CS610 Midterm Online Quiz

0%

CS610-Midterm

1 / 50

ATM is designed to work on___________.

2 / 50

The third field of the header consists of ------ bit Ethernet frame type.

3 / 50

When an application--------------- data, it makes a copy of the data available to all other computers on the network.

4 / 50

A bridges function in the _________ layers(s).

5 / 50

A Bridge can ________

6 / 50

Most LANs that employ ring topology use an access mechanism known as-------

7 / 50

Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.

8 / 50

A bridges function in the _________ layers(s).

9 / 50

A network uses a ------ if all computers attach to a central point

10 / 50

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 

11 / 50

The Fast Ethernet hardware operates at a rate of --------

12 / 50

_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

13 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

14 / 50

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame. 

15 / 50

-------------- have advantages arisen from the size and ease of computation. 

16 / 50

A typical port on an ATM switch operates at __________ or higher.

17 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification. 

18 / 50

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

19 / 50

------ has no way to determine the cause of the problem.

20 / 50

A Bridge can ________

21 / 50

Computer networks are often called -------------- because they use packet technology.

22 / 50

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

23 / 50

 ------ Program sends a message to a remote computer and orts whether the computer responds.

24 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

25 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

26 / 50

In ---------, network occupies larger areas like cities & countries.

27 / 50

Local Talk is a LAN technology that employs -------------

28 / 50

One eater _______, two eaters ________ the maximum cable length limitation.

29 / 50

Most LANs that employ ring topology use an access mechanism known as-------

30 / 50

Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.

31 / 50

In Point-to-Point topology there are two topologies.

32 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

33 / 50

 Computer networks are often called -------------- because they use packet technology.

34 / 50

FDDI can transmits data at a rate of ----------

35 / 50

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

36 / 50

----- Program sends a message to a remote computer and orts whether the computer responds. 

37 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

38 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

39 / 50

Local Talk is a LAN technology that employs -------------

40 / 50

Formally named __________ informally known as the thick wire Ethernet or Thick net.

41 / 50

The product of delay and throughput measures the _____ of data that can be present on the network.

42 / 50

___________ is used for audio and video, since these have predefined maximum data rates

43 / 50

 -------------- have advantages arisen from the size and ease of computation.

44 / 50

17 A network with throughput T and delay D has a total of ________ bit in transit at any time.

45 / 50

 ---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

46 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

47 / 50

The maximum size of an Ethernet segment is___________

48 / 50

 ________ has a jitter zero

49 / 50

Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.

50 / 50

A network with throughput T and delay D has a total of ________ bit in transit at any time.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi