0% found this document useful (0 votes)
141 views

Computer Network - Assignment 4

This document contains instructions for an assignment on computer networks. It instructs students to answer 25 multiple choice questions by changing the color of the right answer to green and bold. It provides information on the course name, subject name, subject code, and semester. It asks students to include their enrollment number on the document.

Uploaded by

Siddharth Rathod
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
141 views

Computer Network - Assignment 4

This document contains instructions for an assignment on computer networks. It instructs students to answer 25 multiple choice questions by changing the color of the right answer to green and bold. It provides information on the course name, subject name, subject code, and semester. It asks students to include their enrollment number on the document.

Uploaded by

Siddharth Rathod
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

Government Engineering College, Patan, At-Katpur

Electronics & Communication Department

Semester : 6th
Name of Subject : Computer Networks
Code of Subject : 3161007

Assignment: 4_MCQ

Instruction for Assignment_4

 All Question all compulsory.


 You have to change the color of right option to Green and make it
Bold also. (For Example check the answer of question 1)
 Write your Enrollment number in the space provided in footer.
 Submit the Soft copy in PDF Format. Rename the PDF file as
“Your Name_Your Enrollment No”

Enrollment No: Page 1


1 Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above

2. Protocols are?
A. Agreements on how communication components and DTE's are to communicate
B. Logical communication channels for transferring data
C. Physical communication channels sued for transferring data
D. None of above

3. Two devices are in network if


A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned

4. What is a Firewall in Computer Network?


A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software

5. The IETF standards documents are called


A. RFC
B. RCF
C. ID
D. None of the mentioned

6. Which data communication method is used to transmit the data over a serial communication
link?
A. Simplex
B. Half-duplex
C. Full duplex
D. All of above
7. Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source and Destination address
D. Source or Destination address

Enrollment No: Page 2


8. What is the minimum header size of an IP packet?
A. 16 bytes
B. 10 bytes
C. 20 bytes
D. 32 bytes

9. Routing tables of a router keeps track of


A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination

10. Which of the following is not the External Security Threats?


A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)

11. What is the IP Address range of APIPA?


A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255

12. Which of the following is not the possible ways of data exchange?
A. Simplex
B. Multiplex
C. Half-duplex
D. Full-duplex

13. The management of data flow between computers or devices or between nodes in a network
is called
A. Flow control
B. Data Control
C. Data Management
D. Flow Management

14. What does the port number in a TCP connection specify?


A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above

Enrollment No: Page 3


15. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message

16. Which of the following protocol is/are defined in Transport layer?


A. FTP
B. TCP
C. UDP
D. B & C

17. The meaning of Straight-through Cable is


A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted

18. What is the size of MAC Address?


A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits

19. Repeater operates in which layer of the OSI model?


A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer

20. Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer

21. Router operates in which layer of OSI Reference Model?


A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)

Enrollment No: Page 4


22. ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line

23. How many layers does OSI Reference Model has?


A. 4
B. 5
C. 6
D. 7

24 Bridge works in which layer of the OSI model?


A. Appliation layer
B. Transport layer
C. Network layer
D. Datalink layer

25. Why IP Protocol is considered as unreliable?


A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above

Enrollment No: Page 5

You might also like