
Handwork
Handover involves a number of procedures depending upon the location are
a.
Intra-cell handover
b.
Inter-cell, intra-BSC handover
c.
Inter-BSC, intra-MSC handover
d.
Inter MSC handover
e.
All of these
267.
Which involve the transfer of connections from one channel to another channel on
the same BTS
a.
Intra-cell handover
b.
Inter-cell, intra-BSC handover
c.
Inter-BSC, intra-MSC handover
d.
Inter MSC handover
268.
Which involve the transfer of the connection from one BTS to another BTS on the
same BSC
a.
Intra-cell handover
b.
Inter-cell, intra-BSC handover
c.
Inter-BSC, intra-MSC handover
d.
Inter MSC handover
269.
The connections is transferred between BTS belonging to two different BSCs within
one MSC is called
a.
Intra-cell handover
b.
Inter-cell, intra-BSC handover
c.
Inter-BSC, intra-MSC handover
d.
Inter MSC handover
270.
Which involve the transfer of a connection to a BTS between two cells within
another MSC
271.
272.
273.
274.
a.
Intra-cell handover
b.
Inter-cell, intra-BSC handover
c.
Inter-BSC, intra-MSC handover
d.
Inter MSC handover
A collection of interconnected networks is known as
a.
Internet
b.
Internetwork
c.
Network
d.
Internetworking
The process of interconnecting different network is called
a.
Internet
b.
Internetwork
c.
Network
d.
Internetworking
The internetworking protocol is known as
a.
SMTP
b.
PPP
c.
TCP/IP
d.
NNTP
The Network element that connects individual network is known as
a.
Gateway
b.
Router
c.
TCP/IP
d.
Both a & b
275.
If single computer network is divided into segments and router are added between
them it forms an
a.
Internet
b.
Internetwork
c.
Network
d.
Internetworking
276.
Which was used as original term for an internetwork which meant a method for
connecting networks with disparate technologies
277.
278.
279.
280.
a.
Catenet
b.
Bridge
c.
PANs
d.
Novell netware
The computer network are of different types…some are
a.
PANs(Personal Area Networks)
b.
Novell Netware
c.
Both a & b
d.
None of these
The word Internet and internet are
a.
Different
b.
Same
c.
Dependent on each other
d.
None of these
Which signifies the specific network model
a.
internet
b.
Internet
c.
Both a & b
d.
None of these
Which means generic interconnection of networks
a.
internet
b.
Internet
c.
Both a & b
d.
None of these
e.
281.
282.
283.
284.
Which protocol provides a reliable data transfer
a.
TCP
b.
UDP
c.
IP
d.
Both a & b
Which protocol provides a unreliable data transfer
a.
TCP
b.
UDP
c.
IP
d.
Both a & b
Every computer has a unique address called
a.
IP
b.
UDP
c.
TCP
d.
None of these
The IP address lies between
a.
0 to 245
b.
0 to 254
c.
0 to 255
d.
0 to 265
e.
285.
DHCP stands for
a.
Dynamic Host Configuration Protocol
b.
Digital Host Communication Provider
c.
Digital Host Communication Protocol
d.
Dynamic Host Configuration Provider
286.
__________ is used for every computer needs one protocol stack for communicating
on the Internet
a.
Protocol stack
b.
Protocol
c.
Transmission protocol
d.
None of these
287.
Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail etc
a.
Application Layer Protocol
b.
Transport Layer Protocol
c.
Internet Layer Protocol
d.
Hardware Layer
288.
Which protocol uses TCP routes to an application on a computer by use of a port
number
289.
a.
Application Layer Protocol
b.
Transport Layer Protocol
c.
Internet Layer Protocol
d.
Hardware Layer
Which protocol moves IP packets to a specific computer by use of an IP address
a.
Application Layer Protocol
b.
Transport Layer Protocol
c.
Internet Layer Protocol
d.
Hardware Layer
290.
Which contains network interface cards, modems for phones or wireless lines for
converting binary packet data to network signals and vice versa
291.
292.
293.
a.
Application Layer Protocol
b.
Transport Layer Protocol
c.
Internet Layer Protocol
d.
Hardware Layer
Hardware layer handle raw
a.
Bytes of data
b.
Bits of data
c.
Both a & b
d.
None of these
Where is the TCP layer is situated in the application layer in the protocol stack
a.
Below
b.
Top
c.
Center
d.
None of these
TCP uses port number to route correct application on the ___________
a.
Source computer
b.
Destination computer
c.
Both a & b
d.
None of these
294.
TCP is __________ in nature
a.
Textual
b.
Not textual
c.
None of these
d.
295.
296.
297.
298.
299.
300.
TCP also contains a ___ checksum
a.
16bit
b.
16byte
c.
32bit
d.
32byte
What is the port number of the HTTP
a.
80
b.
25
c.
23
d.
20/21
What is the port number of the SMTP
a.
25
b.
23
c.
20/21
d.
27960
What is the port number of the Telnet
a.
25
b.
23
c.
20/21
d.
27960
What is the port number of the FTP
a.
25
b.
23
c.
20/21
d.
27960
What is the port number of the Quake III Arena
301.
a.
25
b.
23
c.
20/21
d.
27960
TCP is ______________
a.
Connection-oriented
b.
Reliable
c.
Both a & b
d.
None of these
e.
302.
IP is ___________
a.
Connectionless
b.
Unreliable
c.
Both a & b
d.
None of these
e.
303.
IP does not ensure movement of a packet to its destination and have no knowledge
of __________
a.
Port numbers
b.
Connections
c.
Both a & b
d.
None of these
e.
304.
IP packets ________ arrive in the order in which it is sent
a.
May
b.
May not
c.
May or may not
d.
None of these
e.
305.
SMDS stands for
a.
Switched Multiple Data Services
b.
Switched Multimegabit Data Services
c.
Switched Multiple Double Services
d.
Switched Multiple Data Subscriber
306.
SMDS is a packet switched, high speed, connectionless public data service that
extends
307.
308.
309.
310.
a.
Local Area Network
b.
Metropolitan Area Network
c.
Wide Area Network
d.
All of these
In SMDS, the service follows
a.
IEEE 802.6 DQDB(Distributed Queue Dual Bus)
b.
IEEE 802.5 DQDB(Distributed Queue Dual Bus)
c.
IEEE 802.4 DQDB(Distributed Queue Dual Bus)
d.
IEEE 803.6 DQDB(Distributed Queue Dual Bus)
The SMDS is defined for MAN under_______ standard
a.
IEEE 802.5
b.
IEEE 802.4
c.
IEEE 802.6
d.
IEEE 802.2
SMDS is capable of variety of technologies including
a.
DQDB(Distributed Queue Dual Bus)
b.
Broadband ISDN(B-ISDN)
c.
Both a & b
d.
None of these
North American implementation uses DQDB with DS1 at a data rate of
a.
1.5Mbit/s
b.
45Mbits/s
c.
1.6Mbit/s
d.
46Mbit/s
e.
311.
312.
North American implementation uses DQDB with DS3 at a data rate of
a.
1.5Mbit/s
b.
45Mbits/s
c.
1.6Mbit/s
d.
46Mbit/s
SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of
a.
1.5Mbit/s
b.
45Mbits/s
c.
155Mbit/s
d.
313.
314.
1.9Mbit/s
SMDS is a
a.
Data service
b.
Telephone service
c.
Frame service
d.
Video service
SMDS is a
a.
Technology
b.
Protocol
c.
Both a & b
d.
None of these
e.
315.
316.
317.
318.
319.
The word CPE means
a.
Customer Premises Equipment
b.
Computer Premises Equipment
c.
Customer Packet Equipment
d.
Customer Protocol Equipment
The SMDS is designed to handle
a.
Continuous traffic
b.
Finite traffic
c.
Bursty traffic
d.
All of these
The telephone service is designed to handle
a.
Continuous traffic
b.
Finite traffic
c.
Bursty traffic
d.
All of these
In SMDS , the telephone number consists of
a.
Country code
b.
Area code
c.
Subscriber code
d.
All of these
The SMDS can serve
a.
Only area
b.
Only nationally
c.
Internationally
d.
None of these
e.
320.
Address of source and destination in SMDS both consists of 4 bit code followed by a
telephone no of max.
a.
12 decimal digits
b.
16 decimal digits
c.
15 decimal digits
d.
20 decimal digits
e.
321.
322.
The SMDS is similar to which transfer mode
a.
Synchronous transfer mode
b.
Asynchronous transfer mode
c.
Both a & b
d.
None of these
SMDS make use of cell relay with _______ per cell
a.
53 octets
b.
56 octets
c.
58 octets
d.
55 octets
e.
323.
324.
325.
The data unit of SMDS can encapsulate frames of
a.
IEEE802.3
b.
IEEE802.5
c.
FDDI
d.
All of these
SMDS make use of
a.
Copper
b.
Fiber media
c.
Both a & b
d.
None of these
In SMDS, with a tick every 10msec user can send_________ on the average
326.
a.
100,000 bytes/sec
b.
10,000 bytes/sec
c.
100,0000 bytes/sec
d.
100,000,00 bytes/sec
Which means the network can expand with minimal investment
a.
SNMP
b.
Scalability
c.
Screening
d.
Simple
e.
327.
Which is a network protocol that is based on UDP and is a component of the
component of the Internet Protocol Suite, defined by IETF(Internet Engineering Task Force)
a.
SNMP
b.
Scalability
c.
Screening
d.
Multicasting
e.
328.
329.
330.
The user can have access to high speed lines ______ connected to MAN
a.
32Mbits/s
b.
33Mbits/s
c.
34Mbits/s
d.
35Mbits/s
The user can having access capacity of ______ connected to MAN
a.
151Mbits/s
b.
152Mbits/s
c.
154Mbits/s
d.
155Mbits/s
The backbones of MAN has working data rate of ________
a.
139Mbits/s
b.
140Mbits/s
c.
155Mbits/s
d.
134Mbits/s
331.
332.
333.
334.
335.
User is charged for maximum rate of __________ bandwidth
a.
34Mbits/s
b.
4Mbits/s
c.
10Mbits/s
d.
16Mbits/s
e.
25Mbits/s
f.
Except (a) all are answers
SMDS was primarily used for connecting
a.
LAN
b.
MAN
c.
WAN
d.
PAN
In SMDS, MAN interconnect
a.
Ethernet
b.
Token ring networks
c.
Both a & b
d.
None of these
SMDS networks have many underlying devices for supporting high-speed service are
a.
Subscriber network interface(SNI)
b.
Carrier equipment
c.
Customer Premises Equipment (CPE)
d.
All of these
CPE may be devices such as
a.
PCs(Personal computers)
b.
Intermediate nodes
c.
Terminals
d.
All of these
e.
336.
Which are intermediate nodes provided by SMDS carrier
a.
Multiplexers
b.
Modems
c.
Routers
d.
All of these
337.
338.
339.
340.
341.
342.
343.
PDUs contain
a.
Source address
b.
Destination address
c.
Both a & b
d.
None of these
Addressing in SMDS has provision for
a.
Group addressing
b.
Security features
c.
Both a & b
d.
None of these
In SMDS, there are two useful security features, namely
a.
Source address validation
b.
Address screening
c.
Both a & b
d.
None of these
CCITT stands for
a.
Consultative Committee International for Telegraphy and Telephony
b.
International Consultative Committee for Telegraphy and Telephony
c.
International Consultative Committee for Telephony and Telegraphy
d.
Consultative Committee International for Telephony and Telegraphy
X.25, it was developed for computer connections used for
a.
Timesharing connection
b.
Terminal connection
c.
Both a & b
d.
None of these
X.25 provides a virtual high-quality digital network at
a.
Low cost
b.
High cost
c.
Medium cost
d.
All of these
Which is another useful characteristics of X.25
a.
Speed
b.
Matching
c.
Speed matching
d.
344.
None of these
In X.25 DTEs are not required to use the same line speed because of the
a.
Store
b.
Forward nature of packet switching
c.
Excellent flow control
d.
All of these
345.
In X.25, A host connected at 56kbps and communicating with numerous remote
sites can be linked with cheaper______ lines
346.
347.
a.
18.2kbps
b.
19.2kbps
c.
20.2kbps
d.
22.2kbps
In X.25 defines the protocols from
a.
Layer 2 to Layer 3
b.
Layer 1 to Layer 2
c.
Layer 1 to Layer 3
d.
Layer 3 to Layer 2
Based on X.25 rules, how many logical channel can be set on a single physical line
a.
256
b.
16
c.
4096
d.
2556
e.
348.
349.
To enable control of 4096 logical channels in X.25, there are ____ channel groups
a.
256
b.
16
c.
4096
d.
2556
Each logical channel group is divided into ____ logical channels
a.
256
b.
16
c.
4096
d.
2556
350.
351.
352.
353.
354.
The channel grouping in X.25 are known as
a.
Logical channel group number(LCGN)
b.
Logical channel number(LCN)
c.
Both a & b
d.
None of these
X.25 is a
a.
Protocol
b.
Data service
c.
Telephone service
d.
Technology
X.25 protocol was recommended by CCITT in
a.
1975
b.
1976
c.
1977
d.
1978
X.25 protocol exchanged the data control information between
a.
A node
b.
A user device
c.
Both a & b
d.
None of these
The user device and node are properly referred to as
a.
DTE
b.
DCE
c.
Both a & b
d.
None of these
355.
A terminal of 1.2kbit/s can communicate with host computer at _______ through
the packet switched network
356.
X.25
a.
9600bits/s
b.
8600bits/s
c.
7600bits/s
d.
6600bits/s
The transmission speed of sender should be ___________ as that of receiver in the
357.
358.
359.
a.
Same
b.
Different
c.
Both a & b
d.
None of these
X.25 make use of _______ service
a.
Connectionless
b.
Connection-oriented
c.
Both a & b
d.
None of these
PAD stands for
a.
Packet Assembly and Disassembly
b.
Procedure Assembly and Disassembly
c.
Permanent Assembly and Disassembly
d.
Package Assembly and Disassembly
X.25 supports two types of packet format named
a.
Control packet
b.
Data packet
c.
Both a & b
d.
None of these
e.
360.
361.
362.
A X.25 packet make up the ______ of an HDLC frame
a.
Frame field
b.
Data field
c.
Information field
d.
Both b and c are same
Maximum packet sizes in X.25 vary from
a.
64bytes to 128bytes
b.
64bytes to 4096 bytes
c.
64bytes to 256bytes
d.
32bytes to 64bytes
A X.25 protocol use
a.
Store and forward method
b.
Stop and wait method
c.
Store and stop method
d.
363.
364.
365.
366.
None of these
The advantage of X.25 are
a.
Was developed to recover errors
b.
PCs
Packet switching eases compatibility problems in communications between
c.
Packet switching cannot waste bandwidth
d.
All of these
Frame relay constitutes of the OSI _____ layer
a.
First
b.
Second
c.
Third
d.
Fourth
Logical channels are identified by a number referred by
a.
DLCI(Data Link Connection Identifier)
b.
VLCI(Very Large Connection Identifier)
c.
HDLC(High Level Data Link Control )
d.
QLLC
DLCI can have a value between
a.
0 and 1025
b.
0 and 125
c.
0 and 256
d.
0 and 1023
e.
367.
The device which splits data into frames as well as combines frames into data is
referred as
a.
FRAD(Frame relay and Disassembly)
b.
FDLC
c.
HDLC
d.
DLCI
368.
Frame relay indicates network congestion using two flags namely ________ bits in
data frames
369.
to as
a.
Forward Explicit Congestion Notification(FECN)
b.
Backward Explicit Congestion Notification(BECN)
c.
Both a & b
d.
None of these
Cell relay is data transmission services that uses transmission technology referred
a.
ATM(Asynchronous Transfer Mode)
370.
371.
372.
373.
374.
375.
b.
BTM
c.
STM
d.
DTM
The data transmission is a fixed length of data known as
a.
Cell
b.
Frame
c.
Relay
d.
Cell relay
Advantages of cell relay are
a.
High-speed transmission
b.
Multiplexing transmission
c.
Both a & b
d.
None of these
Disadvantages of cell relay are
a.
Cell discarding occurs with congestion
b.
High cost
c.
Both a & b
d.
None of these
The cell relay protocol corresponds to first ____ layer of OSI
a.
One
b.
Two
c.
Three
d.
Four
The part that corresponds to second layer, that is, data link layer is referred to as
a.
DLC layer
b.
ATM layer
c.
STM layer
d.
Protocol layer
In cell relay these logical channels are represented as
a.
Virtual Channels(VCs)
b.
Virtual Paths(VPs)
c.
Both a & b
d.
376.
377.
378.
379.
380.
None of these
A VC is a virtual channel composed of
a.
Frames
b.
Cells
c.
Relay
d.
Protocol
VP is a bundle of
a.
VCs
b.
VCM
c.
VCI
d.
VIP
Identifiers are called ___________________ are used to identify VPS and VCs
a.
VCIs
b.
VIPs
c.
Both a & b
d.
None of these
In cell relay communication performed between
a.
Two VP
b.
Two VC
c.
VP and VC
d.
VP and VCI
ATM is an
a.
International Telecommunication
b.
International Telecommunication-Union
c.
International Telecommunication Union-Telecommunication
Standardization Sector(ITU-T)
d.
381.
382.
International Telecommunication Union-Telecommunication
ATM networks are
a.
Connectionless
b.
Interconnected
c.
Connection oriented
d.
None of these
In today ATM, separate networks are used to carry _________ information mostly
383.
384.
385.
386.
387.
388.
a.
Voice
b.
Video
c.
Data
d.
All of these
Data traffic in ATM tend to be
a.
Continuous
b.
Bursty
c.
Discontinuous
d.
None of these
ATM cell has a fixed length of __________
a.
52bytes
b.
53bytes
c.
54bytes
d.
55bytes
Which is a portion carries the actual information
a.
Payload(48bytes)
b.
Payment
c.
Payroll
d.
None of these
The purpose of ATM is to provide
a.
High speed
b.
Low-delay multiplexing
c.
Switching networks
d.
All of these
ATM is specifically designed as ________ technology for voice, video, and data
a.
Single
b.
Double
c.
Multiple
d.
None of these
ATM can support
a.
Different speeds
b.
Traffic types
c.
Quality of service attached to applications
d.
389.
390.
All of these
ATM cells coming from a user are guaranteed delivery at the other end with a
a.
High probability
b.
Low delay
c.
Both a & b
d.
None of these
The characteristics of ATM are as follows
a.
The transport speeds of most ATM applications are most often 155Mbps and
622Mbps
b.
ATM is a flexible service made possible by the size of the packets (cells).
c.
The small cell size allows a variety of applications to run on ATM networks
including voice, video and data
d.
391.
392.
All of these
Narrow band ISDN provides for the following services
a.
Circuit-switched voice
b.
Circuit-switched data
c.
Low-speed packet
d.
High-speed packet
e.
All of these
The cell relay is considered to be the __________ of the future
a.
Transmission service
b.
Transport service
c.
Transfer service
d.
None of these
393.
ISDN is a group of __________ standards relating to digital transmission across
conventional copper wire telephone lines, as also other media
394.
less
a.
CCITT
b.
ITU
c.
Both a & b
d.
None of these
Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or
a.
1.533Mbps
b.
1.544Mbps
c.
1.555Mbps
d.
1.552Mbps
395.
The range of speeds for the broadband ISDN services usually range from ______ to
the Gigabit range
396.
a.
24Mbs
b.
25Mbs
c.
26Mbs
d.
27Mbs
BRA stands for
a.
Basic Rate Access
b.
Basic Random Assembly
c.
Bit Rate Assembly
d.
Bursty Rate Assembly
e.
397.
398.
399.
BRA affords an ISDN user with simultaneous access to two _____ data channels
a.
32kbps
b.
64kbps
c.
128kbps
d.
256kbps
The ISDN Internetworking Equipment devices are
a.
Terminal Adapters(TAs)
b.
ISDN Bridges
c.
ISDN Routers
d.
All of these
Advantages of ISDN internetworking are
a.
Quality
b.
Economy
c.
Availability
d.
All of these
e.
400.
ISDN connections mat be seen as very _______ digital conduits
a.
High rate-of-error
b.
Low rate-of-error
c.
Both a & b
d.
None of these
e.
401.
402.
403.
at
404.
405.
406.
Each channel in BRA is referred to as
a.
A-channel
b.
B-channel
c.
C-channel
d.
F-channel
The B-channel is capable of carrying both
a.
Voice
b.
Data
c.
Both a & b
d.
None of these
The Another channel in BRA(Basic Rate Access) is referred as D-channel Functions
a.
12Kbps
b.
14Kbps
c.
16Kbps
d.
18Kbps
The D-channel in BRA is used for sending and receiving signal between
a.
User devices
b.
ISDN
c.
Both a & b
d.
None of these
The total transmission rate of BRA workout to a combined total of
a.
144kbit/s
b.
145kbit/s
c.
146kbit/s
d.
147kbit/s
BRA is also known as ____________, as per CCITT
a.
I.430
b.
I.420
c.
I.440
d.
I.450
407.
Which service provide up to thirty independent 64kbps B channels and a separate
64kbps D channel to carried the signaling
408.
a.
Basic rate access
b.
Primary rate access
c.
Both a & b
d.
None of these
Primary rate access is also known as __________, as per CCITT
a.
I.420
b.
I.421
c.
I.422
d.
I.423
409.
The CCITT eventually was reformed in to the group which is now called the
________
410.
411.
a.
ITU-T
b.
UIT-T
c.
TIU-T
d.
TUI-T
The two standards ISDN connectors are
a.
RJ-45 type plug and socket uses unshielded twisted pair cable
b.
One for accessing primary rate ISDN through a coaxial cable
c.
Both a & b
d.
None of these
ISDN can be accessed as per CCITT by using two service called
a.
BRI(Basic Rate Interface)
b.
PRI(Primary Rate Interface)
c.
Both a & b
d.
None of these
e.
412.
BRI includes ______ B channels and ________ D channel
a.
One , two
b.
Two, three
c.
Two, one(may be written as 2B+D)
d.
Three, two
413.
BRI providing data transmission speed of
a.
62kbps
b.
63kbps
c.
64kbps
d.
65kbps
414.
PRI is popularly referred to as ____________ due to the number of channels as per
CCITT
415.
a.
20+D
b.
30+D
c.
40+D
d.
50+D
PRI can carry up to 30 independent, ________ lines of data or voice channels
a.
b.
c.
d.
62kbps
63kbps
64kbps
65kbps
Data Communication And Networks 01
1.
2.
3.
4.
5.
6.
Data can be either
a.
Images
b.
Numbers
c.
Words
d.
All of these
The word ‘Data’ is derived from
a.
Latin
b.
Contextual
c.
DB
d.
None of these
How many types of data are
a.
1
b.
2
c.
3
d.
4
The types of data are
a.
Qualitative
b.
Quantitative
c.
Both a & b
d.
None of these
Data are taken as ________ level of abstraction
a.
Highest
b.
Middle
c.
Lowest
d.
None of these
Information are taken as ________ level of abstraction
7.
8.
9.
10.
11.
12.
a.
Highest
b.
Middle
c.
Lowest
d.
None of these
Knowledge are taken as ________ level of abstraction
a.
Highest
b.
Middle
c.
Lowest
d.
None of these
The quantitative data is expressed in
a.
Numerical form
b.
Non-numerical form
c.
Both a & b
d.
None of these
The qualitative data is expressed in
a.
Numerical form
b.
Non-numerical form
c.
Both a & b
d.
None of these
The qualitative data may be
a.
Things
b.
Words
c.
Text
d.
None of these
Which type of data is hard, rigorous, credible and scientific
a.
Qualitative data
b.
Quantitative data
c.
Both a & b
d.
None of these
Which data are rich, poor, tall, short, good, bad, better
13.
14.
a.
Qualitative data
b.
Quantitative data
c.
Both a & b
d.
None of these
Data type is thought of as a set of
a.
Values
b.
Operations on values
c.
Both a & b
d.
None of these
Data type as defined in programming language are
a.
Integers
b.
Floating-point numbers
c.
Characters
d.
Alphanumeric strings
e.
All of these
15.
The smallest addressable unit of data is defined as a group of ___ bits is known as
a byte:
16.
a.
4
b.
8
c.
16
d.
32
The unit processed by machine code instructions is called a _______
a.
Word
b.
Number
c.
Bit
d.
Byte
17.
The machine code unit may be _________ depending on the computer
architecture:
a.
8 bit or 16 bit
b.
16 bit or 32 bit
18.
19.
20.
21.
22.
c.
32 bit or 64 bit
d.
64bit or 128 bit
In a 32-bit word it can represent unsigned integer values ranging from
a.
0 to 232 -1
b.
-231 to 231-1
c.
0 to 264 -1
d.
0 to 231 -1
In a 32-bit word it can represent signed integer values ranging from
a.
0 to 232 -1
b.
-231 to 231-1
c.
231 to 264 -1
d.
0 to 231 -1
A signal is an
a.
Electric current
b.
Electromagnetic field
c.
Electronic current
d.
Both a & b
A signal is used to convey data from
a.
One place to another place
b.
One system to another system
c.
Both a & b
d.
None of these
In case of PSTN, signaling between
a.
A telephone user
b.
The telephone network
c.
Both a & b
d.
None of these
23.
A channel is defined as a path between
24.
The path of channel may be
a.
Physical
25.
26.
27.
28.
29.
30.
b.
Logical
c.
Both a & b
d.
None of these
The path of channel may be
a.
Hard wired
b.
Wireless
c.
Both a & b
d.
None of these
Noise of channel noise___________ the quality of information and data
a.
Upgrades
b.
Degrades
c.
Both a & b
d.
None of these
In channel , the information may not be
a.
Reproduced
b.
Reach the receiver at all
c.
Both a & b
d.
None of these
In channel noise, data by affecting communications and files of all types including
a.
Images
b.
Audio
c.
Text
d.
Programs
e.
Telemetry
f.
All of these
Information and data may be treated as a signal in either
a.
Electrical form
b.
Electromagnetic form
c.
Both a & b
d.
None of these
The noise may be classified as ______________ based upon the sources
a.
Internal
b.
External
c.
Both a & b
d.
None of these
31.
The noise generated because of electricity or atmospheric disturbances is of the
order of
a.
300kHz
b.
300MHz
c.
300GHz
d.
300Hz
32.
The noise generated which is lower than the high frequency range of ____ and may
have more interface with the signal of information:
a.
300MHz
b.
300kHz
c.
300GHz
d.
300Hz
33.
External noise is generally picked up from electrical appliances existing
____________________
34.
35.
36.
a.
In the vicinity
b.
From the atmosphere
c.
From electrical transformers
d.
Also from outer space
e.
All of these
Internal noise is generated in the
a.
Channels
b.
Receivers
c.
Transmitter
d.
Both a & b
Internal noise is less dependent on frequency, but has a significant effect at:
a.
Higher frequency
b.
Low frequency
c.
Middle frequency
d.
No frequency
External noise has _______ effect on higher frequencies
a.
More
b.
Less
37.
38.
c.
No
d.
None of these
Internal noise is fairly low in case of
a.
Digital signal processing
b.
Fiber optics technology
c.
Both a & b
d.
None of these
Noise is measured in terms of the signal to noise ratio
a.
S/N
b.
SNR
c.
S/M
d.
39.
Both a & b
The unit of noise is
a.
decibels
b.
Hertz
c.
Micron
d.
bits per second
e.
40.
____________ defined as the size of the range of frequencies that can be
transmitted through a channel
a.
Channel Bandwidth
b.
Channel Data Transmission Rate
c.
Channel noise
d.
Channel capacity
41.
In other words channel bandwidth may be define it as the volume of information
per unit time that a _____________________
42.
a.
Computer
b.
Person
c.
Transmission medium can handle
d.
All of these
Channel Bandwidth is measured in
a.
decibels
b.
Hertz
43.
44.
c.
Micron
d.
bits per second
Bandwidth is expressed as data speed in ___________ digital systems:
a.
decibels
b.
Hertz
c.
Micron
d.
bits per second
In analog systems, bandwidth is expressed as the difference between the
a.
Highest frequency
b.
Lowest frequency
c.
Both a & b
d.
None of these
45.
__________ is determined by the maximum number of bits that can be transmitted
per unit time through the physical medium:
46.
47.
48.
a.
Channel Bandwidth
b.
Channel Data Transmission Rate
c.
Channel noise
d.
Channel capacity
Channel Data Transmission Rate is measured in
a.
decibels
b.
Hertz
c.
Micron
d.
bits per second
Which gave the maximum data rate of a noiseless channel
a.
H.Nyquist in 1924
b.
H.Nyquist in 1934
c.
Peter Sain in 1932
d.
None of these
Channel latency depends on the
a.
Signal propagation speed
b.
Media characteristics
c.
Transmission distance
d.
All of these
49.
_____________ is the amount of time that is needed for the information to
propagate from the source to destination through the channel:
a.
b.
Propagation time
c.
Channel Latency
d.
Channel Utilization
e.
Both a & b
50.
Throughput may be defined as the number of _______________ through a data
communication system over a period of time:
51.
52.
53.
a.
bits
b.
characters
c.
blocks passing
d.
All of these
___________ may be defined as range of frequencies assigned to a channel
a.
Bandwidth
b.
Channel noise
c.
Bit rate
d.
Channel latency
Higher the Bandwidth,________ will be the data transmission rate or throughput
a.
More
b.
Less
c.
Medium
d.
None of these
In transmission of a signal, the range of carrier frequencies depends on the
a.
Nature of medium
b.
Requirement of the applications supported
c.
Nature of distance
d.
Both a & b
54.
________ may be defined as the range of frequencies being supported by a
particular transmission medium
55.
a.
Frequency
b.
Frequency spectrum
c.
Carrier frequency
d.
None of these
The actual range of frequencies supporting a given communication is known as
a.
Baud rate
56.
b.
Pass band
c.
Band data
d.
Pass
Higher frequency signal offers _________ bandwidth
a.
Lesser
b.
Greater
c.
Medium
d.
None of these
57.
________ refers to the minimum or maximum spatial separation between devices
over a link, in the context of a complete, end to end circuit
a.
Bandwidth
b.
Channel
c.
Distance
d.
None of these
58.
_________ is the rate over network speed which is used to detect errors while
transmitting data
59.
a.
Bit rate
b.
Data rate
c.
Baud rate
d.
Pass band
What is the frequency range of gamma and cosmic rays
a.
>1008GHz
b.
<1018GHz
c.
>1018GHz
d.
<1008GHz
60.
The most popular method for detecting errors in bit rate is ________ a parity bit
alongside the data bit for a character
61.
a.
Deleting
b.
Inserting
c.
Modifying
d.
Updating
TDM means
62.
63.
64.
65.
66.
67.
68.
a.
Total division multiplex
b.
Time division modem
c.
Time detect modem
d.
Time division multiplex
FEC means
a.
Formal Error Checking
b.
Forward Error Checking
c.
Forward Error Character
d.
Formal Error Character
The net bit rate is also known as
a.
Pass bit rate
b.
Data bit rate
c.
Useful bit rate
d.
Network bit rate
The incorrect bit rate is also known as
a.
Data bit rate
b.
Useful bit rate
c.
Network bit rate
d.
Parity bit
The example of net bit rate are
a.
TDM
b.
FEC
c.
Framing Bit
d.
All of these
The speed of connection of bit rate is determined by
a.
TDM
b.
FEC
c.
Framing Bit
d.
All of these
The FEC is also refers to
a.
Logical layer net bit rate
b.
Physical layer net bit rate
c.
Prefix layer net bit rate
d.
None of these
The size of the multimedia file is the product of _______
a.
Bit rate in bytes
b.
Bit rate in kilobytes
c.
Bit rate in gigabytes
d.
69.
None of these
The size of the multimedia file is the length of recording in seconds divided by:
a.
4
b.
8
c.
12
d.
16
e.
70.
71.
72.
73.
74.
75.
The fundamentals of Bit rate:
a.
The sample uses different number of bits
b.
The data is encoded by different number of bits
c.
The material is sampled at different frequencies
d.
The information is digitally compressed by different algorithms
e.
All of these
The bit rate is __________ for a specific network
a.
Fixed
b.
Uniform
c.
Fixed and Uniform
d.
None of these
The gross bit rate is the number of bits transmitted
a.
per second by an ideal transmitter
b.
per second by an ideal transistor
c.
per min by an ideal transmitter
d.
per min by an ideal transistor
The bit rate could be as high as
a.
1Gbit/s
b.
1Mbit/s
c.
1Mbyte/s
d.
1Gbyte/s
Bit rate is used to calculate the speed of time to access the network
a.
Without getting error frames
b.
Getting error frames
c.
Without getting error format
d.
Getting error format
Bit rate is always ________ to the baud rate
a.
Equal
b.
More
76.
c.
Equal or more
d.
None of these
Baud rate determines the bandwidth required to transmit the ______
a.
Signal
b.
Data
c.
Symbol
d.
None of these
77.
Lesser bandwidth is required to move these signal units with _____ bits for an
efficient system
78.
79.
80.
81.
82.
a.
Less
b.
Large
c.
Equal
d.
None of these
A character set was designed by
a.
Jean-Maurice-Emile Baudot in 1874
b.
Jean-Maurice-Emile Baudot in 1885
c.
John-Maurice-Emile Baudot in 1864
d.
John-Merry-Emile Baudot in 1894
Character set system was implemented using keyboard having ____
a.
8-key
b.
6-key
c.
5-key
d.
9-key
Who modified system using keyboard using 5-key
a.
Donald Murray in 1901
b.
Donald Merry in 1902
c.
Donald Duck in 1904
d.
Donald Murray in 1902
Donald Murray modification took a shape as
a.
International Telegraph Alphabet 1
b.
International Telephone Alphabet 1
c.
International Television Alphabet 1
d.
International Telegram Alphabet 1
International Telegraph Alphabet 1 was further developed to
a.
ITA 1
83.
84.
b.
ITA 2
c.
ITA 3
d.
ITA 4
In character code system, a 5-bit code is
a.
00011
b.
00101
c.
00010
d.
10101
A 5-bit code is signified a
a.
Line Feed
b.
Light Feed
c.
Line Format
d.
None of these
85.
The basic idea behind coding was really workable if number of characters it had to
handle do not require more than
86.
87.
88.
a.
8 characters
b.
16 characters
c.
32 characters
d.
64 characters
For covering all the characters of alphabet with special
a.
Characters
b.
Punctuation marks
c.
Other control characters
d.
Other coding technique was needed
e.
All of these
Encoding is done for data
a.
Inside computer
b.
Outside computer
c.
Both a & b
d.
None of these
The following data techniques are used
a.
Binary Coded Decimal(BCD)
b.
Extended Binary Coded Decimal Interchange Code(EBCDIC)
c.
American Standard Code for Information Interchange(ASCII)
89.
d.
Unicode
e.
Manchester Code
f.
Differential Manchester Encoding(DME)
g.
Return to Zero(RZ)
h.
Non Return to Zero(NRZ)
i.
Non Return to Zero Invertive(NRZ-I)
j.
MLT-3
k.
4B/5B
l.
5B/6B
m.
All of these
Unicode Examples are
a.
UTF-7
b.
UTF-8
c.
UTF-16
d.
UTF-32
e.
UTF-EBCDIC
f.
All of these
90.
Binary Coded Decimal system makes use of a series of _____ to represent a decimal
number
a.
4
b.
8
c.
16
d.
32
e.
91.
92.
93.
Nibble is known as series of ____
a.
8 bits
b.
4 bits
c.
16 bits
d.
32 bits
Extended Binary Coded Decimal Interchange Code is developed by
a.
Parallel to ASCII, IBM in 1964
b.
Parallel to ASCII, IBM in 1974
c.
Parallel to ASCII, IBM in 1962
d.
Parallel to ASCII, IBM in 1964
EBCDIC is a coding system that uses
a.
8 bit
94.
95.
96.
97.
98.
b.
4 bit
c.
16 bit
d.
32 bit
A byte in EBCDIC system of coding contained ___ nibbles
a.
3
b.
4
c.
2
d.
6
First nibble is known as
a.
Zone
b.
Digit
c.
Byte
d.
Bit
Second nibble is known as
a.
Zone
b.
Digit
c.
Byte
d.
Bit
First nibble represents category to which the __________
a.
Characters belong
b.
Integers belong
c.
String belong
d.
None of these
ASCII is a ___ bit coding for representing characters of English alphabets
a.
64 bit
b.
7 bit
c.
16 bit
d.
32 bit
e.
99.
ASCII was published in
a.
1964
b.
1965
100.
c.
1963
d.
1966
Unicode was developed by
a.
b.
c.
d.
Unicode Consortium
Unique Consortium
Unicode Constant
None of these
101.
Unicode is appeared in
a.
b.
c.
d.
1992
1991
1993
1994
102.
103.
The first version of Unicode
a.
Unicode 1.0
b.
Unicode 2.0
c.
Unicode 3.0
d.
None of these
Unicode version 5.0 appeared in
a.
2005
b.
2006
c.
2007
d.
2004
104.
In Unicode there were codes for representing characters and their basic graphical
representation are known as
105.
106.
a.
Graphical
b.
Graphemes
c.
Graphs
d.
None of these
The first 256 code points belong to __________ for conversion to Roman Text
a.
ISO 5589-1
b.
ISO 5569-1
c.
ISO 5579-1
d.
ISO 5559-1
Unicode mapping methods are of two types, namely are
107.
range
108.
109.
a.
UTF(Unicode Transformation Format)
b.
UCS(Unicode Character Set)
c.
Both a & b
d.
None of these
Every communication channel has a ________ which is defined as the frequency
a.
Channel
b.
Bandwidth
c.
Carrier
d.
Data rate
The bandwidth is a _________ property of a transmission medium
a.
Physical
b.
Logical
c.
Both a & b
d.
None of these
A telephone wire has bandwidth of ______ for short distance
a.
1M
b.
2M
c.
3M
d.
4M
110.
Data rate that can be achieved using a channel depends on the _____________ of a
channel
111.
112.
a.
Frequency
b.
Bandwidth
c.
Data rate
d.
Capacity
The undesirable waveform is known as
a.
Anti-Aliasing
b.
Aliasing
c.
Channel
d.
Bandwidth
The word PCM stands for
a.
Primary code mapping
b.
Pulse code modulation
113.
114.
115.
116.
117.
c.
Primary channel modulation
d.
None of these
How many way to communicate, display, store or manipulate information
a.
1
b.
2
c.
3
d.
4
The way to communicate, display, store or manipulate information are
a.
Analog
b.
Digital
c.
Both a & b
d.
None of these
The analog form of electronic communication represents the information in
a.
Continuous electromagnetic wave form
b.
Discrete form
c.
Both a & b
d.
None of these
The digital form of electronic communication represents the information in
a.
Continuous electromagnetic wave form
b.
Discrete form
c.
Both a & b
d.
None of these
The word AM stands for
a.
Analog Modulation
b.
Analog Manipulation
c.
Amplitude Modulation
d.
118.
119.
AnalogModeling
The word FM stands for
a.
Frequency Modulation
b.
Fourier Manipulation
c.
Frequency Manipulation
d.
Frequency Modeling
The bandwidth of voice grade channel is approximately
a.
4000Hz
b.
5000Hz
c.
6000Hz
d.
3000Hz
120.
121.
122.
123.
124.
125.
126.
The bandwidth of CATV video channel is approximately
a.
2MHz
b.
4MHz
c.
6MHz
d.
8MHz
The advantages of FM over AM are
a.
Improved signal to noise ratio(about 25dB)
b.
Less radiated power
c.
Well defined service areas for given transmitter power
d.
Smaller geographical interference between neighboring stations
e.
All of these
The disadvantages of FM are
a.
Much more bandwidth(as much as 20 times as much)
b.
More Complicated receiver
c.
More complicated transmitter
d.
All of these
Computer are________ in nature
a.
Analog
b.
Digital
c.
Both a & b
d.
None of these
SS7 means
a.
Signal Source7
b.
Signaling source7
c.
Signaling system7
d.
Signal system7
SS7 is a
a.
System
b.
Source
c.
Protocol
d.
None of these
The PSTN provides a _________ path between the destination and source
a.
Logical
b.
Physical
c.
Both a & b
d.
127.
128.
129.
None of these
The functions of SS7 are
a.
Controlling network
b.
Set up and tear down the call
c.
Handles the routines decision
d.
All of these
SS7 uses voice switches known as
a.
SSWs(Service Switching websites)
b.
SSPs(Service Switching Points)
c.
SSNs(Service Switching Networks)
d.
SSDs(Service Switching Data)
SSPs uses Query Service Control Point (SCP) database using Packet switches called
a.
Signal Transfer Points(STPs)
b.
SSWs(Service Switching websites)
c.
SSPs(Service Switching Points)
d.
SSNs(Service Switching Networks)
130.
_____________ refers to correct detection by receiving equipment at the
beginning and end of data that was sent from sending equipment
131.
a.
Asynchronous
b.
Synchronous
c.
Synchronization
d.
None of these
Synchronous systems can be classified into three categories:
a.
Asynchronous systems
b.
Character synchronous systems
c.
Flag Synchronous systems
d.
All of these
132.
Asynchronous transmission is a _________ method of transmission in which a sign
bit is added to the beginning:
133.
a.
Start
b.
Stop
c.
Start-stop
d.
None of these
Manchester is also known as
a.
MPE(Manchester Phase Encoding)
b.
MPD(Manchester Phase Data)
c.
MPN(Manchester Phase Network)
d.
MPW(Manchester Phase Website)
134.
135.
Manchester coding is used in telecommunication by
a.
Encoding standard 802.3
b.
Ethernet standard 802.3
c.
Ethernet standard 805.3
d.
Encoding standard 805.3
For 10Mbps Ethernet carrier frequency is
a.
20MHz
b.
15MHz
c.
10MHz
d.
5MHz
e.
136.
137.
138.
139.
The another name of DME(Differential Manchester Encoding)
a.
CDP(Conditioned Diphase Encoding)
b.
MPE(Manchester Phase Encoding)
c.
SSWs(Service Switching websites)
d.
SSPs(Service Switching Points)
In DME, logical values are indicated by _______________ of transitions
a.
Absence
b.
Presence
c.
Both a & b
d.
None of these
In RZ, zero between each bit signifies a _____________
a.
Rest Condition
b.
Neutral Point
c.
Both a & b
d.
None of these
The NRZ-pulses contain ____ energy in comparison to that of a RZ code
a.
less
b.
more
c.
either less or more
d.
none of these
140.
141.
NRZ has no ___ state
a.
Rest
b.
Zero
c.
Neutral
d.
None of these
MLT-3 is an encoding scheme in which ____ voltage levels are used
a.
2
b.
3
c.
4
d.
5
142.
Due to four transitions the maximum fundamental frequency requirement is
reduced to ____
143.
144.
145.
146.
a.
One-fourth of the baud rate
b.
One-third of the baud rate
c.
One-half of the baud rate
d.
None of these
Who specified the committee scheme of coding
a.
ANSI X3T9.7
b.
ANSI X5T9.6
c.
ANSI X3T9.5
d.
ANSI X6T9.5
FDDI uses ANSI X3T9.5 for obtaining 100Mbps from a signal of ______
a.
32.25MHz
b.
31.25MHz
c.
31.24MHz
d.
32.26MHz
4B/5B encoding scheme is also known as
a.
Block coding
b.
Bit coding
c.
Byte coding
d.
Block character
In 4B/5B scheme, we need a 125MHz clock for a signal of
a.
1000MHz
b.
100MHz
c.
10MHz
d.
99MHz
147.
The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined
_____ bit symbol
148.
149.
150.
151.
152.
a.
5
b.
4
c.
6
d.
3
Modulation is the technique used to translate
a.
Information from source to destination
b.
Low frequency to higher frequency
c.
Source to higher frequency
d.
Low frequency to destination
The low frequency signal are
a.
Audio
b.
Video
c.
Music
d.
Data
e.
All of these
The modulation/demodulation is a
a.
Linear process
b.
Non-linear process
c.
Both a & b
d.
None of these
In character synchronous system ,_______ are added
a.
Special character
b.
Start bit
c.
Stop bit
d.
None of these
Special character are called
a.
STN
b.
SYN
c.
SBN
d.
SRN
153.
154.
155.
156.
157.
The character string of the SYN character is
a.
01001111
b.
10001110
c.
00010110
d.
00110011
The character synchronous system receives _______ as one character
a.
2bit
b.
4bit
c.
8bit
d.
16bit
In the 4B/5B we need a 125MHz clock for a signal of
a.
100MHz
b.
10MHz
c.
1000MHz
d.
10000MHz
5B/6B creates a data pattern that is placed with equal numbers of
a.
1
b.
0
c.
Both a & b
d.
None of these
How many encoding techniques we used today
a.
10
b.
100
c.
1000
d.
10000
158.
Modulation is the technique used to translate low-frequency(base-band) signals like
__________ to a higher frequency
a.
Audio
b.
Music
c.
Video
d.
Data
e.
All of these
159.
Modulation/ demodulation is a non linear process where two different sinusoids are
_________
160.
a.
Addition
b.
Subtraction
c.
Multiplied
d.
Division
Angular frequency id defined as _______ the frequency of carrier signal
a.
Once
b.
Twice
c.
Thrice
d.
None of these
161.
The frequencies that comprise the message (base band) are translated into a
_________ range of frequencies
a.
Lower
b.
Higher
c.
Zero
d.
None of these
162.
Modulation also reduces the size of antenna for higher frequencies with ________
frequency
163.
164.
a.
Lower
b.
Greater
c.
Middle
d.
None of these
The non-linearity results in several ___________ harmonics
a.
Even
b.
Odd
c.
Both a & b
d.
None of these
Harmonics are the _________ of the frequency, that is the message frequency
a.
Addition
b.
Subtraction
c.
Multiply
d.
165.
166.
signal
167.
Division
The carrier frequency may be a ___________
a.
Radio wave
b.
Light wave
c.
Both a & b
d.
None of these
The amplitude of carrier frequency ________ in accordance with the modulated
a.
Can not change
b.
Change
c.
Either change or not
d.
None of these
The frequency of the carrier ___________and we get a complex wave
a.
does not changed
b.
Change
c.
Either change or not
d.
None of these
168.
For demodulation, it needs the carrier frequency to be generated or derived at the
receiving location known as
169.
170.
171.
a.
DSB-SC
b.
DBS-CS
c.
BDS-SC
d.
BSD-CS
The full form of DSB-SC
a.
Direct Side Band-Suppressed Carrier
b.
Direct Side Base-Suppressed Carrier
c.
Double Side Band-Suppressed Carrier
d.
Double Slide Band-Suppressed Carrier
One more kind of analog modulation is called
a.
Vestigial side band modulation
b.
Vestigial side base modulation
c.
Vestigial slide band modulation
d.
Vestigial slide base modulation
Pulse code modulation is a method by which an audio signals are represented as
a.
Direct data
172.
173.
noise
b.
Digital data
c.
Device data
d.
None of these
Pulse Code Modulation(PCM) requires bandwidth of ________
a.
32Kbps
b.
64Kbps
c.
128Kbps
d.
256Kbps
PCM is a coding scheme used in digital communication because of _____ sensitive to
a.
Less
b.
Middle
c.
High
d.
None of these
174.
In digital signal the main source of noise is ___________, which introduces as the
finite number of quantization levels during the conversion to PCM code
175.
176.
a.
Quantization noise
b.
Equalization noise
c.
Digital noise
d.
None of these
The main parameters in determining the quality of a PCM system are the
a.
Dynamic range
b.
Signal-to-Noise Ratio(SNR)
c.
Both a & b
d.
None of these
The maximum error occurs between the
a.
Original level
b.
Quantized level
c.
Both a & b
d.
None of these
177.
The maximum error occurs when the original level falls exactly halfway between
______ quantized levels
a.
2
b.
3
c.
4
d.
1
178.
179.
The dynamic range is the ratio of the
a.
Largest possible signal magnitude
b.
Smallest possible signal magnitude
c.
Both a & b
d.
None of these
For a six bits system the dynamic range will be approximately equal to ___
a.
34dB
b.
36dB
c.
40dB
d.
38dB
180.
In dynamic range, the largest voltage amplitude is _______ the smallest voltage
amplitude
181.
182.
183.
184.
a.
32times
b.
64times
c.
125times
d.
256times
The disadvantages associated with the Delta Modulation PCM is
a.
Slope overload
b.
Granular noise
c.
Both a & b
d.
None of these
Communication channels like ____________ are usually analog media
a.
Telephone lines
b.
Television lines
c.
Digital lines
d.
None of these
Which is a bandwidth-limited channel
a.
Digital media
b.
Analog media
c.
Both a & b
d.
None of these
In the case of telephone lines, the usable bandwidth falls in the range of _______
a.
300Hz to 3000Hz
b.
300Hz to 3300Hz
c.
30Hz to 3300Hz
d.
33Hz to 3300Hz
185.
186.
187.
188.
Digital information signals have the shape of pulse and represented by
a.
0
b.
1
c.
both a & b
d.
none of these
The following types of modulation are used in modems
a.
ASK-Amplitude Shift Keying
b.
FSK-Frequency Shifted Keying
c.
PSK-Phase Shift Keying
d.
DPSK-Differential Phase Shift Keying
e.
BPSK-Binary Phase Shift Keying
f.
QPSK-Quadrature Phase Shifted Keying
g.
QAM- Quadrature Amplitude Modulation
h.
All of these
The main advantage of this technique, it is easy to such
a.
Signals
b.
Also to detect them
c.
Both a & b
d.
None of these
Telephone lines limit amplitude changes to some _________ changes per second
a.
3000
b.
3300
c.
3100
d.
3330
189.
In the Frequency Shift keying, the frequency of the carrier signal is changed
according to the data
a.
Modulation
b.
Data
c.
Signals
d.
None of these
190.
In the Phase Shift Keying method a sine wave is transmitted and the phase of the
sine wave carries the ______
a.
Analog data
b.
Digital data
c.
Signal data
d.
191.
192.
193.
194.
None of these
For a 0, a __ degrees phase sine wave is transmitted
a.
0
b.
45
c.
90
d.
180
For a 1, a __ degrees phase sine wave is transmitted
a.
0
b.
45
c.
90
d.
180
A sub method of the phase modulation is
a.
Differential phase modulation
b.
Direct phase modulation
c.
Double phase modulation
d.
None of these
Differential phase modulation technique is also called
a.
Amplitude Shift Keying
b.
Phase Shift Keying
c.
Frequency Shift Keying
d.
None of these
195.
In the differential phase shift keying, For a 0 the modem shifts the phase of each
succeeding signal in a certain number of degrees
a.
0
b.
45
c.
90
d.
180
196.
In the differential phase shift keying, For a 1 the modem shifts the phase of each
succeeding signal and a different certain number of degrees
a.
0
b.
90
c.
180
d.
270
197.
In binary phase shift keying, the case of 4 different phase shifts, where each symbol
represents ____, the modulation technique is called quadrature PSK(QPSK)
a.
2 bits
b.
4 bits
c.
8 bits
d.
16 bits
198.
In binary phase shift keying, the case of 8 different phase shifts, where each symbol
represents ____, the modulation technique is called
199.
200.
201.
202.
203.
a.
QPSK
b.
8PSK
c.
8QAM
d.
8FSK
Binary Phase Shift Keying is measured in
a.
Decibel
b.
Baud
c.
Hertz
d.
bits per second
In QPSK, the four angle are usually out of phase by
a.
0
b.
45
c.
90
d.
180
The AM is considered as a
a.
Linear process
b.
Non-linear process
c.
Both a & b
d.
None of these
The FM is considered as a
a.
Linear process
b.
Non-linear process
c.
Both a & b
d.
None of these
The phase modulation is similar to the
204.
a.
Amplitude Modulation
b.
Frequency Modulation
c.
Angle Modulation
d.
Pulse Code Modulation
In PM, ________ of the carrier wave changes
a.
Frequency
b.
Phase
c.
Both a & b
d.
None of these
e.
205.
PCM requires bandwidth of
a.
21Kbps
b.
24Kbps
c.
64Kbps
d.
65Kbps
206.
In data communication using computers ,________ signal are normally converted
into PCM
a.
Analog
b.
Digital
c.
Both a & b
d.
None of these
207.
The PCM is a coding scheme used in __________ communication because of less
sensitive to noise
a.
Analog
b.
Digital
c.
Both a &b
d.
None of these
208.
________ is a process where multiple analog message signals or digital data streams
are combined into one medium over a shared medium
a.
Multiplexing
b.
Modulation
c.
Encoding technique
d.
De-multiplexing
209.
The various ways to multiplex are
a.
b.
Frequency Division Multiplexing(FDM)
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
e.
All of these
210.
In which , Multiple channels are combined onto a single aggregate signal for
transmission
211.
a.
Frequency Division Multiplexing(FDM)
b.
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
In FDM , channels are separated in the aggregate by their
a.
Bandwidth
b.
Signal
c.
Frequency
d.
None of these
212.
_________ was the foremost multiplexing scheme to have the benefits of wide
scale network deployment and till today, such systems are still in use and are used with
analog transmission
a.
b.
213.
Frequency Division Multiplexing(FDM)
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
The two alternative technologies of multiplexing for digital sources are
a.
b.
Frequency Division Multiplexing(FDM)
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
e.
Both b & c
f.
Both a & b
g.
Both c & d
214.
_______ provides a means for merging data from the varied sources into a single
channel to support communication over a microwave system , satellite system or a
telephone lines
a.
b.
215.
Frequency Division Multiplexing(FDM)
Time Division Multiplexing(TDM)
c.
Code Division Multiplexing(CDM)
d.
Wavelength Division Multiplexing(WDM)
The TDM are implemented in two ways are
a.
Synchronous TDM
b.
Asynchronous TDM
c.
Both a & b
d.
None of these
e.
216.
In which type of TDM , a single channel is divided into time slots and each
transmitting device is assigned for least one of the time slots for its transmission
217.
218.
a.
Synchronous TDM
b.
Asynchronous TDM
c.
Both a & b
d.
None of these
The Asynchronous TDM is properly known as
a.
Statistical TDM
b.
Static TDM
c.
Dynamic TDM
d.
None of these
Which ways of Multiplex are more flexible
a.
FDM
b.
TDM
c.
CDM
d.
None of these
219.
In which way of multiplex ,the whole amount for a certain amount of time is
provided to the user and all user uses the same frequency but at different time
220.
221.
a.
FDM
b.
TDM
c.
CDM
d.
None of these
To overcome the inefficiency of standard TDM, a technique known as
a.
CDM
b.
FDM
c.
STDM
d.
CDMA
The word UHF means
a.
Ultra -High –Form
b.
Ultra –Half-Form
c.
Ultra- High-Frequency
d.
Ultra-Half-Frequency
222.
________ may be defined as the form of multiplexing where the transmitter
encodes the signal using a pseudo random sequence
223.
224.
225.
226.
227.
a.
CDM
b.
FDM
c.
STDM
d.
CDMA
The number of different frequency per bit are called
a.
Bit rate
b.
Data rate
c.
Baud rate
d.
Chip rate
If one or more bits are transmitted at the same frequency are called
a.
Frequency doping
b.
Frequency hopping
c.
Frequency hoping
d.
Frequency hipping
The main disadvantage of CDM is
a.
Protection from interference
b.
Tapping as only the sender know the spreading code
c.
Tapping as only the receiver know the spreading code
d.
All of these
The Code Division Multiple Access(CDMA) was widely introduced in
a.
1963
b.
1989
c.
1979
d.
1958
In CDMA system ,all user transmit in the ______ bandwidth simultaneously
a.
Different
b.
Same
c.
Both a & b
d.
None of these
e.
228.
The spread spectrum technology of CDMA is ___________ than TDMA
a.
More secure
b.
Provides higher transmission quality
c.
Both a & b
d.
None of these
e.
229.
230.
A CDMA call starts with a standard rate of ___________ bits per second
a.
9500
b.
9200
c.
9300
d.
9600
The code used with the signal for spreading have
a.
Low cross-correlation values
b.
Unique to every user
c.
Higher transmission quality
d.
Both a & b
231.
In spread spectrum technique, a receiver is only capable of selecting the desired
signal if it has the knowledge about the code of the intended
232.
a.
Receiver
b.
Transmitter
c.
Both a & b
d.
Signal
The major advantage of spread spectrum technique may be enumerated as
a.
Low power spectral density
b.
Interference limited operation
c.
Privacy due to unknown random codes
d.
Reduction of multi path affects
e.
All of these
233.
The word FHSS stands for
a.
frequency hopping spread spectrum
b.
file hopping spread spectrum
c.
file hiding spread spectrum
d.
frequency hopping special spectrum
234.
235.
The word DSSS stands for
a.
digital sequence spread spectrum
b.
direct sequence spread spectrum
c.
digital sequence special spectrum
d.
direct signal spread spectrum
The pattern of switching from one channel to another channel is known as
a.
Hipping
b.
Hyping
c.
Harping
d.
Hopping
236.
________ is best known spread spectrum technique in which a pseudo random noise
code multiples the signal
a.
FHSS
b.
FCSS
c.
DSSS
d.
DHSS
237.
A pseudo random noise code is a sequence of chips valued________ with noise-like
properties
a.
-1 and1(polar)
b.
0 and 1(non-polar)
c.
Both a & b
d.
None of these
e.
238.
________ time is the time spent on a channel with certain frequency
a.
FDM
b.
Dwell
c.
Dowel
d.
Dowry
e.
239.
FHSS includes_______ technology
a.
FDM
b.
TDM
c.
CDM
d.
Both a & b
e.
240.
Individual channels are
a.
Data
b.
Audio
c.
Video or their combination
d.
All of these
241.
__________ a multi-channel system in which a number of individuals channels are
multiplexed for transmission
242.
243.
a.
System
b.
Carrier
c.
Carrier system
d.
None of these
T-carrier signaling scheme was developed by
a.
Bell Laboratory
b.
Hell Laboratory
c.
Dull Laboratory
d.
None of these
T1 standards is widely used in
244.
245.
246.
a.
Japan
b.
North America
c.
Both a & b
d.
None of these
T-carrier was digital signal 1, DS1 or DS-1 which is known as
a.
T1
b.
E1
c.
DS0
d.
DS1
DS-1 conveys the meaning of
a.
Direct Service-Level 1
b.
Digital Service-Level 1
c.
Double Service-Level 1
d.
Digital Slide-Level 1
E1 signifies another carrier system that finds use outside
247.
248.
249.
a.
North America
b.
Japan
c.
South Korea
d.
All of these
A DS1 circuit comprises ________ , each of 8 bits
a.
24 channels
b.
26 channels
c.
28 channels
d.
30 channels
24 channels are also called
a.
Timeslots
b.
DS0
c.
Both a & b
d.
None of these
DS0 channel is a ______ that is multiplexed
a.
68Kbit/s
b.
64Kbit/s
c.
62Kbit/s
d.
70Kbit/s
250.
DS1 is full-duplex circuit in which the circuit does concurrent transmission and
reception at a data rate of ___
a.
1.533Mbit/s
b.
1.544Mbit/s
c.
1.566Mbit/s
d.
1.555Mbit/s
251.
By sampling each 8-bit frame for 8000 times per second, total bandwidth achieved
is ________
252.
a.
1.537Kbit/s
b.
1.536Kbit/s
c.
1.538Kbit/s
d.
1.539Kbit/s
Framing schemes are of two types:
a.
Super Frame(SF)
253.
254.
255.
256.
257.
b.
Extended Super Frame(ESF)
c.
Both a & b
d.
None of these
Framing channel has been divided into two each with ______ in Super Frame
a.
2Kbit/s
b.
3Kbit/s
c.
4Kbit/s
d.
6Kbit/s
There are _____ contiguous frames of 193-bit each in a Super Frame
a.
10
b.
12
c.
14
d.
16
There are _____ contiguous frames of 193-bit each in a Extended Super Frame
a.
20
b.
22
c.
24
d.
26
Framing channel has been divided into two each with _______ in Super frame
a.
2Kbit/s
b.
4Kbit/s
c.
6Kbit/s
d.
8Kbit/s
One is used for alignment of ________
a.
Terminal frame
b.
Signaling frame
c.
Super frame
d.
Switching frame
e.
258.
Second is used for alignment of ________
a.
Terminal frame
b.
Signaling frame
c.
Super frame
d.
Switching frame
e.
259.
Alignment of terminal is carried out with frames having _______ in the super frame
a.
Even-number
b.
Odd-number
c.
Prime-number
d.
None of these
260.
A frame having _________ in the super frame is used for signaling alignment of
frame
261.
262.
263.
264.
a.
Even-number
b.
Odd-number
c.
Prime-number
d.
None of these
T1 is recognized by its original ______ line rate
a.
1.566Mbit/s
b.
1.544Mbit/s
c.
1.555Mbit/s
d.
1.533Mbit/s
T1 used the encoding technique _______
a.
AMI
b.
LAN
c.
DS1
d.
CEPT
AMI means
a.
Analog Memory Interchange
b.
Alternate Memory Interchange
c.
Alternate Mark Inversion
d.
Analog Mark Interchange
AMI requires less
a.
Bandwidth
b.
Signal
c.
Both a & b
d.
None of these
265.
CEPT means
a.
Conference European of Postal Telecommunications
b.
European Conference of Postal and Telecommunications
c.
European Control of Postal Telecommunications
d.
None of these
266.
CEPT after ten years of launch of T1 system used _____ for framing known as
European E1
267.
268.
a.
2bits
b.
4bits
c.
8bits
d.
16bits
An E1 carrier carries digital information at ______
a.
2.084Mbps
b.
2.048Mbps
c.
2.044Mbps
d.
2.088Mbps
An E1 circuit has been divided into ____ time slots
a.
30
b.
32
c.
34
d.
36
269.
32 time slots implements an individual communication channel supporting a bit rate
of ________
270.
271.
zones
a.
60Kbps
b.
62Kbps
c.
64Kbps
d.
66Kbps
An E1 frame has a total of _________
a.
128bits
b.
256bits
c.
64bits
d.
192bits
Which is used to exchange information over the E1 carriers that connect remote
a.
Protocols Frame Relay
b.
Cell Relay
c.
Both a & b
d.
None of these
e.
272.
CEPT revised and improved the technology adopted by
a.
T-carrier system
b.
E-carrier system
c.
Both a & b
d.
None of these
e.
273.
Which was taken by International Telecommunications Union Telecommunication
Standardization Sector(ITU-T)
274.
275.
a.
T-carrier system
b.
E-carrier system
c.
E1 system
d.
T1 system
ITU-T finds wide use all over the world except three nations namely
a.
UK, USA, Japan
b.
USA, Canada, Japan
c.
Japan, America, USA
d.
Japan, America, Canada
PDH means
a.
Plesiochronous Digital Hierarchy
b.
Plasma Digital Hierarchy
c.
Pointer Double Hard disk
d.
Plasma Double Hierarchy
276.
In 32 timeslots of E1, only ___ are used two of these are used for framing and
signalling call setup
a.
277.
20
b.
15
c.
30
d.
40
High quality of call is ensured since transmission takes place with a constant
a.
Latency
278.
279.
b.
Capacity
c.
Both a & b
d.
None of these
Another timeslot is reserved for signalling purposes
a.
TS16
b.
TS15
c.
TS14
d.
TS13
Which is controlled some standard protocols in the field of telecommunications
a.
Teardown
b.
Call setup
c.
Both a & b
d.
None of these
280.
E1 is different from earlier T-carrier systems since all ___ of every sampling are
available for every call
281.
282.
283.
a.
4bits
b.
8bits
c.
16bits
d.
32bits
There are two general categories of transmission media
a.
Bounded(guided) media
b.
Unbounded(unguided) media
c.
Both a & b
d.
None of these
__________ are bounded media
a.
Twisted pair
b.
Coaxial cable
c.
Fibre optic cables
d.
All of these
________ are known as unbounded transmission
a.
microwave and satellite transmission
b.
both travel through the air
c.
which has no boundaries
d.
all of these
284.
285.
Wireless transmission systems do not make use of a
a.
Physical conductor
b.
Guide to bind the signal
c.
Logical conductor
d.
Both a & b
Energy travels through the air rather than
a.
Copper
b.
Glass
c.
Both a & b
d.
None of these
e.
286.
287.
288.
289.
290.
The transmission systems addressed under this category include
a.
Microwave
b.
Satellite
c.
Infrared
d.
All of the above
Which are used in radio transmission in one form or another
a.
Radio
b.
TV
c.
Cellular phones
d.
All of these
_______ is the one example of long distance communication
a.
Satellite signal
b.
Satellite relay
c.
Analog signal
d.
Digital signal
The RF(Radio Frequency) is divided in different ranges starting from
a.
Very low frequency(VLF)
b.
Extremely high frequency(EHF)
c.
Both a & b
d.
None of these
Two transmitters cannot share the same frequency band because of
a.
Mutual interference
291.
292.
b.
Band usage is regulated
c.
Both a & b
d.
None of these
PDAs means
a.
Personal Digital Assistants
b.
Personal Double Assistants
c.
Personal Digital Analogs
d.
Power Digital Assistants
ADSL means
a.
Analogs Digital Subscriber Lines
b.
Asymmetric Digital Subscriber Lines
c.
Assistants Digital Subscriber Lines
d.
Asymmetric Digital Subscriber language
293.
A pair of copper wires twisted together and wrapped with a plastic coating as a
twisted pair and which has a diameter of ____:
294.
a.
0.2-0.6
b.
0.4-0.7
c.
0.2-0.8
d.
0.4-0.8
______ are the substances used for insulation purposes
a.
Teflon(r)
b.
Flouropolymer resin
c.
Polyvinyl chloride
d.
Polyethylene
e.
All of these
f.
295.
In modem data rate is restricted to approximately____:
a.
24Kbps
b.
28Kbps
c.
30Kbps
d.
32Kbps
e.
296.
_______ was first used in telephone system by Alexander Graham Bell
a.
Copper medium
b.
Copper signal
c.
Copper set up
d.
None of these
e.
297.
The unshielded twisted pair states the link between the end in the communication
closet and the outlet which is further restricted to
298.
299.
300.
301.
302.
a.
60metres
b.
90metres
c.
100metres
d.
190metres
A UTP cable contains __________ twisted pairs
a.
2 to 240
b.
2 to 4200
c.
2 to 2400
d.
None of these
The major disadvantage of UTP is
a.
Bandwidth is lower
b.
Bandwidth is higher
c.
Bandwidth is limited
d.
Bandwidth is dynamic
STP stands for
a.
Shielded twisted pair
b.
Signal transmission pair
c.
Shielding twisted process
d.
Shielded transmission pair
150Ohms STP contains ________IBM connector or RJ45
a.
1 pair
b.
2 pairs
c.
3 pairs
d.
4 pairs
100Ohm UTP contains _________ and 8-pin modular connector(ISDN)
a.
2 pairs
b.
3 pairs
c.
4 pairs
d.
5 pairs
303.
304.
305.
306.
307.
308.
309.
________ contains multi-mode fibre
a.
52.5/125
b.
72.5/125
c.
62.5/125
d.
82.5/125
What are the biggest advantage of UTP
a.
Flexibility
b.
Cost-effective media
c.
Usability of both data communication and voice
d.
All of these
LED means
a.
Light Emitting Device
b.
Light Emitting Diode
c.
Light Exchange Device
d.
Light Exchange Diode
The effective capacity of coaxial cable depends on the
a.
Spacing of amplifiers
b.
The length of the circuit
c.
The gauge of the centre conductor
d.
Other intermediate devices
e.
All of these
LANs function over coaxial cable to the __________ specifications
a.
10BASE5
b.
10BASE2
c.
10BASET
d.
All of these
Coaxial cables are of two types
a.
Baseband
b.
Broadband
c.
Both a & b
d.
None of these
The gauge of coaxial cable is _____ than the twisted pair
a.
Thicker
b.
Thinner
c.
Heavy
d.
Bulky
310.
Traditional coaxial cable is quite ________ of which Ethernet LAN 10Base5 is an
example
311.
312.
a.
Thick
b.
Heavy
c.
Bulky
d.
All of these
Twin axial cables contains _____ such configurations within a single cable sheath
a.
2
b.
3
c.
4
d.
5
The mechanical protections cover the _________
a.
Secondary buffer coating
b.
Primary buffer coating
c.
Both a & b
d.
None of these
313.
The bandwidth is typically ________ over a length of one kilometer of fibre
expressed as ‘MHz-Km’
a.
10 to 20
b.
20 to 30
c.
30 to 40
d.
40 to 50
314.
In which multimode fibre, light is refracted by an increasing amount as it moves
away from the core
315.
316.
a.
Single mode fibre
b.
Step index multimode fibre
c.
Graded index multimode fibre
d.
All of these
The actual bandwidth of graded index multimode fibre depends on
a.
How well a particular fibre’s index profile minimizes model dispersion
b.
The wavelength of light launched into the fibre
c.
Both a & b
d.
None of these
The typical bandwidth of graded index multimode fibre range from
a.
100MHz-Km to over 1GHz-Km
317.
318.
319.
320.
321.
322.
323.
b.
200 MHz-Km to over 1GHz-Km
c.
300 MHz-Km to over 1GHz-Km
d.
150 MHz-Km to over 1GHz-Km
Which multimode fibre has a thinner inner core
a.
Single mode fibre/ Monomode fibre
b.
Step index multimode fibre
c.
Graded index multimode fibre
d.
All of these
In which multimode fibre , different wavelength of light travel at a different speeds
a.
Single mode fibre
b.
Step index multimode fibre
c.
Graded index multimode fibre
d.
All of these
The single mode fibers have the
a.
Very broadest bandwidth
b.
Lowest cost
c.
Lowest attenuation of any optical fibre
d.
All of these
The advantage of single mode fibre are
a.
Small size and light weight
b.
Large bandwidth
c.
Flexibility and high strength
d.
Secure against signal leakage and interference
e.
No short circuit problems
f.
All of these
The fibre optic systems consists of a
a.
Light sources
b.
Cables
c.
Light detectors
d.
All of these
In a fiber optic system, ______ are opto-electric devices
a.
Repeater
b.
EMI
c.
RMI
d.
RFI
EMI/RFI means
a.
Electro Magnetic Interference / Radio Frequency Interference
b.
Electronics Magnetic Interference/Redundancy Frequency Interference
c.
Electro Minute Intrinsically/ Radio Fibre Interference
d.
None of these
324.
Monomode fibre optic systems routinely are capable of transmitting signal over
distances in excess of
325.
326.
a.
250Km
b.
350Km
c.
225Km
d.
325Km
CAD means
a.
Computer aided distribution
b.
Computer application design
c.
Computer aided design
d.
None of these
Bounded Media Comparison Chart
Media
Twisted pair cable
Coaxial
cable
comparison to twisted)
Optical fibre cable
Advantages
Disadvantage
Inexpensive,
well Sensitive to noise, short
established , easy to add distances,
limited
nodes
bandwidth, security hazard
because of easy interception
(in High
bandwidth,
long Physical dimensions, noise
distances
immunity security is better
in pair cable
Very High bandwidth, long Connections, cost
distances, noise immunity,
high security, small size
327.
In data communication the signal has to travel through the transmission media that
may be
328.
a.
Wired
b.
Wireless
c.
Both a & b
d.
None of these
There exist three causes of impairment in transmission errors
a.
Attenuation
b.
Distortion
c.
Noise
d.
All of these
329.
___________ is the loss of the signal power while traversing a transmission media
including electronic circuitry
330.
331.
332.
333.
a.
Attenuation
b.
Distortion
c.
Noise
d.
None of these
Attenuation is measured in terms of
a.
Hertz
b.
Micro
c.
decibel
d.
Kilometer
Distortion is calculated as the ratio of the
a.
Signal at two different points
b.
Relative power of two signals at the same point
c.
Both a & b
d.
None of these
A negative value of decibel indicates _______ of signal strength
a.
Loss
b.
Gain
c.
Either loss or gain
d.
None of these
A positive value of decibel indicates _______ of signal strength
a.
Loss
b.
Gain
c.
Either loss or gain
d.
None of these
e.
334.
335.
The attenuation includes a number of factors like
a.
Transmitting and receiving antennas
b.
Transmitter powers
c.
Modulation techniques
d.
Frequency of the transmission
e.
Atmospheric conditions
f.
All of these
Distortion is proportional to the square of the _________
a.
Atmospheric conditions
b.
Modulation techniques
c.
Operating frequency
d.
Operating system
336.
Equalizing devices are ________ at intermediate points to keep the shape of the
signal intact
337.
a.
Created
b.
Inserted
c.
Modified
d.
Deleted
Data processing and transmission systems experience errors due to several reasons
a.
Electrostatic interference can be caused from circuits or machines lying
close by
b.
Inductance and capacitance, loss in transmission due to leakages, impulses
from static in the atmosphere, etc, lead to distortion
338.
c.
Resistance to current in a cable can be caused due to attenuation
d.
All of these
The main constraints are due to the physical medium that produces
a.
Noise
b.
Distortion
c.
Attenuation
d.
Dropouts
e.
All of these
339.
The digital signals do not suffer from ___________ but they are susceptible to
dropouts
340.
341.
342.
a.
Noise
b.
Distortion
c.
Both a & b
d.
None of these
The use of several parity bits are
a.
Help to detect any error
b.
Find if any bits are inverted
c.
They should be re-inverted so that the original data is restored
d.
All of these
SECDEC means
a.
Single error correction, double error detection
b.
Single exchange correction, double exchange detection
c.
Single error code, double error detection
d.
Single error character, double error detection
The types of errors are
a.
Single Bit Errors
b.
Burst Errors
c.
Both a & b
d.
None of these
e.
343.
344.
345.
346.
A transmission cable has
a.
Inductance
b.
Capacitance
c.
Resistance
d.
All of these
The inductance and capacitance tends to
a.
Causes the amplitude of the signal to reduce
b.
Distort the shape of a signal
c.
Both a & b
d.
None of these
The resistance tends to
a.
Causes the amplitude of the signal to reduce and therefore loss of power
b.
Distort the shape of a signal
c.
Both a & b
d.
None of these
Which type of error corrupt the single bits of transmission
a.
Burst errors
b.
Single bit errors
c.
Both a & b
d.
None of these
e.
347.
348.
Which type of error corrupt the multiple bits of transmission
a.
Burst errors
b.
Single bit errors
c.
Both a & b
d.
None of these
ENQ means
a.
Enquiry
b.
Encryptions
349.
350.
351.
352.
353.
c.
Enquire
d.
None of these
BER stands for
a.
Byte Enquiry Rate
b.
Bit Error Rate
c.
Burst Enquiry resistance
d.
Burst Error Rate
NAK means
a.
None Acknowledge
b.
Noise Acknowledge
c.
Negative Acknowledgement
d.
Network Acknowledgement
The No of bits that get affected in burst errors depends upon the
a.
Duration of the noise
b.
Transmission time of the no of bits of the transmitted packet
c.
Both a & b
d.
None of these
The redundant bit enables
a.
correction of errors
b.
detection of errors
c.
Redundancy check
d.
All of these
The types of redundancy processes are
a.
Parity check
b.
Cyclic redundancy check
c.
Checksum
d.
All of these
e.
354.
__________ is the technique of providing a data string that is added to information
packets used to detect errors in data packets
a.
CRC
b.
Parity check
c.
Checksum
d.
All of these
e.
355.
356.
357.
358.
359.
Which redundancy process can detect the more than 95 per cent of all errors
a.
CRC
b.
Parity check
c.
Checksum
d.
All of these
CRC means
a.
Circuit Redundancy Check
b.
Cyclic Redundancy Check
c.
Checksum Rail Check
d.
None of these
The Two-dimensional parity check method can not
a.
Correct the errors
b.
Detect the errors
c.
Correct and detect the errors
d.
None of these
When signal amplitude degrades along a transmission medium , this is called
a.
Signal attenuation
b.
Signal bandwidth
c.
Frequency
d.
Data rate
The CRC is validated by using _______ conditions
a.
1
b.
2
c.
3
d.
4
360.
The two conditions of CRC are
a.
It should possess exactly one bit less than the divisor
b.
When CRC is appended to the end of the data stream
c.
Both a & b
d.
None of these
Download