T.Y.B.Sc. IT Sem VI Internal Examination 2018 - IT

Approved & Edited by ProProfs Editorial Team
At ProProfs Quizzes, our dedicated in-house team of experts takes pride in their work. With a sharp eye for detail, they meticulously review each quiz. This ensures that every quiz, taken by over 100 million users, meets our standards of accuracy, clarity, and engagement.
Learn about Our Editorial Process
| Written by Itmvlu
I
Itmvlu
Community Contributor
Quizzes Created: 4 | Total Attempts: 496
Questions: 34 | Attempts: 48

SettingsSettingsSettings
T.Y.B.Sc. IT Sem VI Internal Examination 2018 - IT - Quiz


Questions and Answers
  • 1. 

    _________ is the transmission mechanism used by TCP/IP.

    • A. 

      IP

    • B. 

      IT

    • C. 

      Sniffing

    • D. 

      Tunneling

    Correct Answer
    A. IP
    Explanation
    IP (Internet Protocol) is the transmission mechanism used by TCP/IP. TCP/IP is a suite of protocols that enables communication between devices over the internet. IP is responsible for routing and addressing packets of data across networks. It ensures that data is delivered to the correct destination by assigning unique IP addresses to each device and using routing protocols to determine the most efficient path for data transmission. TCP (Transmission Control Protocol) is built on top of IP and provides reliable, connection-oriented communication between devices.

    Rate this question:

  • 2. 

    __________ layer in TCP/IP is combined of session, presentation and application layers in the OSI model.

    • A. 

      Application

    • B. 

      Physical

    • C. 

      Network

    • D. 

      Session

    Correct Answer
    A. Application
    Explanation
    The correct answer is "Application." In the TCP/IP model, the Application layer combines the functionality of the Session, Presentation, and Application layers in the OSI model. This layer is responsible for providing high-level protocols and interfaces for applications to communicate over the network. It handles tasks such as data formatting, encryption, and session management.

    Rate this question:

  • 3. 

    IP transports data in packets called as _______

    • A. 

      Datagrams

    • B. 

      Frames

    • C. 

      Datasegments

    • D. 

      Bits

    Correct Answer
    A. Datagrams
    Explanation
    IP transports data in packets called datagrams. A datagram is a self-contained unit of data that includes the source and destination IP addresses, as well as the actual data being transmitted. These datagrams are sent over IP networks and are responsible for delivering the data from the source to the destination.

    Rate this question:

  • 4. 

    _________ addresses change from hop to hop.

    • A. 

      Physical

    • B. 

      Network

    • C. 

      Gateway

    • D. 

      Link

    Correct Answer
    A. Physical
    Explanation
    The term "physical" refers to the actual hardware components and physical connections involved in the network. As data travels from one hop to another in a network, it passes through different physical devices and connections. Therefore, the correct answer is "physical" as it addresses the change that occurs at each hop in terms of the hardware and physical connections.

    Rate this question:

  • 5. 

    In __________, a network is divided into several smaller subnetworks.

    • A. 

      Subnetting

    • B. 

      Supernettting

    • C. 

      Tunneling

    • D. 

      Classless

    Correct Answer
    A. Subnetting
    Explanation
    Subnetting is the process of dividing a network into smaller subnetworks, allowing for more efficient use of IP addresses and better network management. By dividing the network into subnets, it becomes easier to control network traffic, manage security, and improve overall network performance. Subnetting helps in organizing and optimizing the network infrastructure, making it a crucial aspect of network design and administration.

    Rate this question:

  • 6. 

    ________ mask is the reverse of a subnet mask.

    • A. 

      Supernet

    • B. 

      Super

    • C. 

      Active

    • D. 

      Network

    Correct Answer
    A. Supernet
    Explanation
    A supernet mask is the reverse of a subnet mask because it is used to combine multiple smaller subnets into a larger network. It is a method of aggregating IP addresses to reduce the number of routing table entries. Instead of dividing a network into smaller subnets with a subnet mask, a supernet mask combines multiple subnets into a single larger network. This allows for more efficient routing and reduces the size of the routing table.

    Rate this question:

  • 7. 

    In _________ addressing, the whole address is divided into variable length blocks.

    • A. 

      Classless

    • B. 

      Classful

    • C. 

      Network

    • D. 

      Optimistic

    Correct Answer
    A. Classless
    Explanation
    Classless addressing is a type of addressing scheme where the whole address is divided into variable length blocks. Unlike classful addressing, which divides the address into fixed length blocks, classless addressing allows for more flexibility in assigning addresses. This means that the blocks can be of different sizes, allowing for efficient allocation of IP addresses and better utilization of address space. Classless addressing is commonly used in modern networks, as it allows for more efficient routing and subnetting.

    Rate this question:

  • 8. 

    _________ is the delivery mechanism used by the TCP/IP protocol.

    • A. 

      IPv4

    • B. 

      IT

    • C. 

      IPv8

    • D. 

      IP

    Correct Answer
    A. IPv4
    Explanation
    The TCP/IP protocol uses IPv4 as its delivery mechanism. IPv4 is the fourth version of the Internet Protocol and is widely used for identifying and routing network traffic on the internet. It uses a 32-bit addressing system, allowing for approximately 4.3 billion unique addresses. TCP/IP relies on IPv4 to deliver data packets across networks, ensuring that they reach their intended destinations.

    Rate this question:

  • 9. 

    _____________ is used by the source to predetermine a route for the datagram as it travels through the internet.

    • A. 

      Strict source route

    • B. 

      Loose source route

    • C. 

      Network route

    • D. 

      Link route

    Correct Answer
    A. Strict source route
    Explanation
    Strict source route is used by the source to predetermine a route for the datagram as it travels through the internet. In a strict source route, the source specifies the exact sequence of intermediate routers that the datagram should pass through. This allows the source to have full control over the path that the datagram takes, ensuring that it follows a specific predetermined route. This can be useful in certain situations where the source wants to avoid certain routers or take a specific path for security or performance reasons.

    Rate this question:

  • 10. 

    _________ is used to record the time of datagram processing by a router.

    • A. 

      Timestamp

    • B. 

      Watch

    • C. 

      WatchdogTimer

    • D. 

      Timer

    Correct Answer
    A. Timestamp
    Explanation
    A timestamp is used to record the time of datagram processing by a router. A timestamp is a record of the exact time when an event occurred. In the context of a router, it is used to keep track of the time it takes for a datagram (a unit of data) to be processed. This information can be useful for network administrators to analyze and optimize the performance of the router.

    Rate this question:

  • 11. 

    The unit of communication in TCP/IP at physical layer is ______

    • A. 

      Bit

    • B. 

      Frame

    • C. 

      Segment

    • D. 

      Byte

    Correct Answer
    A. Bit
    Explanation
    The unit of communication in TCP/IP at the physical layer is a bit. A bit is the smallest unit of data in a computer and is represented as either a 0 or a 1. In TCP/IP, data is transmitted over a network in the form of bits, which are then grouped into larger units such as bytes, frames, or segments at higher layers of the protocol stack. However, at the physical layer, the data is transmitted as individual bits over the physical medium.

    Rate this question:

  • 12. 

    Error detection method used by the TCP/IP protocol is called __________.

    • A. 

      Checksum

    • B. 

      Error resolving

    • C. 

      Debugging

    • D. 

      Trobleshooting

    Correct Answer
    A. Checksum
    Explanation
    The error detection method used by the TCP/IP protocol is called checksum. This method involves calculating a numerical value based on the data being transmitted and appending it to the data. When the data is received, the receiver recalculates the checksum and compares it to the transmitted value. If they match, it indicates that the data was received without errors. If they don't match, it suggests that errors may have occurred during transmission. Therefore, the checksum is an important mechanism for ensuring data integrity in TCP/IP communication.

    Rate this question:

  • 13. 

    ______________ does not change the contents of the packet.

    • A. 

      Packet sniffing

    • B. 

      Packet snoofing

    • C. 

      Routing table

    • D. 

      Attack

    Correct Answer
    A. Packet sniffing
    Explanation
    Packet sniffing refers to the act of intercepting and analyzing network traffic. It allows an individual to capture and view the contents of packets being transmitted over a network. However, packet sniffing itself does not alter or modify the contents of the packets. It is purely a passive activity that involves monitoring and observing network traffic for various purposes such as network troubleshooting, security analysis, or performance monitoring.

    Rate this question:

  • 14. 

    _____________ guarantees that the packet is not modified during the transmission.

    • A. 

      Data Integrity

    • B. 

      Data isolation

    • C. 

      Data safe

    • D. 

      Datagram

    Correct Answer
    A. Data Integrity
    Explanation
    Data integrity ensures that the packet remains unchanged during transmission. This means that the data in the packet, including its content and structure, remains intact and has not been altered or corrupted in any way. Data integrity is crucial for maintaining the accuracy and reliability of the transmitted data, ensuring that it can be trusted and used effectively by the recipient.

    Rate this question:

  • 15. 

    ________ table used by the fragmentation module to find the MTU interface.

    • A. 

      MTU

    • B. 

      LTU

    • C. 

      MTUU

    • D. 

      MTU fragmentation

    Correct Answer
    A. MTU
    Explanation
    The correct answer is "MTU" because the question is asking for the table used by the fragmentation module to find the MTU interface. MTU stands for Maximum Transmission Unit, which refers to the largest size of a packet that can be transmitted over a network. Therefore, it makes sense that the fragmentation module would use a table specifically dedicated to MTU values in order to determine the appropriate interface for packet transmission.

    Rate this question:

  • 16. 

    ___________ is used by the forwarding module to determine the next hop address of the packet.

    • A. 

      Routing table

    • B. 

      Fragmentation table

    • C. 

      Information table

    • D. 

      Link address

    Correct Answer
    A. Routing table
    Explanation
    The forwarding module uses the routing table to determine the next hop address of the packet. The routing table contains information about the network topology and available paths, allowing the forwarding module to make informed decisions on how to route the packet towards its destination. By looking up the destination address in the routing table, the forwarding module can determine the appropriate next hop address to forward the packet to.

    Rate this question:

  • 17. 

    ________ stores the datagram coming from the data link layer.

    • A. 

      Input queue

    • B. 

      Output queue

    • C. 

      Address queue

    • D. 

      Routing table

    Correct Answer
    A. Input queue
    Explanation
    The correct answer is "Input queue" because the input queue is responsible for storing the datagrams that are received from the data link layer. This queue acts as a buffer, allowing the network device to temporarily hold incoming data until it can be processed by the network layer. The input queue ensures that the data is received in the correct order and can be efficiently processed by the network layer protocols.

    Rate this question:

  • 18. 

    In _______ address packet is sent to the intended recipient.

    • A. 

      Unicast

    • B. 

      Multicast

    • C. 

      Broadband

    • D. 

      Link

    Correct Answer
    A. Unicast
    Explanation
    In unicast, the address packet is sent to the intended recipient. Unicast is a type of communication where a message is sent from one sender to one specific receiver. It is commonly used in most network communication scenarios, such as email, web browsing, and file transfers. Unlike multicast or broadcast, unicast ensures that the packet reaches only the intended recipient, making it suitable for private or personalized communication.

    Rate this question:

  • 19. 

    In __________ each member of the group receives a copy.

    • A. 

      Multicasting

    • B. 

      Unicasting

    • C. 

      Tunneling

    • D. 

      Linking

    Correct Answer
    A. Multicasting
    Explanation
    In multicasting, each member of the group receives a copy of the data being transmitted. This is different from unicasting, where data is sent to a specific recipient, and tunneling, where data is encapsulated and sent through a virtual tunnel. Linking, on the other hand, refers to connecting different parts of a program or system. Therefore, multicasting is the most suitable option for the given statement as it implies the distribution of data to multiple recipients.

    Rate this question:

  • 20. 

    _______________ is applied to notation if there are consecutive zeros only.

    • A. 

      Zero compression

    • B. 

      Zero expand

    • C. 

      Zero removed

    • D. 

      Zero updation

    Correct Answer
    A. Zero compression
    Explanation
    Zero compression is applied to notation if there are consecutive zeros only. This means that if there are multiple zeros in a row, they can be compressed or represented in a shorter form to save space or simplify the notation. This compression technique is commonly used in data storage and transmission to reduce the size of files or messages.

    Rate this question:

  • 21. 

    Physical address is also known as ______ address.

    • A. 

      Link

    • B. 

      Network

    • C. 

      Gateway

    • D. 

      Switch

    Correct Answer
    A. Link
    Explanation
    Physical address is also known as a link address. This is because the physical address, also known as the MAC (Media Access Control) address, is used to uniquely identify network devices at the data link layer of the OSI model. The physical address is assigned to the network interface card (NIC) of each device and is used for communication within a local area network (LAN).

    Rate this question:

  • 22. 

    _________________ is address of 96 bits of zero followed by 32 bits of IPv4 address.

    • A. 

      Compatible address

    • B. 

      Logical address

    • C. 

      IPv6 address

    • D. 

      Physical address

    Correct Answer
    A. Compatible address
    Explanation
    A compatible address is an address that consists of 96 bits of zero followed by 32 bits of IPv4 address. This address format is used in IPv6 to represent IPv4 addresses. It allows IPv4 and IPv6 networks to coexist and communicate with each other. By using a compatible address, IPv4 addresses can be embedded within IPv6 addresses, facilitating the transition from IPv4 to IPv6.

    Rate this question:

  • 23. 

    The first _____ bits of a global unicast address are called global routing prefix.

    • A. 

      48

    • B. 

      44

    • C. 

      64

    • D. 

      99

    Correct Answer
    A. 48
    Explanation
    The first 48 bits of a global unicast address are called global routing prefix. This prefix is used to identify the network portion of the address and is assigned by the Internet Assigned Numbers Authority (IANA). The remaining bits in the address are used to identify the host within the network.

    Rate this question:

  • 24. 

    IPv6 is also known as _____

    • A. 

      IPng

    • B. 

      IPgn

    • C. 

      IP better version

    • D. 

      IP next

    Correct Answer
    A. IPng
    Explanation
    IPv6, also known as IPng, stands for Internet Protocol next generation. It is the successor to IPv4 and was designed to address the limitations of IPv4, such as the depletion of available IP addresses. IPv6 provides a larger address space, improved security features, and better support for mobile devices and emerging technologies. The term IPng is commonly used to refer to IPv6 as it represents the next generation of the Internet Protocol.

    Rate this question:

  • 25. 

    _______________ is used when two computers using IPv6 want to communicate with each other and packet must pass through a region that uses IPv4.

    • A. 

      Tunneling

    • B. 

      Converting

    • C. 

      Encapsulation

    • D. 

      Binding

    Correct Answer
    A. Tunneling
    Explanation
    Tunneling is used when two computers using IPv6 want to communicate with each other and the packet must pass through a region that uses IPv4. Tunneling encapsulates the IPv6 packet within an IPv4 packet, allowing it to travel through the IPv4 network. This ensures that the packet can reach its destination by going through the IPv4 region and then being decapsulated back into IPv6 at the receiving end.

    Rate this question:

  • 26. 

    Communication at the network layer is __________

    • A. 

      End to end

    • B. 

      Hop to hop

    • C. 

      Node to node

    • D. 

      Layer to layer

    Correct Answer
    A. End to end
    Explanation
    Communication at the network layer is end to end. This means that the communication between the source and destination nodes is established and maintained throughout the entire network, regardless of the number of hops or intermediate nodes. The network layer is responsible for routing and forwarding packets across different networks, ensuring that the packets reach their intended destination. Therefore, the communication at this layer is not limited to a specific node or hop, but rather spans the entire network from the source to the destination.

    Rate this question:

  • 27. 

    ________ layer is responsible for the source to destination delivery of a packet.

    • A. 

      Network

    • B. 

      Application

    • C. 

      Transport

    • D. 

      Physical

    Correct Answer
    A. Network
    Explanation
    The network layer is responsible for the source to destination delivery of a packet. It is responsible for routing the packets through different networks and ensuring that they reach their intended destination. This layer adds the necessary addressing and routing information to the packet headers, allowing them to be properly transmitted across the network. The network layer also handles any necessary fragmentation and reassembly of packets, ensuring that they can be successfully delivered to the destination.

    Rate this question:

  • 28. 

    _____________ layer is responsible for translation, compression and encryption.

    • A. 

      Presentation

    • B. 

      Application

    • C. 

      Network

    • D. 

      Session

    Correct Answer
    A. Presentation
    Explanation
    The presentation layer is responsible for translating, compressing, and encrypting data. It ensures that the data format used by the application layer is understood by the receiving device. It also handles data compression to reduce the amount of data that needs to be transmitted. Additionally, the presentation layer provides encryption services to secure the data being transmitted, protecting it from unauthorized access or tampering.

    Rate this question:

  • 29. 

    __________ layer is responsible for dialog control and synchronization.

    • A. 

      Session

    • B. 

      Presentation

    • C. 

      Network

    • D. 

      Application

    Correct Answer
    A. Session
    Explanation
    The session layer is responsible for dialog control and synchronization. It establishes, maintains, and terminates connections between two communicating hosts. It also handles the coordination and synchronization of data exchange, ensuring that the data is delivered in the correct order and without errors. The session layer is responsible for managing sessions and providing services such as session establishment, session maintenance, and session termination.

    Rate this question:

  • 30. 

    In the ____________ mode two devices can send and receive but not at the same time.

    • A. 

      Half duplex

    • B. 

      Full duplex

    • C. 

      Broadband

    • D. 

      Duplex

    Correct Answer
    A. Half duplex
    Explanation
    In half duplex mode, two devices can send and receive data, but not simultaneously. This means that one device can transmit data while the other device can only receive it, and vice versa. The communication between the two devices is not bidirectional at the same time, but rather switches between transmitting and receiving. This mode is commonly used in situations where simultaneous communication is not required or feasible, such as walkie-talkies or traditional landline telephones.

    Rate this question:

  • 31. 

    _____________ layer divides the stream of bits into frames.

    • A. 

      Data link

    • B. 

      Session

    • C. 

      Presentation

    • D. 

      Transport

    Correct Answer
    A. Data link
    Explanation
    The data link layer is responsible for dividing the stream of bits into frames. This layer adds a header and a trailer to the data, creating a frame that can be transmitted over the network. By dividing the data into frames, the data link layer ensures that each frame can be individually transmitted and received, allowing for efficient and reliable data transfer.

    Rate this question:

  • 32. 

    In ___________ topology every device is on a common link.

    • A. 

      Bus

    • B. 

      Star

    • C. 

      Unicast

    • D. 

      Circle

    Correct Answer
    A. Bus
    Explanation
    In a bus topology, every device is connected to a common link called a bus. This means that all devices share the same communication medium, and data is transmitted in a linear fashion from one device to another. Each device on the bus receives all transmitted data, but only the intended recipient processes it. This topology is relatively simple and inexpensive to set up, making it suitable for small networks. However, if the bus link fails, the entire network can be affected.

    Rate this question:

  • 33. 

    ________________ is achieved through a trailer which is added to the end of the frame.

    • A. 

      Error control

    • B. 

      Mass control

    • C. 

      Link control

    • D. 

      Delivery

    Correct Answer
    A. Error control
    Explanation
    Error control is achieved through a trailer which is added to the end of the frame. This trailer contains error detection codes or checksums that allow the receiver to verify the integrity of the data. By checking the trailer, the receiver can detect if any errors occurred during transmission and request for retransmission if necessary. This ensures that the data is delivered accurately and any errors are controlled.

    Rate this question:

  • 34. 

    A technology which provide the mapping between private and universal addresses and supports virtual network is known as _______

    • A. 

      NAT

    • B. 

      TAT

    • C. 

      SMTP

    • D. 

      FTP

    Correct Answer
    A. NAT
    Explanation
    NAT, which stands for Network Address Translation, is a technology that enables the mapping between private and universal addresses. It allows multiple devices within a private network to share a single public IP address. NAT also supports virtual networks by providing a way to translate IP addresses between different network domains. This technology is commonly used in home and office networks to allow multiple devices to access the internet using a single public IP address.

    Rate this question:

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.