B.Tech CSE Exams Data Communications Objective Bits

Following are objective questions for B.Tech CSE paper Data Communications and Networks for Semester Exams of various Universities.

1. In_________ the router creates a distinct reservation for each flow [ ]
a)fixed filter style b)wild card filter style c)shared explicit d)reservation style
2. The__________________ class delivers cells at a minimum rate [ ]
a)constant bit rate b)variable bit rate c)available bit rate d)unspecified bit rate
3. ________layer is responsible for the movement of a signal from its optical source to its optical
destination [ ]
a)path layer b)line layer c)section layer d)photonic layer
4. __________is used to record the internet routers that handle the datagram [ ]
a)record route option b)strict source route option
c)end-of-option d)loose source route option
5. _________protocol is a client/server protocol designed to provide physical address to logical address
mapping [ ]
a)removing address resolution protocol b)bootstrap protocol
c)dynamic configuration protocol d)none
6. To reduce the contents of routing table is called [ ]
a)next-hop method b)network-specific method c)default method d)host specific method
7. The principle that states routing table is sorted from longest mask to shortest mask is [ ]
a)longest mask matching b)hierarchical routing c)geographical routing d)none
8. __________is a network that is connected to only one router [ ]
a)stub link b)point-to-point c)transient link d)virtual link
9. The dynamic ports ranging from [ ]
a)0 to 1023 b)1024 to 49,151 c)49,152 to 65,535 d)0 to 1024
10. ___________ is used to map an address to a name [ ]
a)inverse domain b)country domain c)generic domain d)none
11. I PV6 also known as________________
12. ___________involves in creation of a table that associates a logical address with a physical address
13. A technique called__________ ARP is used to create a subletting effect
14. IGMP stands for______________
15. ___________is group of networks and routers under the authority of a single administration
16. __________is an interdomain routing protocol using path vector routing
17. The combination of IP address and a port number is called a ______________
18. ___________packet is a packet sent by a node to source to inform it of congestion
19. If a label is non terminated by a null string it is called a _______________
20. The _____________domains define registered hosts according to their generic behaviour.
21) A router is___________ device that routes packets based on their logical addressing [ ]
a)two layer b)three layer c)four layer d)none
22) VLANS are [ ]
a)cost-and time efficient b)reduce network traffic
c)extra measure of secrity d)all the above
23) The mobile station that can communicate with two base stations at a time is [ ]
a)Hard Hand off b) soft Hand off c)Hand off d)none
24) ________layer is responsible for the movement of a signal from its optical source to its optical
destination [ ]
a)path layer b)line layer c)section layer d)photonic layer
25) A linear SONET network can be [ ]
a)point-to-point network b)multipoint c)either a or b d)none
26) ____________address is used by a host to test itself without going into network [ ]
a)loop back address b)compatible address c)unspecified address d)mapped address
27) __________is used to record the internet routers that handle the datagram [ ]
a)record route option b)strict source route option
c)end-of-option d)loose source route option
28) _________protocol is a client/server protocol designed to provide physical address to logical
address mapping [ ]
a)removing address resolution protocol b)bootstrap protocol
c)dynamic configuration protocol d)none
29) The principle that states routing table is sorted from longest mask to shortest mask is [ ]
a)longest mask matching b)hierarchical routing c)geographical routing d)none
30) __________is a network that is connected to only one router [ ]
a)stub link b)point-to-point c)transient link d)virtual link
31) _____________ is a device that operates only in physical layer
32) A___________________LAN is configured by software,not by physical wiring
33) Each base station in turn is controlled by a switching office called a ___________
34) ___________is a device that uses services of SONET network
35) A technique called__________ ARP is used to create a subnetting effect
36) IGMP stands for______________
37) ___________is group of networks and routers under the authority of a single dministration
38) __________is an interdomain routing protocol using path vector routing
39) The combination of IP address and a port number is called a ______________
40) ___________packet is a packet sent by a node to source to inform it of congestion
41. If a datagram router goes down then _ _ _ _ _ _ _ _ _ _ [ ]
a) all packets will suffer
b) only those packets which are queued in the router at that time will suffer
c) only those packets which are not queued in the router at that time will suffer
d) no packets will suffer
42. Why probe packets are transmitted in the network? [ ]
a) to know about the capacity of the channel b) to count the number of host in the network
c) to know about efficiency of the routing algorithm d) to know about the congestion
43. What type of addressing is specifically used by the transport layer? [ ]
a) Station address b) application program port address
c) Dialog address d) network address
44. Decryption and Encryption of data are the responsibility of which of the following layer [ ]
a) Session layer b) Network layer c) Transport layer d) Presentation layer
45. A _ _ _ _ _ _ _ _ _ _ _ _ _ field on a cell header in the ATM layer determines whether a cell can be dropped. [ ]
a) Virtual path identifier b) Virtual circuit identifier
c) Cell loss priority d) Generic flow constant
46. Which AAL type is designed to support a data stream that has a constant bit rate? [ ]
a) AAL1 b) AAL2 c) AAL3/4 d) AAL5
47. The DNS name space is divided into non overlapping _ _ _ _ _ _ _ _ _ _ _ _ _ _ . [ ]
a) regions b) blocks c) divisions d) zones
48. In datagram subnet new route is chosen _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _. [ ]
a) for every packet sent b) for all the packet sent
c) only for the first packet d) for the packet which is not transmitted
49. In open loop congestion control techniques, the decisions are based on the _ _ _ _ _ _ . [ ]
a) without regard to the current state of the network b) with regard to the current state of the
network
c) with regard to the choice of the host d) without regard to the choice of the host
50. The TCP sockets are assigned address using _ _ _ _ _ _ _ _ _ _ _ _ primitive. [ ]
a) LISTEN b) ACCEPT c) BIND d) CONNECT
51. SEND and RECEIVE primitives are called as ___________ primitives.
52. In ____________ each packet of a message need not follow the same path from sender to
receiver.
53. When routers are being inundated by packets that they cannot handle, they just throw them
away isknown as __________
54. The art of breaking ciphers is ____________
55. ________ layer in the ATM protocol reformats the data received from other networks?
56. In DNS, the resource records are presented in ___________ format.
57. A single transport layer connection split and connects the different network connections is
called___________
58. When too many packets are present in the subnet and performance degrades then it leads to
__________
59. What is the routing algorithm used in MANETs? _______________________
60. The program that accepts the commands for composing, receiving and replying to messages,
as well as for manipulating mailboxes is _____________
61. The pair of wires connecting a subscriber to the closest telephone office is called [ ]
A)WAN B) MAN C) Local Loop D) None
62. Simultaneous Transmission in both directions is a transmission mode called [ ]
A) Half Duplex B) Full Duplex C) Both A&B D) None
63. Based on IS-95 standard CDMA channel bandwidth of voice channel is [ ]
A) 55 B) 64 C) 90 D) 110
64. Data added to the original information is called [ ]
A) Over head B) Message Frame C) Character Frame D) ALL
65. DTMF originally called [ ]
A) Touch-Tone B) LGF C) Both A&B D) None
66. Data signals are transmitted at a lower level than_____ Signals [ ]
A) Electrical B) Voice C) Transmission D) None
67. Transmission From base station to mobile units are called [ ]
A) Down-Link B) Up-Link C) Reverse Links D) Forward Links
68. Signaling and all-Digital data Network is called [ ]
A) ISDN B) GSM C) CDMA D) Above ALL
69. Compromise Equalizers are located in the transmit section of [ ]
A) Modem B) Network C) Both A&B D) None
70. SDLC Transmission states [ ]
A) Transient B) Address C) Control D) Above All
71. Code-39 character contains __________ No. of vertical Elements.
72. Character Synchronization involves identifying the Beginning & End of a character within a
_____________
73. Intelligent (Smart) Modems were introduced in early _________
74. Protocols are nothing but ________________
75. Block check Character is an _______________ type of Character.
76. ESS stands for______________________________________
77. Computer Network Communicates using _______________
78. Asynchronous Protocols are _______________________
79. Echoplex is _______________________
80. Synchronous Data Link Control (SDLC) is a Synchronous ________ Oriented Protocol.

Related Posts Plugin for WordPress, Blogger...

Share This:

Leave a Reply

Your email address will not be published. Required fields are marked *