Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
229 views2 pages

CN - MID-1 - Quiz Paper

The document is a quiz on computer networks for students of ECE department at KKR & KSR Institute of Technology & Sciences. It contains 20 multiple choice questions testing knowledge of fundamental computer network concepts. Some of the questions cover topics like the definition of a computer network, protocols, IP addressing, routing, OSI model layers, and TCP/IP protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views2 pages

CN - MID-1 - Quiz Paper

The document is a quiz on computer networks for students of ECE department at KKR & KSR Institute of Technology & Sciences. It contains 20 multiple choice questions testing knowledge of fundamental computer network concepts. Some of the questions cover topics like the definition of a computer network, protocols, IP addressing, routing, OSI model layers, and TCP/IP protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

KKR & KSR INSTITUTE OF TECHNOLOGY & SCIENCES

(Approved by AICTE, New Delhi & Affiliated to JNTU, Kakinada)


DEPARTMENT: ECE DATE: 06-09-2022
CLASS: IV B.TECH I SEM Academic Year: 2022-23
Quiz No: 01
Branch: ECE
Name: Sub: COMPUTER NETWORKS Max. Time: 20 Min
Roll No: Max. Marks: 20
* Enter correct option in [ ], Ex: - [ a ] or [ b ] or [ c ] or [ d ]
* Each Question Carries 1 Mark

1 Computer Network is______ [ ]


A. Collection of hardware components and computers B. Interconnected by communication channels
C. Sharing of resources and information D. All of the Above

2. Protocols are________ [ ]
A. Agreements on how communication components and DTE's are to communicate
B. Logical communication channels for transferring data
C. Physical communication channels sued for transferring data
D. None of above

3. Two devices are in network if [ ]


A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned

4. ________ is a Firewall in Computer Network. [ ]


A. The physical boundary of Network B. An operating System of Computer Network
C. A system designed to prevent unauthorized access D. A web browsing Software

5. The IETF standards documents are called [ ]


A. RFC B. RCF C. ID D. None of the mentioned

6. _____ data communication method is used to transmit the data over a serial communication link. [ ]
A. Simplex B. Half-duplex C. Full duplex D. All of above

7. Each IP packet must contain [ ]


A. Only Source address B. Only Destination address
C. Source and Destination address D. Source or Destination address

8. _______ is the minimum header size of an IP packet. [ ]


A. 16 bytes B. 10 bytes C. 20 bytes D. 32 bytes

9. Routing tables of a router keeps track of [ ]


A. MAC Address Assignments B. Port Assignments to network devices
C. Distribute IP address to network devices D. Routes to use for forwarding data to its destination

10. ____________ is not the External Security Threats. [ ]


A. Front-door Threats B. Back-door Threats
C. Underground Threats D. Denial of Service (DoS)
KKR & KSR INSTITUTE OF TECHNOLOGY & SCIENCES
(Approved by AICTE, New Delhi & Affiliated to JNTU, Kakinada)
11. OSI Reference Model has ________ layers. [ ]
A. 4 B. 5 C. 6 D. 7

12. __________ is not the possible ways of data exchange. [ ]


A. Simplex B. Multiplex C. Half-duplex D. Full-duplex

13. The management of data flow between computers or devices or between nodes in a network is called [ ]
A. Flow control B. Data Control C. Data Management D. Flow Management

14. Port number in a TCP connection specify___________ [ ]


A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above

15. The purpose of the PSH flag in the TCP header is _______. [ ]
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message

16. __________ protocol is/are defined in Transport layer. [ ]


A. FTP B. TCP C. UDP D. B & C

17. The meaning of Straight-through Cable is [ ]


A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted

18. Size of MAC Address is _________ [ ]


A. 16-bits B. 32-bits C. 48-bits D. 64-bits

19. Repeater operates in _________ layer of the OSI model [ ]


A. Physical layer B. Data link layer
C. Network layer D. Transport layer

20. ______________ layer of OSI model also called end-to-end layer. [ ]


A. Presentation layer B. Network layer
C. Session layer D. Transport layer

You might also like