CS610 Midterm Online Quiz

0%

CS610-Midterm

1 / 50

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 

2 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

3 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

4 / 50

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

5 / 50

A typical port on an ATM switch operates at __________ or higher.

6 / 50

_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

7 / 50

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

8 / 50

----- Program sends a message to a remote computer and orts whether the computer responds. 

9 / 50

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 

10 / 50

Most LANs that employ ring topology use an access mechanism known as-------

11 / 50

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

12 / 50

---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

13 / 50

One eater _______, two eaters ________ the maximum cable length limitation.

14 / 50

Formally named __________ informally known as the thick wire Ethernet or Thick net.

15 / 50

A bridges function in the _________ layers(s).

16 / 50

 _______ computes shortest paths in a graph by using weights on edges as a measure of distance.

17 / 50

The term----- ------- refers to the general concept of a small block of data

18 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

19 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

20 / 50

The product of delay and throughput measures the _____ of data that can be present on the network.

21 / 50

 ---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

22 / 50

A bridges function in the _________ layers(s).

23 / 50

A network uses a ------ if all computers attach to a central point

24 / 50

When an application--------------- data, it makes a copy of the data available to all other computers on the network.

25 / 50

Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.

26 / 50

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ . 

27 / 50

Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.

28 / 50

The Fast Ethernet hardware operates at a rate of --------

29 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification. 

30 / 50

 -------------- have advantages arisen from the size and ease of computation.

31 / 50

Which of the following is a connecting device?

32 / 50

A Bridge can ________

33 / 50

FDDI can transmits data at a rate of ----------

34 / 50

------ has no way to determine the cause of the problem.

35 / 50

Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.

36 / 50

In Point-to-Point topology there are two topologies.

37 / 50

Computer networks are often called -------------- because they use packet technology.

38 / 50

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

39 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

40 / 50

ATM is designed to work on___________.

41 / 50

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame. 

42 / 50

--------- was especially concerned about the lack of high powered computers.

43 / 50

 ________ has a jitter zero

44 / 50

he next hop to which a packet is sent depends only on 

45 / 50

A network with throughput T and delay D has a total of ________ bit in transit at any time.

46 / 50

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

47 / 50

In ---------, network occupies larger areas like cities & countries.

48 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

49 / 50

A Bridge can ________

50 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi