KKR & KSR INSTITUTE OF TECHNOLOGY & SCIENCES
(Approved by AICTE, New Delhi & Affiliated to JNTU, Kakinada)
DEPARTMENT: ECE DATE: 06-09-2022
CLASS: IV B.TECH I SEM Academic Year: 2022-23
Quiz No: 01
Branch: ECE
Name: Sub: COMPUTER NETWORKS Max. Time: 20 Min
Roll No: Max. Marks: 20
* Enter correct option in [ ], Ex: - [ a ] or [ b ] or [ c ] or [ d ]
* Each Question Carries 1 Mark
1 Computer Network is______ [ ]
A. Collection of hardware components and computers B. Interconnected by communication channels
C. Sharing of resources and information D. All of the Above
2. Protocols are________ [ ]
A. Agreements on how communication components and DTE's are to communicate
B. Logical communication channels for transferring data
C. Physical communication channels sued for transferring data
D. None of above
3. Two devices are in network if [ ]
A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
4. ________ is a Firewall in Computer Network. [ ]
A. The physical boundary of Network B. An operating System of Computer Network
C. A system designed to prevent unauthorized access D. A web browsing Software
5. The IETF standards documents are called [ ]
A. RFC B. RCF C. ID D. None of the mentioned
6. _____ data communication method is used to transmit the data over a serial communication link. [ ]
A. Simplex B. Half-duplex C. Full duplex D. All of above
7. Each IP packet must contain [ ]
A. Only Source address B. Only Destination address
C. Source and Destination address D. Source or Destination address
8. _______ is the minimum header size of an IP packet. [ ]
A. 16 bytes B. 10 bytes C. 20 bytes D. 32 bytes
9. Routing tables of a router keeps track of [ ]
A. MAC Address Assignments B. Port Assignments to network devices
C. Distribute IP address to network devices D. Routes to use for forwarding data to its destination
10. ____________ is not the External Security Threats. [ ]
A. Front-door Threats B. Back-door Threats
C. Underground Threats D. Denial of Service (DoS)
KKR & KSR INSTITUTE OF TECHNOLOGY & SCIENCES
(Approved by AICTE, New Delhi & Affiliated to JNTU, Kakinada)
11. OSI Reference Model has ________ layers. [ ]
A. 4 B. 5 C. 6 D. 7
12. __________ is not the possible ways of data exchange. [ ]
A. Simplex B. Multiplex C. Half-duplex D. Full-duplex
13. The management of data flow between computers or devices or between nodes in a network is called [ ]
A. Flow control B. Data Control C. Data Management D. Flow Management
14. Port number in a TCP connection specify___________ [ ]
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
15. The purpose of the PSH flag in the TCP header is _______. [ ]
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
16. __________ protocol is/are defined in Transport layer. [ ]
A. FTP B. TCP C. UDP D. B & C
17. The meaning of Straight-through Cable is [ ]
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
18. Size of MAC Address is _________ [ ]
A. 16-bits B. 32-bits C. 48-bits D. 64-bits
19. Repeater operates in _________ layer of the OSI model [ ]
A. Physical layer B. Data link layer
C. Network layer D. Transport layer
20. ______________ layer of OSI model also called end-to-end layer. [ ]
A. Presentation layer B. Network layer
C. Session layer D. Transport layer