Technical :: All Aptitude Test ::

Hassan
1.If there are n signal sources of same data rate, then the TDM link has slots?
A. n
B. n/2
C. n*2
D. n

2.If link transmits 4000 frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is?
A. 32kbps
B. 500bps
C. 500kbps
D. 32kbps

3.The state when dedicated signals are idle are called?
A. Death period
B. Poison period
C. Silent period
D. Death period

4.Multiplexing provides?
A. Efficiency
B. Privacy
C. Both A & B
D. Efficiency

5.In TDM, slots are further divided into?
A. Seconds
B. Frames
C. Packets
D. Seconds

6.Which of the following delay is faced by the packet in travelling from one end system to another?
A. Propagation delay
B. Queuing delay
C. Transmission delay
D. Propagation delay

7.For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is (in microseconds)?
A. 3.2
B. 32
C. 0.32
D. 3.2

8.The time required to examine the packet’s header and determine where to direct the packet is part of?
A. Processing delay
B. Queuing delay
C. Transmission delay
D. Processing delay

9.Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by?
A. La/R
B. LR/a
C. R/La
D. La/R

10.The total nodal delay is given by?
A. dnodal = dproc – dqueue + dtrans + dprop
B. dnodal = dproc + dtrans – dqueue
C. dnodal = dproc + dqueue + dtrans + dprop
D. dnodal = dproc – dqueue + dtrans + dprop

11.In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
A. Propagation delay
B. Queuing delay
C. Transmission delay
D. Propagation delay

12.Transmission delay does not depend on?
A. Packet length
B. Distance between the routers
C. Transmission rate
D. Packet length

13.The attacker using a network of compromised devices is known as?
A. Internet
B. Botnet
C. Telnet
D. Internet

14.Which of the following is a form of DoS attack?
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. Vulnerability attack

15.The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is?
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. Vulnerability attack

16.The DoS attack, in which the attacker sends deluge of packets to the targeted host is?
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
D. Vulnerability attack

17.Which is not a application layer protocol?
A. HTTP
B. SMTP
C. FTP
D. HTTP

18.The packet of information at the application layer is called?
A. Packet
B. Message
C. Segment
D. Packet

19.Which one of the following is an architecture paradigms?
A. Peer to peer
B. Client-server
C. Both A & B
D. Peer to peer

20.Application developer has permission to decide the following on transport layer side?
A. Transport layer protocol
B. Maximum buffer size
C. Both A & B
D. Transport layer protocol

21.Application layer offers service?
A. End to end
B. Process to process
C. Both A & B
D. End to end

22.E-mail is?
A. Loss-tolerant application
B. Bandwidth-sensitive application
C. Elastic application
D. Loss-tolerant application

23.Pick the odd one out?
A. File transfer
B. File download
C. E-mail
D. File transfer

24.Which of the following is an application layer service?
A. Network virtual terminal
B. File transfer, access, and management
C. Mail service
D. Network virtual terminal

25.To deliver a message to the correct application program running on a host, the address must be consulted?
A. IP
B. MAC
C. Port
D. IP

26.Which is a time-sensitive service?
A. File transfer
B. File download
C. E-mail
D. File transfer

27.Transport services available to applications in one or another form?
A. Reliable data transfer
B. Timing
C. Security
D. Reliable data transfer

28.Electronic mail uses which Application layer protocol?
A. SMTP
B. HTTP
C. FTP
D. SMTP

29.The translates internet domain and host names to IP address?
A. Domain name system
B. Routing information protocol
C. Network time protocol
D. Domain name system

30.Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host?
A. HTTP
B. FTP
C. Telnet
D. HTTP


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers