100% found this document useful (1 vote)
424 views23 pages

Coc Level 3 Section 1

1. The document provides questions and answers related to networking concepts. 2. Key topics covered include data communication components, network topologies, transmission media, protocols, and the OSI model. 3. Multiple choice questions test understanding of fundamental networking concepts like half duplex vs full duplex communication, error detection methods, and characteristics of different network topologies.

Uploaded by

3e23e23e
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
424 views23 pages

Coc Level 3 Section 1

1. The document provides questions and answers related to networking concepts. 2. Key topics covered include data communication components, network topologies, transmission media, protocols, and the OSI model. 3. Multiple choice questions test understanding of fundamental networking concepts like half duplex vs full duplex communication, error detection methods, and characteristics of different network topologies.

Uploaded by

3e23e23e
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Level 3 section 1

1 Protocols are.

A. Agreements on how communication components and DTE

B. Logical communication channels used for transferri

C. Physical communication channels used for transferr

D. None of the above

Answer: Option A

2. The method of communication in which transmission takes place in both directions, but only one
direction at a time is called.

A. Simplex

B. Four wire circuit

C. Full Duplex

D. Half Duplex

Answer: Option D

3. Error detection at the data link level is achieved by.

A. Bit Stuffing

B. Cyclic Redundancy Code

C. Hamming Code

D. Equalization

Answer: Option B
4. Which of the following is a wrong example of network layer?

A. Internet Protocol (IP) - ARPANET

B. X.25 Packet Level Protocol (PLP)-ISO

C. Source routing and domain naming-USENet

D. X.25 level 2-ISO

Answer: Option D

5. The topology with highest reliability is:

A. Bus topology

B. Star topology

C. Ring topology

D. Mesh topology

Answer: Option D

Solution:

Mess Topology is a network setup where each computer and network device is interconnected with one
another, allowing for most transmissions to be distributed, even if one of the connections go down. This
topology is not commonly used for most computer networks as it is difficult and expensive to have
redundant connection to every computer. However, this topology is commonly used for wireless
networks.

6. "BAUD" rate means.

A. The number of bits transmitted per unit time.

B. The number of bytes transmitted per unit time.

C. The rate at which the signal changes.

D. None of the above


Answer: Option C

7. Start and stop bits are used in serial communication for.

A. Error detection

B. Error correction

C. Synchronization

D. Slowing down the communication

Answer: Option C

8. Unmodulated signal coming from a transmitter is know as.

A. Carrier signal

B. Baseband signal

C. Primary signal

D. None of these

Answer: Option B

9. How many Character per sec(7bits + 1parity) can be transmitted over a 2400 bps line if the transfer
is synchronous (1 "Start" and 1 "stop" bit)?

A. 300

B. 240

C. 250

D. 275

Answer: Option A

Solution:

Start and stop bits are not needed in synchronous transfer of data. So, it is 2400/8=300. Answer &
Solution
10. Which one of the following network uses dynamic or adaptive routing?

A. TYMNET

B. ARPANET

C. SNA(IBM's System Network Architecture)

D. None of these

Answer: Option B

11. The number of cross point needed for 10 lines in a cross point switch which is full duplex in nature
and there are no self-connection is.

A. 100

B. 45

C. 50

D. 90

Answer: Option B

Solution:

As all lines are full-duplex and there are no self connections, only the cross points above the diagonals
are needed. Hence formula for the number of cross points required is n(n-1)/2. Answer & Solution

12. A terminal multiplexer has six 1200 bps terminals and 'n' 300bps terminals connected to it. The
outgoing line is 9600bps. What is the maximum value of n?

A. 4

B. 16

C. 8

D. 28

Answer: Option C

Solution:
Since there are six 1200bps terminals, 6*1200 + n*300 =9600 by solving this, n=8. Answer & Solution

13. Maximum data rate of a channel for a noiseless 3-kHz binary channel is.

A. 3000bps

B. 6000 bps

C. 1500 bps

D. None of these

Answer: Option B

Solution:

Maximum data rate = 2Hlog V bps, where

H is the bandwidth, V is the discrete levels. Here H is 3 kHz and V is 2.

So, data rate = 2*3000 log 2 bps = 6000 bps. Answer & Solution

14. The ________ measures the number of lost or garbled messages as a fraction of the total sent in
the sampling period.

A. Residual Error Rate.

B. Transfer Failure Probability.

C. Connection release failure probability.

D. Connection establish.

Answer: Option A

15. In session layer, during data transfer, the data stream responsible for the "control" purpose (i.e
control of the session layer itself) is.

A. Regular Data

B. Typed data
C. Capability Data

D. Expedited Data

Answer: Option C

16. A high speed communication equipment typically would not be needed for.

A. E-mail

B. Transferring large volume of data

C. Supporting communication between nodes in a LAN

D. All of these

Answer: Option A

17. Which of the following ISO level is more closely related to the physical communications facilities?

A. Application

B. Session

C. Networking

D. Data Link

Answer: Option D

18. which of the following is not a field in the Ethernet Message packet?

A. Type

B. Data

C. Pin-code

D. Address

Answer: Option C

19. The Network topology that supports bi-directional links between each possible node is.

A. Ring
B. Star

C. Tree

D. Mesh

Answer: Option D

20. In a broad Sense, a railway track is an example of.

A. Simplex

B. Half Duplex

C. Full Duplex

D. All of these

Answer: Option B

21. Which network has connectivity range up to 10 meters?

A. LAN

B. PAN

C. MAN

D. WAN

Answer: Option B

22. What is Unicode?

A. Represents symbol or characters used in any language.

B. Only few languages are supported

C. Supports only few characters

D. Characters from A to Z

Answer: Option A
23. For data communications to occur, the communicating devices must be part of a communication
system made up of a combination of?

A. WAN and LAN

B. Hardware and software

C. Full duplex and half duplex

D. All of the above

Answer: Option B

24. Correct method for full duplex mode of communication is:

A. Both stations can transmit and receive data at the

B. One device can send other device can only accepts.

C. One device sends and other device receives and vic

D. None of these

Answer: Option A

25. Data communications system depends on four fundamental characteristics.

A. Receiver

B. Sender

C. Timeliness

D. Medium

Answer: Option C

Solution:

Data communications means the exchange of data between two devices via some form of transmission
medium such as a wire cable. For data communications to occur, the communicating devices must be
part of a communication system made up of a combination of hardware (physical equipment) and
software (programs).
The effectiveness of a data communications system depends on four fundamental characteristics:
delivery, accuracy, timeliness, and jitter.

1. Delivery: The system must deliver data to the correct destination. Data must be received by the
intended device or user and only by that device or user.

2. Accuracy: The system must deliver the data accurately. Data that have been altered in transmission
and left uncorrected are unusable.

3. Timeliness: The system must deliver data in a timely manner. Data delivered late are useless. In the
case of video and audio, timely delivery means delivering data as they are produced, in the same order
that they are produced, and without significant delay. This kind of delivery is called real-time
transmission.

4. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of
audio or video packets. For example, let us assume that video packets are sent every 3D ms. If some of
the packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven quality in the video is the
result.

26. A data communications system has:

A. 4 components

B. 5 components

C. 6 components

D. 7 components

Answer: Option B

27. 00 represents a pixel that pixel is known as :

A. Black pixel

B. Light gray

C. White pixel

D. Dark gray pixel

Answer: Option A
28. Select correct type of line configuration:

A. Multi-point

B. Single point

C. Link

D. Dedicated point

Answer: Option A

29. Select the wrong data communication system component:

A. Medium

B. Protocol

C. Receiver

D. Transits

Answer: Option D

30. Time required for a message to travel from one device to another is known as:

A. Transit time

B. Dialogue time

C. Response time

D. Wait time

Answer: Option A

31. If one link fails, only that link is affected. All other links remain active. Which topology does this?

A. Mesh topology

B. Star topology

C. Bus topology

D. Physical topology
Answer: Option B

32. OSI model means:

A. Open systems interconnection

B. Operating system interconnection

C. Open source interconnection

D. Operating source interconnection

Answer: Option A

33. Select the correct cable that transport signals in the form of light:

A. Twisted-Pair cable

B. Fiber optic cable

C. Coaxial Cable

D. Shielded Twisted Pair cable

Answer: Option B

34. Twisted pair wires, coaxial cable, optical fiber cables are the examples of:

A. Wired Media

B. Wireless Media

C. Both A & B

D. None of these

Answer: Option A

35. Which of the followings is used in communications is referred to as unshielded twisted-pair (UTP)?

A. Coaxial cable

B. Fiber-optic cable

C. Twisted-pair cable
D. None of these

Answer: Option C

36. What is Cladding?

A. Cables with shield

B. Coxial Cable

C. A typical optical fiber consists of a very narrow

D. None of these

Answer: Option C

37. Which network is a cross between circuits switched network and a data-gram network?

A. Circuit-switched network

B. Virtual-circuit network

C. Virtual-circuit identifier

D. None of these

Answer: Option B

38. Select the cable that uses copper conductor, accept and transport signals in the form of electric
current?

A. Fiber-optic cable

B. Metallic cable

C. Twisted pair cable

D. All of the above

Answer: Option C

39. Number of Unguided Media is:

A. 6
B. 5

C. 4

D. 3

Answer: Option D

40. Switching at the network layer in the Internet uses the datagram approach to:

A. Message switching

B. Circuit switching

C. IP switching

D. Packet switching

Answer: Option D

41. Which is also known as a connectionless protocol for a packet-switching network that uses the
Datagram approach?

A. IPV5

B. IPV4

C. IPV6

D. None of these

Answer: Option B

42. Which switch is a multistage switch with micro switches at each stage that route the packets
based on the output port represented as a binary string?

A. Banyan switch

B. Crossbar switch

C. Multistage crossbar

D. Packet switch

Answer: Option A
43. How many digits of the DNIC (Data Network Identification Code) identify the country?

A. first three

B. first four

C. first five

D. first six

E. None of the above

Answer: Option A

44. A station in a network forwards incoming packets by placing them on its shortest output queue.
What routing algorithm is being used?

A. hot potato routing

B. flooding

C. static routing

D. delta routing

E. None of the above

Answer: Option A

45. The probability that a single bit will be in error on a typical public telephone line using 4800 bps
modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a
communication line using 9-bit frames is approximately equal to

A. 0.003

B. 0.009

C. 0.991

D. 0.999

E. None of the above

Answer: Option B
46. Frames from one LAN can be transmitted to another LAN via the device

A. Router

B. Bridge

C. Repeater

D. Modem

E. None of the above

Answer: Option B

47. Which of the following condition is used to transmit two packets over a medium at the same time?

A. Contention

B. Collision

C. Synchronous

D. Asynchronous

E. None of the above

Answer: Option B

48. You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new
subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet.
Which subnet mask should you assign?

A. 255.240.0.0

B. 255.248.0.0

C. 255.252.0.0

D. 255.254.0.0

E. 255.255.255.255

Answer: Option D

49. What are the most commonly used transmission speeds in BPS used in data communication?
A. 300

B. 1200

C. 2400

D. 9600

E. None of the above

Answer: Option D

Answer & Solution

50. What is the default subnet mask for a class C network?

A. 127.0.0.1

B. 255.0.0.0

C. 255.255.0.0

D. 255.255.255.0

E. None of the above

Answer: Option D

51. Which of the following is used for modulation and demodulation?

A. modem

B. protocols

C. gateway

D. multiplexer

E. None of the above

Answer: Option A

52. Which of the following is not a disadvantage of wireless LAN?

A. Slower data transmission


B. higher error rate

C. interference of transmissions from different computers

D. All of the above

Answer: Option D

53. The Internet Control Message Protocol

(ICMP)

A. allows gateways to send error a control messages to other gateways or hosts

B. provides communication between the Internet Protocol Software on one machine and the

Internet Protocol Software on another

C. reports error conditions to the original source, the source must relate errors to individual

application programs and take action to correct the problem

D. All of the above

E. None of the above

Answer: Option D

54. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing
plant in the suburbs. To enable everyone to share data and resources between the two LANs, what

type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem

B. Cable

C. Hub

D. Router

E. None of the above

Answer: Option D
55. The term 'duplex' refers to the ability of the data receiving stations to echo back a confirming
message to the sender. In full duplex data transmission, both the sender and the receiver

A. cannot talk at once

B. can receive and send data simultaneously

C. can send or receive data one at a time

D. can do one way data transmission only

E. None of the above

Answer: Option B

56. How many hosts are attached to each of the local area networks at your site?

A. 128

B. 254

C. 256

D. 64

E. None of the above

Answer: Option B

57. Which of the following technique is used for fragment?

A. a technique used in best-effort delivery systems to avoid endlessly looping packets

B. a technique used by protocols in which a lower level protocol accepts a message from a higher level
protocol and places it in the data portion of the low level frame

C. one of the pieces that results when an IP

gateway divides an IP datagram into smaller pieces for transmission across a network that cannot
handle the original datagram size

D. All of the above


E. None of the above

Answer: Option C

58. Contention is

A. One or more conductors that serve as a common connection for a related group of devices

B. a continuous frequency capable of being modulated or impressed with a second signal

C. the condition when two or more stations attempt to use the same channel at the same time

D. a collection of interconnected functional units that provides a data communications service

among stations attached to the network

E. None of the above

Answer: Option C

59. Avalanche photodiode receivers can detect hits of transmitted data by receiving .

A. 100 photons

B. 200 photons

C. 300 photons

D. 400 photons

E. None of the above

Answer: Option B

60. Satellite-Switched Time-Division Multiple Access (SS/TDMA) is.

A. the method of determining which device has access to the transmission medium at any time.

B. a medium access control technique for multiple access transmission media

C. a form of TDMA in which circuit switching is used to dynamically change the channel

assignments

D. All of the above


E. None of the above

Answer: Option C

61. When you ping the loopback address, a packet is sent where?

A. On the network

B. Down through the layers of the IP architecture

and then up the layers again

C. Across the wire

D. through the loopback dongle

E. None of the above

Answer: Option B

62. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one
machine to another?

A. FTP

B. SNMP

C. SMTP

D. RPC

E. None of the above

Answer: Option C

63. Which of the following device is used to connect two systems, especially if the systems use
different protocols?

A. hub

B. bridge

C. gateway

D. repeater
E. None of the above

Answer: Option C

64. The synchronous modems are more costly than the asynchronous modems because.

A. they produce large volume of data

B. they contain clock recovery circuits

C. they transmit the data with stop and start bits.

D. they operate with a larger bandwidth

E. None of the above

Answer: Option B

65. A distributed network configuration in which all data/information pass through a central
computer is.

A. bus network

B. star network

C. ring network

D. Point-to-point network

E. None of the above

Answer: Option B

66. Which of the following TCP/IP protocol allows an application program on one machine to send a
datagram to an application program on another machine?
A. UDP

B. VMTP

C. X.25

D. SMTP

E. None of the above

Answer: Option A

67. A remote batch-processing operation in which data is solely input to a central computer would
require a:

A. telegraph line

B. simplex lines

C. mixedband channel

D. All the above

E. None of the above

Answer: Option B

68. ICMP (Internet Control Message Protocol) is.

A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware
address

B. a TCP/IP high level protocol for transferring files from one machine to another

C. a protocol used to monitor computers

D. a protocol that handles error and control messages

E. None of the above

Answer: Option D

69. If you get both local and remote echoes, every character you type will appear on the screen.

A. once
B. twice

C. three times

D. never

E. None of the above

Answer: Option B

70. What part of 192.168.10.51 is the Network ID, assuming a default subnet mask?

A. 192

B. 192.168.10

C. 0.0.0.5

D. 51

E. None of the above

Answer: Option B

You might also like