You are on page 1of 6

Data Communication and Computer Networks Set 1

Data Communication and Computer Network


Questions and Answers 1 to 10
1. Which error detection method consists of a parity bit for each data unit as well as
an entire data unit of parity bits?
(a) VRC
(b) LRC
(c)
CRC
(d) Checksum
(e) None of the above.
2. Which of the following encoding method does not provide for synchronization?
(a) NRZ-L
(d) HDB3

(b) RZ
(e) Manchester.

(c) B8ZS

3. Consider the following Fig 1 which consists of five different network topologies
In the above figure, which of the following correctly identifies the respective
topologies?
Graph, ring, star, unconnected, fully connected
Star, ring , tree, uncompleted, fully connected
Star, rounded, graph, irregular, fully connected
Ring, tree, star, regular, fully connected
Star, ring, tree, irregular, fully connected.
4. Shannons noisy channel capacity theorem states that C = H Log 2( 1 + S/N) bits
per second. In this equation H stands for
C is the bandwidth of the signal
H is the bandwidth of the Channel
C is the bandwidth of the Channel
H is the bandwidth of the signal
S/N is in decibels.
5. When signals are used to transmit digital data
Channel of infinite bandwidth must be used for 100% accurate reception of data
A modulation technique must always be used
The data rate is only limited by the bandwidth of the channel used
Data must be decoded on to the signal at the transmitter
The Noise level of the channel can increase the bandwidth.
6. In go-back-n ARQ, if frames 4, 5, 6 are received successfully, What is the ACK
number receiver may send to the sender?
(a) 5
8

(b) 6
(e) 9.

(c) 7

(d)

7. Transmitted signals across band limited channels are distorted due to


External interferences.
Attenuation of some of the frequency components
Delays in some frequency components
Reductions in the amplitudes of the transmitted frequency components
Amplification of the unwanted frequency components.
8. The following statements can be made in general on data communication links.
Digital data cannot be transmitted along analog transmission links.
A modem is an essential component of a serial data link.
Full duplex communication is not done on serial transmission.
Parallel links are used in interconnecting subsystems of a computer system.
Which of the following statements are correct?
(I) and (IV) are correct, (II) and (III) are incorrect
(I) and (II) are correct, (III) and (IV) are incorrect
(II) and (IV) are correct, (I) and (III) are incorrect
(II) and (III) and (IV) are correct, (I) is incorrect.
(I), (II) and (III) are incorrect, (IV) is correct.
9. In a Bit Oriented Synchronous Transmission Scheme, the bit pattern
1010111111111111110001100000001010111110 has to be transmitted as the frame
content. If the opening and the closing flags have the form 01111110, which of the
following pattern(s) enable(s) data transparency?
01111110101011111111111111000110000000101011111001111110
01111110101011111011111011110001100000001010111110001111110
011111010101011111011111011110001100000001010111110011111010
0111111010101111110111111011000110000000101011111001111110
0111111010101111111111111110001100000100101011111001111110.
10 How many bits are allocated for the host part in a class A type of an IP address?
.
(a) 8
(b) 16
(c) 24
(d) 32
(e) 48.

Answers

Data Communication and Computer Networks Set 2


DATA COMMUNICATION AND COMPUTER NETWORK
QUESTIONS AND ANSWERS 11 TO 20
1 WHICH OF THE FOLLOWING INDICATE AN ERROR IF AN ODD PARITY
1. APPROACH IS USED?
(A) 10101011
(B) 01001010
(C) 10101010
(D)
10010010
(E) 10011101
1 THERE ARE FIVE (5) TYPES OF CABLING WHICH ARE COMMONLY USED IN
2. A ETHERNET .FOR THE 10BASE5 AND 10BASE2 CABLE STANDARDS, THE
MAXIMUM SEGMENT SIZE AND THE MAXIMUM NUMBER OF NODES PER
SEGMENT RESPECTIVELY ARE
10BASE5:200M, 30 10BASE2: 500M, 100
10BASE5:100M, 50 10BASE2: 200M, 100
10BASE5:500M, 30 10BASE2: 100M, 30
10BASE5:500M, 100
10BASE2: 200M, 30
10BASE5:500M, 100
10BASE2: 200M, 20
1 THE ACRONYM ADSL STANDS FOR
3.
ANALOG AND DIGITAL SYNCHRONOUS LINK.
ASYNCHRONOUS DATA SPECIFIC LANGUAGE
ASYMMETRIC DIGITAL SUBSCRIBER LINE
APERTURE DISTANCE OF SATELLITE LINK
ANALOG DATA SPEED LIMIT.
1 FORTY STATIONS ARE ON AN ETHERNET LAN. A 10-PORT BRIDGE
4. SEGMENTS THE LAN. WHAT IS THE EFFECTIVE AVERAGE DATA RATE OF
EACH STATION?
(A) 1.0 MBPS
(B) 2.0 MBPS
(C) 2.5 MBPS
(D) 5.0
MBPS
(E) 6.0 MBPS.
1 WHAT BIT IN THE X.25 STANDARD ALLOWS THE USER TO DEFINE THE
5. SOURCE OF CONTROL INFORMATION?
(A) Q

(B) D
(E) R.

(C) M

(D) P

1 WHAT IS THE FIELD ON A CELL HEADER IN THE ATM LAYER DETERMINES


6. WHETHER A CELL CAN BE DROPPED.
(A) VPI
(B) VCI
(C) CLP
(D)
GFC
(E) PT.
1 WHICH OF THE FOLLOWING USES THE GREATEST NUMBER OF LAYERS IN
7. THE OSI MODEL?
(A) BRIDGE
(B) REPEATER
(C) ROUTER
(D) GATEWAY
(E) NONE OF THE ABOVE.
1 WHICH OF THE FOLLOWING LAYER IS ALSO CALLED AS APPLICATION
8. ADAPTATION LAYER?
SIMPLE AND EFFORT ADAPTATION LAYER
SIMPLE AND EFFICIENT ADAPTATION LAYER
SIMPLE AND EFFICIENT ABNORMAL LAYER
SIMPLE AND EFFORT LESS ADAPTATION LAYER
SAMPLE AND EFFICIENT ADAPTATION LAYER.
1 A PACKET TRAVELING FROM ONE TOKEN RING NETWORK TO ANOTHER
9. TOKEN RING NETWORK USES WHICH OF THE FOLLOWING SERVICES OF A
DEVICE (EACH NETWORK IS AN INDEPENDENT NETWORK)
(A) SIMPLE BRIDGE
(B) REPEATER
(C) ROUTER
(D) TRANSPARENT BRIDGE
(E) GATEWAY
2 WHAT TYPE OF ADDRESSING IS SPECIFICALLY USED BY THE TRANSPORT
0. LAYER?
STATION ADDRESSES
NETWORK ADDRESSES
APPLICATION PROGRAM PORT ADDRESSES
DIALOG ADDRESSES
INTERFACE ADDRESSES

Answers
Answer
11. : (c)
Reason : 10101010 bit pattern is used to indicate an error if an odd parity approach is used.
Answer
12. : (d)
Reason : 10Base5:500m, 100
10Base2: 200m, 30 .
Answer
13. : (c)
Reason : The acronym ADSL stands for Asymmetric Digital Subscriber Line.
Answer
14. : (c)
Reason : Forty stations are on an Ethernet LAN. A 10-port bridge segments the LAN. The effective average
data rate of each station is 2.5 Mbps.
Answer
15. : (a)
Reason : Q (qualifier) bit in the X.25 standard (GFI general format identifier) allows the user to define the
source of control information.
Answer
16. : (c)
Reason : CLP field on a cell header in the ATM layer determines whether a cell can be dropped.
Answer
17. : (d)
Reason : Gateway is internetworking device , which is the greatest number of layers in the OSI model.

Answer
18. : (b)
Reason : Application Adaptation Layer 5 is also called as Simple and efficient adaptation layer.
Answer
19. : (d)
Reason :
A packet traveling from one Token Ring network to another Token Ring network uses the
services of a transparent bridge.
Answer
20. : (c)
Reason : Application program port addresses is the type of addressing is specifically used by the transport
layer.

Data Communication and Computer Networks Set 3

Data Communication and Computer Network


Questions and Answers 21 to 30
2 HTTP (Hyper Text Transfer Protocol) has similarities to both of the following
1. protocols
(a) FTP; SMTP
(b) FTP; SNMP
(c) FTP; MTV
(d) FTP; URL
(e) SMTP; SNMP
2 What is the bit combination used by the SAPI field of ISDNs data link layer, to
2. control call for end-to-end signaling in LAPD addressing format?
(a) 000000

(b) 000010
(c) 010000
(d) 000001
(e) 111111.
2 Which category of AAL of ATM is intended to support connection-oriented data
3. services?
(a) AAL1
(b) AAL2
(c) AAL3
(d)
AAL4
(e) AAL5.
2 In the process of congestion control, the bits FECN and BECN of frame relay
4. protocol are useful to
Warn sender and receiver of congestion in the network respectively
Warn receiver and sender of congestion in the network respectively
Warn only receiver of congestion in the network respectively
Warn only sender of congestion in the network respectively
Indicate the congestion but no warning to either sender or receiver is given
2 MIME allows what type of data to be sent through SMTP?
5.
(a) Audio
(b) Non-ASCII data
(c) Image
(d) Video
(e) All of the
above.
2 Which of the following application protocol is a framework for managing devices in
6. an internet using the TCP/IP protocol suite.
(a) SMTP

(b) SNMP
(c) FTP
(d) TELNET
(e) HTTP.
2 Which of the following component of SMTP can transform non-SMTP mail to
7. SMTP format and vice versa.
(a) mail spool
(b) mail gateway
(d) mail exchanger (e) none of the above.

(c) mail file

2 What names objects, defines the type of data that can be stored in an object, and
8. encodes data for network transmission.
(a) MIB
(b) SMI
(c) SNMP
(d)
ASN.1
(e) BER .
2 Flow Control in data communications
9.
Can be implemented using a CSMA/CD Protocol
Makes a channel an error-free one.
Can be implemented using a Stop-and-Wait Protocol
Cannot be implemented on a simplex link
None of the above.
3 Which of the following is not correct regarding the Simple Mail Transfer Protocol
0. (SMTP) and Post Office Protocol3 (POP3)?
SMTP delivers email by having the source machine establish a TCP connection to
port 25 of the destination machine
SMTP and POP3 are simple one ASCII protocols
POP3 uses the port 20 by default to establish a connection
POP3 is used for fetching email from a remote mailbox
SMTP provides for mail exchange between users on the same or different
computers.

etween the client and the server look like SMTP messages.

Answers

You might also like