0% found this document useful (0 votes)
14 views1 page

Iii CSC Mid-2 (CN)

Uploaded by

Bhagya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views1 page

Iii CSC Mid-2 (CN)

Uploaded by

Bhagya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

SUBJECT NAME :COMPUTER NETWORKS MAX MARKS :10

BRANCH : CSE TIME – 30 M


NAME: ROLL NO:
Choose the Correct Answer
1. ____________ is a technique that allows data to be transmitted between networks, often using a public network
to move data to a private network. [ ]
A. Packet fragmentation B. Tunneling C. Both D. None
2 . A source sends a single destination is called ‘unicast’ and all destinations are called [ ]
A. multicast B. any cast C. mobile host D. broadcast
3. Expand MTU. [ ]
A. Maximum Transmission Unit B. Minimum Transmission Unit C. Multi Transmission Unit
4. Define AS in internetwork routing. [ ]
A. Automatic System B. Autonomous System C. Autonomy system
5. Link-State Routing Algorithm is also known as ____________ [ ]
A. OSPF B.OPF
6. Static Routing Algorithm is in nature. [ ]
A. Non-adaptive B. Adaptive C. Fixed
7. Which bit is used for connection establishment [ ]
A. SYN sent. C. SYN received C. ACK
8. Distance-vector Routing Algorithm is __________ in nature. [ ]
A. Static B. Dynamic
9. Congestion control will be occurred at routers and it will be detected at the [ ]
A. Data link layer B. Network layer C. Application layer D. Transport layer
10.What are the protocol used for Remote E-mail Access? [ ]
A. POP-3 & IMAP B. FTP & IPP C. HTTP & SSH

Fill in the blanks:


11.Define UDP Checksum
12.Define Flooding?

13. Name some Internet Control Protocols.


14. What is a packet?
15. What is the use of FIN bit?
16.List the Congestion Control Schemes.

17. What are the levels of servers present in DNS?


18. What is Socket?

19. Define PEER?


20. What are the components present in Electronic Mail?

You might also like