Professional Documents
Culture Documents
EC16503-Computer Networks CIA - III MCQ - Google Forms
EC16503-Computer Networks CIA - III MCQ - Google Forms
1. Email address *
3. Register Number *
V Sem - ECE
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 1/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
bits
frames
packets
bytes
8. What is the correct order of the operations of OSPF? i ) Hello packets ii 1 point
)Propagation of link-state information and building of routing tables iii
)Establishing adjacencies and synchronization of the database (L2) *
i-ii-iii
i-iii-ii
iii-ii-i
ii-i-iii
Destination unreachable
Source quench
Router error
Time exceeded
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 2/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
10. The router operates in which layer of the OSI Reference Model? (L2) * 1 point
32 bit
64 bit
128 bit
256 bit
10
110
1111
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 3/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
13. Which of the following are transport layer protocols used in networking?(L4) 1 point
*
Flow control
Three-Way Handshaking
Forwarding
Synchronization
15. In the slow-start algorithm, the size of the congestion window increases 1 point
__________ until it reaches a threshold. (L2) *
exponentially
additively
multiplicatively
suddenly
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 4/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
16. A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by 1 point
averaging the(L2) *
Data Rate
Average Rate
Traffic Rate
Traffic Shaping
17. A mechanism to control the amount and the rate of the traffic sent to the 1 point
Traffic Shaping
Traffic Flow
Traffic Congestion
Traffic Control
stream oriented
message oriented
block oriented
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 5/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
Flow control
Error control
20. If a segment carries data along with the acknowledgement then it is known 1 point
as (L2) *
forward packing
piggybacking
both A and B
21. The ports ranging from 49,152 to 65,535 can be used as private port 1 point
numbers. These are called as (L1) *
well known
registered
dynamic
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 6/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
22. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. 1 point
What is your class of address, subnet address, and broadcast address? (L5) *
23. Which layer is responsible for Framing, Flow Control and Error Control (L1) * 1 point
Physical Layer
Network Layer
Session Layer
Circuit switching
Packet switching
Virtual Switching
Line switching
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 7/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
25. Both stations can transmit and receive data simultaneously in (L1) * 1 point
Simplex mode
None of Above
26. The electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz 1 point
are called (L1) *
Infrared
Radio waves
Microwaves
High frequency
n+1 channels
2n channels
n-1 channels
n channels
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 8/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
28. _____ cable can carry signals of higher frequency ranges than _____ cable. 1 point
(L3) *
Twisted-pair; fiber-optic
Coaxial; fiber-optic
Coaxial; twisted-pair
Multiplexing
Quality of service
30. The most common unshielded twisted pair connector is (L1) * 1 point
RJ-45
RG-59
RG-58
RG-ll
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 9/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
31. The Clear To Send frame in CSMA/CA handshake can prevent from (L2) * 1 point
Data overlap
Distort signals
Frames overlap
Collision
Yes
No
Both A and B
connectionless protocol
bit-oriented protocol
byte-oriented protocol
None
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 10/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
34. Error control in the data link layer is based on (L2) * 1 point
situation based
both a and b
35. The Receive window in the Go-Back-N Protocol is an abstract concept 1 point
one variable
two variables
three variables
four variables
Nodes
Gadgets
Piconet
Entity
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 11/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
Multiplexing
Quality of service
Error Correction
Sender address
receiver address
39. The field of the MAC frame that alerts the receiver and enables it to 1 point
preamble
source address
destination address
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 12/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
41. Distributed Coordination Function (DCF) uses the mechanism of (L2) * 1 point
CSMA/CD
CSMA/CA
TDMA
FDMA
42. Bluetooth network consists of one primary device and up to (L1) * 1 point
5 Devices
7 Devices
9 Devices
11 Devices
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 13/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
43. Carrier Sense Multiple Access (CSMA) is based on the medium called (L1) * 1 point
44. The term that refers to a set of procedures used to restrict the amount of 1 point
data that the sender can send before waiting for acknowledgement is (L2) *
error control
flow control
delay
byte stuffing
Efficient network
intranet
Ethernet
None of Above
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 14/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
47. What is the major factor that makes the coaxial cable less susceptible to 1 point
inner conductor
Outer conductor
Insulating material
12
12.11
11.1.21
11.1
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 15/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
Bellman-ford algorithm
51. Which protocol gives a full route table update every 30 seconds? (L2) * 1 point
IEGRP
RIP
ICMP
IP
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 16/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
52. The correct format of a packet in a tunnel that uses IPv4 region is ________ i. 1 point
IPv6 header ii. Payload iii. IPv4 header (L2) *
iii-i-ii
iii-ii-i
i-ii-iii
i-iii-ii
53. You type debug IP RIP on your router console and see that 172.16.10.0 is 1 point
being advertised to you with a metric of 16. What does this mean? (L4) *
HTTP
SMTP
FTP
TCP
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 17/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
End to end
Process to process
Mail service
SMTP
HTTP
FTP
SIP
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 18/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
58. The ____________ translates internet domain and host names to IP address. 1 point
(L4) *
59. When displaying a web page, the application layer uses the _____________ 1 point
(L4) *
HTTP protocol
FTP protocol
SMTP protocol
TCP protocol
60. The default connection type used by HTTP is _________ (L2) * 1 point
Persistent
Non-persistent
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 19/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
61. The first line of HTTP request message is called _____________ (L1) * 1 point
Request line
Header line
Status line
Entity line
web address
source code
user’s address
an attribute
Cookie
Web Server
FTP
Database
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 20/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
Intranet
Internet
Client-Server
Server
65. If an end to end connection is done at a network or IP level, and if there are N 1 point
hosts, then what is the number of keys required? (L4) *
N(N-1)/2
N(N+1)/2
N/2
encrypted message
both algorithm for performing encryption and decryption and encrypted message
decrypted message
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 21/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
67. Which one of the following allows the client to update their DNS entry as 1 point
their IP address change? (L3) *
dynamic DNS
DNS updater
DNS resolver
DNS handler
69. When the sender and the receiver of an email are on different systems, we 1 point
need only _________ (L2) *
One MTA
Two UAs
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 22/23
12/29/2020 EC16503-Computer Networks CIA -III MCQ
71. Bytes of data being transferred in each connection are numbered by TCP. 1 point
Fixed number
One
Forms
https://docs.google.com/forms/d/1dw48AO2dZUMwsv7EWPOcTR7jAlh2lzgtUg2bYYNFo2A/edit 23/23