You are on page 1of 3

www.jntuworld.

com
J
N
T
U
W
O
R
L
D
COMPUTER NETWORKS
76. Traditional LANs run at a speed of ( )
a) 10mbps to 100 mbps b) 10gbps to 100gbps c) 10kbps to 100kbps d) none
77. Which error detection method involves polynomials ( )
a) VRC b) LRC c) CRC d) None
78. ARPA Stands for ( )
a) Automatic research projects b) Advanced research projects academy
c) Advanced research project agency d) none
79. In the _____Layer the data unit is called a frame ( )
a) Physical b) data link c) network d) transport
80. The no. of bit positions in which two code word differ is called as ( )
a) Hamming Distance b)Parity bit c) Cyclic redundancy check d)flag
81. Piggy backing means ( )
a) Sending an acknowledgement separate
b) Sending an acknowledgement and data frames simultaneously
c) Sending only data frames
d) None
82. The maximum throughput of SLOTTED ALOHA is ( )
a) 1/e b) e c) e
2
d)1/e
2
83. An Ack 3 is sliding window flow control means that frame _______ is net expected by
The receiver. ( )
a) 2 b) 3 c) 4 d) 8
84.______is an agreement between the communication parties on how communication is to
proceed.
a)Protocol b)transmission c)interface d)peers
85. Which of the following is not a guided medium ( )
a) Twisted-pair cable b) coaxial cable c) f iber-optic cable d)
atmosphere
86. The bit period is divided in to two equal intervals by using -------- encoding.
www.jntuworld.com
www.jntuworld.com
J
N
T
U
W
O
R
L
D
a) natural NRZ b) polar NRZ c) inverted NRZ d) Manchester [ ]
87. ARQ stands for----------.
a) automatic reply queue b) automatic repeat request c) automatic responds for request
d) arithmetic queue [ ]
88. --------- AAL type is designed to support a data stream that has a constant bit rate.
a) 1 b) 2 c) a & b d) [ ]
89. Systems in which multiple users share a common channel lead to---------.
a) contention b) network c) internet d) arbitration [ ]
90.--------- sub layer performs the channel allocation.
a) network b) physical c) mac d) network convergence [ ]
91. the --------- layer lies between network layer and session layer.
a) application b) network c) presentation d) transport [ ]
92. DNS stands for---------------.
a) domain name system b)domain name software c) domain naming structure
d) none of the above [ ]
93. TCP segment header contains----------- bytes header.
a) 20 b) 30 c) 40 d) 50 [ ]
94. SMTP used for ----------
a) email b) file transfer c) nvt d) none of the above [ ]
95. the protocol that allows stranger to establish a shared secret key is----------
a) RSA b) DES c) IDEA d) Diffie-Hellman key exchange [ ]
96. class D start with address 1110 is used for-------------.
a) unicasting b)broadcasting c) multicasting d) point to point [ ]
97. how many packet filter routers are their in firewalls.
a) 1 b) 2 c) 3 d) 4 [ ]
98. ------------ is described in RFC 1519.
a) CIDR b) OSPF c) BGP d) RSA [ ]
99. hop limit field present in internet protocol version-----------.
www.jntuworld.com
www.jntuworld.com
J
N
T
U
W
O
R
L
D
a) 4 b) 6 c) 4 & 6 d) none of the above [ ]
100. when a mobile host arrives some where , it can just listen for these broadcasts called
a) advertisements b) services c)protocols d) a & c [ ]

























www.jntuworld.com

You might also like