CS610 Midterm Online Quiz

0%

CS610-Midterm

1 / 50

Ethernet uses a ------ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.

2 / 50

In Point-to-Point topology there are two topologies.

3 / 50

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

4 / 50

---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

5 / 50

Computers attached to an Ethernet use ------ in which a computer waits for the ether to be idle before transmitting a frame.

6 / 50

A network uses a ------ if all computers attach to a central point

7 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

8 / 50

 _______ computes shortest paths in a graph by using weights on edges as a measure of distance.

9 / 50

Local Talk is a LAN technology that employs -------------

10 / 50

--------- was especially concerned about the lack of high powered computers.

11 / 50

ATM is designed to work on___________.

12 / 50

A Bridge can ________

13 / 50

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ . 

14 / 50

Most LANs that employ ring topology use an access mechanism known as-------

15 / 50

 ------ has no way to determine the cause of the problem.

16 / 50

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy. 

17 / 50

A bridges function in the _________ layers(s).

18 / 50

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

19 / 50

A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_____

20 / 50

The product of delay and throughput measures the _____ of data that can be present on the network.

21 / 50

The term----- ------- refers to the general concept of a small block of data

22 / 50

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________ 

23 / 50

-------------- have advantages arisen from the size and ease of computation. 

24 / 50

In Point-to-Point topology there are two topologies.

25 / 50

The term -------- is used to denote the definition of a packet used with a specific type of network. 

26 / 50

------ has no way to determine the cause of the problem.

27 / 50

Computer networks are often called -------------- because they use packet technology.

28 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification. 

29 / 50

FDDI can transmits data at a rate of ----- 

30 / 50

A ---------- provide a mechanism that a customer can use to set a physical address. 

31 / 50

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

32 / 50

FDDI can transmits data at a rate of ----------

33 / 50

An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.

34 / 50

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

35 / 50

A network with throughput T and delay D has a total of ________ bit in transit at any time.

36 / 50

 ________ has a jitter zero

37 / 50

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

38 / 50

___________ is used for audio and video, since these have predefined maximum data rates

39 / 50

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

40 / 50

Local Talk is a LAN technology that employs -------------

41 / 50

_________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

42 / 50

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame. 

43 / 50

 ---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

44 / 50

One eater _______, two eaters ________ the maximum cable length limitation.

45 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

46 / 50

A typical port on an ATM switch operates at __________ or higher.

47 / 50

------ Program sends a message to a remote computer and orts whether the computer responds.

48 / 50

When an application--------------- data, it makes a copy of the data available to all other computers on the network.

49 / 50

A Bridge can ________

50 / 50

17 A network with throughput T and delay D has a total of ________ bit in transit at any time.

Your score is

The average score is 0%

0%

Qunoot e Nazilah
Dua e Hajat
4 Qul
6 Kalma
Dua-e-Akasha
Darood Akbar
Surah Fatiha
Dua-e-Ganj Ul Arsh
Dua-e-Jamilah
Ayat-ul-Kursi