0

Computer Networks- II

Description: C.N
Number of Questions: 25
Created by:
Tags: C.N Data Communication & Networks Operating System
Attempted 0/25 Correct 0 Score 0

Which of the following properties of computer network classifies according to broadcast or point-to-point networks?

  1. Transmission technique

  2. Functional relationship

  3. Connection method

  4. None of these


Correct Option: A
Explanation:

It is a technique, which classifies the computer networks according to broadcast or point to point networks.

Which primitive is used in connection-oriented service to terminate a connection?

  1. CONNECT

  2. DISCONNECT

  3. RECEIVE

  4. None of these


Correct Option: B
Explanation:

This primitive is used to terminate a connection with the server.

Which of the following routing algorithms consists of a data structure called routing table?

  1. Shortest path algorithm

  2. Flooding algorithm

  3. Distance vector routing

  4. None of these


Correct Option: C
Explanation:

Distance vector routing algorithm consists of data structure called a routing table.

Which of the following styles of terminating/releasing a connection works the same as a telephone system works?

  1. Symmetric release

  2. Asymmetric release

  3. Congestion

  4. None of these


Correct Option: B
Explanation:

Asymmetric release works as same as the telephone system works.

Which of the following hubs consist of several ports that transfer data from one connected device to other ports?

  1. Passive hubs

  2. Active hubs

  3. USB hubs

  4. Stackable hubs


Correct Option: D
Explanation:

These are the hubs that consist of several ports that transfer data from one connected device to other ports.

Which of the following types of bridges is invisible to the other devices on a network?

  1. Translational bridge

  2. Transparent bridge

  3. Source-route bridge

  4. None of these


Correct Option: B
Explanation:

This is the bridge which is invisible to the other devices on the network.

Which of the following protocols in internet protocol suite sends short messages known as datagrams?

  1. TCP/IP

  2. DNS protocol

  3. UDP protocol

  4. None of these


Correct Option: C
Explanation:

This protocol can be used to programs on networked computers and can send short messages known as datagrams.

Which of the following is the combination of a router and a bridge?

  1. Wireless router

  2. Brouter

  3. Wireless access point

  4. Modem


Correct Option: B
Explanation:

This combines the function of a router and a bridge.

Which of the following components of a computer network is/are provided to the users to carry out their tasks using the network?

  1. Server

  2. Network operating system

  3. Nodes

  4. None of these


Correct Option: C
Explanation:

These are the components in the computer network which are provided to the users to carry out their tasks using the network.

Which of the following frequencies is the range of microwave signals?

  1. 30 MHz to 1 GHz

  2. 2 GHz to 40 GHz

  3. 3x1011 Hz to 2x1014 Hz

  4. None of these


Correct Option: B
Explanation:

This is the frequency range of microwave signals.

Which of the following protocols in TCP/IP reference model resolves the numerical address of network into its textual name or vice-versa?

  1. TELNET

  2. FTP

  3. DNS

  4. None of these


Correct Option: C
Explanation:

Domain Name System protocol resolves the numerical address of network into its textual name or vice-versa.

______________ is the programming approach in which as one program needs input/output from disk, it is suspended and another program whose data is already in main memory is taken up for execution.

  1. Batch processing

  2. Multi programming

  3. Distributed system

  4. None of these


Correct Option: B
Explanation:

Multiprogramming is the programming approach in which as one program needs input/output from disk, it is suspended and another program whose data is already in main memory is taken up for execution.

Which of the following devices is the network point that acts as an entrance to another network?

  1. Router

  2. Gateway

  3. Bridge

  4. None of these


Correct Option: B
Explanation:

Gateway is a network point that acts as an entrance to another network.

Which of the following layers in TCP/IP reference model describes the physical equipment necessary for communication?

  1. Layer 2

  2. Layer 4

  3. Layer 1

  4. None of these


Correct Option: C
Explanation:

This layer describes the physical equipment necessary for communication, such as twisted pair cables.

Which systems are large centralized computers and provide the bulk of business computing through time sharing?

  1. Server operating systems

  2. Minicomputers

  3. Mainframe systems

  4. None of these


Correct Option: C
Explanation:

These are large centralized computers and provide the bulk of business computing through time sharing.

Which policy in memory management determines where in real memory a process piece is to reside?

  1. Replacement policy

  2. Fetch policy

  3. Placement policy

  4. None of these


Correct Option: C
Explanation:

The placement policy of memory management determines where in real memory, a process piece is to reside.

Which of the following interrupts is said to be occurred when a process has executed its current time quantum which was allocated to it?

  1. I/O interrupt

  2. Memory fault

  3. Trap

  4. Clock interrupt


Correct Option: D
Explanation:

This type of interrupt occurs when a process has executed its current time quantum which was allocated to it and switched to another process for execution.

Which of the following load balancing methods in CPU scheduling involves a separate process that runs periodically, and moves processes from heavily loaded to less loaded?

  1. Pull migration

  2. Push migration

  3. Contention scope

  4. None of these


Correct Option: B
Explanation:

This is a load balancing method that involves a separate process that runs periodically, and moves processes from heavily loaded to less loaded.

Which of the following is the condition for deadlock in which processes holding resources can request new resources?

  1. Mutual exclusion

  2. No preemption

  3. Hold and wait

  4. None of these


Correct Option: C
Explanation:

This is the condition for deadlock in which processes holding resources can request new resources.

Mark the cleaning policy in which a page is written out only when it has been selected for replacement.

  1. Pre-cleaning

  2. Demand cleaning

  3. Page buffering

  4. None of these


Correct Option: B
Explanation:

Demand cleaning is the one in which a page is written out only when it has been selected for replacement.

Which of the following mutual exclusion methods is the one in which the integer variable 'turn' keeps track of whose turn is to enter the critical section?

  1. Mutual exclusion by disabling interrupts

  2. Mutual exclusion by using lock variable

  3. Mutual exclusion by strict alternation

  4. None of these


Correct Option: C
Explanation:

This is the method of mutual exclusion in which the integer variable 'turn' keeps track of whose turn is to enter the critical section.

Which of the following fetch policies is dependent upon some defined criterion, while using the main memory rather than the cache to hold the information?

  1. Selective fetch

  2. Pre-fetch

  3. Demand fetch

  4. None of these


Correct Option: A
Explanation:

The selective fetch policy is dependent upon some defined criterion, and in these cases using the main memory rather than the cache to hold the information.

Which of the following threads implement(s) in user-level libraries, rather than via system calls?

  1. Kernel level threads

  2. User-level threads

  3. Context switching

  4. None of these


Correct Option: B
Explanation:

These are the threads implement in user-level libraries, rather than via system calls.

In which of the following cache memory organizations are both the main memory and the cache divided into sectors?

  1. Fully associative mapping

  2. Direct mapping

  3. Set-associative mapping

  4. Sector mapping


Correct Option: D
Explanation:

In the sector mapping, the main memory and the cache are both divided into sectors; each sector is composed of a number of blocks.

Which of the following is the time taken in an interactive program from the issuance of a command to the commence of a response to that command?

  1. Turn around time

  2. Response time

  3. Waiting time

  4. None of these


Correct Option: B
Explanation:

This is the time taken in an interactive program from the issuance of a command to the commence of a response to that command.

- Hide questions