Computer Network Final Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Republic of the Philippines

Province of Camarines Sur


GOVERNOR MARIANO E. VILLAFUERTE COMMUNITY COLLEGE-SIRUMA
Poblacion, Siruma, Camarines Sur
[email protected]

CHS6 / CHS312- COMPUTER NETWORK


Final Examination
A/Y 2021-2022
1st Semester
Name:______________________________________ Score:______________________
Course:_____________________________________ Date:_______________________

Test I. Direction: Select the best answer/s to the following multiple-choice questions. Circle your answer.
Goodluck!

1. Which of these is a standard interface for serial data transmission?


a. ASCII c. 2
b. RS232C d. Centronics
2) Which type of topology is best suited for large businesses which must carefully control
and coordinate the operation of distributed branch outlets?
a. Ring c. Hierarchical
b. Local area d. Star
3) Which of the following transmission directions listed is not a legitimate channel?
a. Simplex c. Full Duplex
b. Half Duplex d. Double Duplex
4) "Parity bits" are used for which of the following purposes?
a. Encryption of data c. To detect errors
b. To transmit faster d. To identify the user
5) What kind of transmission medium is most appropriate to carry data in a computer network that is
exposed to electrical interferences?
a. Unshielded twisted pair c. Coaxial cable
b. Optical fiber d. Microwave
6) A collection of hyperlinked documents on the internet forms the ?
a. World Wide Web (WWW) c. Mailing list
b. E-mail system d. Hypertext markup language
7) The location of a resource on the internet is given by its?
a. Protocol c. E-mail address
b. URL d. ICQ
8) The term HTTP stands for?
a. Hyper terminal tracing program c. Hypertext transfer protocol
b. Hypertext tracing protocol d. Hypertext transfer program
9) A proxy server is used as the computer?
a. with external access c. performing file handling
b. acting as a backup d. accessing user permissions
10) Which one of the following would breach the integrity of a system?
a. Looking the room to prevent theft
b. Full access rights for all users
c. Fitting the system with an anti-theft device
d. Protecting the device against willful or accidental damage
11) Which software prevents the external access to a system?
a. Firewall b. Gateway c. Router d. Virus checker
12) Which one of the following is a valid email address?
a. [email protected] b. gmail.com c. [email protected] d. javatpoint@books
13) Which of the following best describes uploading information?
a. Sorting data on a disk drive
b. Sending information to a host computer
c. Receiving information from a host computer
d. Sorting data on a hard drive
14) Which one of the following is the most common internet protocol?
a. HTML b. NetBEUI c. TCP/IP d. IPX/SPX
15) Software programs that allow you to legally copy files and give them away at no cost are called
which of the following?
a. Probe ware c. Shareware
b. Timeshare d. Public domain
16) The term FTP stands for?
a. File transfer program c. File transfer protocol
b. File transmission protocol d. File transfer protection
17) At what speed does tele-computed refer?
a. Interface speed c. Baud rate
b. Cycles per second d. Megabyte load
18) Which one of the following is not a network topology?
a. Star b. Ring c. Bus d. Peer to Peer
19) The maximum length (in bytes) of an IPv4 datagram is?
a. 32 b. 1024 c. 65535 d. 512
20) Which of the following statements could be valid with respect to the ICMP (Internet Control
Message Protocol)?
a. It reports all errors which occur during transmission.
b. A redirect message is used when a router notices that a packet seems to have been routed
wrongly.
c. It informs routers when an incorrect path has been taken.
d. The "destination unreachable" type message is used when a router cannot locate the
destination.
21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following
subnet masks can be used for the above requirement?
a. 255.243.240 b. 255.255.0.0
c. 255.255.0 d. 255.255.255
22) When the mail server sends mail to other mail servers it becomes ___ ?
a. SMTP client b. SMTP server c. Peer d. Master
23) The length of an IPv6 address is?
a. 32 bits b. 64 bits c. 128 bits d. 256 bits

24) Consider the following:


1. Twisted pair cables
2. Microwaves and Satellite Signals
3. Repeaters
4. Analog Transmissions
5. Fiber optics
Which of the above is consider as (a) signal transmission medium is data communications?
a. (1) and (5) c. (1) (2) and (5)
b. (1) and (2) d. (1) (2) (3) and (5)
25) Which of the following address belongs class A?
a. 121.12.12.248 c. 128.12.12.248
b. 130.12.12.248 d. 129.12.12.248

26) Which of the following is correct IPv4 address?


a. 124.201.3.1.52 c. 300.142.210.64
b. 01.200.128.123 d. 10110011.32.16.8
e. 128.64.0.0
27) Which of the following IP addresses can be used as (a) loop-back addresses?
a. 0.0.0.0 c. 255.255.255.255
b. 127.0.0.1 d. 0.255.255.255
28) The term WAN stands for?
a. Wide Area Net
b. Wide Access Network
c. Wide Area Network
d. Wide Access Net
29) Which of the following cannot be used as a medium for 802.3 ethernet?
a. A thin coaxial cable
b. A twisted pair cable
c. A microwave link
d. A fiber optical cable
30) What IP address class allocates 8 bits for the host identification part?
a. Class A b. Class B c. Class C d. Class D
31) The term IANA stands for?
a. Internet Assigned Numbers Authority
b. Internal Assigned Numbers Authority
c. Internet Associative Numbers Authoritative
d. Internal Associative Numbers Authority
32) How many versions available of IP?
a. 6 version
b. 4 version
c. 2 version
d. 1 version
33) Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
a. Host to host c. Internet
b. Application d. Network Access
34) An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long size.
Calculate the maximum throughput.
a. 5999 b. 6900 c. 6027 d. 5027
35) On a simplex data link, which of the following is a possible error recovery technique?
a. Backward error correction (BEC)
b. The use of hamming codes
c. Automatic Repeat Request (ARQ)
d. Downward error correction (DEC)
36) Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its
variants?
a. Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the data
stream is probabilistic.
b. TDM requires the transmitter and receiver to be synchronized periodically.
c. TDM performs efficiently if the arrival pattern of the data stream is probabilistic.
d. Statistical TDM is efficient if the data stream is deterministic.
37) The term IPv4 stands for?
a. Internet Protocol Version 4
b. Internet Programming Version 4
c. International Programming Version 4
d. None of these
38) The term LAN stands for?
a. Local Area Net
b. Local Aera Network
c. Local Array Network
d. Local Array Net
39) Which of the through is share the data of two computer?
a. Library b. Network c. Grouping d. Integrated system
40) In specific, if the systems use separate protocols, which one of the following devices is used to
link two systems?
a. Repeater b. Gateway c. Bridge d. Hub
41) How many digits of the Data Network Identification Code (DNIC) identify the country?
a. first three b. first four c. first five d. first six
42) Which of the following methods is used to broadcast two packets on the medium at a time?
a. Collision b. Synchronous c. Asynchronous d. None of the above
43) Which of the following is true with regard to the ping command?
a. Ping stands for Packet Internet Generator.
b. The ping command checks the port level connectivity between source destinations end
points.
c. Ping summarizes the packet loss and round-trip delay between two IP end points.
d. The ping command activates the RARP protocol of the IP layer.
44) The private key in asymmetric key cryptography is kept by?
a. Sender c. Sender and Receiver
b. Receiver d. None of the these

45) Which of the following algorithms is not used in asymmetric-key cryptography?


a. RSA algorithm c. Electronic code book algorithm
b. Diffie-Hellman algorithm d. None of the mentioned

46) In the cryptography, the sequence of the letters is rearranged by?


a. Transposition ciphers c. Both a and b
b. Substitution ciphers d. None of these

47) What is the maximum efficiency of pure aloha at G = 1/2?


a. 1.89 b. 17.99 c. 18.999 d. 18.4

48) What is the maximum efficiency of slotted aloha at G = 1?


a. 36.8 b. 35.8 c. 35.5 d. 37.8

49) Which of the following statement is true about error detection techniques used on
communications link?
a. Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
b. Error detection cannot be used on simplex links.
c. Hamming code can detect up to 3-bit errors.
d. All of the these

50) The correct order of corresponding OSI layers for having functionalities of routing and reconciling
machine representation differences with shared access resolution and ASCII test protocol is?
a. Network, Physical, Transport, Data link
b. Network, Physical, Data link, Application
c. Network, Presentation, Data link, Application
d. Network, Presentation, Physical, Transport

THANK YOU AND KEEP SAFE EVERYONE.

CONGRATULATIONS!

You might also like