Engineering :: All Aptitude Test ::

Hassan
1.When collection of various computers seems a single coherent system to its client, then it is called
A. computer network
B. distributed system
C. both (a) and (b)
D. computer network

2.Two devices are in network if
A. a process in one device is able to exchange information with a process in another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. a process in one device is able to exchange information with a process in another device

3. Which one of the following computer network is built on the top of another network?
A. prior network
B. chief network
C. prime network
D. prior network

4.In computer network nodes are
A. the computer that originates the data
B. the computer that routes the data
C. the computer that terminates the data
D. the computer that originates the data

5.Communication channel is shared by all the machines on the network in
A. unicast network
B. multicast network
C. broadcast network
D. unicast network

6.Bluetooth is an example of
A. personal area network
B. local area network
C. virtual private network
D. personal area network

7. A _____ is a device that forwards packets between networks by processing the routing information included in the packet.
A. bridge
B. firewall
C. router
D. bridge

8.A list of protocols used by a system, one protocol per layer, is called
A. protocol architecture
B. protocol stack
C. protocol suit
D. protocol architecture

9.Network congestion occurs
A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. in case of traffic overloading

10.Which one of the following extends a private network across public networks?
A. local area network
B. virtual private network
C. enterprise private network
D. local area network

11.The IETF standards documents are called
A. RFC
B. RCF
C. ID
D. RFC

12.The structure or format of data is called
A. Syntax
B. Semantics
C. Struct
D. Syntax

13.Communication between a computer and a keyboard involves ______________ transmission
A. Automatic
B. Half-duplex
C. Simplex
D. Automatic

14.The first Network was
A. CNNET
B. NSFNET
C. ASAPNET
D. CNNET

15.The _______ is the physical path over which a message travels
A. path
B. Medium
C. Protocol
D. path

16.Which organization has authority over interstate and international commerce in the communications field?
A. ITU-T
B. IEEE
C. FCC
D. ITU-T

17.Which of this is not a network edge device?
A. PC
B. Smartphones
C. Servers
D. PC

18.A set of rules that governs data communication
A. Protocols
B. Standards
C. RFCs
D. Protocols

19.Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
A. CDMA
B. CDMA/CD
C. CDMA/CA
D. CDMA

20.What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 16-bits

21.This is what happens if two devices on the same Ethernet network determine the network is free, but attempt to transmit data at exactly the same time.
A. overlap
B. crossover
C. collision
D. overlap

22.This describes how the Ethernet protocol regulates communication among connection points.
A. Carrier Sense Multiple Access/Collision Detect
B. Discontinuous transmission
C. Aggregator
D. Carrier Sense Multiple Access/Collision Detect

23.802.11 wireless networking uses what method as the media access method?
A. CSMA/CD
B. CTS/RTS
C. CSMA/CA
D. CSMA/CD

24.____________ assigns a unique number to each IP network adapter called the MAC address.
A. Media Access Control
B. Metro Access Control
C. Metropolitan Access Control
D. Media Access Control

25.In ________ each station sends a frame whenever it has a frame to send.
A. pure ALOHA
B. slotted ALOHA
C. both (a) and (b)
D. pure ALOHA

26.In pure ALOHA, the vulnerable time is ______ the frame transmission time.
A. the same as
B. two times
C. three times
D. the same as

27.The maximum throughput for pure ALOHA is ________ per cent.
A. 12.2
B. 18.4
C. 36.8
D. 12.2

28.In __________, each station is forced to send only at the beginning of the time slot.
A. pure ALOHA
B. slotted ALOHA
C. both (a) and (b)
D. pure ALOHA

29.In slotted ALOHA, the vulnerable time is ______ the frame transmission time.
A. the same as
B. two times
C. three times
D. the same as

30.In the _________ method, after the station finds the line idle, it sends its frame immediately. If the line is not idle, it continuously senses the line until it finds it idle.
A. nonpersistent
B. 1-persistent
C. p-persistent
D. nonpersistent


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers