Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree
Last Answer : a. spanning tree
Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree
Last Answer : A. spanning tree
Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches
Last Answer : d. Routers, Bridges and Switches
Description : Structured programming codes includes ? sequencing alteration iteration multiple exit from loops only A, B and C
Last Answer : only A, B and C
Description : Receptors perform the following function/functions: A. Ligand recognition B. Signal transduction C. Both ligand recognition and signal transduction D. Disposal of agonists and antagonists
Last Answer : D. Disposal of agonists and antagonists
Description : The following receptor type has 7 helical membrane spanning amino acid segments with 3 extracellular and 3 intracellular loops: A. Tyrosine protein kinase receptor B. Gene expression regulating receptor C. Intrinsic ion channel containing receptor D. G protein coupled receptor
Last Answer : D. G protein coupled receptor
Description : Data communication system spanning states, countries, or the whole world is ________ a) LAN b) WAN c) MAN d) PAN
Last Answer : b) WAN
Description : In OSPF, a ________ link connects two routers without anyother host or router in between. A) point-to-point B) transient C) stub D) none of the above
Last Answer : point-to-point
Description : A bridge can use the _________algorithm tocreate aloopless topology. A) binary tree B) spanning tree C) multiway tree D) none of the abov
Last Answer : spanning tree
Description : Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate? a. solid bucket algorithm b. spanning tree algorithm c. hocken helm algorithm d. leaky bucket algorithm
Last Answer : d. leaky bucket algorithm
Description : What is Spanning tree?
Last Answer : It is for the bridges to select ports over which they will forward frames. A spanning tree is a subgraph of this graph that covers (spans) all the vertices, but contains no cycles. It keeps all of the vertices of the original graph, but throws out some of the edges.
Description : What are called routers? a. The devices that operates at session layer b. The devices that operates at data layer c. The devices that operates at application layer d. The devices that operates at network
Last Answer : d. The devices that operates at network
Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true
Last Answer : D. 1. true, 2. false, 3. true
Description : Four routers haveto be interconnected in a point-to-point Network. Each pair of root us may connect by a high-speed line, a medium speed line ora low speed line. Find the total number of topologies. A. 12 B. 81 C. 48 D. 729
Last Answer : 729
Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above
Last Answer : d. All of the above
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : Consider a source computer(S) transmitting a file of size 106 bits to a destination computer (D)over a network of two routers (R1 and R2) and three links(L1, L2, and L3). L1connects S to R1; L2 connects R1 to ... file from S to D? a. 1005 ms b. 1010 ms c. 3000 ms d. 3003 ms Answer: Option(a)
Last Answer : a. 1005 ms
Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above
Last Answer : B. queues
Description : What is an auto-associative network? a) a neural network that contains no loops b) a neural network that contains feedback c) a neural network that has only one loop d) a single layer feed-forward neural network with pre-processing
Last Answer : b) a neural network that contains feedback
Description : An auto-associative network is: a) a neural network that contains no loops b) a neural network that contains feedback c) a neural network that has only one loop d) a single layer feed-forward neural network with pre-processing
Description : In the group-shared tree approach,_________ involved in multicasting. A) only the core router is B) all routers are C) only some routers are D) none of the above
Last Answer : only the core router is
Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica
Last Answer : User exec is a subset of the privileged exec
Description : In OSPF, when the link between two routers is broken, the administration may create a _________ link between them usinga longer paththat probably goes throughseveral routers. A) point-to-point B) transient C) stub D) none of the above
Last Answer : none of the above
Description : __________ is agroup ofnetworksand routers under theauthorityof a singleadministration. A) An autonomous system B) An area C) a and b D) none of the above
Last Answer : An autonomous system
Description : In the original ARPANET,_______ were directly connected together. A) IMPs B) host computers C) networks D) routers
Last Answer : IMPs
Description : When data moves from one set of major connections to another on theInternet, we call theseconnections the Internet _____. A) Pathway B) Backbone C) Communications system D) Routers
Last Answer : Backbone
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls
Last Answer : B. Unix
Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link
Last Answer : B. physical, data link, network
Description : Figure shows human urinary system with structures labelled A to D. Select option which correctly identifies them and gives their characteristic and/ or functions. (a) C - Medulla - inner zone of ... B - Pelvis - broad funnel shaped space inner to hilum, directly connected to loops of Henle
Last Answer : (c) A - Adrenal gland - located at the anterior part of kidney. Secrete catecholamines which stimulate glycogen breakdown.
Description : In Bluetooth, multiple ________ form a network called a _________. A) scatternet; piconets B) piconets: scatternet C) piconets:bluenet D) bluenet; scatternet
Last Answer : piconets: scatternet
Description : A Bluetooth network is called a ________. A) piconet B) scatternet C) bluenet D) none of the above
Last Answer : piconet
Description : TCP and UDP are called ________ a. Application protocols b. Session protocols c. Transport protocols d. Network protocols
Last Answer : c. Transport protocols
Description : TCP and UDP are called ________ A. Application protocols B. Session protocols C. Transport protocols D. Network protocols
Last Answer : C. Transport protocols
Description : The first Network was called ________ a) CNNET b) NSFNET c) ASAPNET d) ARPANET
Last Answer : d) ARPANET
Description : Which among the following definitions is correct: a) Address - The unique number ID assigned to one host or interface in a network b) Subnet - A portion of a network sharing a particular subnet address c) ... to the host d) Interface - A network connection e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : When a company distributes its products through a channel structure that includes one or more resellers, this is known as ________. A. indirect marketing B. direct marketing C. multi-level marketing D. integrated marketing
Last Answer : B. direct marketing
Description : The number of independent loops for a network with n nodes and b branches is
Last Answer : The number of independent loops for a network with n nodes and b branches is b-n+1
Description : The moderntelephone network isnow ________. A) digital B) analog C) digital as well as analog D) none of the above
Last Answer : digital as well as analog
Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above
Last Answer : virtual-circuit
Description : ________ is a virtual-circuit wide-area network that was designed in response to demands fora new type of WAN in thelate1980s and early 1990s. A) X.25 B) Frame Relay C) ATM D) none of the above
Last Answer : Frame Relay
Description : In OSPF, a ________ link is a network is connectedto only one router. A) point-to-point B) transient C) stub D) none of the above
Last Answer : stub
Description : The routing processor of arouter performs the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above
Last Answer : network
Description : The inputand output portsof a router perform the ________ layer functions of therouter. A) physical and data link B) network C) transport D) none of the above
Last Answer : physical and data link
Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223
Last Answer : a. 158
Description : Automatic repeat request error management mechanism is provided by ________ a. logical link control sublayer b. media access control sublayer c. network interface control sublayer d. application access control sublayer
Last Answer : a. logical link control sublayer
Description : Automatic repeat request error management mechanism is provided by ________ A. logical link control sublayer B. media access control sublayer C. network interface control sublayer D. application access control sublayer
Last Answer : A. logical link control sublayer
Description : HTTP is ________ protocol. a) application layer b) transport layer c) network layer d) data link layer
Last Answer : a) application layer
Description : Communication channel is shared by all the machines on the network in ________ a) broadcast network b) unicast network c) multicast network d) anycast network
Last Answer : a) broadcast network
Description : The property of binary tree is A) The first subset is called left subtree B) The second subtree is called right subtree C) The root cannot contain NULL D) The right subtree can be empty
Last Answer : D) The right subtree can be empty