You are on page 1of 3

Jetking computer hardware and networking institute

NAME:- DATE MAX. MARKS ALL QUESTIONS ARE COMPULSORY:-

BATCH NO. TIME

1) OSI Model consist of layers. a) 2 b) 7 c) 9 d) 6 2) Segmentation and reassembly are function of .layer. a) Session b) Transport c) Presentation d) Application 3) The full form of OSI ________________________________________ 4) Trailers to the data are added only at .layer of the OSI model a) Session b) Transport c) Presentation d) data link 5) The full form of LAN _______________________________________ 6) The ..topology is widely used for networks. a) ring b) bus c) star d) mesh 7) The primary term design for the arrangement of a network is a) network architecture b) internetwork c) topology d) protocol 8) The maximium amount of data that can be transmitted using UTP is a) 1 mbps b) 10 mbps c) 1000 mbps d) 100 mbps 9) The Full Form of MAN ___________________________________ 10) The is the method which is used to join the fber optic cables. a) crimping b) slicing c) splicing d) punching 11) The full form of UTP _______________________________ 12) RG-6 cable can carry signals up to a distance of feet. a) 1200 b) 1500 c) 1375 d) 1560

13) The full form of NIC_______________________________________ 14) SMTP stands for ______________________________________ 15) The..cable is least susceptibele to interference. a) STP b)UTP c)fiber optic cable d)co axial cable

Jetking computer hardware and networking institute

16) The.is used to connect two LAN segments at the data link layer. a) hub b)protocols c) repeater d) bridge

17) The _____is also referred as thinnet coxial cable. a) 10 base-T b) 10 base-5 c) 10 base-F d) 10 base-2

18) According to the 5-4-3 rule . Segment are used for connecting the repeaters. a) user b) network c) link d) populated

19) MAC address works at thelayer.. a) Session b) Transport c) Presentation d) data link

20) NIC card is fixed in the.slot on the motherboard. a) Leds b) Sensors c) Disk d) rollers

21) Data can be transmitted using a single frequency using thetechnique. a)multiplexing b)modulation c)baseband d) broadband

22) defines the rule and regulation that are to be followed during the data communication. a)receiver b)medium c)sender d) protocol

23) ..is used to establish a direct cable connection using serial ports. a)parallel cable b) null modem c)serial cable d) RG-6 cable

24) The protocol is used to send query and error reporting messages. a) DNS b) ICMP c) IGMP d) IP

25) Theprotocol is used to determine the IP address when physical address of the device is known. a) SMTP b) RARP c)ARP d) None of these.

26) TCP is responsible for communication. a) device to device b)process to process c) host to host d)network to network

27) Theprotocol operates at the session layer of the OSI model. a) NETBIOS b)UDP c)IP d) IPX

Jetking computer hardware and networking institute

28) An IP address 255.255.0.0 is a default subnet mask of. a) Class A b) Class C c) Class D d) Class B

29) The class D are reserved for.. a) private address b) multicast c) loop back d)broadcast

30) The class provides 65,532 host addresses. a) C b) B c) A d) D

31)Explain: a)Router (5 MARKS) b)Switch (1 MARK) c)Hub (1 MARK)

d)Repeater (1MARK)

32) Diference between MAC address and IP address. (3 MARKS) 33)Explain all the layers of OSI Model. (5 MARKS) 32) Explain all the topology of the network. (4 MARKS)

You might also like