1. The computer network is 

(A) Network computer with cable
(B) Network computer without cable
(C) Both of the above
(D) None of the above

2. Wireless transmission can be done via

(A) radio waves
(B) microwaves
(C) infrared
(D) all the above

3. Which one of the following is a transport layer protocol used in internet?

(C) both (A) and (B)
(D) None of the above

4. The processes that keep track of all mobile hosts visiting the area is ……………..

(A) Home agent
(B) Mobile agent
(C) Foreign agent
(D) User agent

5. Which one of the following extends a private network across public networks?

(A) local area network
(B) virtual private network
(C) enterprise private network
(D) storage area network

6. The IETF standards documents are called

(C) ID
(D) None of the above

7. The …………….. of A TSI controls the order of delivering of slot values that are stored in RAM.

(A) cross bar
(B) cross point
(C) control unit
(D) transceiver

8. Which of the following does not allow multiple uses or devices to share one communication line?

(A) doubleplexer
(B) multiplexer
(C) concentrator
(D) controller

9. Time out determination policy is used in …………………..

(A) network layer
(B) transport layer 
(C) data link layer
(D) application layer

10. In mesh topology, relationship between one device and another is ..............

(A) Primary to peer
(B) Peer to primary
(C) Primary to secondary
(D) Peer to Peer