Friday, January 6, 2012
[vu-students] mgt401 4th quiz after midterm mega file
You received this message because you are subscribed to the Google
Groups "VU Students" group.
To post to this group, send email to vu-students@googlegroups.com
To unsubscribe from this group, send email to
vu-students+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/vu-students?hl=en_PK?hl=en
Re: (VU-Study-Corner) Click on for 100% free LAPTOP.
100% free ipod
http://multiplyfund.com/ref.php?page=act/ref&invcod=5628
On Fri, Jan 6, 2012 at 11:20 AM, bc100401133 Fahad Rasool <bc100401133@vu.edu.pk> wrote:
Click on for 100% free LAPTOP.--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
Re: (Attock VU Group) salaam
aj grace day hai pr abi tak koi Acc311 ka idea nahi ayaOn Fri, Jan 6, 2012 at 12:03 AM, Shahzad Sadiq <lushahz@gmail.com> wrote:
Irfan bhai ooper aap ko idea diya tau hai............:)
--On Thu, Jan 5, 2012 at 8:29 PM, bc090200730 Irfan Pervez <bc090200730@vu.edu.pk> wrote:
snd me the gdb soln of eco 403 plzzzzzzzzzz--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
(Attock VU Group) ...... CS610 subjective part all 2011 paperz---by Shazia Sister......
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
(Attock VU Group) ...... CS610 subjective part all 2011 paperz---by Shazia Sister......
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
(Attock VU Group) ............cs403---shared by Shazia Sister...........
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
[vu-students] Make your date sheet now ...... MIT VIRTUALIANS
Dear Virtual University Fellows
Published On: Friday, January 06, 2012 | |
As announced earlier, the web interface for making your date sheet is being placed on the following link: Note: You MUST make your date sheet on or before: Friday, Janurary 13, 2012. Seats will be available on a 'first come first served' basis.
|
MIT VIRTUALIANS
MIT VIRTUALIANS
--
You received this message because you are subscribed to the Google
Groups "VU Students" group.
To post to this group, send email to vu-students@googlegroups.com
To unsubscribe from this group, send email to
vu-students+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/vu-students?hl=en_PK?hl=en
*~* VuPak2009 *~* Make your date sheet now ...... MIT VIRTUALIANS
Dear Virtual University Fellows
Published On: Friday, January 06, 2012 | |
As announced earlier, the web interface for making your date sheet is being placed on the following link: Note: You MUST make your date sheet on or before: Friday, Janurary 13, 2012. Seats will be available on a 'first come first served' basis.
|
MIT VIRTUALIANS
MIT VIRTUALIANS
--
You received this message because you are subscribed to the Google Groups "Virtual University of Pakistan 2009" group.
To post to this group, send email to virtual-university-of-pakistan-2009@googlegroups.com.
To unsubscribe from this group, send email to virtual-university-of-pakistan-2009+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/virtual-university-of-pakistan-2009?hl=en.
(VU-Study-Corner) Make your date sheet now ...... MIT VIRTUALIANS
Dear Virtual University Fellows
Published On: Friday, January 06, 2012 | |
As announced earlier, the web interface for making your date sheet is being placed on the following link: Note: You MUST make your date sheet on or before: Friday, Janurary 13, 2012. Seats will be available on a 'first come first served' basis.
|
MIT VIRTUALIANS
MIT VIRTUALIANS
--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
Re: (VU-Study-Corner) can any one help me telling about the summer semester in vu?
as many as u want...--On Thu, Jan 5, 2012 at 12:46 PM, bc110201412 Hafsa Abdul Wahab <bc110201412@vu.edu.pk> wrote:
Does VU offers any summer semester?? If yes, then how many courses are offered in that semester? --
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
Regard'sMohammad Sajjadjis dawa kita "main" ala o pal vich ho Iblees(Sheetan) gaya....oonay yar no wakhraya samja c main q samjha je main howan...
--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.
(Attock VU Group) Re: (VUStudyMasti) ............... CS610 subjective part all 2011 paperz
Attached...........--
---------------------------
Complete QURAN
http://www.quranflash.com/en/quranflash.html
http://tanzil.info
~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~
thanks for joing "vustudy&masti" group.
For group Rules view the link
http://groups.google.com.pk/group/vustudymasti/web/group-rules
To post to this group, send email to vustudymasti@googlegroups.com
Current web address: http://groups.google.com.pk/group/vustudymasti
------------------------------------------------------------------------------------------------
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████
(Attock VU Group) Re: (VUStudyMasti) ...............CS610 Solved about 180 MCQs
----Computer Networks (CS610)
________ of TCP/IP layering model, corresponds to basic network hardware.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.
· Physical Layer
· Network Interface Layer
· Internet Layer
· Transport Layer
________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.
· IP
· UDP
· TCP
· None of the given
____________ uses distance vector approach to define routing
· BGP
· OSPF
· RIP
· None of the given
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address
· 3
· 2
· 1
· 0
Protocol addresses are abstractions provided by ___________.
· hardware
· software
· operating system
· internet
Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.
· True
· False
ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.
· 32, 48
· 24, 32
· 32, 64
· 32, 128
In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.
· False
· True
In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· D
· C
· T, C
Which method of Address Resolution Protocol is useful with any hardware?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T
· C
· D
· C, D
In which method of Address Resolution Protocol the implimentation is more difficult?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, C
· T
· C
· D
Which method of Address Resolution Protocol resolution with minimum delay?
Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?
· T, D
· c
· T
· T, C
The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.
· True
· False
To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.
· True
· False
------------- was especially concerned about the lack of high powered computers.
· IEEE
· APRA (wrong spelling)
· EIA
· None
Missing eot indicates sending computer crashed in frame format.
· True
· False
The -------------term refers to the general concept of a small block of data.
· Packets
· Data
· Frame
· None of given
CRC can detect more errors than a simple checksum.
· True
· False
The network that uses a -------------, usually consist of a single long cable to which computer attach.
· Star topology
· Bus topology
· Ring topology
· None of the given
LAN that use ATM technology have a -------------
· Star topology
· Bus topology
· Ring topology
· None of the given
A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.
· Source address, destination address.
· Destination adress, destination address.
· Destination adress, source address.
· source adress, source address.
--------------- has a jitter zero
· Virtual Private Network
· Isochronous Network
· Asynchronous Network
· None of the given
The network with Throughput T and Delay D has a total --------------- bits in transit at a time.
· D + T
· D – T
· D X T
· D / T
One repeater ---------------, two repeaters --------------- the maximum cable length limitation.
· Double, triple
· Double, 4 time
· half, triple
· Double, half
End-to-end delivery service is connection oriented.
· True
· False
A single networking technology is best for all needs.
· True
· False
Twice NAT allows a site to run servers.
· True
· False
________ device is used for multicasting.
· Hub
· Switch
· Router
· none of the given
___________ does not depend on any particular unicast routing protocol.
· PIM-DM
· PIM-SM
· PIM-AM
· none of the given
A routing table contains_______
· The destination network ID
· The hop count to reach the network
· The router ID of the next hop
· All of the given
_______ can be used to propagate information about remote networks.
· Dynamic routing
· Static routing
· Address resolution
· None of the given
________ protocol is designed to use within an organization.
· OSPF
· MEOSPF
· MOSPF
· none of the given
NAPT stands for ________________
· Network Address and Protocol Translation
· Network Address and Port Translation
· Network Address and Packet Translation
· None of the given
In dynamic routing, the routing table is initialized when system boots.
· True
· False
OSPF includes ________ address mask with each address.
· 30Bit
· 32Bit
· 34Bit
· none of the given
Twice NAT fails if an application uses the IP addresses instead of Domain Name.
· True
· False
_________ uses window mechanism to control the flow of data.
· IP
· UDP
· TCP
· none of the given
TCP uses _______ mechanism to control the flow of data.
· door
· window
· acknowledgment
· retransmission
IGPs stand for _________
· Internal Gateway Protocols
· Interior Gateway Protocols
· Intermediate Gateway Protocols
· None of the given
________ protocol uses distance vector algorithm.
· IGP
· BGP
· RIP
· none of the given
__________measures distance in network hops, where each network between the source and destination counts as single hop.
· BGP
· OSPF
· RIP
· Non of these
Network Address Translation (NAT) requires device to perform packet translation.
· True
· False
We use the term _______ to refer to a measure of the path that routing software use when choosing a route.
· routing path
· routing metric
· routing
· switching
Which of the following is a correct representation of the IPv6?
· 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255
· 105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255
· 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256
· 105.220.136.100.255.255.255.255.0.0.18.128.140.10.255
Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.
· 32 bit
· 16 bit
· 8 bit
· 64 bit
Reconstruction of original datagram is called reassembly.
· True
· False
Reliability is the responsibility of the ______ layer.
· Transport
· Network
· Physical
· Internet
_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.
· Flood-and -Prune
· Configuration-and -Tunneling
· Core-Based Discovery
· None of the given
In Direct point to point communication adding the Nth computer requires------------ new connections.
· None of the given
· N2
· N-1
· (N2 –N)/2
The number of connections needed for N computer in direct point to point communication is equal to:
· (N2-N)/2
· N(N-1)
· N2
· None of the given
Hardware that calculates a CRC uses two simple components.
· AND unit and XOR unit
· Shift register and XOR unit
· Shift register and AND unit
· None of the given
The Gigabit Ethernet hardware operates at a rate of --------
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· None of the given
________ computes shortest paths in a graph by using weights on edges as a measure of distance.
· Greedy algorithm
· Distance vector algorithm
· Dijksta's algorithm
· Non of the given
Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.
· Connectionless service paradigm
· Connection-oriented service paradigm
· Both Connectionless and Connection-oriented service paradigm
· None of the given
An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host
· 48-bit
· 32-bit
· 24-bit
· None of the given
The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.
· prefix , suffix
· suffix , prefix
· suffix , suffix
· None of the given
___________ places the boundary between the first and second octets
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the second and third octets.
· Class A
· Class B
· Class C
· Class D
___________ places the boundary between the third and fourth octets.
· Class A
· Class B
· Class C
· Class D
________ field of header indicates whether a datagram is a fragment or a complete datagram.
· FLAGS
· FLAGMENT OFFSET
· IDENTIFICATION
· None of the given
______ provides connectionless service.
· TCP
· UDP
· IP
· None of the given
UDP and TCP are both_________ layer protocols
· Physical
· Data link
· Network
· Transport
________identifies which application program on receiving computer should receive the data
Logical address
· Source port
· Source port
· Destination Port
· None of the given
________ identifies the application program that sent the data.
· Destination Port
· Source port
· Logical address
· None of the given
The Border Gateway Protocol (BGP) uses_________ for all communication
· UDP
· TCP
· Both UDP and TCP
· None of the given
Which of the following protocols allows the sender and receiver to enforce polices.
· RIP
· OSPF
· BGP
· RIP and OSPF
ICMP message transport is acted upon by getting ICMP encrypted in IP.
· True
· False
These ICMP message transport is acted upon ________ as frames on ______
· Intranet, LAN
· Internet, WAN
· Intranet, WAN
· Internet, LAN
Address mask defines how many bits of address are in suffix?
· True
· False
A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?
· True
· False
The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.
· itself
· prefix
· suffix
· mask
Find the class of the address:
11110011 10011011 11111011 00001111
· A
· C
· E
· B
Find the class of the address.
10100111 11011011 10001011 01101111
· A
· B
· E
· C
On of the design goals for unicast route propagation is __________.
· consistency
· inconsistency
· stability
· dynamic addressing
Propagation multicast routing information differs dramatically from unicast route propagation?
· True
· False
The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.
· one or more (????)
· only one
· no
· many
In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.
· Anycast
· Unicast
· Multicast
· Non of the given
Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.
· Unicast
· Anycast
· Multicast
· Non of the given
UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.
· True
· False
The time for acknowledgement to arrival of packet depends on.
· Distance to destination and Current traffic conditions
· Current traffic conditions
· Distance to destination
· non of these
Cost, effort, risks, and resources are the factors included in--------
· Estimation
· Testing
· Development
· Maintenance
Final Quizs
There are _______ possibilities to detect the destination using Trace-route
· 1
· 2
· 3
· None of the given
_______ is used for single destination computer.
· Multicast
· Broadcast
· unicast
· none of the given
·
Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address.
· 16-bit
· 48-bit
· 64-bit
· 128-bit
Which is not the type of error messages defined by ICMP.
· Source quench
· Time exceeded
· Destination unreachable
· none of the given
End to End delivery Service of IP datagram is _____
· Connection oriented
· Connectionless
· both a and b
· none of the given
________ is a type of address used for collection of computers with same prefix.
· Cluster
· unicast
· Multicast
· none of the given
IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram's larger than network
· Destination
· Intermediate routers
· Source
· Medium
_______ Source is responsible for fragmentation.
· IPV4
· IPV6
________ message is sent in response to incoming datagrams with problems.
· TCP/IP
· IGMP
· ICMP
· none of the given
________ field is used to identify a specific path through the network
· FLOW LABEL
· TRAFFIC CLASS
· Both a and b
· none of the given
Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________
· TCP
· UDP
· IP
· None of the given
The process of using a routing table to select a next hop for a given datagram is called __________.
· Encapsulation
· Reassembling
· Routing or forwarding
· None of the given
A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________
· Distance Vector Multicast Routing Protocol (DVMRP)
· Core Based Tree (CBT)
· Protocol Independent Multicast_Sparse Mode (PIM-SM)
· Protocol Independent Multicast_Dense Mode (PIM-DM)
Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.
· postfix, Infix
· non of these
· Infix, prefix
· prefix, suffix
Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________
· None of the given
· TCP
· UDP
· IP
_____ Protocol provides error reporting mechanism.
· IGMP
· SNMP
· ICMP
· none of the given
________ encapsulates IP datagram as data area in hardware frame.
· Network Interface Layer
· Datalink Layer
· Network Layer
· None of the given
TTL stands for __________
· Time to Learn
· Time to Leave
· Time to Live
· none of the given
______ layer Provides reliable delivery of datagram.
· Network
· Transport
· Datalink
· none of the given
Which protocol is used to test different tools.
· ICMP
· IGMP
· TCP/IP
· none of the given
Routers use _______ to forward datagrams along prearranged path.
· Traffic class
· Flow label
· Destination address
· none of the given
NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.
· TRUE
· FALSE
Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.
· Least
· Maximum
· Fragment
· Frame
Postfix defines how much of address used to identify network.
· TRUE
· FALSE
______ contains all information needed to deliver datagram to the destination.
· Header
The Source can configure outgoing datagram's to avoid _________
· Segmentation
· Defragmentation
· Fragmentation
· None of the given
The Current version of IP-Version 4 is _____ old
· 18 years
· 20 years
· 22 years
· none of given
The Header format of IPv6 is entirely different.
· TRUE
· FALSE
_______ shows senders preference for low latency, high Reliability.
· TYPE
· SERVICE TYPE
· SERVICE PRIORITY
· None of the given
The Network Layer Protocol ICMP stands for____________
· Instant Control Message Protocol
· Internet Control Message Protocol
· Initial Control Message Protocol
· None of the given
IPV6 address consists of ________
· 32 Bits
· 64 Bits
· 128 Bits
· none of the given
_______ is a technique used to Limit datagram size to small MTU of any network
· Segmentation
· Fragmentation
· Encapsulation
· none of the given
ICMP message transport is acted upon by getting ICMP _________ in IP.
· De-encapsulated
· Encapsulated
· Segmented
· none of the given
IETF stands for _____________
· Internet Engineering Task Force
· Internal Efficient Task Force
· Internet Engineering Technical Force
· none of the given
Which of the following protocols provide the routing information at the autonomous system level?
· BGP
· OSPF
· RIP
· OSPF and RIP
A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication.
· Unicast
· Multicast
· Broadcast
· Unicast & Multicast
_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted.
· RIP
· OSPF
· BGP
· None of the given
In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data.
· ACKNOWLEGE NUMBER, WINDOW
· SEQUENCE NUMBER, WINDOW
· ACKNOWLGEGE NUMBER, SEQUENCE NUMBER
· None of the given
_________ is used to attach two autonomous systems.
· BGP
· IGP
· EGP
· none of the given
Routing inserts or changes values in _______
· MAC address
· routing table
· both (a) and (b)
· None of the given
NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.
· True
· False
Each autonomous system used to communicate among autonomous systems by chooses an IGP.
· True
· False
Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.
· True
· False
The computer uses _________ to inform Local router about the last application when it leaves.
· ICMP
· IGMP
· SNMP
· None of the given
IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.
· 96
· 100
· 120
· none of the given
For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.
· Efficiency
· Security
· Accuracy
· Anomalies
Class A mask is 255.0.0.0 which is used for ______
· Unicasting
· Multicasting
· Subnetting
· All of the given
When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.
· True
· False
Which one of these is not a main feature of connectionless service:
· It includes extension of LAN abstraction.
· It has universal addressing and the data is delivered in packets frames), each with a header.
· It combines collection of physical networks into a single virtual network.
· It has universal addressing and the data is delivered in packets frames), without a header.
Which one is NOT the function of ping program?
· Traceability
· Reach ability
· Both a and b
· None of the given
A datagram cannot be larger than ________ of a network over which it is sent.
· MTU
· Size
· IP header
· None of the given
MTU Stands for _______
· Minimum transmission unit
· Maximum transmission unit
· Multicast transmission unit
· None of the given
Fragmentation when using ICMP for path MTU should be avoided.
· True
· False
HEADER LEN field gives size of extention header.
· False
· True
The process of learning the path MTU is known as path MTU discovery.
· True
· False
________ is less complex and easy to understand.
· TCP
· UDP
· IP
· None of the given
IPV6 128 bits address includes network prefix and ________
· Host sufix
· Host prefix
· source Prefix
· None of the given
The Universal Datagram is not an end-to-end protocol.
· True
· False
MID Term Papers
Ethernet uses a ____________ static addressing scheme in which each device is assigned a unique address by the manufacturer.
· 64
· 48
· 32
· 8
The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver's hardware to synchronize with the incoming signal.
· 64
· 32
· 16
· 8
The third field of the header consists of ------ bit Ethernet frame type.
· 48
· 32
· 16
· 8
An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.
· BNC- t base 10
· RJ 45- t base 10
· BNC-t base 5
· RJ 45-t base 2
A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.
· Source , destination
· Source , source
· Destination, source
· None from above
Formally named __________ informally known as the thick wire Ethernet or Thick net.
· 10 Base 2
· 10 Base 5
· 10 Base T
· None of the given
Formally named --------------- informally known as thin wire Ethernet or thin net.
· 10 Base 2
· 10 Base 5
· 10 Base T
· None of the given
Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.
· 10 Base 2
· 10 Base 5
· 10 Base T
· None of the given
Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.
· DMA(Direct Memory Access)
· Multiplexer
· Transceiver
· None of the given
A system with redundant bridges might have a problem with_______ in the system.
· Loop
· Filters
· Spamming
· All above
A Bridge can ________
· Filter a frame
· Forward a frame
· Extend a LAN
· Do all the above
________ has a jitter zero
- None of the given
- Virtual Private Network
- Isochronous Network
- Asynchronous Network
Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .
- Connectionless service paradigm
- Connection oriented service paradigm
- Both Connectionless and Connection-oriented service paradigm
- None of the given
ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.
· 21-bit
· 22-bit
· 23-bit
· 24-bit
Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________
· Hierarchal address
· Default route
· Shortest path
· None of the given
The next hop to which a packet is sent depends only on
· Packet's destination
· Packet's original source
· Path the packet has taken
· Non of the given
When an application--------------- data, it makes a copy of the data available to all other computers on the network?
· Broadcasting
· Multicasting
· Unicasting
· None of the given
A ---------- provide a mechanism that a customer can use to set a physical address.
· Static addressing scheme
· Configurable addressing scheme
· Dynamic addressing scheme
· None of the given
_____________ sense a signal on one cable and then transmits an amplified copy on the other cable.
· Repeater
· Bridge
· Hub
· None of the given
The maximum size of an Ethernet segment is___________
· 250 meters
· 500 meters
· 700 meters
· None of the given
FDDI can transmits data at a rate of -----
· 1000 million bits per second
· 100 million bits per second
· 10 million bits per second
· None of the given
Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.
· CSMA/CD
· CSMA/CA
· TOKEN PASSING
· None of the given
-------------- have advantages arisen from the size and ease of computation.
· CRC
· Parity
· Checksums
· None of given
The term -------- is used to denote the definition of a packet used with a specific type of network.
· Packet
· Frame
· Data
· None of the given
------ has no way to determine the cause of the problem.
· Ping
· Trace route
· ICMP
· Non of the given
In -------------, network occupies the smaller area like a room a floor or a building
· LAN
· WAN
· MAN
· None of the given
In ---------, network occupies larger areas like cities & countries.
· LAN
· WAN
· MAN
· None of the given
No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.
· False
· True
A typical port on an ATM switch operates at __________ or higher.
· OC-2 speed (155Mbps)
· OC-3 speed (100Mbps)
· OC-3 speed (155Mbps)
· OC-3 speed (155Gbps)
The product of delay and throughput measures the _____ of data that can be present on the network.
· Area
· Volume
· Length
· None of the given
__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.
· Constant Bit Rate (CBR) service
· Variable Bit Rate (VBR) service
· Available Bit Rate (ABR) service
· None of the given
Which of the following is a connecting device?
· Bridge
· Repeater
· Hub
· All the given
A bridges function in the _________ layers(s).
· Physical (MAC)
· Data link
· Network
· Physical (MAC) and Data link
A Bridge forwards or filters a frame by comparing the information in its address table to the frame's__________
· Layer 2 source address
· Source node's physical address
· Layer 2 destination address
· Layer 3 destination address
IEEE LLC/SNAP header is --------, which is used to specify the type of data.
· 8 octets
· 8 bytes
· 8 bits
· None of the given
An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.
· Explicit frame type
· Ideal frame type
· Implicit frame type
· None of the given
Local Talk is a LAN technology that employs -------------
· Star topology
· Bus topology
· Ring topology
· None of the given
The Fast Ethernet hardware operates at a rate of --------
· 10 Mbps
· 100 Mbps
· 1000 Mbps
· None of the given
---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character
· Parity
· Checksums
· CRC
· None of given
Computer networks are often called -------------- because they use packet technology.
· Ethernet
· Switch networks
· Packet networks
· None of the given
------ Program sends a message to a remote computer and reports whether the computer responds.
· Ping
· Traceroute
· ICMP
· Non of the given
In Point-to-Point topology there are two topologies.
· Tree and Ring
· Star and Ring
· Star and Tree
· None of the given
A network uses a ------arranges for computers to be connected in a closed loop.
· Star Topology
· Ring Topology
· Bus Topology
· None of the given
An interface for thin Ethernet must have an ____________ connector, and must generate signals according to the_____________ specification.
· RJ-45, 10 Base T
· RJ-45, 10 Base 5
· BNC, 10 Base 2
· BNC, 10 Base T
--
--
***Ya Allah! grant us good in this world and good in the hereafter,
and save us from the chastisement of the fire***
---------------------------
Complete QURAN
http://www.quranflash.com/en/quranflash.html
http://tanzil.info
~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~
thanks for joing "vustudy&masti" group.
For group Rules view the link
http://groups.google.com.pk/group/vustudymasti/web/group-rules
To post to this group, send email to vustudymasti@googlegroups.com
Current web address: http://groups.google.com.pk/group/vustudymasti
------------------------------------------------------------------------------------------------
--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
Group Email Address:
Attock-VU-Group@Googlegroups.Com
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████