1.      The network identification in an IP address is called
               as :-

               (a) Netid
               (b) id
2. Gigabit Ethernet operates on ________ data rate.
               (a)1000 Mbps
               (b)100 Mbps

3.In ATM, ________ is designed to support a data stream
that has a constant bit rate.

4. ARQ stands for :-
                (a)Automatic repeat request
                (b)Automatic retransmission request
                (c) Auto retransmission request
                (d) Automatic transmission request
5.Topology requires a central controller or hub.
                (a) Star
                (b) bus
                (c) ring
6.TCP offers :-
                (a)Full duplex service
                (b)some duplex service

7.Which of the following connects LAN to another of the
same type?
                (a)A network bridge
                (b)A network gateway
                (c)A network card

8.IPv6 is also known as IPng.
                  (a) True
                  (b) false

9. Layer one of the OSI model is :-
                  (a)Physical layer
                  (b)session layer
                  (c)transport layer
10.Data rate of traditional Ethernet is 100Mbps.

11. Auto negotiation is a feature of fast Ethernet.

12.The 5-7 digits are known as the country code of the
   Network User Address (NUA)

13.GMII is a physical component.

14.Which layer in the Ethernet standard communicates
  with the OSI network layer?

15.In HDLC ________ are used for flow and error control
   where piggy backing is impossible.
                (a)S - frame
                (b)Frame check sequence
16.The Frame Relay committed Information Rate
                (a) The minimum data rate on the network
                (b)The maximum data rate on the network
17.Transmission media is characterized by :-
                 (a) Throughput , Propagation speed , Propagation time
                 (b) Propagation speed , Propagation time , Received signal
18.In a access method a station that has token is :-
                  (a)Token passing
                  (b)Token processing
                  (c) both

19.Application programs as well as all protocol software
   from the internet layer upward use only IP address.
20.Multiple Choice Single Answer In which method a station reserves a slot for data by
setting its flag in a frame?
                     (b) Polling Access

21.The main advantage of ISO model is that :-
                (a)It allows integration of software and hardware
                (b) It fits in well in network

22.AAL sub layers are :-t
                (a)Convergence sub layer (CS) , Segmentation and reassembly (SAR)
                (b)Data link layer (DLC) , Media access control (MAC)

23.IPCP defines three categories of seven packets :-
                 (a)Configure , Terminate , Code
                 (b) Configure , Terminate , Code
                 (c) Both
                 (d) none

24.The fast Ethernet has ________ data rate.
                   (a)100 Mbps
                   (b)10 Mbps

25.Data link layer is responsible for transmitting
________ from one node to other.
                     (a) Frames
                     (b) packets
                     (c) Both
                     (d) none

26.Network layer is responsible for delivery of ________
from one source to other.
                   (a) Packets
                   (b) frames
                   (c) Both
                   (d) none

27.Operational features of Ethernet are:-
                   (a)10 mbps rate , CSMA/CD protocol , 500 meters length
                   (b)10 mbps rate , CSMA/CD protocol , Star topology
                   (c) Both
                   (d) none

28.The main functional difference between circuit switched digital networks (CSDN) and packet-
switched digital network (PSDN)is
                    (a)That a CSDN establishes a permanent
                      connection between two nodes where PSDN uses a virtual circuit
                   (b)That a CSDN establishes a permanent connection
                      between two nodes where PSDN uses a virtual circuit
                    (c) Both
                    (d) none

29.Frame Relay operates at :-
                  (a)Physical and data link layer
                  (b) Data Link layer
                  (c) Both
                  (d) none

30.HDLC supports :-
                  (a)Half duplex communication , Full duplex
                      communication , ARQ mechanisms
                  (b) Half duplex communication , ARQ mechanisms , Pipelining
                  (c) Both
                  (d) none

31.The ________ layer is responsible for host-to-host
                  (b) Data link
                  (c) Both
                  (d) none

31.The physical path in ATM is :-
                    (a)Physical connection between two switches ,
                    Connection between an end point and a switch , Used for data transfer
                    (b) Answer Physical connection between two switches , Used to
                      connect switches , Used for data transfer
                    (c) Both
                    (d) none

32.In Base T4 Ethernet ________ line coding is used.
                   (a)8B /6T
                   (b) 8B /10B
                   (c) Both
                   (d) none

33.Channelization protocols are :-
                   (a) TDMA , CDMA , FDMA
                   (b)CDMA , CSMA/CD protocol
                   (c) Both
                   (d) none

34.Error control is________.
                    (a) Error detection and correction
                    (b) Error detection and correction
                    (c) Both
                    (d) none
35.The Types of error that Internet Control Message Protocol (ICMP) can handle are :-
                    (a)Destination unreachable , Source quench , Redirection
                    (b)Destination unreachable , Redirection
36.The functions of ATM layers are :-
                     (a)Routing , Switching , Multiplexing
                     (b)Routing , Switching , Bridging

37. Base band is :-
                      (a) Transmission of signals without modulation
                      (b) Transmission of signals with modulation

38.The basic Ethernet design does not provide :-
                   (a)Automatic retransmission of a message
                   (b)Multiple virtual networks

39.In digital data transmission :-
                      (a) Baud rate is equal to bit rate , Baud rate is
                        always smaller than the bit rate
                      (b) Baud rate is equal to bit rate

40.In X.25 network layer protocol, the data contains________.
                     (a) One octet of header plus data
                     (b) Two octet of header plus data

41.A data terminal serves as :-
                    (a)Effecter , Sensor
                    (b) Transmitter , Modulator

42.Topology requires a multipoint connection called :-
                    (b) Star

43. The 5-7 digits are known as the country code of the Network User Address (NUA)
                      (a) False
                      (b) True

44. An error detecting code which is the remainder resulting from dividing the bits to be
checked by a predetermined binary number, is known as :-
                   (a) Cyclic Redundancy check
                   (b) Error rate

45.Flow control ________.
                 (a)Prevents overflow at receiver
                 (b)Prevents overflow at transmitter

46. Fiber Optic Ethernet is also known as:-
                    (b) 10BASET

47.The ________ Timer is used in termination phase.
                (a)Time waited
                (b)Time count

48.In Base T4 Ethernet ________ line coding is used.
                   (a) 8B /6T
                   (b) 8B /10B

49. Which of the following device copies electrical signals from one Ethernet to another?
                     (b) Passive hub

50. Which of the following connects LAN to a WAN?
                     (a) A network gateway
                     (b) A network router

51. Which of the following communications lines is best suited to interactive processing
                     (a) Full-duplex lines
                     (b) half-duplex lines

52. A spanning tree bridge :-
                    (a)Has no loops , Creates logical topology , Uses BPDU
                    (b)Has no loops , Uses BPDU , Forward every frame

53.n fast Ethernet functions of autonegotiation are :-
                     (a)To allow incompatible devices to one other , To allow one device to have
                        multiple capability , To allow station to check hub's capability
                     (b)To allow incompatible devices to one other , To allow
                        one device to have multiple capability

54.The simultaneous transmission of data to a number of stations is known as broadcast.
                  (a) True
                  (b) false

55.Which organisation has developed much of the original standards?
                    (a) IEEE
                    (b) IEAE

56. Peer to peer communication involves:-
                   (a)Computers to share information over a network
                   (b)Computers to share information over a lab

57.Twisted -pair Ethernet is also known as :-
                    (b)10 BASE2

58.Broadcasting methods are :-
                 (a)Flooding , Multidestination routing , Reverse path forwarding
                 (b)Random routing , Multidestination routing , Reverse path forwarding

59. In ALOHA ________ is the downloading carrier frequency.

                    (a) 413 MHz
                    (b) 407 MHz

60.Bandlimited signal is :-
                    (a) A signal all of whose energy is contained within a finite frequency range
                    (b)The simultaneous transmission of data to a number of stations

61.In the TCP/IP suite the protocol used for physical addressing of the next hop :-

62.Categories of traditional Ethernet are :-
                    (a)10Base 5 , 10Base 2 , 10Base T
                    (b)10Base 5 , 10Base 5 , 10Base T

63. The functions of ATM layers are :-
                    (a)Routing , Switching , Multiplexing
                    (b)Routing , Switching , Multiplexing

64. The main purpose of a data link content monitor detect problems in protocols.

65. Frame Relay operates at :-
                  (a)Physical and data link layer
                  (b) Physical and data link layer

66.The actual transmission and reception of data on an RS - 232 interface occurs :-
                   (a)On pins 2 and 3
                   (b) On pins 3 and2

67.The ________ field is used to order packets of a message.
                 (a)Sequence number

68.In fast Ethernet autonegotiation allows ________ negotiation.
                    (a)Data rate
                    (b)Data speed

69. Error correction and detection in OSI model is done by :-
                    (a)Data link Layer , Transport Layer
                    (b)Physical layer
                    (c)Data link Layer

70.Link control protocol (LCP) is responsible for :-
                    (a)Establishing , Maintaining , Configuring
                    (b) Establishing ,linking

71. X.25 uses :-
                   (a)Packet assembler/disassembler
                   (b)packet switched network , Access lines to public data networks

72.The full abbreviation for AAL is________.
                    (a)Application Adaptation layer
                    (b)Application allocation layer

73. The ________ timer is needed to handle the zero window size.
                 (a) Persistence
                 (b) Keep alive

74.Frame Relay is not used for ________ due to delays in transmission of variable frame sizes.
                  (a) Real-time video
                  (b) Reverse-time video
75.Demodulation is the process of converting digital signals to analog signals.
                 (a) False

76.A device that can convert digital signals to analog signals is a packet.
                  (a) False

77.A hub is actually :-
                 (a) A multiport repeater
                 (b) A multiport converter

78. The cost assigned for passage of a packet through a network is called :-
                 (a) Metric
                 (b) Matrix

79.PAP packets include :-
                (a)Authenticate request , Authenticate ack
                (b) Authenticate nak

80.In 100BaseX ________ bits of data is received from network interface card.
                (a) 8

81.In digital data transmission________.
                    (a) Baud rate is equal to bit rate
                    (b) Baud rate is equal to byte rate
82.A client is defined as –
           a) Requester of services
           b) Provider of services
           c) User of services
           d) None of the above.
83.A server is defined as –
           (a)Requester of services
           (b)Provider of services
           (c)User of services
           (d)None of the above.
 84.DCE is brief of –
           (a)Data Computing Environment
           (b)Distributed Component environment
           (c)Digital Computer Environment
           (d)Distributed Computing Environment
85.Scalability is related to –
           (a)Speed Capacity
           (c)Performance capacity
           (d)None of the above.
86.A of ACID is –

87.Durability of ACID Means –
           (a)Once a transaction is committed, the change must persist.
           (b)Once a transaction is committed, the change must not persist.
           (c)Once a transaction is committed, the change must rollback.
           (d)None of the above.
88.Data warehouses relates to –
           (a)(Data Distribution
           (b)Data definition
           (c)Data mining
           (d)None of the above.
89.CORBA abbreviates –
           a) Common Object Remote Broker Architecture
           b) Common Object Robots Broker Architecture
           c) Common Object Request Broker Architecture
           d) Common Object Responsibility Broker Architecture
90.OOD is concerned with-
           a) Object Model
           b) Object Design
           c) Object Oriented Model
           d) None of the above.
91.OOPL abbreviates-
           a) Object Open Program Link
           b) Object Open Process Link
           c) Object Oriented Programming Link
           d) Object Oriented Programming Language
92.DCOM stand for
           (a)division component object model
           (b)distributed component object modulation
          (c) distributed component object model
          (d)None of the above.
93.load balancing means
           (a) division of task
           (b) blancing of task
           (c) Assignment of task
           (d) load distribution

94.SMP stand for
          (a)simple mail protocols
          (b)symmetric mail protocols
          (c) symmetric multi processing
          (d)None of the above. RMI abbreviates for
          (a)java remote multi processing interface
          (b)java remote method invocation.
          (d)None of the above.

 96.latency means :-
             (a)The physical distance and number of network element.
             (b)The logical distance and number of network element.
             (d)None of the above.
97. TP monitor first became popular in the………….
98. java.rmi.RemoteException class is super class of..
           (a) InterruptedException
           (b) ArithmaticException
           (c) Exception
           (d) None of the above.
99.The interfaces and class that are responsible for specifying the remote behavior of
                (a)RMI sys
                (b)RMO sys
                (d)None of the above.
100.Scability in the sense of distributed environment is-
        a) to ensure the number of users as the number of operations increases.
        b) To ensure the acceptable number of operations as the number of users
        c) Both
        d) None of the above.
  Q1.MOM expanded as

  1.   Medium-oriented Middleware
  2.   Market oriented machine
  3.   Message-oriented middleware
  4.   All are valid

  Q2. Allowing the application to be distributed over multiple heterogeneous platforms
  can increase the interoperability, portability and flexibility of an application. This can
  be achieved by:
  1. MOM
  2. API
  3. Client server infrastructure
  4. None of the above

  Q3. Remote objects are only collected when
  1. Local references don’t exist.
  2. Remote references don’t exist.
  3. Both a & b
  4. None of the above

  Q4. Data is only “offered” on the server, not processed
  1. True

  Q5. RMI uses a reference-counting garbage collection similar to Modula-3’s Network
  1. Correct
  2. Incorrect

  Q6.Objects are only closable using --- language
  1. C
  2. C++
  3. Java
  4. SQL

  Q7.The wait and notify methods for java.lang.object deal with the waiting and
  notification in the context of the java programming languages ----model
  1. Thread
  2. Activation
  3. Both 1 and 2
  4. None of the above
Q8.OSF uses an open process to design the architectural frame works part of its
distributed computing environment request for technology effort
1. Correct statement
2. Incorrect statement

Q9. DCS DFS uses a set of tokens to keep track of ---- information
1. Cached
2. Flexible
3. Speed
4. All are valid

Q10. UTC stands for
1. Universal communicated time
2. Unicode coordinated table
3. Universal Coordinated time
4. All of the above are true

Q11. Alerts are used to provide graceful and reliable ----- termination
1. Process
2. Program
3. Thread
4. All of the above

Q12. The directory service needs to support features such as
1. White pages
2. Yellow pages
3. Link and group service
4. All of the above

Q13. Out of all which fundamental services provide a layer between the application
and the operating system
1. File and threads
2. Time and directory
3. All of the above
4. Remote procedure call mgmt

Q14.Legend x denotes an ---- point
1. Integration
2. Differentiation point
3. Information
4. None of the above

Q15.The getData method returns a
1. Data
2. Object data
3. Marshaled object
4. None of the object

Q16.Transforming a passive objects into an active object is a process known as ----
1. Initialization
2. Transformation
3. Activation
4. Registry

Q17.The activation system uses ------ numbers to detect late
ActivationSystem.activeGroup and ActivationMonitor.inactiveGroup calls
1. Integer system
2. Floating point numbers
3. Decimal number
4. Incantation numbers

To top