CS610 Solved Grand Quiz Spring 2021

Dear Students in this post we are providing you CS610 Solved Grand Quiz Spring 2021. We have provided all Past CS610 Grand Quiz with 100% correct Solution. You can also visit our website vulmshelp.com for the solution of CS610 Mid Term past paper and Final Term Past paper.

CS610 Solved Grand Quiz Spring 2021

In Cyclic Redundancy Checking, CRC is __________.

  • Divisor
  • Quotient
  • Remainder  page 20
  • Dividend

The satellite or radio topology in which all computers are connected to each other via satellite or radio wave is a kind of

  • Broadcast network   page 5
  • Point-to-Point network

Which of the following two operations are performed by Ethernet CD?

I. It monitors outgoing signals.

II. Grabbled signal is interpreted as a collision.

III. Signals are sent back to the sender.

  • I and III
  • II and IV
  • II and III
  • I and II       page 28

The process of forwarding a packet is called ____________.

  • Routing      page 58
  • Processing
  • Hierarchical Addressing
  • Source Addressing

Which statement is correct about Network Interface Card (NIC)?

I. NIC contains sufficient hardware to process data independent of system CPU

II. NIC looks like any other I/O device to system CPU

III. NIC also receives interrupt on incoming data.

  • I and II
  • II and III
  • I and III
  • All of the given options     page 40

While transmitting data from source A to destination B, 4 bits are changed during the transmission then the error is a _________.

  • Burst error page 22
  • Single error
  • Double error
  • Logic error

The switch that has no attached computers is called __________.

  • Packet Switch
  • Exterior Switch
  • Interior Switch      page 59
  • External Switch

________ is the most popular wiring scheme because of lowest cost.

  • 5 Base T
  • 10 Base T           page 43
  • 100 base T
  • 1000 base T

In _________ technique, all members of the network can send data only on the specific time slot?

  • CDMA
  • FDMA
  • CSMA       page 43
  • TDMA

 If a sender with a 100 Megabit NIC and receiver with 10 Megabit NIC wants to communicate with each other at which speed they can communicate?

  • 110 Megabit
  • 1000 Megabit
  • 10 Megabit
  • 100 Megabit                  page 40

 Missing ______ in a frame format indicates receiving computer missed

beginning of the message.

  • eot
  • sot
  • eoh
  • soh                   page 16

The _______ of errors is easier than the ________ of errors.

  • correction; detection
  • correction; creation
  • detection; manipulation
  • detection; correction       cs601 handouts

The _______ of errors is difficult than the ________ of errors.

  • detection; correction
  • correction; creation
  • detection; manipulation
  • correction; detection                  google

Source Independence phenomenon allows fast and efficient ____________.

  • Source Addressing
  • Routing
  • Packet Switching                  page 58
  •  Store and forward

In distributed route computation process each packet switch computes its routing table locally and sends messages to the __________.

  • Router
  • Graph
  • Neighbors       page 63
  • WAN

The ___ layer of the OSI model takes the data from the physical layer and perform error checking.

  • Transport
  • Data link              google
  • Application
  • Presentation

CBR stands for _________.

  • Constant Byte Rate
  • Constant Bit Rate
  • Connection break Recovery
  • Constant Borrow Rate

A network that uses _______ usually consist of a single long cable to which computer attach.

  • Star Topology
  • Ring Topology
  • Bus Topology             page 26
  • Bus and Ring Topology

If simultaneous transmission occurs, the frames interfere with each other and this phenomenon is called _______.

  • packet loss
  • collision       page 28
  • delayed transmission
  • coordination

In __________ all computers are attached to a central hub

  • Ring topology
  • Star topology            page 31
  • Hub topology
  • Bus topology

For adding a new computer in a point to point network ______new connection will be required

  • N
  • N-1         page 23
  • N-2
  • 2N

The fastest Ethernet hardware operates at a rate of _____

  • 1000 bps
  • 100 Mbps    page 27
  • 10 Mbps
  • 1000 Mbps

Which of the following the benefit to point to point communication?

  • Quick to configure.
  • Security implementation             page 23
  • Cost
  • Less availability

ATM offers _____speed and ________delay

  • High, High
  • High, low             page 72
  • Low, low
  • Low, high

Thick Ethernet is known as ___________

  • 10 Base 2  
  • 10 Base 5   google
  • 10 Base T
  • 10 Base 10

Both interior and exterior switches _______packet and they also need routing tables.

  • Create
  • Delay
  • Forward               page 59
  • Start

______is the rate at which data can be sent through the network

  • Throughput page 79
  • Propagation delay
  • Access delay
  • Switching delay

In a ping command, small –sized information packets of _____are sent.

  • TCP
  • UDP
  • ICMP     page 11
  • IGMP

Many WANs use ______addressing of efficiency

  • Sequence
  • Forward
  • Hierarchical       page 56
  • Sequential

Which of the following is not a function of ping commends?

  • Local computer network issue
  • Congestion in the network
  • Relay nodes      page 11
  • Remote host availability

Packet switched can be linked together to form a ________

  • LAN
  • WAN     page 56
  • Bridge
  • None of the given option

Fixed network is a type of network which is classified with repect to the factor

  • Size
  • Connectivity
  • Medium
  • Mobility              page 6

Parity bit can detect _________________error(s)

  • 4
  • 3
  • 2              page 19 (even or odd)
  • 1             

When we will try to connect to the internet which of the following protocol will be used?

  • Telnet
  • TCP/IP page 84
  • ICMP
  • IPx

How many computers are mandatory to form a network?

1

2      google

4

8

________ is standard wireless LAN that uses radio signals at 2.4GHz.

  • IEEE 803.16
  • IEEE 802.15
  • IEEE 802.3
  • IEEE 802.11 page 29

LAN interface hardware obeys ______ access rule.

  • CSMA/CD    page 34
  • Round robin
  • First come first served
  • High priority

The most important task a bridge performs is _________.

  • Packet switching
  • Line controlling
  • Noise controlling
  • Frame filtering         page 50

ATM uses small, fixed-sized packets called cells and each cell has _____ octets.

  • 47
  • 52
  • 53   page 66
  • 55  

___________ can’t be guaranteed with variable length packets as easily as it can with fixed length cells.

  • Errors
  • Noise
  • Quality of Service
  • None of the given page 72

Which multiplexing technique transmits digital signals?

  • WDM
  • FDM
  • TDM              page 15
  • GSM

Connections in Asynchronous transfer mode are called ________.

  • Virtual channels       page 67
  • Virtual Path Identifier
  • Cells
  • Cell tax

A _______ is a device that combines multiple signals and forwards into a single line.

Modem

Multiplexer page 41

Repeater

Layer 3 Switch

___________ is inflexible.

  • Routing
  • Searching
  • Processing
  • Static routing             page 62

If a hub is used to connect many computers in a LAN, then only _______ computers can communicate at a given time.

  • Three
  • Two       page 54
  • Four
  • One

_________ is the term used for variance in transmission delays.

Friction

Segment

Checksum

Jitter             page 66

 ________ is also called self healing network.

ATM

FDDI

Token Ring

Frame relay page 46

_______ and _______ are the two frame types.

  • Internal and external
  • Single and dual
  • Implicit and explicit
  • Multicast and broadcast       page 35

Bluetooth uses shared medium and _______ instead of coaxial cable.

  • Radio waves              page 29
  • Infrared waves
  • Micro waves
  • Low frequency waves

Which of the following is not a guided medium?

  • Twisted pair cable
  • Fiber-optic cable
  • Atmosphere              google
  • Coaxial cable

As a result of ARPA research, the first network was established which was named as ________.

  • INTERNETWORKING
  • ARPNET
  • ARPANET     page 9
  • PACKET NETWORK

Asynchronous transfer mode (ATM) can dynamically establish a __________.

  • Switched virtual circuit         page 70
  • Virtual connection identifier
  • Virtual path indicator
  • None of the given options

A typical port on an ATM switch operates at ________ or _______ higher.

OC-2 speed (155Gbps)

OC-2 speed (1000Mbps)

OC-3 speed (155Mbps)          page 72

OC-3 speed (100Gbps)

10Base-T Ethernet is often called a __________.

  • ring shaped star
  • ring shaped bus
  • star shaped bus        page 46
  • star shaped ring

___________ allows automatic updates.

  • Dynamic routing      page 62
  • Static routing
  • Routing
  • Default routing

Handling variable length packets leads to memory __________.

  • Fragmentation          page 72
  • Management
  • Location
  • Allocation

In order to forward a copy of frame, the bridge uses ________ address.

  • Network
  • Destination page 51
  • IP
  • Source

We may use _______ to extend local area network.

  • Bridge, Router
  • Bridge, Hub, Router
  • Bridge, Hub, Repeater           page 149
  • Bridge, Hub, Repeater, Router

All of the given options are the types of delay except __________.

  • Propagation
  • Access
  • Throughput page 79
  • Queuing

While computing shortest path in a graph, next hop information is inserted into _________.

  • Routing table            page 62
  • Trailer
  • Header
  • Register

LAN interface uses _________ to copy frame data directly from main memory

  • DMA              page 34
  • FDDI
  • Hard disk
  • Flash

The Gigabit Ethernet hardware operates at a rate of ___________.

  • 10 Mbps
  • 100 Mbps
  • 1000               Mbps    reference book page 263
  • 1000               Gbps    

In the early resource sharing era, which resources were shared among users?

  • Computation             page 9
  • Floppy Drives
  • Hard Disk
  • Printers

If two buildings are located far from each other then bridge, and ________ can be used to connect two LAN.

  • Optical fiber              page 51
  • Ethernet modem
  • Switch
  • NIC

Which type of network consists of wireless connection of laptops in a university classroom?

  • WAN
  • MAN
  • Fog
  • LAN                google

A typical bridge has _______________.

  • One NIC, a CPU a memory and a ROM.
  • Two NICs, a CPU a memory and a ROM.        page 50
  • RAM, ROM and CPU.
  • A cache memory, ROM and CPU.

__________ is used for compressed audio and video, where the data rate depends on the level of compression that can be achieved.

  • Constant Bit Rate
  • Stable Bit Rate
  • Variable Bit Rate      page 71
  • Available Bit Rate    

There are ________ types of data stuffing.  

  • 1
  • 2      page 17
  • 0
  • 5                     

Dijkstra’s algorithm can accommodate weights on _______ in graph.

  • Nodes    page62
  • Edges
  • Path
  • Connections

________ masks your IP address.

  • Firewall
  • Antivirus
  • VPN
  • Incognito mode

Static routing computes routing table information at __________ time.

  • Load
  • Boot              page 62
  • Execute
  • One

 ___________ was the first automated tool required to see whether the given computer is online or not.

  • Probing program
  • PING program
  • status program
  • None of the above page 11

In which type of error detection, the arithmetic sum is calculated before and after the transmission of data at both communication ends?

  • CRC
  • Party
  • Checksum   page 19
  • Hash Function

Computer sends a connection request to the ________ to which it is attached while establishing a switched virtual circuit

  • Bridge
  • Switch           page 70
  • VPI
  • Virtual circuit

The bridges communicate with each other on the network and use ________ algorithm to decide which bridge will not forward frames if a cycle occurs.

  • Djikstra
  • Shortest path first
  • Vector distance
  • Distributed Spanning Tree   page 53

Ethernet uses a ______ bit static addressing scheme in which each device is assigned a unique address by the manufacturer.

  • 64
  • 48
  • 32
  • 16

Weights on graph edges reflect cost of ____________.

  • Nodes
  • Traversing edge               page 63
  • Trending edge
  • Path

A ________ relies on the hardware manufacturer to assign a unique physical address to each network interface.

  • Static addressing scheme     page 34
  • Configurable addressing scheme
  • Dynamic addressing scheme
  • None of the given

In _______ topology, if the switch goes down all the computers will be disconnected.

  • Star
  • Ring
  • Bus
  • Mesh

Which type of network consists of wired computers in a university classroom?

  • MAN
  • PAN
  • WAN
  • LAN

81. If you as a network administrator want to know the traffic flow of your data while communicating with a remote computer which of the following will be used to know about intermediate routers?

  • Ipconfig
  • Ping               page 11
  • Traceroute
  • Arp

Hardware address is also called _____________.

  • Physical address
  • Logical address
  • IP address
  • Port address

Thick Ethernet also requires _________ to avoid signal reflectance.

  • Transceivers
  • AUI cable
  • Drop cable
  • Terminators               page 41

Which of the following network is using the TCP/IP model globally?

  • PAN
  • SAN
  • LAN
  • The Internet

VPNs connections are sometimes called ________.

  • Tunnels        page 75
  • Open networking
  • Routing
  • Public network

To reduce _______ computers can be connected and distributed to a number of hubs, then the hubs can be connected to a switch.

  • Costs             page 54
  • Quality
  • Efficiency
  • Noise

If a __________ is used the communication between two computers will not affect the other pair of computers and they can communicate at the same time

  • Hub
  • Switch          page 54
  • Repeater
  • Amplifier

The length of hardware address is ______________.

  • One to ten bytes
  • One to five bytes
  • One to six bytes       page 34
  • One to seven bytes

A network analyzer is also called _________.

  • Network manager
  • Network administrator
  • Network monitor page 37
  • Network 

90. No any error detection scheme is perfect because transmission errors can affect _________.

  • Data
    • Additional Information
    • Additional information & data   google
    • Transmission medium

The token ring network topology is a ring but wiring topology is a _________.

  • Star        page 44
  • bus
  • tree
  • mesh

_______ addresses are used in an ethernet frame.

  • IP page 99
  • Port
  • Logical
  • МАС

AUI cable connects from NIC to ___________.

  • BNC Connector
    • RJ-45 Connector              
    • Transceiver        page 41
    • Terminator        

Public networks are _______________.

  • More secure than LAN  
  • Flexible page 74
  • Limited in boundary      
  • Intranet              

The maximum cable length of a LAN is fixed because _________________.

  • Additional hardware are not suitable for the LAN extension.
  • The electrical signal level gets weaker as it travels. Page 48
  • Additional software are not suitable for the LAN extension
  • The electrical signal level gets stronger as it travels.

In _______.network topology is separated from route computation.

  • Local area
  • Link-state routing            page 64
  • Static routing
  • Dynamic routing

Which layer of the OSI Model directly communicates and controls the transmission medium:

  • Transmission
  • Physical
  • Application
  • Network

In ________ technique data is treated as a sequence of integers and their arithmetic sum is computed and the carry bits are added to the final sum.

  • CRC
  • Bit stuffing
  • Checksum   page 19
  • 2D Parity

A network with _______ jitter takes more time to deliver some packets than others.

  • Zero
  • High              page 80
  • Low
  • Moderate

A network uses _______ to arrange computers in a single closed loop.

  • Star Topology
  • Mesh Topology
  • Ring Topology           page 25
  • Bus Topology

Which of the following tasks is not done by the second layer of the OSI model?

Flow control

Framing

Channel coding         google

Error control

ATM is a single technology designed to meet the goals of both ________and __________.

LAN & PAN

LAN & WAN               page 66

LAN & MAN

MAN & WAN

LAN and WAN are classified according to their _______.

  • Size                page 4
  • Connectivity
  • Medium
  • Mobility

The identifier that is used for data transfer in the virtual circuit network is called _________.

  • Virtual circuit identifier
  • Global address
  • Network identifier
  • IP identifier

In Direct point to point communication adding the Nth computer requires______ new connections

  • N^2
  • N-1
  • (N^2 -N)/2  page 23
  • N (N-1)

Which of the following is the correct function of bridge?

  • MTU path discovery
  • Byte stuffing
  • Routing information
  • Filtering and forwarding a frame      page 50, 51

Point to point topology is

  • Size based
  • Mobility based
  • Connectivity based page 5
  • Medium based

IEEE LLC / SNAP header is ________which is used to specify the type of date.

  • 8 octets        google
  • 16 octets
  • 32 octets
  • 64octets

IEEE LLC / SNAP header is ________which is used to specify the type of date.

  • CRC
  • Bit stuffing
  • Checksum
  • 2D Parity

What is the largest network in existence?

  • The internet              google
  • A PAN
  • A Fog
  • Edge Network

The frame format of any LAN technology must consists of ____ and___-

Payload and CRC

Frame header and CRC

Payload and Frame type

Frame header and payload page 36

___________ can occur a LANs when a packet is delayed because the network is busy

  • Jitter              page 66
  • Loop
  • Deadlock
  • variance

Which of the following cannot be used to extend a LAN?

  • Repeaters
  • Switches
  • Routers
  • Fiber modems

Links-state algorithm is used in ___________

  • RIP
  • IGRP
  • RIPv2
  • OSPF             page 64

According to size, there are ___classifications of networks

  • 2      page 2
  • 3
  • 4
  • 5

In which topology terminators are used at the end of the cable?

  • Star
  • Bus
  • Ring
  • Mesh

Switch simulates a _________LAN connecting segments

  • Single
  • Single shared
  • Bridged        page 54
  • Complex

PVS stands for _____________

a. Permanent virtual circuit page 69

b.    Private virtual circuit

c.     Public virtual circuit

d.    Plastic virtual circuit

Hardware that calculates a CRC used two simple components _____

  • AND unit and XOR Unit
  • Shift register and XOR unit  page 20
  • Shift register & AND unit
  • Shift register and Shift XCR unit

Thin ethernet is known as ________

a. 10 base 2                google

b.    10 base 5

c.     10 base T

d.    All of the above

If a sender with a 1 Gigabit NIC and receiver with 100 Megabit NIC wants to communicate with each other than at which speed they can communicate

  • 11 Megabit
  • 100 Megabit
  • 1 Gigabit
  • Gigabit

____________ is used as an alternative of packet for a specific computer network technology

  • Datum
  • Token
  • Ether
  • Frame           page 14

The sharing of a medium and its link by two or more devices is called ____

  • Modulation
  • Encoding
  • Multiplexing
  • Line discipline

The topology each computer is connected to a central hub is called

  • Ring topology
  • Star topology            page 5
  • Tree topology
  • Mesh topology

Asynchronous transfer mode (ATM) is designed to work on fiber but can be used with _____________

  • Wireless
  • Twisted pair               page 72
  • Wifi
  • Bluetooth

The basic responsibility of NIC is ________

  • To access medium network
  • To resource allocation
  • To access memory
  • All of the given option

Frame relay is ____

a. Connection oriented service         page 64

b.    Connectionless service

c.     Typically ranges for 5 Mbps to 1000Mbps

d.    Call based

The length of time required to send a variable length packet is ____

  • 5 second
  •  Variable              page 72
  • Constant
  • Fix

ABR stands for ______

  • Asynchronous bit rate
  • Asynchronous byte recovery
  • Asynchronous bit redundancy
  • Available bit rate     page 71

In Token Ring, if all computers are ready to transmit it enforces ________Access

  • First come first served
  • Round Robin              page 30
  • Shorter delay
  • Last come first served

The Ethernet standard specifies that frames are sent using the _________ scheme.

Differential Manchester

Not Return to Zero (NR2)

Manchester Encoding            page 27

Return to Zero (RZ)

ATM uses the concept of ___________.

a. Connection-oriented        page 66

b.    Connection-less

c.     variable packet size

d.    Fixed and variable packet size

133.                Which of the following is a benefit of point to point communication?

  • Quick to configure
  • Security implementation
  • Cost
  • Less availability

_________ is not used to extend LAN.

  • Hub
  • Fiber modem
  • Repeater
  • Bridge

Which types of VPNs are used for corporate connectivity across companies residing in different geographical locations?

  • Remote access VPNs
  • Peer-to-peer VPNs
  • Country-to-country VPNs
  • Site-to-site VPNs     google

Star topology is the kind of

a. Tree topology

b. Point-to-point topology  page 05

c.     Broadcast topology

d.    Ring topology

In a __________ state, a bridge allows simultaneous use of each segment.

  • Ready
  • Steady
  • Final
  • Startup

The network occupies larger areas like cities & countries is called

  • LAN
  • WAN
  • MAN
  • All of the above

In link state routing __________ send link-state information about local connections.

  • Bridge
  • Switches
  • Routers
  • Hubs

Transmission media are usually categorized as _______.

  • Guided or unguided
  • Fixed or unfixed
  • Determinate or indeterminate
  • Metallic or nonmetallic

Even parity can be used to check for ________ bit/ bits of errors.

a. 1 page 18

b.    2

c.     3

d.    0

Routing table entries can be ________ with a default route.

  • Collapsed
  • Redirected
  • Emerged
  • Guaranteed

The system administrator must coordinate to avoid the conflict in_________ hardware addressing scheme.

  • Static
  • Dynamic
  • Configurable
  • Fixed

____________ network does not depend on CSMA/CD.

  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Wireless

Which of the following technologies can extend the diameter of LAN medium?

  • Fiber optic
  • Repeater
  • Diameter of LAN medium is not extendable
  • Both. Fiber optic and Repeaters

Connections are formed in Asynchronous transfer mode by starting values in________ in ATM switches, as opposed to making actual electrical connections.

  • Heap
  • Stack
  • Virtual Circuit
  • Memory locations   page 67

The _______ scheme must be reliable to prevent conflicts.

 a. Static

b. Dynamic page 34

c.     Configurable

d.    Fixed

Metropolitan area network is used for ____________.

a. City page 55

b.    Building

c.     Country

d.    Continent

Which addressing can be only used in the local area networks?

a. IP google

b.    Physical

c.     Port

d.    Protocol

The sharing of a _______ among the workers in an office is a goal of resource sharing.

  • Mouse
  • Printer  page 9
  • Keyboard
  • Motherboard

ATM uses fixed size, small cells, 48 octet’s data and __________.

a. Octets header

b. 5 Octets header  page 65

c.     6 Octets header

d.    7 Octets header

Which of the followings is not an advantage of framing?

  • Missing eot indicates sending computer crashed.
  • Missing soh indicates receiving computer missed beginning of message.
  • Delimiters do not contain any user data        page 16
  • Bad frame is discarded.

The _________ field of Ethernet frame has the purpose of receiver synchronization.

a. Preamble               page 36

b.    Frame Type

c.     Data

d.    CRC

___________ was the first internet available for the first time.

  • ARPANAT
  • The ARPNET
  • The NET
  • ARPANET     page 9

We need packets rather than bits because ________

  • To compress the data
  • Packets move faster
  • Sender and receiver need to coordinate to detect transmission errors. Page 14
  • Packets can only move between two terminals

When an application ________ any data, it makes a copy of the data available to all other computers on the network.

a. Multicast page 143

b.    Broadcast

c.     Anycast

d.    Unicast

VBR stands for _________

  • Virtual Bit Rate
  • Virtual Byte Rate
  • Variable Byte Redundancy
  • Variable Bit Rate      page 71

As you know virtual university taking midterm or grand quiz exams. Students are searching past grand quiz files of their subjects. Here we provide you vu grand quiz 2021 files. Easy to Download your midterm papers according to your subject

JOIN OUR WHATSAPP GROUP

AL-JUNAID INSTITUTE GROUP

Download link of CS610 Grand Quiz Solved File

Leave a Comment