world college of technology and management, gurgaon · 2017. 4. 9. · world college of technology...

15
WORLD COLLEGE OF TECHNOLOGY AND MANAGEMENT, GURGAON COMPUTER SCIENCE ENGINEERING SECTION-COMPUTER FUNDAMENTALS 1. Which of the following languages is more suited to a structured program? A. PL/1 B. FORTRAN C. BASIC D. PASCAL E. None of the above 2. A computer assisted method for the recording and analyzing of existing or hypothetical systems is A. Data transmission B. Data flow C. Data capture D. Data processing E. None of the above 3. The brain of any computer system is A. ALU B. Memory C. CPU D. Control unit E. None of the above 4. What difference does the 5th generation computer have from other generation computers? A. Technological advancement B. Scientific code C. Object Oriented Programming D. All of the above E. None of the above 5. Which of the following computer language is used for artificial intelligence? A. FORTRAN B. PROLOG C. C D. COBOL E. None of the above 6. The tracks on a disk which can be accessed without repositioning the R/W heads is A. Surface B. Cylinder C. Cluster D. All of the above E. None of the above 7. Which of the following is the 1's complement of 10? A. 01 B. 110 C. 11 D. 10

Upload: others

Post on 21-Jan-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • WORLD COLLEGE OF TECHNOLOGY AND MANAGEMENT, GURGAON

    COMPUTER SCIENCE ENGINEERING SECTION-COMPUTER FUNDAMENTALS

    1. Which of the following languages is more suited to a structured program?

    A. PL/1

    B. FORTRAN

    C. BASIC

    D. PASCAL

    E. None of the above

    2. A computer assisted method for the recording and analyzing of existing or hypothetical systems is

    A. Data transmission

    B. Data flow

    C. Data capture

    D. Data processing

    E. None of the above

    3. The brain of any computer system is

    A. ALU

    B. Memory

    C. CPU

    D. Control unit

    E. None of the above

    4. What difference does the 5th generation computer have from other generation computers?

    A. Technological advancement

    B. Scientific code

    C. Object Oriented Programming

    D. All of the above

    E. None of the above

    5. Which of the following computer language is used for artificial intelligence?

    A. FORTRAN

    B. PROLOG

    C. C

    D. COBOL

    E. None of the above

    6. The tracks on a disk which can be accessed without repositioning the R/W heads is

    A. Surface

    B. Cylinder

    C. Cluster

    D. All of the above

    E. None of the above

    7. Which of the following is the 1's complement of 10?

    A. 01

    B. 110

    C. 11

    D. 10

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024002javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024002

  • E. None of the above

    8. A section of code to which control is transferred when a processor is interrupted is known as

    A. M

    B. SVC

    C. IP

    D. MDR

    E. None of the above

    9. Which part interprets program instructions and initiate control operations.

    A. Input

    B. Storage unit

    C. Logic unit

    D. Control unit

    E. None of the above

    10. The binary system uses powers of

    A. 2

    B. 10

    C. 8

    D. 16

    E. None of the above

    11. A computer program that converts assembly language to machine language is

    A. Compiler

    B. Interpreter

    C. Assembler

    D. Comparator

    E. None of the above

    12. The time required for the fetching and execution of one simple machine instruction is

    A. Delay time

    B. CPU cycle

    C. Real time

    D. Seek time

    E. None of the above

    13. The time for which a piece of equipment operates is called

    A. Seek time

    B. Effective time

    C. Access time

    D. Real time

    E. None of the above

    14. Binary numbers need more places for counting because

    A. They are always big numbers

    B. Any no. of 0's can be added in front of them

    C. Binary base is small

    D. 0's and l's have to be properly spaced apart

    E. None of the above

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024002javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024002javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024003javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024003javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024003javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024002http://www.indiabix.com/computer-science/computer-fundamentals/024002http://www.indiabix.com/computer-science/computer-fundamentals/024003http://www.indiabix.com/computer-science/computer-fundamentals/024003http://www.indiabix.com/computer-science/computer-fundamentals/024003

  • 15. Which access method is used for obtaining a record from a cassette tape?

    A. Direct

    B. Sequential

    C. Random

    D. All of the above

    E. None of the above

    16. Any type of storage that is used for holding information between steps in its processing is

    A. CPU

    B. Primary storage

    C. Intermediate storage

    D. Internal storage

    E. None of the above

    17. A name applied by Intel corp. to high speed MOS technology is called

    A. HDLC

    B. LAP

    C. HMOS

    D. SDLC

    E. None of the above

    18. A program component that allows structuring of a program in an unusual way is known as

    A. Correlation

    B. Coroutine

    C. Diagonalization

    D. Quene

    E. None of the above

    19. The radian of a number system

    A. Is variable

    B. Has nothing to do with digit position value

    C. Equals the number of its distinct counting digits

    D. Is always an even number

    E. None of the above

    20. The section of the CPU that selects, interprets and sees to the execution of program instructions

    A. Memory

    B. Register unit

    C. Control unit

    D. ALU

    E. None of the above

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024004javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024004javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024004javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/computer-fundamentals/024004http://www.indiabix.com/computer-science/computer-fundamentals/024004http://www.indiabix.com/computer-science/computer-fundamentals/024004

  • SECTION-OPERATING SYSTEM FUNDAMENTALS

    1. The part of machine level instruction, which tells the central processor what has to be done, is

    A. Operation code

    B. Address

    C. Locator

    D. Flip-Flop

    E. None of the above

    2. Which of the following refers to the associative memory?

    A. the address of the data is generated by the CPU

    B. the address of the data is supplied by the users

    C. there is no need for an address i.e. the data is used as an address

    D. the data are accessed sequentially

    E. None of the above

    3. To avoid the race condition, the number of processes that may be simultaneously inside their critical section

    is

    A. 8

    B. 1

    C. 16

    D. 0

    E. None of the above

    4. A system program that combines the separately compiled modules of a program into a form suitable for

    execution

    A. assembler

    B. linking loader

    C. cross compiler

    D. load and go

    E. None of the above

    5. Process is

    A. program in High level language kept on disk

    B. contents of main memory

    C. a program in execution

    D. a job in secondary memory

    E. None of the above

    6. Addressing structure

    A. defines the fundamental method of determining effective operand addresses

    B. are variations in the use of fundamental addressing structures, or some associated actions which are related

    to addressing.

    C. performs indicated operations on two fast registers of the machine and leave the result in one of the

    registers.

    D. all of the above

    E. None of the above

    7. The Memory Buffer Register (MBR)

    A. is a hardware memory device which denotes the location of the current instruction being executed.

    B. is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory.

    C. contains the address of the memory location that is to be read from or stored into.

    D. contains a copy of the designated memory location specified by the MAR after a "read" or the new

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/operating-systems-concepts/013002javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/operating-systems-concepts/013002

  • contents of the memory prior to a "write".

    E. None of the above

    8. The strategy of allowing processes that are logically runnable to be temporarily suspended is called

    A. preemptive scheduling

    B. non preemptive scheduling

    C. shortest job first

    D. first come first served

    E. None of the above

    9. The Storage-to-Storage instructions

    A. have both their operands in the main store.

    B.

    which perform an operation on a register operand and an operand which is located in the main store,

    generally leaving the result in the register, expect in the case of store operation when it is also written into

    the specified storage location.

    C. which perform indicated operations on two fast registers of the machine and have the result in one of the

    registers

    D. all of the above

    E. None of the above

    10. The LRU algorithm

    A. pages out pages that have been used recently

    B. pages out pages that have not been used recently

    C. pages out pages that have been least used recently

    D. pages out the first page in a given area

    E. None of the above

    11. Which of the following systems software does the job of merging the records from two files into one?

    A. Security software

    B. Utility program

    C. Networking software

    D. Documentation system

    E. None of the above

    12. Fork is

    A. the dispatching of a task

    B. the creation of a new job

    C. the creation of a new process

    D. increasing the priority of a task

    E. None of the above

    13. Thrashing

    A. is a natural consequence of virtual memory systems

    B. can always be avoided by swapping

    C. always occurs on large computers

    D. can be caused by poor paging algorithms

    E. None of the above

    14. Supervisor state is

    A. never used

    B. entered by programs when they enter the processor

    C. required to perform any I/O

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/operating-systems-concepts/013002javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/operating-systems-concepts/013002

  • D. only allowed to the operating system

    E. None of the above

    15. Which of the following instruction steps , would be written within the diamond-shaped box, of a

    flowchart?

    A. S = B - C

    B. IS A

  • SECTION-DATABASE SYSTEM

    1. A report generator is used to

    A. update files

    B. print files on paper

    C. data entry

    D. All of the above

    E. None of the above

    2. Which of the following is not a logical data-base structure?

    A. tree

    B. relational

    C. network

    D. chain

    E. All of the above

    3. Which of the following is a database administrator's function?

    A. database design

    B. backing up the database

    C. performance monitoring

    D. user coordination

    E. All of the above

    4. Primitive operations common to all record management systems include

    A. Print

    B. Sort

    C. Look-up

    D. All of the above

    E. None of the above

    5. Each of data files has a _____ that describe the way the data is stored in the file.

    A. File structure

    B. Records

    C. Fields

    D. Database

    E. None of the above

    6. After you _____ a record, many data management the environments require you to issue a command to save

    the changes you made.

    A. Delete

    B. Update

    C. Sort key

    D. Index

    E. None of the above

    7. What is the language used by most of the DBMSs for helping their users to access data?

    A. High level language

    B. Query language

    C. SQL

    D. 4GL

    E. None of the above

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/database-systems/javascript:%20void%200;http://www.indiabix.com/computer-science/database-systems/javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/database-systems/javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;http://www.indiabix.com/computer-science/database-systems/http://www.indiabix.com/computer-science/database-systems/http://www.indiabix.com/computer-science/database-systems/

  • 8. Data item characteristics that are important in data management include

    A. punctuation

    B. language

    C. spelling

    D. width

    E. None of the above

    9. In SQL, which command is used to make permanent changes made by statements issue since the beginning of

    a transaction?

    A. ZIP

    B. PACK

    C. COMMIT

    D. SAVE

    E. None of the above

    10. Periodically adding, changing and deleting file records is called file

    A. Updating

    B. upgrading

    C. restructuring

    D. renewing

    E. None of the above

    11. Sort/report generators

    A. are faster than index/report generators

    B. require more disk space than index/report generators

    C. do not need to sort before generating a report

    D. both (a) and (b)

    E. None of the above

    12. The data dictionary tells the DBMS

    A. what files are in the database

    B. what attribute are possessed by the data

    C. what these files contain

    D. All of the above

    E. None of the above

    13. In SQL, which command(s) is(are) used to enable/disable a database trigger?

    A. MODIFY USER

    B. CHANGE USER

    C. ALTER TRIGGER

    D. All of the above

    E. None of the above

    14. If the record management system allows you to edit values before they are recorded on disk, you can

    A. correct spelling changes before they are recorded

    B. change the name of a field

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;

  • C. change the width of a field

    D. All of the above

    E. None of the above

    15. The relational model uses some unfamiliar terminology. A tuple is equivalent to a:

    A. record

    B. field

    C. file

    D. data base

    E. data item

    16. The files stored on a secondary stage device are composed of a hierarchy of data. What does a record in a

    file contain?

    A. Bits

    B. Characters

    C. Data field

    D. Schema

    E. None of the above

    17. Which command is used to remove an index from the database in SQL?

    A. DELETE INDEX

    B. DROP INDEX

    C. REMOVE INDEX

    D. ROLL BACK INDEX

    E. None of the above

    18. An-owner-member set in the CODASYL specifications may have

    A. only one owner but many owner occurrences

    B. only one member but many member occurrence

    C. more than one member but only one occurrence per member

    D. All of the above

    E. None of the above

    19. What is the name given to the database management system which is able to handle full text data, image

    data, audio and video?

    A. Full media

    B. Graphics media

    C. Multimedia

    D. Hypertext

    E. None of the above

    20. A top-to-bottom relationship among the items in a database is established by a

    A. Hierarchical schema

    B. Network schema

    C. Relational schema

    D. All of the above

    E. None of the above

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;

  • SECTION-C++ CONCEPTS

    1. You can use C++ as a procedural, as well as an object-oriented, language

    A. True B. False

    2. A default catch block catches

    A. all thrown objects

    B. no thrown objects

    C. any thrown object that has not been caught by an earlier catch block

    D. all thrown objects that have been caught by an earlier catch block

    3. Adding a derived class to a base class requires fundamental changes to the base class

    A. True B. False

    4. Format flags may be combined using

    A. the bitwise OR operator (|)

    B. the logical OR operator (||)

    C. the bitwise AND operator (&)

    D. the logical AND operator (&&)

    5. The use of the break statement in a switch statement is

    A. optional

    B. compulsory

    C. not allowed. It gives an error message

    D. to check an error

    E. None of the above

    6. To expose a data member to the program, you must declare the data member in the _____ section of the class

    A. common B. exposed

    C. public D. unrestricted

    E. user

    7. Evaluate the following expression: 3 >6&&7>4

    A. True B. False

    8. Which of the following are valid characters for a numeric literal constant?

    A. a comma

    B. a dollar sign ($)

    C. a percent sign (%)

    D. a space

    E. None of the above

    9. A function that changes the state of the cout object is called a(n) _____

    A. member B. adjuster

    C. manipulator D. operator

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;

  • 10. A C++ program contains a function with the header int function(double d, char c). Which of the following

    function headers could be used within the same program?

    A. char function(double d, char c)

    B. int function(int d, char c)

    C. both (a) and (b)

    D. neither (a) nor (b)

    11. When the compiler cannot differentiate between two overloaded constructors, they are called

    A. overloaded B. destructed

    C. ambiguous D. dubious

    12. Some Streams work with input, and some with output

    A. True B. False

    13. If you design a class that needs special initialization tasks, you will want to design a(n) _____

    A. housekeeping routine

    B. initializer

    C. constructor

    D. compiler

    14. Which type of statement does not occur in computer programs?

    A. sequence B. loop

    C. denial D. selection

    15. The newline character is always included between

    A. pair of parentheses

    B. pair of curly braces

    C. control string

    D. &

    E. None of the above

    16. To be called object-oriented, a programming language must allow

    A. functions that return only a single value

    B. #include files

    C. inheritance

    D. All of the above

    17. A function that returns no values to the program that calls it is _____

    A. not allowed in C++

    B. type void

    C. type empty

    D. type barren

    18. The keyword used to define a structure is _____

    A. stru B. stt

    C. struct D. structure

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;

  • 19. If container classes are carefully constructed, then these tools are available to work with structures that are

    not ______

    A. valid without container classes

    B. programmer-defined

    C. type-specific

    D. public

    20. Header files often have the file extension _____

    A. .H B. .HE

    C. .HEA D. .HEAD

    SECTION – NETWORKING

    1. How many digits of the DNIC (Data Network Identification Code) identify the country?

    A. first three

    B. first four

    C. first five

    D. first six

    E. None of the above

    2. A station in a network forwards incoming packets by placing them on its shortest output queue. What routing

    algorithm is being used?

    A. hot potato routing

    B. flooding

    C. static routing

    D. delta routing

    E. None of the above

    3. The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is

    10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line

    using 9-bit frames is approximately equal to

    A. 0.003

    B. 0.009

    C. 0.991

    D. 0.999

    E. None of the above

    4. Frames from one LAN can be transmitted to another LAN via the device

    A. Router B. Bridge

    C. Repeater D. Modem

    5. Which of the following condition is used to transmit two packets over a medium at the same time?

    A. Contention

    B. Collision

    C. Synchronous

    D. Asynchronous

    E. None of the above

    6. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very

    soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask

    should you assign?

    A. 255.240.0.0 B. 255.248.0.0

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;

  • C. 255.252.0.0 D. 255.254.0.0

    E. 255.255.255.255

    7. What are the most commonly used transmission speeds in BPS used in data communication?

    A. 300

    B. 1200

    C. 2400

    D. 9600

    E. None of the above

    8. What is the default subnet mask for a class C network?

    A. 127.0.0.1

    B. 255.0.0.0

    C. 255.255.0.0

    D. 255.255.255.0

    E. None of the above

    9. Which of the following is used for modulation and demodulation?

    A. modem

    B. protocols

    C. gateway

    D. multiplexer

    E. None of the above

    10. Which of the following is not a disadvantage of wireless LAN?

    A. Slower data transmission

    B. higher error rate

    C. interference of transmissions from different computers

    D. All of the above

    11. The Internet Control Message Protocol (ICMP)

    A. allows gateways to send error a control messages to other gateways or hosts

    B. provides communication between the Internet Protocol Software on one machine and the Internet

    Protocol Software on another

    C. reports error conditions to the original source, the source must relate errors to individual application

    programs and take action to correct the problem

    D. All of the above

    E. None of the above

    12. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in

    the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s)

    are needed to connect them? Choose the most correct answer.

    A. Modem B. Cable

    C. Hub D. Router

    13. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming message to the

    sender. In full duplex data transmission, both the sender and the receiver

    A. cannot talk at once

    B. can receive and send data simultaneously

    C. can send or receive data one at a time

    D. can do one way data transmission only

    E. None of the above

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;

  • 14. How many hosts are attached to each of the local area networks at your site?

    A. 128

    B. 254

    C. 256

    D. 64

    E. None of the above

    15. Which of the following technique is used for fragment?

    A. a technique used in best-effort delivery systems to avoid endlessly looping packets

    B. a technique used by protocols in which a lower level protocol accepts a message from a higher level

    protocol and places it in the data portion of the low level frame

    C. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for

    transmission across a network that cannot handle the original datagram size

    D. All of the above

    E. None of the above

    16. Contention is

    A. One or more conductors that serve as a common connection for a related group of devices

    B. a continuous frequency capable of being modulated or impressed with a second signal

    C. the condition when two or more stations attempt to use the same channel at the same time

    D. a collection of interconnected functional units that provides a data communications service among

    stations attached to the network

    E. None of the above

    17. Avalanche photodiode receivers can detect hits of transmitted data by receiving

    A. 100 photons

    B. 200 photons

    C. 300 photons

    D. 400 photons

    E. None of the above

    18. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is

    A. the method of determining which device has access to the transmission medium at any time.

    B. a medium access control technique for multiple access transmission media

    C. a form of TDMA in which circuit switching is used to dynamically change the channel assignments

    D. All of the above

    E. None of the above

    19. When you ping the loopback address, a packet is sent where?

    A. On the network

    B. Down through the layers of the IP architecture and then up the layers again

    C. Across the wire

    D. through the loopback dongle

    E. None of the above

    20. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine

    to another?

    A. FTP

    B. SNMP

    C. SMTP

    D. RPC

    E. None of the above

    javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;javascript:%20void%200;