Time Left - 10:00 mins
ISRO 2018: Computer Network Booster Quiz- 1
Attempt now to get your rank among 977 students!
Question 1
Which of the following protocol is used for transferring electronic mail message from one machine to another?
Question 2
What is/are true about WAN & LAN-
i) LAN can be more secure than WAN
ii) Cost of Bandwidth of WAN is more than that of LAN
iii) Data transfer rate is more in WAN than LAN
i) LAN can be more secure than WAN
ii) Cost of Bandwidth of WAN is more than that of LAN
iii) Data transfer rate is more in WAN than LAN
Question 3
Which is/are true about switch –
i) Switch forwards a data packet signal to one direction based on IP address of device
ii) Full duplex mode in switch causes maximum collision
iii) Switch stores unique address of Electronics device in CAM
iv) sending data packet from switch to receiver PC can be broadcasted but reverse is unicasted.
i) Switch forwards a data packet signal to one direction based on IP address of device
ii) Full duplex mode in switch causes maximum collision
iii) Switch stores unique address of Electronics device in CAM
iv) sending data packet from switch to receiver PC can be broadcasted but reverse is unicasted.
Question 4
What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?
Question 5
Duringtransfer of message through network for one PC to another PC ,3 addresses are attached to message packet at a time in midway-
i) 183.05.67.11
ii) 191.19.53.19:80
iii) 00:1B:44:11:3A:B7
Which one can be changed in next moment?
i) 183.05.67.11
ii) 191.19.53.19:80
iii) 00:1B:44:11:3A:B7
Which one can be changed in next moment?
Question 6
Which media access control protocol is used by IEEE 802.11 wireless LAN?
Question 7
What is /are true regarding encryption -
i) Locked data by private key can be opened by public key
ii) Locked data by private key can be opened by private key
iii) Locked data by public key can be opened by private key
iv) Locked data by public key can be opened by public key
i) Locked data by private key can be opened by public key
ii) Locked data by private key can be opened by private key
iii) Locked data by public key can be opened by private key
iv) Locked data by public key can be opened by public key
Question 8
In a token ring network, the transmission speed is 107 bps and the propagation speed is 200 metres/micro second. The 1-bit delay in this network is equivalent to:
- 977 attempts
- 3 upvotes
- 22 comments
Mar 30GATE & PSU CS