With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions Question type Randomized MCQs.Changes every time you visit the test Total Number of Questions 30 Time Limit 20 Minutes Points 1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Question 1 of 30
Q-1.For many applications, we need a program or a script to be run at the client site. These are called _______________ documents
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.Which of the following could not be an Ethernet unicast destination address?
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In cyclic redundancy checking, what forms the check bits?
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.To implement _________, the DS node uses _________________ such as meters, markers, shapers, and droppers
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.How many carrier frequencies are used in BPSK?
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.Which multiplexing technique is used for digital signals?
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.A _______ algorithm is a policing technique that shapes bursty traffic into fixed-rate traffic by averaging the data rate, but it does not give credit to the user during idle periods.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.The fourth generation cellular phones uses _____________ antenna.
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In TCP, a SYN + ACK segment consumes _____ sequence numbers.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.__________ means changing the encoding of a payload to a lower quality to match the bandwidth of the receiving network.
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.In the third generation of cellular phones, ______ uses a combination of W-CDMA and TDMA.
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In Bluetooth, multiple ________ form a network called a _________.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.____ is designed to use the high bandwidth capability of fiber-optic cable.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.An RFC is labeled ________ if it must be implemented by all Internet systems.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.______ finds the value of the signal amplitude for each sample; ____ finds the change from the previous sample.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.The GetRequest PDU is sent from the _______ to the __________ to retrieve the value of a variable or a set of variables.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.If the available channel is a ____ channel, we cannot send a digital signal directly to the channel.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In TCP, urgent data requires the urgent pointer field as well as the URG bit (to be set) in the _______ field.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.The idea of RZ and the idea of NRZ-L are combined into the ________ scheme.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.Integrated Services is a _______________ QoS model designed for IP.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.Three security goals are _______________________________________.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In the domain name space, a _________ is a subtree of the domain name space.
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24._______ signals can have only a limited number of values in a time interval.
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25._______ is a first-generation cellular phone system.
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26._____ is an application layer protocol that establishes, manages, and terminates a multimedia session.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.________ satellites provide time and location information for vehicles and ships.
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The ________________ class is used to create datagram packets.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.Guaranteed services in IntServ model are required for __________ application
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.Digital signature does not provide _________.
Your Answer:Correct
Your Answer:Incorrect