0% found this document useful (0 votes)
116 views10 pages

DCN One Word 2023

1. This document contains one mark questions from the subject of Data Communication and Networking for the B.Sc Computer Science semester VI course. 2. It includes 73 multiple choice and fill in the blank questions testing concepts related to data communication, networking, protocols, topologies and transmission media. 3. The questions cover topics such as data communication definitions, network layers, transmission media properties, protocols like TCP/IP and concepts like error detection and correction techniques.

Uploaded by

Sri Gayu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views10 pages

DCN One Word 2023

1. This document contains one mark questions from the subject of Data Communication and Networking for the B.Sc Computer Science semester VI course. 2. It includes 73 multiple choice and fill in the blank questions testing concepts related to data communication, networking, protocols, topologies and transmission media. 3. The questions cover topics such as data communication definitions, network layers, transmission media properties, protocols like TCP/IP and concepts like error detection and correction techniques.

Uploaded by

Sri Gayu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

E.M.G. YADAVA WOMEN’S COLLEGE, MADURAI – 625 014.

(An Autonomous Institution – Affiliated to Madurai Kamaraj University)


+
Re-accredited (3rd Cycle) with Grade A & CGPA 3.51 by NAAC

DEPARTMENT OF COMPUTER SCIENCE

Course : B.Sc., Computer Science


Title of the paper : Data Communication and Networking
Semester : VI
Subject code : 21S61
________________________________________________________________
ONE MARK QUESTIONS

Fill in the Blanks:


1.________ are the exchange of data between two devices via some form of
transmission medium.
Ans: Data communication
2. The information to be communicated in a data communications system is the ______.
Ans: Message

3. The physical layer concerns with________.


Ans: bit by bit delivery
4. _______topology requires a central controller or hub.
Ans: Star
5. Communication between a computer and a keyboard involve_________transmission.
Ans: Simplex
6. ________ is defined as the rate of transferring error-free data.
Ans: Performance
7. Communication channel is shared by all the machines on the network in________.
Ans: Broadcast network
8. ________ is a collection of many separate networks.
Ans: Internet
9. A _______ is a data communication system within a building, plant, or campus, or
between nearby buildings.
Ans: LAN (Local Area Network)
10. The Process-to-process delivery of the entire message is the responsibility of the
___________layer
Ans: Transport
11. The ________ is used to broadcast two packets on the medium at a time.
Ans: Collision
12. The ________ are used for short-range communications such as those between a PC
and a peripheral device.
Ans: infrared waves
13. A _________ provides a physical conduct from one device to another device.
Ans: unguided media
14. ________ is the fastest media to data transfer from one system and another system.
Ans: Fiber Optic
15. ________ is the process of converting digital data to digital signal.
Ans: Line Coding
16. Microwaves are _________.
Ans: Unidirectional
17. To detect or correct errors, we send extra bits with data is known as _______.
Ans: Redundancy
18. ________cables are composed of a glass or plastic inner core.
Ans: Fiber Optic
19. ___________ can have an infinite number of values in a range.
Ans: Analog Signal
20. ________ are used for cellular phone, satellite, and wireless LAN communications.
Ans: Microwaves
21. A ________ network is a set of switches connected by physical links.
Ans: circuit-switched
22. A switch in a datagram network uses a routing table that is based on the________.
address.
Ans: destination
23. In ________ error correction the receiver corrects error with requesting retranmission.
Ans: Forward
24. In block coding, we divide our message into blocks is called __________.
Ans: Data word
25. A device operating at the physical layer is called a ___________.
Ans: Repeater
26. Circuit switching takes place at the ________layer.
Ans: physical
27. The remainder of the division in decoder is called ________.
Ans: Syndrome
28. The technique to reduce the contents of a routing table is called the _______method.
Ans: next hop
29. In data link layer DSAP field stands for________.
Ans: Destination Service Access Point.
30.The Beginning of the frame in MAC sub layer is called as ________.
Ans: Start frame delimiter.
31. A ________ is a procedure that lays down the route or path to transfer data packets
from source to the destination.
Ans: routing algorithm
32. An ___________ is a group of networks and routers under the authority of a single
administration.
Ans: autonomous system.
33. Routing inside an autonomous system is referred to as ________.
Ans: intradomain routing
34. __________ is an implementation of the distance vector protocol.
Ans: Routing Information Protocol(RIP)
35. The length of the IPv6 address is _______ bits.
Ans: 128
36. The ________ domains is used to map an address to a name.
Ans: inverse
37. ________ is an inter domain routing protocol using path vector routing.
Ans: Border Gateway Protocol
38. An ________ is an algorithm that designs the routing table supported by the
network circumstances.
Ans: adaptive Routing algorithm
39. The DNS Name space is divided into no overlapping________.
Ans: Zones
40. Datagrams are routed to their destinations with the help of ________.
Ans: Distance Vector Multicast Routing Protocols
41.The _______ is used to allocate and manage resources for a network.
Ans: Server
42. The ________is an analog multiplexing technique that combines analog signals.
Ans: Frequency Division Multiplexing
43. ________is an example for public key algorithm.
Ans: RSA
44. The ________each occurrence of a character can have a different substitute.
Ans: Poly alphabetic ciphers
45. In a ________there is no substitution of characters instead their locations change.
Ans: Transposition cipher
46. A ________is a networking device that is designed to receive, analyze, and forward
data packets between computer networks.
Ans: Router
47. Digital signature cannot provide ________ for the message.
Ans: confidentiality
48. The ________method provides a one-time session key for two parties.
Ans: Diffie – Hellman
49. The type of encoding in ________manipulation of bit streams.
Ans: Entropy encoding
50. A _______ is a software package that composes, reads, replies to and forwards
message.
Ans: user agent
Choose the best answer:
51. In______ transmission the channel capacity is shared by both communicating
devices at all time.
a) Simplex b) half duplex c) full duplex d) half simplex
Ans: c) full duplex
52. The ________is the division of one task among multiple computer.
a) Distributed Processing b) Distributed Messaging
c) Distributed telephony d) Electronic Messaging
Ans: a) Distributed Processing
53. A ______ is a data communication system spanning states, countries, or the whole
world.
a) MAN b) WAN c) LAN d) PAN
Ans: b) WAN
54. The connection of two or more topologies are called _________.
a) star b) mesh c) bus d) hybrid
Ans: d) hybrid
55. The SMTP protocol is used in the layer_________.
a) Application layer b) Transport layer c) Internet layer d) Hardware layer
Ans: a) Application layer
56. A television broadcast is an example of ________ transmission.
a) simplex b) half duplex c) full duplex d) automatic
Ans: a) simplex
57. The________layer is the closest to the transmission Medium.
a) Physical b) Network c) Transport d) Data link
Ans: a) Physical
58. The Internetworking protocol is known as_________.
a) SMTP b) PPP c)TCP/IP d)NNTP
Ans: c) TCP/IP
59. The ________layer changes bits into electromagnetic signals.
a) Physical b) Data Link c) Transport d) Application
Ans: a) Physical
60. A single channel is shared by multiple signals by ________.
a) analog modulation b) digital modulation
c) multiplexing d) phase modulation
Ans: c) multiplexing
61.The ________ layer is responsible for process to process delivery in a general
network model.
a) session layer b) data link layer c) transport layer d) network layer
Ans: c) transport layer
62. In fiber optics, the signal is _______ waves.
a) light b) radio c) wave d) very low frequency
Ans: a)light
63.A _______ device is used to connect multiple nodes to network
a) router b) repeater c) modem d)hub
Ans: d)hub
64. A_______ is not a guided medium.
a) Coaxial cable b) Twisted Pair cable c) Fiber optical d) Atmosphere
Ans: d) Atmosphere
65. ________transmission media has the highest transmission speed in a network.
a) coaxial cable b) twisted pair cable c) optical fiber d) electrical cable
Ans: b) optical fiber
66.The mode in each station can send and receive data but not at the same time is
called_______.
a) half duplex b) simplex c) full duplex d) simplex
Ans: a) half duplex
67. Radio waves are _________.
a) omni directional b) unidirectional c) bidirectional d) directional
Ans: a) omni directional
68. The_______ are used for cellular phone, satellite, and wireless LAN
communications.
a) Radio waves b) Micro waves c) Infrared waves d) Waves
Ans: b) Micro waves
69. A set of devices connected by communication links is called ________.
a) Network b) Protocol c) Topology d) Multilink
Ans: a) Network
70.The ______ media is used to provide the protection to Radio Frequency.
a) UTP b) STP c)Coax d)Fibers
Ans: d)Fibers
71. The size of an IP address in IPv6 is _________.
a) 4 bytes b) 128 bits c) 8 bytes d) 100 bits
Ans: b) 128 bits
72. In cyclic redundancy checking,_________ is the CRC.
a) the Divisor b) the quotient c) the Dividend d) the Reminder
Ans: d) The Reminder
73. The ________ transmission mode is used for data communication along telephone
lines.
a) Parallel b) Asynchronous c) Synchronous d) Serial
Ans: b) Asynchronous
74. The _________ technique is used to allow a single network address to span multiple
physical networks.
a) Subnet addressing b) IP Addressing c) Subnet Masking d) IP Masking
Ans: a) Subnet addressing
75. A device that connects to a network with our cables is said to be ______.
a) Open source b) Cable c) Distributed d) Wireless
Ans: d) Wireless
76. Linear codes are used for________.
a) Forward error correction b) Backward error correction
c) Forward error detection d) Backward error detection
Ans: a) Forward error correction
77. A_______ is a first-generation cellular phone system.
a) AMPS b) D-AMPS c) GSM d)MMS
Ans: a) AMPS
78.The term IPv4 stands for _______
a) Internet Protocol Version 4 b) Internet Programming Version 4
c) International Programming Version 4 d) Intranet Protocol Version 4
Ans: a) Internet Protocol Version 4
79. Ethernet uses a ______ physical address that is imprinted on the network interface
card (NIC).
a) 18 byte b) 12 byte c) 6 byte d) 4 byte
Ans: c) 6 byte
80. The signal from a satellite is normally aimed at a specific area called the
_________.
a) Path b) effect c) footprint d) route
Ans: c) foot print
81. The main contents of the routing table in datagram networks are________.
a) Source and Destination address b) Destination address and Output port
c) Source address and Output port d) Input port and Output port
Ans: b) Destination address and Output port
82. _______ deals with the issues of creating and maintaining routing tables.
a) Forwarding b) Routing c) Directing d) domain
Ans: b) Routing

83. A _______ routing table contains information entered manually.


a) static b) dynamic c) hierarchical d) multiple
Ans: a) static
84. UDP does not add anything to the services of IP except for providing________.
communication.
a) node-to-node b) process-to-process c) host-to-host d) end-to-end
Ans: b) process-to-process
85. Routing between autonomous systems is referred to as _________.
a) inter domain b) intra domain c) single domain d) multi domain
Ans: a) inter domain
86. The UDP receives a data unit from the________ layer.
a) application b) transport c) Network d) datalink
Ans: c) IP
87. UDP and TCP are both _________ layer protocols.
a) data link b) network c) physical d) transport
Ans: d) transport
88. Multicast routing, each involved router needs to construct a________path tree for
each group.
a) average b) longest c) shortest d) lesser
Ans: c) shortest
89. In the Internet, the email address consists of two parts: a________ and a________.
a) local part ;domain name b) global part ;domain name
c) label; Domain Name d) local part ; label
Ans: a) local part ; domain name
90. A DNS client /server program can support an e-mail program to find IP address of
an_______.
a) E-mail server b) DNS server c) E-mail recipient d) DNS recipient
Ans: c) E-mail recipient
91. The maximum length (in bytes) of an IPv4 datagram is __________.
a) 32 b)1024 c)65535 d) 512
Ans: c)65535
92. The original message before being transformed is called _________.
a) Plain text b) Document text c) Content text d)chiper text
Ans: a) Plain text
93. One way to preserve the integrity of a document is through the use of a _________.
a) Message Communication b) Message Digest c) Message Integrity d)Finger Print
Ans: d) Finger Print
94. A ________on the other hand can use a pair of asymmetric keys a public one and a
private one.
a) Right Signature b) Left Signature c) Digital Signature d) Logical Signature
Ans: c) Digital Signature
95. Message confidentiality is using ________.
a) Cipher Text b) Cipher c) Symmetric-Key d) Asymmetric-Key
Ans: d) Asymmetric-Key
96. The secure authentication connection is referred to as-_________.
a) chisel b) tunnel c) zeroing d) handshaking
Ans: b) tunnel
97. The _____ type of network shares the communication channel among all the
machines.
a) anycast network b) multicast network
c) unicast network d) broadcast network
Ans: d) broadcast network
98. The _______ is a major problem when traffic in the network is very high.
a) Collision b) Congestion c) retransmission d) Buffering
Ans: b) Congestion
99. The establishment of the security parameters is done via a mechanism
called_________.
a) Security Association b) Sending Association
c) Seller Association d) Simple Association
Ans: a) Security Association
100. The user client process sends a message the ________ runs a server process to
receive the request.
a) Sender firewall b) Proxy server c) Receiver firewall d) Original firewall
Ans: b) Proxy server

You might also like