E.M.G. YADAVA WOMEN’S COLLEGE, MADURAI – 625 014.
(An Autonomous Institution – Affiliated to Madurai Kamaraj University)
+
Re-accredited (3rd Cycle) with Grade A & CGPA 3.51 by NAAC
DEPARTMENT OF COMPUTER SCIENCE
Course : B.Sc., Computer Science
Title of the paper : Data Communication and Networking
Semester : VI
Subject code : 21S61
________________________________________________________________
ONE MARK QUESTIONS
Fill in the Blanks:
1.________ are the exchange of data between two devices via some form of
transmission medium.
Ans: Data communication
2. The information to be communicated in a data communications system is the ______.
Ans: Message
3. The physical layer concerns with________.
Ans: bit by bit delivery
4. _______topology requires a central controller or hub.
Ans: Star
5. Communication between a computer and a keyboard involve_________transmission.
Ans: Simplex
6. ________ is defined as the rate of transferring error-free data.
Ans: Performance
7. Communication channel is shared by all the machines on the network in________.
Ans: Broadcast network
8. ________ is a collection of many separate networks.
Ans: Internet
9. A _______ is a data communication system within a building, plant, or campus, or
between nearby buildings.
Ans: LAN (Local Area Network)
10. The Process-to-process delivery of the entire message is the responsibility of the
___________layer
Ans: Transport
11. The ________ is used to broadcast two packets on the medium at a time.
Ans: Collision
12. The ________ are used for short-range communications such as those between a PC
and a peripheral device.
Ans: infrared waves
13. A _________ provides a physical conduct from one device to another device.
Ans: unguided media
14. ________ is the fastest media to data transfer from one system and another system.
Ans: Fiber Optic
15. ________ is the process of converting digital data to digital signal.
Ans: Line Coding
16. Microwaves are _________.
Ans: Unidirectional
17. To detect or correct errors, we send extra bits with data is known as _______.
Ans: Redundancy
18. ________cables are composed of a glass or plastic inner core.
Ans: Fiber Optic
19. ___________ can have an infinite number of values in a range.
Ans: Analog Signal
20. ________ are used for cellular phone, satellite, and wireless LAN communications.
Ans: Microwaves
21. A ________ network is a set of switches connected by physical links.
Ans: circuit-switched
22. A switch in a datagram network uses a routing table that is based on the________.
address.
Ans: destination
23. In ________ error correction the receiver corrects error with requesting retranmission.
Ans: Forward
24. In block coding, we divide our message into blocks is called __________.
Ans: Data word
25. A device operating at the physical layer is called a ___________.
Ans: Repeater
26. Circuit switching takes place at the ________layer.
Ans: physical
27. The remainder of the division in decoder is called ________.
Ans: Syndrome
28. The technique to reduce the contents of a routing table is called the _______method.
Ans: next hop
29. In data link layer DSAP field stands for________.
Ans: Destination Service Access Point.
30.The Beginning of the frame in MAC sub layer is called as ________.
Ans: Start frame delimiter.
31. A ________ is a procedure that lays down the route or path to transfer data packets
from source to the destination.
Ans: routing algorithm
32. An ___________ is a group of networks and routers under the authority of a single
administration.
Ans: autonomous system.
33. Routing inside an autonomous system is referred to as ________.
Ans: intradomain routing
34. __________ is an implementation of the distance vector protocol.
Ans: Routing Information Protocol(RIP)
35. The length of the IPv6 address is _______ bits.
Ans: 128
36. The ________ domains is used to map an address to a name.
Ans: inverse
37. ________ is an inter domain routing protocol using path vector routing.
Ans: Border Gateway Protocol
38. An ________ is an algorithm that designs the routing table supported by the
network circumstances.
Ans: adaptive Routing algorithm
39. The DNS Name space is divided into no overlapping________.
Ans: Zones
40. Datagrams are routed to their destinations with the help of ________.
Ans: Distance Vector Multicast Routing Protocols
41.The _______ is used to allocate and manage resources for a network.
Ans: Server
42. The ________is an analog multiplexing technique that combines analog signals.
Ans: Frequency Division Multiplexing
43. ________is an example for public key algorithm.
Ans: RSA
44. The ________each occurrence of a character can have a different substitute.
Ans: Poly alphabetic ciphers
45. In a ________there is no substitution of characters instead their locations change.
Ans: Transposition cipher
46. A ________is a networking device that is designed to receive, analyze, and forward
data packets between computer networks.
Ans: Router
47. Digital signature cannot provide ________ for the message.
Ans: confidentiality
48. The ________method provides a one-time session key for two parties.
Ans: Diffie – Hellman
49. The type of encoding in ________manipulation of bit streams.
Ans: Entropy encoding
50. A _______ is a software package that composes, reads, replies to and forwards
message.
Ans: user agent
Choose the best answer:
51. In______ transmission the channel capacity is shared by both communicating
devices at all time.
a) Simplex b) half duplex c) full duplex d) half simplex
Ans: c) full duplex
52. The ________is the division of one task among multiple computer.
a) Distributed Processing b) Distributed Messaging
c) Distributed telephony d) Electronic Messaging
Ans: a) Distributed Processing
53. A ______ is a data communication system spanning states, countries, or the whole
world.
a) MAN b) WAN c) LAN d) PAN
Ans: b) WAN
54. The connection of two or more topologies are called _________.
a) star b) mesh c) bus d) hybrid
Ans: d) hybrid
55. The SMTP protocol is used in the layer_________.
a) Application layer b) Transport layer c) Internet layer d) Hardware layer
Ans: a) Application layer
56. A television broadcast is an example of ________ transmission.
a) simplex b) half duplex c) full duplex d) automatic
Ans: a) simplex
57. The________layer is the closest to the transmission Medium.
a) Physical b) Network c) Transport d) Data link
Ans: a) Physical
58. The Internetworking protocol is known as_________.
a) SMTP b) PPP c)TCP/IP d)NNTP
Ans: c) TCP/IP
59. The ________layer changes bits into electromagnetic signals.
a) Physical b) Data Link c) Transport d) Application
Ans: a) Physical
60. A single channel is shared by multiple signals by ________.
a) analog modulation b) digital modulation
c) multiplexing d) phase modulation
Ans: c) multiplexing
61.The ________ layer is responsible for process to process delivery in a general
network model.
a) session layer b) data link layer c) transport layer d) network layer
Ans: c) transport layer
62. In fiber optics, the signal is _______ waves.
a) light b) radio c) wave d) very low frequency
Ans: a)light
63.A _______ device is used to connect multiple nodes to network
a) router b) repeater c) modem d)hub
Ans: d)hub
64. A_______ is not a guided medium.
a) Coaxial cable b) Twisted Pair cable c) Fiber optical d) Atmosphere
Ans: d) Atmosphere
65. ________transmission media has the highest transmission speed in a network.
a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable
Ans: b) optical fiber
66.The mode in each station can send and receive data but not at the same time is
called_______.
a) half duplex b) simplex c) full duplex d) simplex
Ans: a) half duplex
67. Radio waves are _________.
a) omni directional b) unidirectional c) bidirectional d) directional
Ans: a) omni directional
68. The_______ are used for cellular phone, satellite, and wireless LAN
communications.
a) Radio waves b) Micro waves c) Infrared waves d) Waves
Ans: b) Micro waves
69. A set of devices connected by communication links is called ________.
a) Network b) Protocol c) Topology d) Multilink
Ans: a) Network
70.The ______ media is used to provide the protection to Radio Frequency.
a) UTP b) STP c)Coax d)Fibers
Ans: d)Fibers
71. The size of an IP address in IPv6 is _________.
a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits
Ans: b) 128 bits
72. In cyclic redundancy checking,_________ is the CRC.
a) the Divisor b) the quotient c) the Dividend d) the Reminder
Ans: d) The Reminder
73. The ________ transmission mode is used for data communication along telephone
lines.
a) Parallel b) Asynchronous c) Synchronous d) Serial
Ans: b) Asynchronous
74. The _________ technique is used to allow a single network address to span multiple
physical networks.
a) Subnet addressing b) IP Addressing c) Subnet Masking d) IP Masking
Ans: a) Subnet addressing
75. A device that connects to a network with our cables is said to be ______.
a) Open source b) Cable c) Distributed d) Wireless
Ans: d) Wireless
76. Linear codes are used for________.
a) Forward error correction b) Backward error correction
c) Forward error detection d) Backward error detection
Ans: a) Forward error correction
77. A_______ is a first-generation cellular phone system.
a) AMPS b) D-AMPS c) GSM d)MMS
Ans: a) AMPS
78.The term IPv4 stands for _______
a) Internet Protocol Version 4 b) Internet Programming Version 4
c) International Programming Version 4 d) Intranet Protocol Version 4
Ans: a) Internet Protocol Version 4
79. Ethernet uses a ______ physical address that is imprinted on the network interface
card (NIC).
a) 18 byte b) 12 byte c) 6 byte d) 4 byte
Ans: c) 6 byte
80. The signal from a satellite is normally aimed at a specific area called the
_________.
a) Path b) effect c) footprint d) route
Ans: c) foot print
81. The main contents of the routing table in datagram networks are________.
a) Source and Destination address b) Destination address and Output port
c) Source address and Output port d) Input port and Output port
Ans: b) Destination address and Output port
82. _______ deals with the issues of creating and maintaining routing tables.
a) Forwarding b) Routing c) Directing d) domain
Ans: b) Routing
83. A _______ routing table contains information entered manually.
a) static b) dynamic c) hierarchical d) multiple
Ans: a) static
84. UDP does not add anything to the services of IP except for providing________.
communication.
a) node-to-node b) process-to-process c) host-to-host d) end-to-end
Ans: b) process-to-process
85. Routing between autonomous systems is referred to as _________.
a) inter domain b) intra domain c) single domain d) multi domain
Ans: a) inter domain
86. The UDP receives a data unit from the________ layer.
a) application b) transport c) Network d) datalink
Ans: c) IP
87. UDP and TCP are both _________ layer protocols.
a) data link b) network c) physical d) transport
Ans: d) transport
88. Multicast routing, each involved router needs to construct a________path tree for
each group.
a) average b) longest c) shortest d) lesser
Ans: c) shortest
89. In the Internet, the email address consists of two parts: a________ and a________.
a) local part ;domain name b) global part ;domain name
c) label; Domain Name d) local part ; label
Ans: a) local part ; domain name
90. A DNS client /server program can support an e-mail program to find IP address of
an_______.
a) E-mail server b) DNS server c) E-mail recipient d) DNS recipient
Ans: c) E-mail recipient
91. The maximum length (in bytes) of an IPv4 datagram is __________.
a) 32 b)1024 c)65535 d) 512
Ans: c)65535
92. The original message before being transformed is called _________.
a) Plain text b) Document text c) Content text d)chiper text
Ans: a) Plain text
93. One way to preserve the integrity of a document is through the use of a _________.
a) Message Communication b) Message Digest c) Message Integrity d)Finger Print
Ans: d) Finger Print
94. A ________on the other hand can use a pair of asymmetric keys a public one and a
private one.
a) Right Signature b) Left Signature c) Digital Signature d) Logical Signature
Ans: c) Digital Signature
95. Message confidentiality is using ________.
a) Cipher Text b) Cipher c) Symmetric-Key d) Asymmetric-Key
Ans: d) Asymmetric-Key
96. The secure authentication connection is referred to as-_________.
a) chisel b) tunnel c) zeroing d) handshaking
Ans: b) tunnel
97. The _____ type of network shares the communication channel among all the
machines.
a) anycast network b) multicast network
c) unicast network d) broadcast network
Ans: d) broadcast network
98. The _______ is a major problem when traffic in the network is very high.
a) Collision b) Congestion c) retransmission d) Buffering
Ans: b) Congestion
99. The establishment of the security parameters is done via a mechanism
called_________.
a) Security Association b) Sending Association
c) Seller Association d) Simple Association
Ans: a) Security Association
100. The user client process sends a message the ________ runs a server process to
receive the request.
a) Sender firewall b) Proxy server c) Receiver firewall d) Original firewall
Ans: b) Proxy server