Education In Pakistan

Papers, Notes, Books & Help For Students

UPDATED EDUCATIONAL NEWS INTERVIEW HELP FOR ALL JOBS ONLINE BOOKS SCHOLARSHIPS AVAILABLE INTERNSHIP JOBS

Tag: VU CS610- Computer Network MIDTERM solved unsolved past papers spring 2010

VU CS610- Computer Network MIDTERM solved unsolved past papers spring 2010

VU CS610- Computer Network MIDTERM Solved Unsolved Past Papers Spring 2010

Question No: 1 ( M a r k s: 1 ) In Point-to-Point topology there are two topologies.
► Star and Tree ► Tree and Ring ► Star and Ring ► Star and Tree (Page 5) ► None of the given Question No: 2 ( M a r k s: 1 ) —— Program sends a message to a remote computer and reports whether the computer responds.
► Ping (Computer Networks and Internets, page9) ► Traceroute ► ICMP ► Non of the given Question No: 3 ( M a r k s: 1 ) —— has no way to determine the cause of the problem.
► ICMP ► Ping (Computer Networks and Internets, page 11) ► Trace route ► Non of the given
6
Question No: 4 ( M a r k s: 1 ) The term—– ——- refers to the general concept of a small block of data
► Packet (Page 16) ► Frame ► Data ► None of the given Question No: 5 ( M a r k s: 1 ) ———- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character ► Parity (Computer Networks and Internets, page 77) ► Checksums ► CRC ► None of given Question No: 6 ( M a r k s: 1 ) Local Talk is a LAN technology that employs ————- ► Bus topology (Page 30) ► Ring topology ► Star topology ► None of the given Question No: 7 ( M a r k s: 1 ) Most LANs that employ ring topology use an access mechanism known as——- ► CSMA/CD ► CSMA/CA ► TOKEN PASSING (Computer Networks and Internets, page95) rep ► None of the given Question No: 8 ( M a r k s: 1 ) Ethernet uses a —— bit static addressing scheme in which each device is assigned a unique address by the manufacturer. ► 64 ► 48 (Computer Networks and Internets, page 109) ► 32 ► 8
7
Question No: 9 ( M a r k s: 1 ) Formally named __________ informally known as the thick wire Ethernet or Thick net.
► 10 Base 2 ► 10 Base 5 Computer Networks and Internets, page 120) ► 10 Base T ► None of the given Question No: 10 ( M a r k s: 1 ) Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet. ► 10 Base 2 ► 10 Base 5 ► 10 Base T (Page 43) rep ► None of the given
Question No: 11 ( M a r k s: 1 ) The maximum size of an Ethernet segment is___________ ► 250 meters ► 500 meters (Page 27) ► 700 meters ► None of the given Question No: 12 ( M a r k s: 1 ) A Bridge can ________
► Filter a frame ► Forward a frame ► Extend a LAN ► Do all the above rep Click here For Detail Question No: 13 ( M a r k s: 1 ) _______ computes shortest paths in a graph by using weights on edges as a measure of distance. ► Greedy algorithm ► Distance vector algorithm ► Dijksta’s algorithm (Computer Networks and Internets, page112) rep ► Non of the given
8
Question No: 14 ( M a r k s: 1 ) __________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
► Constant Bit Rate (CBR) service ► Variable Bit Rate (VBR) service (Page 71) ► Available Bit Rate (ABR) service ► None of the given
Question No: 15 ( M a r k s: 1 ) Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____. ► Connectionless service paradigm (Computer Networks and Internets, page112) ► Connection-oriented service paradigm ► Both Connectionless and Connection-oriented service paradigm ► None of the given Question No: 16 ( M a r k s: 1 ) The product of delay and throughput measures the _____ of data that can be present on the network.
► Area ► Volume (Page 80) ► Length ► None of the given Question No: 17 ( M a r k s: 1 ) A network with throughput T and delay D has a total of ________ bit in transit at any time.
► T / D ► T x D (Computer Networks and Internets, page203) rep ► T + D ► None of the given Question No: 18 ( M a r k s: 1 ) One repeater _______, two repeaters ________ the maximum cable length limitation.
► doubles, triple (Page 49) ► square roots, cude roots ► and, triple ► doubles, cancel
9
Question No: 19 ( M a r k s: 1 ) A network uses a —— if all computers attach to a central point
► Star Topology (Page 25) ► Ring Topology ► Bus Topology ► None of the given Question No: 20 ( M a r k s: 1 ) Computers attached to an Ethernet use —— in which a computer waits for the other to be idle before transmitting a frame. ► CSMA/CD (Computer Networks and Internets, page 93) rep ► CSMA/CA ► TOKEN PASSING ► None of the given

VU CS610- Computer Network MIDTERM Solved Unsolved Past Papers Spring 2010

VU CS610- Computer Network MIDTERM solved unsolved past papers spring 2010

VU CS610- Computer Network MIDTERM Solved Unsolved Past Papers Spring 2010

Question No: 1 ( M a r k s: 1 ) No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
► True (Computer Networks and Internets, page82) ► False Question No: 2 ( M a r k s: 1 ) —— Program sends a message to a remote computer and reports whether the computer responds.
► Ping (Computer Networks and Internets, page9) ► Traceroute ► ICMP ► Non of the given Question No: 3 ( M a r k s: 1 ) ———- was especially concerned about the lack of high powered computers.
► ARPA (Computer Networks and Internets, page5) ► IEEE ► EIA ► Non of the given Question No: 4 ( M a r k s: 1 ) The term ——– is used to denote the definition of a packet used with a specific type of network. ► Packet
► Frame (Computer Networks and Internets, page 73) ► Data ► None of the given
2
Question No: 5 ( M a r k s: 1 ) Computer networks are often called ————– because they use packet technology. ► Ethernet ► Switch networks
► Packet networks (Computer Networks and Internets, page 73) ► None of the given
Question No: 6 ( M a r k s: 1 ) ————– have advantages arisen from the size and ease of computation. ► CRC ► Parity (Page 19)
► Checksums ► None of given Question No: 7 ( M a r k s: 1 ) Most LANs that employ ring topology use an access mechanism known as——- ► CSMA/CD ► CSMA/CA
► TOKEN PASSING (Computer Networks and Internets, page95) ► None of the given Question No: 8 ( M a r k s: 1 ) IEEE LLC/SNAP header is ——–, which is used to specify the type of data.
► 8 octets (Computer Networks and Internets, page112) ► 8 bytes ► 8 bits ► None of the given Question No: 9 ( M a r k s: 1 ) Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet. ► 10 Base 2 ► 10 Base 5
► 10 Base T (Page 43) ► None of the given
3
Question No: 10 ( M a r k s: 1 ) An interface for twisted pair Ethernet must have an ____________ connector , and must generate signals according to the_____________ specification.
► RJ-45, 10 Base T (Computer Networks and Internets, page 126) ► RJ-45, 10 Base 5 ► BNC, 10 Base 2 ► BNC, 10 Base T Question No: 11 ( M a r k s: 1 ) A bridges function in the _________ layers(s).
► Physical (MAC) Click here for Detail ► Data link ► Network
► Physical (MAC) and Data link Question No: 12 ( M a r k s: 1 ) A Bridge can ________ ► Filter a frame ► Forward a frame ► Extend a LAN
► Do all the above Click here for Detail
Question No: 13 ( M a r k s: 1 ) A Bridge forwards or filters a frame by comparing the information in its address table to the frame’s_____ ► Layer 2 source address ► Source node’s physical address
► Layer 2 destination address Click here for Detail ► Layer 3 destination address Question No: 14 ( M a r k s: 1 ) ________ computes shortest paths in a graph by using weights on edges as a measure of distance. ► Greedy algorithm ► Distance vector algorithm
► Dijksta’s algorithm (Computer Networks and Internets, page112) ► Non of the given
4
Question No: 15 ( M a r k s: 1 ) ___________ is used for audio and video, since these have predefined maximum data rates
► Constant Bit Rate (CBR) service (Page 71) ► Variable Bit Rate (VBR) service ► Available Bit Rate (ABR) service ► None of the given Question No: 16 ( M a r k s: 1 ) Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
► Connectionless service paradigm (Computer Networks and Internets, page112) ► Connection oriented service paradigm ► Both Connectionless and Connection-oriented service paradigm ► None of the given Question No: 17 ( M a r k s: 1 ) A network with throughput T and delay D has a total of ________ bit in transit at any time. ► T / D
► T x D (Computer Networks and Internets, page203) ► T + D ► None of the given Question No: 18 ( M a r k s: 1 ) ATM is designed to work on___________. ► Twisted Pair ► Coaxial ► Radio Frequency
► Fiber (Computer Networks and Internets, page 72) Question No: 19 ( M a r k s: 1 )
Computers attached to an Ethernet use —— in which a computer waits for the ether to be idle before transmitting a frame.
► CSMA/CD (Computer Networks and Internets, page 93) ► CSMA/CA ► TOKEN PASSING ► None of the given
5
Question No: 20 ( M a r k s: 1 ) FDDI can transmits data at a rate of ———-
► 100 million bits per second (Page 314) ► 10 million bits per second ► 1000 million bits per second ► None of the given

VU CS610- Computer Network MIDTERM Solved Unsolved Past Papers Spring 2010

Education In Pakistan © 2016