How To Exam?

a knowledge trading engine...


DOEACC Society 2007 Advanced Level Course In Computer Science A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS - Question Paper

Thursday, 13 June 2013 12:15Web

A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS

NOTE:
1. There are 2 PARTS in this Module/paper. PART 1 contains 4 ques. and PART 2 contains 4 ques..

2. PART 1 is to be answered in the TEAR-OFFANSWER SHEET only, attached to the ques. paper, as per the instructions contained therein. PART 1 is NOT to be answered in the ans book.

3. Maximum time allotted for PART 1 is 1 HOUR. ans book for PART 2 will be supplied at the table when the ans sheet for PART 1 is returned. However, candidates who complete PART 1 earlier than 1 hour, can collect the ans book for PART 2 immediately after handing over the ans sheet for PART ONE.
TOTAL TIME: three HOURS TOTAL MARKS: 100
(PART ONE-40; PART 2 – 60)

PART ONE
(Answer all the questions)

1. Each ques. beneath provide a multiple option of answers. select the most improper 1 and enter in the “tear-off” ans sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

1.1 Learning about the neighbours through special HELLO packets is the 1st step in
A) distance vector routing
B) local area routing
C) link state routing
D) none of the above

1.2 Sliding windows is a technique for
A) line discipline
B) error control
C) flow control
D) session management
1.3 In TCP, the path
A) upto destination is allocated before the transmission of message starts
B) upto next intermediate node is allocated before the transmission of message starts
C) to be followed depends on the length of message
D) none of the above

1.4 A bridge recognizes addresses of
A) layer 1
B) layer 2
C) layer 3
D) all of the above
1.5 Mapping from MAC address to IP address is done by
A) SNMP
B) ARP
C) RARP
D) SMTP







1.6 To interconnect 2 homogeneous WANs, we need a
A) bridge
B) router
C) repeater
D) none of the above

1.7 To employ multi-access in GSM, users are provided various
A) time slots
B) bandpass filters
C) handsets
D) none of the above

1.8 Base Station and MSC are related to
A) cellular radio
B) ISO-OSI model
C) ARPANET structure
D) none of the above

1.9 DNS name space in the Internet is
A) flat and centralized
B) hierarchical and centralized
C) flat and distributed
D) hierarchical and distributed

1.10 Usually security in a network is achieved by
A) layering
B) grade of service
C) addressing
D) cryptography





























2. Each statement beneath is either actual or FALSE. select the most improper 1 and ENTER in the “tear-off” sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

2.1 Dial-up is always better than leased line.



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER DOEACC Society 2007 Advanced Level Course In Computer Science A9-R3: DATA COMMUNICATION & COMPUTER NETWORKS - Question Paper