Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

INDEPENDENT UNIVERSITY, BANGLADESH

CSE 316, SUMMER 2024 (Quiz 1)


Marks: 20 Time: 15 Minutes
Name: Avijit #01 Id: xxxx Sec:

1. Which of the following protocols operates at the Application layer of


the TCP/IP model and encompasses functionalities of the Session,
Presentation, and Application layers of the OSI model?

A. TCP B. IP C. HTTP D. Ethernet


2. Which of the following protocols operates at the Transport layer of the
TCP/IP model?

A. HTTP B. TCP C. IP D. Ethernet


3. Which characteristic of a data communications system ensures that data
must be received only by the intended device or user?
A. Accuracy B. Timeliness C. Delivery D. Jittr
4. In full-duplex mode, which analogy best describes the nature of
communication?
A. One-way Street B. Two-way Street C. One-lane Road D. Roundabout
5. Which of the following best describes the concept of encapsulation in
object-oriented programming?
A. Encapsulation is the process of combining data and methods that operate
on the data into a single unit, typically a class.
B. Encapsulation is a mechanism to allow multiple inheritance in
object-oriented programming.
C. Encapsulation is the process of defining a method in a superclass and
providing a new implementation in a subclass.
D. Encapsulation is the technique of using a class without revealing its
internal structure to the user.
6. In networking, what is the main purpose of decapsulation?
A. Decapsulation refers to the process of combining multiple data packets
into one for efficient transmission.
B. Decapsulation involves removing the header information from data packets
as they pass through the different layers of the OSI model.
C. Decapsulation is a technique used to encrypt data before transmission to
ensure security.
D Decapsulation is the process of converting an encrypted message back to
its original form.
7. The physical layer concerns with

A. bit-by-bit delivery
B. process to process delivery
C. application to application delivery
D. none
8. What does reliability in network terms refer to?

A. The efficiency of the software


B. The accuracy of message delivery
C. The frequency of failure and recovery time
D. The type of transmission medium used.
9. The main function of the transport layer in the OSI model is to:
A. Route packets across multiple networks
B. Ensure reliable data transfer between hosts
C. Encode and decode data into signals
D. Manage network connections and traffic control
10. Transport layer aggregates data from different applications into a
single stream before passing it to the:
A. Network layer B. data link layer C. Application layer D. physical layer
11. You are streaming a live sports event on your smartphone. Which
protocol is most likely being used to handle the video transmission to
ensure low latency and real-time delivery, even if some packets are lost?
A. TCP B. UDP C. HTTP D. FTP
12. You are downloading a large file from a remote server using an FTP
client. Which protocols at the application and transport layers are being
used to ensure reliable and ordered delivery of the file data, handling
retransmissions in case of packet loss?

A. FTP and UDP B. HTTP and TCP C.FTP and TCP D. SMTP and UDP
13. The network layer protocol of internet is

A. Ethernet B. internet protocol C.hypertext transfer protocol D. none


14. The network layer is responsible for:

A. Establishing end-to-end connections


B. Routing packets between different networks
C. Managing data encoding and transmission
D. Aggregating data from multiple applications
15. Which address is used on the internet for employing the TCP/IP
protocols?
A. physical address and logical address, B. port address
C. specific address, D. all of the mentioned
16. When you access a secure website, data is encrypted and decrypted to
protect sensitive information such as passwords and credit card details.
Which layer of the OSI model is responsible for this encryption and
decryption?

A.Application layer B.Transport layer C.Presentation layer D.Network


layer
17. During an online video conference, the communication session between
participants needs to be established, managed, and terminated. Which layer
of the OSI model is responsible for setting up, managing, and tearing down
these sessions?

A.Application layer B.Presentation layer C.Session layer D.Transport


layer
18. When accessing a remote server using a secure shell (SSH) connection,
which layer of the OSI model manages the synchronization of data exchange
and keeps track of the dialog between your computer and the server?

A. Application layer B. Session layer C. Presentation layer D. Network


layer
19. Which of the following is a transport layer protocol used in internet?

A.TCP B. UDP C. both A and B D. none


20. In a star topology network, what role does a hub play in the
communication between devices?
A. It routes data packets to the specific destination device using MAC
addresses.
B. It broadcasts data packets to all connected devices, regardless of the
destination.
C. It establishes a direct connection between two devices for
communication.
D. It encrypts and decrypts data before transmission.

You might also like