Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above
Last Answer : C) Both A and B
Description : Packet-switched networks can alsobe divided into ______subcategories: virtual-circuit networks and datagram networks A) four B) three C) two D) five
Last Answer : two
Description : _____ is used for transmission of packets in the cellular switched architecture. a) Packet switching techniques b) Circuit switching techniques c) Packet and circuit switched technique d) Datagram technique
Last Answer : a) Packet switching techniques
Description : Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender? (A) Broadcasting (B) Unicasting (C) Packet Switching (D) Circuit Switching
Last Answer : (D) Circuit Switching
Description : ………………….. is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling B) Transferring C) Trafficking D) Switching
Last Answer : A) Tunneling
Description : In networks thatdo not support physical multicastaddressing, multicastingcan be accomplished through _______. A) mapping B) queries C) tunneling D) noneof the above
Last Answer : tunneling
Description : ………… enable us to hide, inside the object, both the data fields and the methods that act on that data. A) Encapsulation B) Polymorphism C) Inheritance D) Overloading
Last Answer : A) Encapsulation
Description : Abstraction and encapsulation are fundamental principles that underlie the object oriented approach to software development. What can you say about the following two statements? I. Abstraction allows us to focus on what something ... and II are correct. (3) Only II is correct. (4) Only I is correct.
Last Answer : (1) Neither I nor II is correct.
Description : …………. Is the process of creating new classes, called derived classes from existing classes called base class. A) Inheritance B) Encapsulation C) Polymorphism D) Overloading
Last Answer : A) Inheritance
Description : What is Encapsulation? How is it implemented in Java?
Last Answer : A: Binding up of data and associated functions together into a single unit called (class) is called Encapsulation. In Java, it is implemented by the use of a class.
Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation
Last Answer : (B) Inheritance
Description : The “part-whole”, or “a-part-of”, relationship in which objects representing the components of something associated with an object representing the entire assembly is called as (A) Association (B) Aggregation (C) Encapsulation (D) Generalisation
Last Answer : (B) Aggregation
Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction
Last Answer : (C) Encapsulation
Description : A network is a cross between a circuit-switched network and a datagram network. It has some characteristics of both. a. virtual-circuit b. packet-switched c. None of the Given d. frame-switched
Last Answer : a. virtual-circuit
Description : A local telephone network isan example of a_______ network. A) packet-switched B) circuit-switched C) message-switched D) none of the above
Last Answer : circuit-switched
Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above
Last Answer : virtual-circui
Description : There are two types of designs for communication subnets: they are ………… A. Point-to-Point channels and Broadcast channels B. packet-switched subnet and store-and-forward C. Multicasting and Broadcasting D. Point-to-Point channels and store-and-forward
Last Answer : A. Point-to-Point channels and Broadcast channels
Description : BSNL land line telephone network is an example of a network. A. Packet switched B. Circuit switched C. Bit switched D. Line switched
Last Answer : B. Circuit switched
Description : A local telephone network is an example of a _______ network. a) Packet switched b) Circuit switched c) Bit switched d) Line switched
Last Answer : b) Circuit switched
Description : The required resources for communication between end systems are reserved for theduration of the session between end systems in method. a. Packet switched b. Bit switched c. Line switched d. Circuit switched
Last Answer : d. Circuit switched
Description : A local telephone network is an example of a network. a. Packet switched b. Circuit switched c. Bit switched d. Line switched
Last Answer : b. Circuit switched
Description : The ________is a circuit-switched network, while the ______is a packet-switched network. (A) Telephone, ATM (B) SONET and FDDI (C) Satellite, Telephone (D) FDDI and SONET
Last Answer : (A) Telephone, ATM
Description : Which of the following feature makes impossible to eavesdrop on GSM radio transmission? a) SIM b) On the air privacy c) SMS d) Packet switched traffic
Last Answer : b) On the air privacy
Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony
Last Answer : c) Call diversion
Description : Which of the following does not come under the teleservices of GSM? a) Standard mobile telephony b) Mobile originated traffic c) Base originated traffic d) Packet switched traffic
Last Answer : d) Packet switched traffic
Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above
Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame
Description : A network that needs human beings to manually route signals is called.... A) Fiber Optic Network B) Bus Network C) T-switched network D) Ring network
Last Answer : C) T-switched network
Description : What four switched networks are part of the defense communications system?
Last Answer : AUTOVON, AUTOSEVOCOM, AUTODIN, and DSSCS.
Description : Which of the following approaches to switching share networks resource? a. Circuit switching b. Packet switching c. Both A and B d. None of these
Last Answer : b. Packet switching
Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above
Last Answer : A) i only
Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : D) All i, ii, iii, iv and v
Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : Which of the following is not a congestion policy at network layer? (A) Flow Control Policy (B) Packet Discard Policy (C) Packet Lifetime Management Policy (D) Routing Algorithm
Last Answer : (A) Flow Control Policy
Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes
Last Answer : (4) 5 bytes
Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway
Last Answer : Answer: 4
Description : In _______delivery, the deliverer of theIP packet and the destination are on different networks. A) aconnection-oriented B) a direct C) an indirect D) none of the above
Last Answer : an indirect
Description : Which of the following statements is correct for the use of packet switching? A. the subdivision of information into individuallyaddressed packets in conjunction with alternativerouting arrangementenabled the transmission path ... capacity could be achieved. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : In computer networks _________ is a characteristic that a flow needs where Lack of it means losing a packet or acknowledgment, which entails retransmission. A. Reliability B. Delay C. Jitter D. Bandwidth
Last Answer : A. Reliability
Description : A __________ is a device that forwards packets between networks by processing the routing information included in the packet. a) bridge b) firewall c) router d) hub
Last Answer : c) router
Description : Which tool allows a user to simulate real networks? a.artificial intelligence b.Packet Tracer c.internet d.PAN
Last Answer : b.Packet Tracer
Description : Satellite-Switched Time-Division Multiple Access (SS/TDMA) is A. the method of determining whichdevice has access tothe transmission medium at any time. B. a medium access control technique for ... switching is used to dynamically changethechannel assignments D. All of theabove E. None of the above
Last Answer : a form of TDMA in which circuit switching is used to dynamically changethechannel assignments
Description : The standard suit of protocols used by the Internet, Intranets, extranets and some other networks. A) TCP/IP B) Protocol C) Open system D) Internet work processor
Last Answer : A) TCP/IP
Description : Internet is ................. A) Network of Networks B) Networks of Communication C) Networks of Data D) Group of LAN
Last Answer : A) Network of Networks
Description : Slots and facets are used in (A) Semantic Networks (B) Frames (C) Rules (D) All of these
Last Answer : (B) Frames
Description : Consider the following statements : (a) Boolean expressions and logic networks correspond to labelled acyclic digraphs. (b) Optimal Boolean expressions may not correspond to simplest networks. (c) Choosing essential blocks first in a Karnaugh map ... (b) only (C) (a) and (b) (D) (a), (b) and (c)
Last Answer : (D) (a), (b) and (c)
Description : Which of the following neural networks uses supervised learning? (A) Multilayer perceptron (B) Self organizing feature map (C) Hopfield network (1) (A) only (2) (B) only (3) (A) and (B) only (4) (A) and (C) only
Last Answer : (1) (A) only
Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II
Last Answer : (1) only I
Description : In ………………. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B
Last Answer : D) Both A and B
Description : In Unix, files can be protected by assigning each one a 9-bit mode called rights bits. Now, consider the following two statements: I. A mode of 641 (octal) means that the owner can read and write the file, other ... (B) Only II is correct (C) Both I and II are correct (D) Both I and II are incorrect
Last Answer : (C) Both I and II are correct