1. The computer network is
(A) Network computer with cable
(B) Network computer without cable
(C) Both of the above
(D) None of the above
2. Wireless transmission can be done via
(A) radio waves
(B) microwaves
(C) infrared
(D) all the above
(A) radio waves
(B) microwaves
(C) infrared
(D) all the above
3. Which one of the following is a transport layer protocol used in internet?
(A) TCP
(B) UDP
(C) both (A) and (B)
(D) None of the above
(A) TCP
(B) UDP
(C) both (A) and (B)
(D) None of the above
4. The processes that keep track of all mobile hosts visiting the area is ……………..
(A) Home agent
(A) Home agent
(B) Mobile agent
(C) Foreign agent
(C) Foreign agent
(D) User agent
5. Which one of the following extends a private network across public networks?
(A) local area network
(B) virtual private network
(C) enterprise private network
(D) storage area network
(A) local area network
(B) virtual private network
(C) enterprise private network
(D) storage area network
6. The IETF standards documents are called
(A) RFC
(B) RCF
(C) ID
(D) None of the above
(A) RFC
(B) RCF
(C) ID
(D) None of the above
7. The …………….. of A TSI controls the order of delivering of slot values that are stored in RAM.
(A) cross bar
(A) cross bar
(B) cross point
(C) control unit
(C) control unit
(D) transceiver
8. Which of the following does not allow multiple uses or devices to share one communication line?
(A) doubleplexer
(B) multiplexer
(C) concentrator
(D) controller
9. Time out determination policy is used in …………………..
(A) network layer
(A) network layer
(B) transport layer
(C) data link layer
(C)
(D) application layer
10. In mesh topology, relationship between one device and another is ..............
(A) Primary to peer
(B) Peer to primary
(C) Primary to secondary
(D) Peer to Peer
0 Comments
Post a Comment