WIRELESS NETWORKS
UNIT-5
1) What are the average upload speeds of our 4G LTE
network?
A. a. 1-3 Mgps
B. b. 2-5 Mgps
C. c. 1-3 Mbps
D. d. 2-5 Mbps
2) 4G LTE is ____ times faster than 3G?
A. a. 5
B. b. 10
C. c. 15
D. d. 20
3) What are the average download speeds for our 4G LTE
network?
A. a. 1-2 Mgps
B. b. 5-12 Mgps
C. c. 1-2 Mbps
D. d. 5-12 Mbps
4) Which of these are not part of the characteristics of 4G?
(a) Software Dependency
(b) Fully Converged Services
(c) Diverse User Devices
(d) Multirate management
5) What does SGSN stand for?
(a) Serial Gateway Supporting Node
(b) Supporting GPRS Support Node
(c) Supporting GGSN Support Node
(d) Supporting Gateway Supporting Node
6) What does MSC stand for?
(a) Master Sequence Controller
(b) Master Switching Controller
(c) Master Switch Controller
(d) Master Switching Control
7) What is the expected maximum data rate for 4G?
(a) 100Mbps
(b) 100Kbps
(c) 10Mbps
(d) 200Kbps
8) What application will require BlueTooth?
(a) Ad-Hoc Networking
(b) Desktop Publishing
(c) Circuit Switching
(e) Packet Networking
9) What are some of the major architectural differences
exist between 3G and 4G?
(a) The RNC acts as a BS in a cluster-type RAN
configuration.
(b) The circuit-switching elements are removed in 4G.
(c) A VOIP Gateway is used to connect to the PSTN and
ISDN networks
(d) All of the Above
10) ____________ to attain ultra high spectral efficiency
by means of spatial processing including multi-antenna
and multi-user MIMO
A. 3G MIMO
B. MIMO
C. WiMAX
D. Beamforming
11) The pre-4G technology ________ (LTE) is often
branded “4G”, but the first LTE release does not fully
comply with the IMT-Advanced requirements.
A. E-UTRA
B. WiMAX
C. 3GPP Long Term Evolution
D. Universal Mobile Telecommunications System
12) The process of transferring a mobile station from
one base station to another is
a. MSC
b. Roamer
c. Hand off
d. Forward channel
13).2G CDMA standard – cdma one supports up to
a. 8 users
b. 64 users
c. 32 users
d. 116 users
14).The shape of the cellular region for maximum radio
coverage is
a. Circular
b. Square
c. Oval
d. Hexagon
15). In a dynamic channel assignment strategy,
a. Voice channels are not permanently assigned
b. The serving base station requests for a channel from MSC
c. MSC allocates the channel according to the predetermined
algorithm
d. All of the above
16) In Handoff
a. Process of transferring the call to the new base station
b. Transfers the call
c. New channel allocation is done
d. All of the above
17) Interference in frequency bands may lead to
a. Cross talk
b. Missed calls
c. Blocked calls
d. All of the above
18) Diversity employs the decision making at
a. Transmitter
b. Receiver
c. Transmitter and receiver
d. Communication channel
19)Global Positioning System uses
a. CDMA
b. TDMA
c. SDMA
d. FDMA
20)OFDM is a technique of
1. Encoding digital data
2. Multiple carrier frequencies
3. Wide band digital communication
4. 4G mobile communication
a. 1, 2 and 3 are correct
b. 2 and 3 are correct
c. 1, 2 and 4 are correct
d. All the four are correct
UNIT-IV
1. What is the name of 300 MHz of unlicensed spectrum
allocated by FCC in ISM band?
a) UNII
b) Unlicensed PCS
c) Millimetre wave
d) Bluetooth
2. Which of the following specifies a set of media access control
(MAC) and physical layer specifications for implementing
WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
3. Which of the following is the 802.11 High Rate Standard?
a) IEEE 802.15
b) IEEE 802.15.4
c) IEEE 802.11g
d) IEEE 802.11b
4. What is WISP?
a) Wideband Internet Service Protocol
b) Wireless Internet Service Provider
c) Wireless Instantaneous Source Provider
d) Wideband Internet Source Protocol
5. What are the features of HSDPA
a.Adaptive modulation and coding (AMC)
B.Multi-code operation
C.Hybrid Automatic Repeat Request
D.All the above
6. Which of the following is not a characteristic of cellular
telephone system?
a) Accommodate a large number of users
b) Large geographic area
c) Limited frequency spectrum
d) Large frequency spectrum
7. Why the size of the cell is kept small in cellular network?
a) Increase capacity
b) Decrease capacity
c) Increased size of base station electronics
d) Slow process of handoffs
8. The interference between the neighbouring base stations is
avoided by ____________
a) Assigning different group of channels
b) Using transmitters with different power level
c) Using different antennas
d) Using different base stations
9. What is the term used by ITU for a set of global standards of
3G systems?
a) IMT 2000
b) GSM
c) CDMA
d) EDGE
10. Which of the following leads to evolution of 3G
networks in CDMA systems?
a) IS-95
b) IS-95B
c) CdmaOne
d) Cdma2000
11. What is 3GPP?
a) Project based on W-CDMA
b) Project based on cdma2000
c) Project based on 2G standards
d) Project based on 2.5G standards
12. Which of the following is not a standard of 3G?
a) UMTS
b) Cdma2000
c) TD-SCDMA
d) LTE
13. What does the number 2000 in IMT-2000 signifies?
a) Year
b) Number of subscribers per cell
c) Number of cells
d) Area (Km)
14. Which of the following is not an application of third
generation network?
a) Global Positioning System (GPS)
b) Video conferencing
c) Mobile TV
d) Downloading rate upto 1 Gbps
15. Which of the following is not a characteristic of
Cdma2000?
a) Adaptable baseband signalling rates
b) Adaptable baseband chipping rates
c) Multicarrier technologies
d) OFDMA
16. What is the condition for intersystem interference?
a) Mobile moves from one cell to another cell
b) Mobile remains in the same cell
c) Mobile moves from one cellular system to another
cellular system
d) Mobile remains in the same cluster
17. Who developed standards for a UMTS network
a) ANSI (American National Standards Institute)
b) 3GPP (3rd Generation PartnershipProject)
c) ITU (International Telecommunication Union)
d) None
18. What are the parts of a 3G network architecture?
a) User Equipment (UE)
b) Radio Access Network (RAN)
c) Core Network
d) All the above. UE, RAN and Core network.
19. What is the multiple access technique used in 3G
mobile network?
a) Time Division
b) Frequency Division
c) Code Division
d) None
20. WCDMA stands for
a) Wide array CDMA
b) Wide band CDMA
c) Wireless CDMA
d) Wifi CDMA
UNIT -3
1. Which services are provided by transport layer?
a) Error control
b) Connection service
c) Connection less service
d) Congestion control
2.Using which method in transport layer data integrity
can be ensured?
a) Checksum
b) Repetition codes
c) Cyclic redundancy checks
d) Error correcting codes
3. What layer in the TCP/IP stack is equivalent to the
Transport layer of the OSI model?
a) Application
b) Host to host
c) Internet
d) Network Access
4. if TCP encounters packet loss it assumes network
internal congestion
and slows down the transmission rate. This is
called.......
a.Network routing
b)Network Friendly
c)Network error
d)none of these.
5. ARQ stands for __________
a) Automatic Repeat Request
b) Automatic Request Repeat
c) Application Repeat Request
d) Application Request Repeat
6.TCP is characterized by the following properties:
a)TCP is reliable
b)TCP incorporates congestion control mechanism
c)TCP incorporates end-to-end flow control
mechanism.
d) all the above
7. Fast retransmit and fast recovery are two
important mechanisms to
a. reduce the congestion.
b. increase the congestion
c. neither a nor b
d. exponentially increase the congestion
8. Indirect TCP was developed to overcome
a) Poor performance of TCP in wireless links
b) Inability of TCP to get fixed with a wireless part
c) both a and b are true
d)both a and b are false
10. In wireless distribution system __________
a) multiple access point are inter-connected with
each other
b) there is no access point
c) only one access point exists
d) access points are not required
11. .....................is a very simple concept whenever
one party sends something to the other
party, it retains a copy of the data it sent until the
recipient has acknowledged that it received it.
a) Retransmission
b) slow start
c) fast transfer
d)all are wrong
12. In selective retransmission .....................
a) Only the lost packets are retransmitted
b) All packets are transmitted
c) both a and b are true
d) both a and b are false
13. During TCP congestion control , when three or
more duplicate ACKs are
received, the sender does not even wait for a
retransmission timer to expire before retransmitting the
segment. This process is called.....
a)Fast Retransmit
b)Fast recovery
c) slow retransmit
d)slow recovery
14.I-TCP stands for
a)indirect TCP
b)direct TCP
c) informed TCP
d)inventive TCP
15. When a packet is lost on the wireless link due to
some transmission error, then the correspondent host
will .....
a) not be able to notice this error
b) will be able to notice this error.
c) sometimes goes wrong
d) all the above are false
16. When data is received during Congestion
Avoidance, then the congestion
window is
a.increased
b.decreased
c. same
d.none of these
17. TCP then stops sending and ...........the current
state of its congestion
window and further timers.
a. ‘freezes’
b. ‘hots’
c. ‘snoozes’
d. All the above
18. Wireless systems suffer from large delay variations
or ....
a. delay spikes
b.increse pipes
c.tunnels
d.none of these
19.pick odd man out regarding applications of TCP
a)www-browsing
b) e-mail
c) FTP
d)bluetooth
20.TCP and UDP are called ________
a) Application protocols
b) Session protocols
c) Transport protocols
d) Network protocols
UNIT - II
1. The network layer is concerned with __________ of data.
a) bits
b) frames
c) packets
d) bytes
2. Which one of the following is not a function of network
layer?
a) routing
b) inter-networking
c) congestion control
d) error control
3. A 4 byte IP address consists of __________
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
4. Which of the following routing algorithms can be used for
network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
5. Which of the following is not correct in relation to multi-
destination routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
6. Which one of the following algorithm is not used for
congestion control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
7. The network layer protocol for internet is __________
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
8. Transport layer aggregates data from different
applications into a single stream before passing it to
____________
a) network layer
b) data link layer
c) application layer
d) physical layer
9. Which of the following are transport layer protocols used
in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
10. User datagram protocol is called connectionless
because _____________
a) all UDP packets are treated independently by
transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
11. Transmission control protocol ___________
a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
12. Which one of the following is a version of UDP with
congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
13. A _____ is a TCP name for a transport service access
point.
a) port
b) pipe
c) node
d) protocol
14. Physical or logical arrangement of network is
__________
a) Topology
b) Routing
c) Networking
d) Control
15. In TDM, slots are further divided into __________
a) Seconds
b) Frames
c) Packets
d) Bits
16. _____ is the multiplexing technique that shifts each
signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
17. Which multiplexing technique used to transmit digital
signals?
a) FDM
b) TDM
c) WDM
d) FDM & WDM
18. If link transmits 4000frames per second, and each slot
has 8 bits, the transmission rate of circuit this TDM is
_________
a) 32kbps
b) 500bps
c) 500kbps
d) 32bps
19. Multiplexing provides _________
a) Efficiency
b) Privacy
c) Anti jamming
d) Both Efficiency & Privacy
20. In TDM, the transmission rate of a multiplexed path is
always _______ the sum of the transmission rates of the
signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
UNIT - I
1. What is the access point (AP) in a wireless LAN?
a) device that allows wireless devices to connect to a
wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a
wired network and wireless devices itself
d) all the nodes in the network
2. In wireless ad-hoc network _________
a) access point is not required
b) access point is must
c) nodes are not required
d) all nodes are access points
3. Which multiple access technique is used by IEEE 802.11
standard for wireless LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
4. In wireless distribution system __________
a) multiple access point are inter-connected with each
other
b) there is no access point
c) only one access point exists
d) access points are not required
5. A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
6. In wireless network an extended service set is a set of
________
a) connected basic service sets
b) all stations
c) all access points
d) connected access points
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing
8. Which one of the following event is not possible in wireless
LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
9. What is Wired Equivalent Privacy (WEP)?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) security algorithm for emails
10. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
11. Which of the following protocols is used in the
internet?
a) HTTP
b) DHCP
c) DNS
d) DNS, HTTP and DNS
12. The size of an IP address in IPv6 is _________
a) 32 bits
b) 64 bits
c) 128 bits
d) 265 bits
13. Internet works on _______
a) packet switching
b) circuit switching
c) both packet switching and circuit switching
d) data switching
14. Which one of the following is not an application layer
protocol used in internet?
a) remote procedure call
b) internet relay chat
c) resource reservation protocol
d) local procedure call
15. Which one of the following is not used in media access
control?
a) ethernet
b) digital subscriber line
c) fiber distributed data interface
d) packet switching
16. An interconnected collection of piconet is called
___________
a) scatternet
b) micronet
c) mininet
d) multinet
17. In a piconet, there can be up to ________ parked nodes
in the network.
a) 63
b) 127
c) 255
d) 511
18. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
19. Bluetooth is the wireless technology for __________
a) local area network
b) personal area network
c) metropolitan area network
d) wide area network
20. Bluetooth transceiver devices operate in ______ band.
a) 2.4 GHz ISM
b) 2.5 GHz ISM
c) 2.6 GHz ISM
d) 2.7 GHz ISM

Wireless networks mcq

  • 1.
    WIRELESS NETWORKS UNIT-5 1) Whatare the average upload speeds of our 4G LTE network? A. a. 1-3 Mgps B. b. 2-5 Mgps C. c. 1-3 Mbps D. d. 2-5 Mbps 2) 4G LTE is ____ times faster than 3G? A. a. 5 B. b. 10 C. c. 15 D. d. 20 3) What are the average download speeds for our 4G LTE network? A. a. 1-2 Mgps B. b. 5-12 Mgps C. c. 1-2 Mbps D. d. 5-12 Mbps 4) Which of these are not part of the characteristics of 4G? (a) Software Dependency (b) Fully Converged Services (c) Diverse User Devices (d) Multirate management 5) What does SGSN stand for? (a) Serial Gateway Supporting Node (b) Supporting GPRS Support Node (c) Supporting GGSN Support Node (d) Supporting Gateway Supporting Node 6) What does MSC stand for? (a) Master Sequence Controller (b) Master Switching Controller (c) Master Switch Controller (d) Master Switching Control
  • 2.
    7) What isthe expected maximum data rate for 4G? (a) 100Mbps (b) 100Kbps (c) 10Mbps (d) 200Kbps 8) What application will require BlueTooth? (a) Ad-Hoc Networking (b) Desktop Publishing (c) Circuit Switching (e) Packet Networking 9) What are some of the major architectural differences exist between 3G and 4G? (a) The RNC acts as a BS in a cluster-type RAN configuration. (b) The circuit-switching elements are removed in 4G. (c) A VOIP Gateway is used to connect to the PSTN and ISDN networks (d) All of the Above 10) ____________ to attain ultra high spectral efficiency by means of spatial processing including multi-antenna and multi-user MIMO A. 3G MIMO B. MIMO C. WiMAX D. Beamforming 11) The pre-4G technology ________ (LTE) is often branded “4G”, but the first LTE release does not fully comply with the IMT-Advanced requirements. A. E-UTRA B. WiMAX C. 3GPP Long Term Evolution D. Universal Mobile Telecommunications System
  • 3.
    12) The processof transferring a mobile station from one base station to another is a. MSC b. Roamer c. Hand off d. Forward channel 13).2G CDMA standard – cdma one supports up to a. 8 users b. 64 users c. 32 users d. 116 users 14).The shape of the cellular region for maximum radio coverage is a. Circular b. Square c. Oval d. Hexagon 15). In a dynamic channel assignment strategy, a. Voice channels are not permanently assigned b. The serving base station requests for a channel from MSC c. MSC allocates the channel according to the predetermined algorithm d. All of the above 16) In Handoff a. Process of transferring the call to the new base station b. Transfers the call c. New channel allocation is done d. All of the above 17) Interference in frequency bands may lead to a. Cross talk b. Missed calls c. Blocked calls d. All of the above 18) Diversity employs the decision making at a. Transmitter b. Receiver
  • 4.
    c. Transmitter andreceiver d. Communication channel 19)Global Positioning System uses a. CDMA b. TDMA c. SDMA d. FDMA 20)OFDM is a technique of 1. Encoding digital data 2. Multiple carrier frequencies 3. Wide band digital communication 4. 4G mobile communication a. 1, 2 and 3 are correct b. 2 and 3 are correct c. 1, 2 and 4 are correct d. All the four are correct UNIT-IV 1. What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM band? a) UNII b) Unlicensed PCS c) Millimetre wave d) Bluetooth 2. Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs? a) IEEE 802.16 b) IEEE 802.3 c) IEEE 802.11 d) IEEE 802.15 3. Which of the following is the 802.11 High Rate Standard? a) IEEE 802.15 b) IEEE 802.15.4
  • 5.
    c) IEEE 802.11g d)IEEE 802.11b 4. What is WISP? a) Wideband Internet Service Protocol b) Wireless Internet Service Provider c) Wireless Instantaneous Source Provider d) Wideband Internet Source Protocol 5. What are the features of HSDPA a.Adaptive modulation and coding (AMC) B.Multi-code operation C.Hybrid Automatic Repeat Request D.All the above 6. Which of the following is not a characteristic of cellular telephone system? a) Accommodate a large number of users b) Large geographic area c) Limited frequency spectrum d) Large frequency spectrum 7. Why the size of the cell is kept small in cellular network? a) Increase capacity b) Decrease capacity c) Increased size of base station electronics d) Slow process of handoffs 8. The interference between the neighbouring base stations is avoided by ____________ a) Assigning different group of channels b) Using transmitters with different power level c) Using different antennas d) Using different base stations
  • 6.
    9. What isthe term used by ITU for a set of global standards of 3G systems? a) IMT 2000 b) GSM c) CDMA d) EDGE 10. Which of the following leads to evolution of 3G networks in CDMA systems? a) IS-95 b) IS-95B c) CdmaOne d) Cdma2000 11. What is 3GPP? a) Project based on W-CDMA b) Project based on cdma2000 c) Project based on 2G standards d) Project based on 2.5G standards 12. Which of the following is not a standard of 3G? a) UMTS b) Cdma2000 c) TD-SCDMA d) LTE 13. What does the number 2000 in IMT-2000 signifies? a) Year b) Number of subscribers per cell c) Number of cells d) Area (Km) 14. Which of the following is not an application of third generation network? a) Global Positioning System (GPS) b) Video conferencing
  • 7.
    c) Mobile TV d)Downloading rate upto 1 Gbps 15. Which of the following is not a characteristic of Cdma2000? a) Adaptable baseband signalling rates b) Adaptable baseband chipping rates c) Multicarrier technologies d) OFDMA 16. What is the condition for intersystem interference? a) Mobile moves from one cell to another cell b) Mobile remains in the same cell c) Mobile moves from one cellular system to another cellular system d) Mobile remains in the same cluster 17. Who developed standards for a UMTS network a) ANSI (American National Standards Institute) b) 3GPP (3rd Generation PartnershipProject) c) ITU (International Telecommunication Union) d) None 18. What are the parts of a 3G network architecture? a) User Equipment (UE) b) Radio Access Network (RAN) c) Core Network d) All the above. UE, RAN and Core network. 19. What is the multiple access technique used in 3G mobile network? a) Time Division b) Frequency Division c) Code Division d) None 20. WCDMA stands for
  • 8.
    a) Wide arrayCDMA b) Wide band CDMA c) Wireless CDMA d) Wifi CDMA UNIT -3 1. Which services are provided by transport layer? a) Error control b) Connection service c) Connection less service d) Congestion control 2.Using which method in transport layer data integrity can be ensured? a) Checksum b) Repetition codes c) Cyclic redundancy checks d) Error correcting codes 3. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? a) Application b) Host to host c) Internet d) Network Access 4. if TCP encounters packet loss it assumes network internal congestion and slows down the transmission rate. This is called....... a.Network routing b)Network Friendly c)Network error d)none of these.
  • 9.
    5. ARQ standsfor __________ a) Automatic Repeat Request b) Automatic Request Repeat c) Application Repeat Request d) Application Request Repeat 6.TCP is characterized by the following properties: a)TCP is reliable b)TCP incorporates congestion control mechanism c)TCP incorporates end-to-end flow control mechanism. d) all the above 7. Fast retransmit and fast recovery are two important mechanisms to a. reduce the congestion. b. increase the congestion c. neither a nor b d. exponentially increase the congestion 8. Indirect TCP was developed to overcome a) Poor performance of TCP in wireless links b) Inability of TCP to get fixed with a wireless part c) both a and b are true d)both a and b are false 10. In wireless distribution system __________ a) multiple access point are inter-connected with each other b) there is no access point c) only one access point exists d) access points are not required 11. .....................is a very simple concept whenever one party sends something to the other party, it retains a copy of the data it sent until the recipient has acknowledged that it received it. a) Retransmission b) slow start c) fast transfer
  • 10.
    d)all are wrong 12.In selective retransmission ..................... a) Only the lost packets are retransmitted b) All packets are transmitted c) both a and b are true d) both a and b are false 13. During TCP congestion control , when three or more duplicate ACKs are received, the sender does not even wait for a retransmission timer to expire before retransmitting the segment. This process is called..... a)Fast Retransmit b)Fast recovery c) slow retransmit d)slow recovery 14.I-TCP stands for a)indirect TCP b)direct TCP c) informed TCP d)inventive TCP 15. When a packet is lost on the wireless link due to some transmission error, then the correspondent host will ..... a) not be able to notice this error b) will be able to notice this error. c) sometimes goes wrong d) all the above are false 16. When data is received during Congestion Avoidance, then the congestion window is a.increased b.decreased c. same d.none of these
  • 11.
    17. TCP thenstops sending and ...........the current state of its congestion window and further timers. a. ‘freezes’ b. ‘hots’ c. ‘snoozes’ d. All the above 18. Wireless systems suffer from large delay variations or .... a. delay spikes b.increse pipes c.tunnels d.none of these 19.pick odd man out regarding applications of TCP a)www-browsing b) e-mail c) FTP d)bluetooth 20.TCP and UDP are called ________ a) Application protocols b) Session protocols c) Transport protocols d) Network protocols UNIT - II 1. The network layer is concerned with __________ of data. a) bits b) frames
  • 12.
    c) packets d) bytes 2.Which one of the following is not a function of network layer? a) routing b) inter-networking c) congestion control d) error control 3. A 4 byte IP address consists of __________ a) only network address b) only host address c) network address & host address d) network address & MAC address 4. Which of the following routing algorithms can be used for network layer design? a) shortest path algorithm b) distance vector routing c) link state routing d) all of the mentioned 5. Which of the following is not correct in relation to multi- destination routing? a) is same as broadcast routing b) contains the list of all destinations c) data is not sent by packets d) there are multiple receivers 6. Which one of the following algorithm is not used for congestion control? a) traffic aware routing b) admission control c) load shedding d) routing information protocol 7. The network layer protocol for internet is __________ a) ethernet b) internet protocol c) hypertext transfer protocol d) file transfer protocol
  • 13.
    8. Transport layeraggregates data from different applications into a single stream before passing it to ____________ a) network layer b) data link layer c) application layer d) physical layer 9. Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP 10. User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly 11. Transmission control protocol ___________ a) is a connection-oriented protocol b) uses a three way handshake to establish a connection c) receives data from application as a single stream d) all of the mentioned 12. Which one of the following is a version of UDP with congestion control? a) datagram congestion control protocol b) stream control transmission protocol c) structured stream transport d) user congestion control protocol 13. A _____ is a TCP name for a transport service access point. a) port b) pipe c) node d) protocol
  • 14.
    14. Physical orlogical arrangement of network is __________ a) Topology b) Routing c) Networking d) Control 15. In TDM, slots are further divided into __________ a) Seconds b) Frames c) Packets d) Bits 16. _____ is the multiplexing technique that shifts each signal to a different carrier frequency. a) FDM b) TDM c) Both FDM & TDM d) PDM 17. Which multiplexing technique used to transmit digital signals? a) FDM b) TDM c) WDM d) FDM & WDM 18. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________ a) 32kbps b) 500bps c) 500kbps d) 32bps 19. Multiplexing provides _________ a) Efficiency b) Privacy c) Anti jamming d) Both Efficiency & Privacy 20. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the
  • 15.
    signal sources. a) Greaterthan b) Lesser than c) Equal to d) Equal to or greater than UNIT - I 1. What is the access point (AP) in a wireless LAN? a) device that allows wireless devices to connect to a wired network b) wireless devices itself c) both device that allows wireless devices to connect to a wired network and wireless devices itself d) all the nodes in the network 2. In wireless ad-hoc network _________ a) access point is not required b) access point is must c) nodes are not required d) all nodes are access points 3. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN? a) CDMA b) CSMA/CA c) ALOHA d) CSMA/CD 4. In wireless distribution system __________ a) multiple access point are inter-connected with each other b) there is no access point c) only one access point exists d) access points are not required 5. A wireless network interface controller can work in _______ a) infrastructure mode b) ad-hoc mode
  • 16.
    c) both infrastructuremode and ad-hoc mode d) WDS mode 6. In wireless network an extended service set is a set of ________ a) connected basic service sets b) all stations c) all access points d) connected access points 7. Mostly ________ is used in wireless LAN. a) time division multiplexing b) orthogonal frequency division multiplexing c) space division multiplexing d) channel division multiplexing 8. Which one of the following event is not possible in wireless LAN? a) collision detection b) acknowledgement of data frames c) multi-mode data transmission d) connection to wired networks 9. What is Wired Equivalent Privacy (WEP)? a) security algorithm for ethernet b) security algorithm for wireless networks c) security algorithm for usb communication d) security algorithm for emails 10. What is WPA? a) wi-fi protected access b) wired protected access c) wired process access d) wi-fi process access 11. Which of the following protocols is used in the internet? a) HTTP b) DHCP c) DNS d) DNS, HTTP and DNS
  • 17.
    12. The sizeof an IP address in IPv6 is _________ a) 32 bits b) 64 bits c) 128 bits d) 265 bits 13. Internet works on _______ a) packet switching b) circuit switching c) both packet switching and circuit switching d) data switching 14. Which one of the following is not an application layer protocol used in internet? a) remote procedure call b) internet relay chat c) resource reservation protocol d) local procedure call 15. Which one of the following is not used in media access control? a) ethernet b) digital subscriber line c) fiber distributed data interface d) packet switching 16. An interconnected collection of piconet is called ___________ a) scatternet b) micronet c) mininet d) multinet 17. In a piconet, there can be up to ________ parked nodes in the network. a) 63 b) 127 c) 255 d) 511 18. Bluetooth is the wireless technology for __________ a) local area network b) personal area network
  • 18.
    c) metropolitan areanetwork d) wide area network 19. Bluetooth is the wireless technology for __________ a) local area network b) personal area network c) metropolitan area network d) wide area network 20. Bluetooth transceiver devices operate in ______ band. a) 2.4 GHz ISM b) 2.5 GHz ISM c) 2.6 GHz ISM d) 2.7 GHz ISM