CS610 Midterm Online Quiz

0%

CS610-Midterm

1 / 50

In Point-to-Point topology there are two topologies.

2 / 50

In -------------, network occupies the smaller area like a room a floor or a building 

3 / 50

Formally named __________ informally known as the thick wire Ethernet or Thick net.

4 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification. 

5 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

6 / 50

FDDI can transmits data at a rate of ----------

7 / 50

In ---------, network occupies larger areas like cities & countries.

8 / 50

One eater _______, two eaters ________ the maximum cable length limitation.

9 / 50

 __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

10 / 50

 _______ computes shortest paths in a graph by using weights on edges as a measure of distance.

11 / 50

 Computer networks are often called -------------- because they use packet technology.

12 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

13 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

14 / 50

In -------------, network occupies the smaller area like a room a floor or a building

15 / 50

 ------ Program sends a message to a remote computer and orts whether the computer responds.

16 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

17 / 50

 -------------- have advantages arisen from the size and ease of computation.

18 / 50

A network with throughput T and delay D has a total of ________ bit in transit at any time.

19 / 50

Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.

20 / 50

A network uses a ------ if all computers attach to a central point

21 / 50

A Bridge can ________

22 / 50

When an application--------------- data, it makes a copy of the data available to all other computers on the network.

23 / 50

Computer networks are often called -------------- because they use packet technology.

24 / 50

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 

25 / 50

------ has no way to determine the cause of the problem.

26 / 50

 ________ has a jitter zero

27 / 50

 ------ has no way to determine the cause of the problem.

28 / 50

A ---------- provide a mechanism that a customer can use to set a physical address. 

29 / 50

The product of delay and throughput measures the _____ of data that can be present on the network.

30 / 50

----- Program sends a message to a remote computer and orts whether the computer responds. 

31 / 50

_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

32 / 50

Computers attached to an Ethernet use ------ in which a computer waits for the other to be idle before transmitting a frame.

33 / 50

A bridges function in the _________ layers(s).

34 / 50

Most LANs that employ ring topology use an access mechanism known as-------

35 / 50

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

36 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

37 / 50

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 

38 / 50

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

39 / 50

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

40 / 50

___________ is used for audio and video, since these have predefined maximum data rates

41 / 50

A bridges function in the _________ layers(s).

42 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

43 / 50

A Bridge can ________

44 / 50

--------- was especially concerned about the lack of high powered computers.

45 / 50

The product of delay and throughput measures the _____ of data that can be present on the network.

46 / 50

The term----- ------- refers to the general concept of a small block of data

47 / 50

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

48 / 50

The third field of the header consists of ------ bit Ethernet frame type.

49 / 50

FDDI can transmits data at a rate of ----- 

50 / 50

In Point-to-Point topology there are two topologies.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi