Anda di halaman 1dari 16

Sikkim Manipal University DDE

Master in Business Administration (MBA) Semester III

MI0035-Computer Networks - 4 Credits
Book ID: B1218
Model Question Paper Answers Keys
Time: 2 hours

Total Marks: 140

Section A 1 Mark Questions

Answer all questions. Each question carries 1 mark

50 * 1= 50 Marks

1. Residential LAN network is called ______________.

a. HOME network
b. LAN connection
c. WAN
d. Wireless
2. If the packets are sent to only a subset or group of machines on the network, then it is
called ___________.
a. Broadcast links
b. Point-to-point links
c. Multicasting
d. Internetwork
3. Which of the following is interconnecting the various components and mobile device
using short range wireless links?
a. System interconnection
b. Wireless LANs
c. Wireless WANs
d. Home networks
4. _______________ can be based on static table that are wired into the network and rarely
a. Routes
b. Layer
c. Control
d. Session

__________________ is a main protocol at this layer which provides a single service,

namely, best-effort connectionless packet transfer.


User datagram protocol

Transmission control protocol
Arpanet protocol
Internet packet

6. Cd stands for _____________.

a. Compac disk
b. Compact disk
c. Committee draft
d. Committee date
7. ______________ can be handled by just imagining that it repeats the entire pattern over
and over forever.
a. Data signal
b. ASCII code
c. Binary code
d. Fourier signal
8. The range of frequencies transmitted without being strongly attenuated is called
a. Wavelength
b. Bandwidth
c. Transmission
d. Harmonics
9. The method of dividing a physical channel into many logical channels so that a number of
independent signals may be simultaneously transmitted on. It is known as ____________.
a. Packet switching
b. Circuit switching
c. Multiplexing
d. Synchronous transmission
10. _____________ are those that provide a conduit from one device to another.
a. Wired
b. Wireless
c. Free space
d. Radio transmission
11. ____________ indicates a 1 bit.
a. Pulse of light
b. Absence of light
c. Air boundary
d. Silica boundary

12. The number of oscillations per second of a wave is called ____________.

a. Hertz
b. Frequency
c. Wavelength
d. Bandwidth
13. ______________ orbit has the altitude 36000km above earth surface.
a. Low earth orbit
b. Middle earth orbit
c. Geostationary orbit
d. Highly elliptical orbit
14. __________________ looked like the long-term winner.
a. Optical communication
b. Terrestrial fibre connections
c. Single fibre
d. Compression schemes
15. Which of the following contains a nodal computer called the server and all the other
computers are connected to the server and are called its clients?
a. Information systems
b. Peer-to-peer LAN
c. Network computing
d. Operating system (OS)
16. Which of the following provides oversight of, and occasional commentary on, aspects of
the architecture for the network protocols and procedures used by the internet?
a. IAB
d. AT & T
17. Which of the following is the most commonly used standard for a local area network?
a. Topology
b. LAN
c. Information systems
d. Ethernet
18. Under unguided media, transmission and reception are achieved by means of
a. Antenna
b. Tower s
c. Routers
d. Switches

19. The data signals are bound by the __________ system in guided transmission media.
a. Routers
b. Servers
c. Cabling
d. Bridges
20. In which of the following type of topology the devices are connected in the form of a
closed loop?
a. Linear bus
b. Ring
c. Star
d. Mesh
21. Which of the following is a device that allocates traffic from one network segment to
certain lines which connect the segment to another network segment?
a. Bridge
b. Gateway
c. Router
d. Switch
22. The bridge is linked to several local area networks, called ______________.
a. Transparent
b. Source route
c. Static
d. Segment
23. For dss1 signalling, the d channel layer 2 protocol is q.921 also called __________.
24. The design of a communications network is what is basically known as
a. Network topology
b. Network termination
c. Terminal adapter
d. Network architecture
25. __________ indicates the beginning of the isdn data-link layer frame fields.
a. Flag
b. Address
c. Layer

d. Protocols
26. IP routing protocols are _________________.
a. Static
b. Stagnant
c. Dynamic
d. Inert
27. Exterior gateways perform protocol functions between ________________ networks.
a. Independent
b. Dependent
c. Reliant
d. Unreliable
28. Each socket has a socket number consisting of the IP address of the host and a
___________number local to that host, called a port.
a. 32- bit
b. 8-bit
c. 16-bit
d. 24-bit
29. __________________ layer architecture is compared with the seven-layer OSI reference
b. FTP
30. ____________ is an agreement between the communicating parties on how
communication is to proceed.
a. Interface
b. Protocol
c. Connection release
d. OSI
31. Which of the following is a classical bit- oriented protocol?
32. ________________ field tells how long the frame and its acknowledgement will occupy
the Ethernet.
a. Data field
b. Frame header

c. Duration field
d. Sequence field
33. ___________________ is the part of network layer software which is responsible for
deciding which output line an incoming packet should be transmitted on.
a. Congestion
b. Routing algorithm
c. Link state algorithm
d. Path vector algorithm
34. _______________ transmits segments consisting of an 8-byte header followed by the
a. Tcp/IP
b. Tcp
c. Udp
d. Smtp
35. _______________ protocol is faster convergence than distance vector protocol.
a. Path vector
b. Link state
c. Dynamic vector
d. Routing vector
36. Dotted quad notation is also called as _________.
a. Dot address
b. Dotted lines
c. Dotted periods
37. ___________ keeps track of which version of the protocol the datagram belongs to.
a. Header field
b. Version field
c. The type field
38. User agents for electronic mail are sometimes called as ____________.
a. Mailers
b. E-mailers
c. Recipients
d. Mail readers
39. Which of the following is an architectural framework for accessing linked documents
spread out over millions of machines all over the internet?
a. Internet

b. WWW
c. Webpage
d. Portal
a. IRC
b. Cryptography
c. Gopher
41. _____________ is one of the services which the layer can offer.

Connection oriented
Flow control

42. _____________ and UDP are the protocols of transport layer.

b. DNS
c. IP
d. TCP
43. _____________ and TDM are the methods of multiplexing.
a. FDM
b. Circuit
c. Synchronous
d. Half-duplex
44. Which of the following is a technique to spread the bandwidth?
a. THF
c. Short wave
d. UHF
45. Inmarsal is an example of ______________.
a. HEO
b. LEO
c. MEO
d. GEO
46. Which of the following is not a network device?
a. Fax

b. Plotter
c. Super computer
d. Suspension bridge
47. Identify one among the following that is not a packet switching protocol
b. Frame relays
c. Banyan vines
48. Microwave radio frequencies are used to transmit messages between ground-based
stations and___________.
a. Unguided media.
b. Networks
c. Walky talkies
d. Satellite communications systems.
49. Cable television is a system of providing television to consumers via ________________
signals transmitted to televisions through fixed optical fibers or coaxial cables.
a. Wireless transmission
b. Electromagnetic spectrum
c. Microwave transmission
d. Radio frequency
50. Which of the following is a type of method which the bridges use to determine the
network segment a MAC address belongs to?
a. Transparent
b. Circuit
c. Packet
d. Distance vector protocols

Answer all questions. Each question carries 2 marks

25 * 2 = 50 Marks

51. B channel also known as ________ channel is a telecommunications term which refers to
the ISDN channel which carries the primary data or ________ communication.
a. Bearer, voice
b. Beta, clear
c. Best, quick
d. Bearer, clear

52. The technology for B-ISDN was asynchronous transfer mode (ATM), which carried both
____________ voice and __________ data services on the same transport.
a. Systematic, Unsystematic
b. Systematic, Asynchronous
c. Synchronous, Unsystematic
d. Synchronous, Asynchronous
53. The gateway computer reads the destination address and forwards the packet to an
___________ gateway that in turn reads the destination address and so forth across the
__________ until one gateway recognizes the packet as belonging to a computer within
its immediate neighbourhood or domain.
a. Adjacent, network
b. Opposite, network
c. Opposite, internet
d. Adjacent, internet
54. While ______________ consist of a 3-bit field of which the two low order bits control
fragmentation, _________________ indicates the position of the fragments data relative
to the beginning of the data in the original datagram, which allows the destination IP
process to property reconstruct the original datagram.
a. Protocol and source address
b. Flags and fragment offset
c. Flags and protocol
d. Fragment offset and protocol
55. The interface defines which primitive _________________ and ___________ the lower
layer makes available to the upper end.
a. Operations, services
b. Operations, repairs
c. Operations, transmits
d. Services, transmits
56. State whether the following statement are true or falsei. When the load offered to any network is more than it can handle, congestion builds
ii. In the Internet, packets get lost when a router is overloaded.

(i)True, (ii)True
(i)False, (ii)True
(i)False, (ii)False
(i)True, (ii)False

57. _____________ and ________________ are clearly an improvement over ALOHA

because they ensure that no station begins to transmit when it senses the channel busy.

a. Ethernet and connection oriented protocols

b. Persistent and non-persistent CSMA protocols
c. TCP and UDP
d. SMTP and UDP
58. Routing algorithm can be classified as ________________ and ________________.
a. Path vector and distance vector
b. Link state and path vector
c. Congestion and distance vector
d. Non adaptive and adaptive
59. While ________________ are designed for frame relay networks, _________ maps
physical address to IP address.
a. ARP and RARP
b. ARP and Inverse ARP
c. RARP and ARP
d. Inverse ARP and RARP
60. The scheme and standard for email security standards are ______________ and
a. Pretty Good Privacy and privacy enhanced mail
b. SIMME and XML security
c. Digital signatures and cryptographic techniques
d. Data encryption standard and digital signatures

Identify the above diagram from the following option and find out what is the missing
component in the diagram.
a. Connection oriented service interactions, CLIENT

b. Connection less service interactions, ROUTER

c. Connectionless service interactions, SERVER
d. Connection oriented services interactions, RECEIVE
62. Consider the following statements:
i. Data transmission is the process of electronically sending and receiving data through
cable or wireless medium from one point to another.
ii. Full duplex mode enables to perform error detection process and request the sending
device to re-transmit the data if any error occurs during transmission.
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False

63. Fill in the blanks:

The transmission of data to and from hard disk is called as ________________.
Information transfer on patterns is called as _____________.

Half duplex mode, asynchronous transmission

Asynchronous transmission, isochronous transmission
Isochronous transmission, synchronous transmission
Synchronous transmission, half duplex transmission

64. Consider the following statements:

i. The computer or sending device uses the serial transmission mode to transmit the
digital data through the communication channel or the wires.
ii. Data communication interfacing provides easy transfer of data between two or more
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False
65. Fill in the blanks:
i. ______________ is fixed antenna positions to adjustment required.
ii. _______________ is the process of transmitting the digital data over a single
communication channel in the series of alternating time slots.


GEO, time division multiplexing

MEO, space division multiplexing
LEO, frequency division multiplexing
HEO, code division multiplexing

66. Microsoft and Netscape were fighting for violations in which space?
A. Browsers
B. Search Engines
C. Artificial Intelligence
D. Word processors
67. Fill up the blanks with suitable answer:
1. ___________________ are at a frequency too low for human eyes to receive and
2. ____________ is a wireless transmission medium that sends data over long distances
at up to 2 megabits per second.

Broadcast Radio, communications

Communications, microwaves
Infrared-light waves, broadcast radio
Microwaves, infrared-light waves

68. Consider the following statements:

i. Internet Protocol is the primary protocol that operates at the Internet layer of the
TCP/IP stack.
ii. System has a unique code for a node or a host connection on internet protocol
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False
69. Fill in the blanks:
1. Polarity of the four signals being __________, this encoding scheme is less prone to
DC bias than a unipolar line code.
2. Four distinct signal levels being present it would seem to make this code more likely
to be ______________.
a. Efficient, balance
b. Active, efficient

c. Self-clocking, active
d. Balanced, self-clocking

70. Consider the following statements:

a. The minimum value for an octet is 1.
b. The maximum value for an octet is 255.

(i)True, (ii)True
(i)False, (ii)True
(i)True, (ii)True
(i)False, (ii)False

71. Consider the following statements:

i. TCP/IP is not really a protocol, but a set of protocols.
ii. Physical layer ensures complete data transfer.
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False

72. Fill in the blanks:

i. ________________ is used by mobile stations to connect them to base station.
ii. _________________ determines how to route frames sent to the base station.

Association, distribution
Disassociation, association
Distribution, disassociation
Reassociation, distribution

73. Consider the following statements:

i. Class B addresses are used to specify the local area networks. The first three bytes are
used to specify the network ID.
ii. Class E addresses are used to specify the number of networks, which have medium to
large number of total hosts.
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False

74. Consider the following statements:

i. Routing algorithms are employed to calculate the most efficient and cost effective
path to the destination.
ii. Dynamic routing algorithms are the most dominant of all the routing algorithms
existing in the present environment.
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False

75. Consider the following statements:

i. Multiple Access Protocols enable the user to know how to use time, frequency, and
code functions to communicate to the other users.
ii. The CSMA protocol is a simple communication scheme where you can send frames
in a network.
State True or False.
a. (i)True, (ii)True
b. (i)False, (ii)True
c. (i)False, (ii)False
d. (i)True, (ii)False

Answer all the following questions. (Descriptive questions to be answered in not more
than 200 words)10 Marks x 4 = 40 Marks



List the major recommendatory, regulatory, and tariff setting tasks

and functions of Telecom Regulatory Authority of India (TRAI).



10 Marks)

Refer Unit 7, Section 7.2

Describe the architectural framework of Integrated Services Digital
Network (ISDN).
(10 Marks)
Refer Unit 9, Section 9.2

Read the following case study thoroughly and answer the following questions:
India is the second most populous country in the world. Even with abundant natural
resources, it is still considered a developing country. In India, it is necessary that research
and development that has taken place in the field of communication should reach rural areas.
This is because nearly 70% of the population lives in villages.
In India, physical infrastructure such as roads and highways is still not fully developed.
Wired communication requires digging of roads, laying of cables and erecting towers. It
involves tremendous human effort and enormous capital outlay in the rural and hilly areas.
Hence wireless communication implemented through satellites can play a vital role.
Realising the importance of satellite communication, India implemented Satellite
Instructional Television Experiment (SITE) in 1975-76. This made it possible to broadcast
educational and other programs related to family planning, agriculture and health issues
through television sets even in the remote areas. This initiative helps in creating awareness
and also helps government in bringing developmental schemes to the door step of the masses.

An advantage of satellite communication is that, satellites can amplify the signals and resend
it to thousands of stations on the ground at the same time. Digital TV and radio programmes
can directly reach the receivers found in the cars and homes through a satellite. For large
organisations, it has become much cheaper to transmit commercial information to thousands
of their dealers scattered across the globe by means of satellites. Wired communication can
easily get disrupted when the cables are damaged intentionally or unintentionally. However,
microwave satellite communication is not affected even in the adverse environmental
conditions. Thus, during the times of natural disasters, the physical infrastructure of wired
communication may be destroyed. But still contact can be maintained with the affected
people through the satellites. In addition, remote sensing satellites can be used to keep an eye
on the enemy movements, determine the locations of natural resources, warn about impeding
cyclones and exactly pinpoint the presence of fishes or submerged objects in the oceans or
Another form of wireless communication is the mobile communication. Mobile handsets
have made it possible for the people not only to converse among themselves but also carry
out banking and e-commerce transactions. Satellites have also made it possible the
implementation of Global System for Mobile Communication(GSM) through which wireless
Internet can be provided.

To answer the questions for this case you should know the concepts of data communication
(unit 3), radio and microwave transmission (unit 4), satellite communication (unit 5)
78 a)

Highlight the advantages of wireless communication over wired

communication. (5 marks)

79 c)

In what ways, rural India has benefited through satellite (10 Marks)
communication. (5 marks)
According to your opinion, what are the different areas in (10 Marks)
which mobile communication devices can be utilised in the
Indian context? (5 marks)
What steps the government needs to take so that the benefits of
electronic communication, reaches the rural masses? (5marks).