Friday, January 6, 2012

[vu-students] mgt401 4th quiz after midterm mega file

--
You received this message because you are subscribed to the Google
Groups "VU Students" group.
To post to this group, send email to vu-students@googlegroups.com
To unsubscribe from this group, send email to
vu-students+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/vu-students?hl=en_PK?hl=en

Re: (VU-Study-Corner) Click on for 100% free LAPTOP.

http://multiplyfund.com/ref.php?page=act/ref&invcod=5736

On Fri, Jan 6, 2012 at 12:36 PM, bc100400731 Saifullah Khan <bc100400731@vu.edu.pk> wrote:
100% free ipod
http://multiplyfund.com/ref.php?page=act/ref&invcod=5628


On Fri, Jan 6, 2012 at 11:20 AM, bc100401133 Fahad Rasool <bc100401133@vu.edu.pk> wrote:
Click on for 100% free LAPTOP.
 
 

--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.

--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.

--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.

Re: (Attock VU Group) salaam

Luqman bhai yeh aik Idea mila hai .......shayad aap kay kaam ka ho..........
Idea:
1). Assessment of Records or Documents: 
                                                                              Assessment or Inspection of records or documents consists of examining records or documents whether internal or external, in paper form electronic form or other media.
Explanation:
                    This type of inspection provides evidence of unstable degree of reliability depending on their nature and source and in case of internal records an effectiveness of controls over their production.
Reason:
               In this type of audit procedure auditor can inspect according to situation of the statement that the internal control of Star Technologies Limited consists of what type of record which is proved through the statements,
 
"Check the records of the department"
"Check the recording system properly"
"The purchases department receives the information in the shape of an e-mail containing the details about specifications"
"A copy of the order is also files in the purchase database by computerized system"
"Star Technologies keeps their records in proper computerized system"
"Stamps the delivery note with order number, which is then filed in store record"
 
Reference:
Handouts of "Fundamentals of Auditing"(Audit Procedures)


And Question no.1 and Question no. 2 are attempted in this way so search the handouts Lecture no. 22 and Lecture no. 32 as well, for the solution of the questions. 


On Fri, Jan 6, 2012 at 10:23 AM, luckman <bc110201870@vu.edu.pk> wrote:
aj grace day hai pr abi tak koi Acc311 ka idea nahi aya


On Fri, Jan 6, 2012 at 12:03 AM, Shahzad Sadiq <lushahz@gmail.com> wrote:
Irfan bhai ooper aap ko idea diya tau hai............:)

On Thu, Jan 5, 2012 at 8:29 PM, bc090200730 Irfan Pervez <bc090200730@vu.edu.pk> wrote:
snd me the gdb soln of eco 403 plzzzzzzzzzz

--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████



--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████



--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

(Attock VU Group) ...... CS610 subjective part all 2011 paperz---by Shazia Sister......

Assalam o Alaikum...........

Please check the attached file...........
--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

(Attock VU Group) ...... CS610 subjective part all 2011 paperz---by Shazia Sister......

Assalam o Alaikum................

Please check the attached file...........
--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

(Attock VU Group) ............cs403---shared by Shazia Sister...........

Assalam o Alaikum........

CS403 attached file is shared by Shazia Sister
--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

[vu-students] Make your date sheet now ...... MIT VIRTUALIANS



Asslam.o.Alaikum

Dear Virtual University Fellows


Published On: 
 Friday, January 06, 2012

As announced earlier, the web interface for making your date sheet is being placed on the following link:
http://datesheet.vu.edu.pk/

Note: You MUST make your date sheet on or before: Friday, Janurary 13, 2012. Seats will be available on a 'first come first served' basis.


INSTRUCTIONS

  1. Logon using your VULMS ID and Password 
    (In case of any password related problem contact at password@vu.edu.pk)
  2. Choose Your Exam City in which you want to appear for Exam (optional)
  3. Choose your Exam Center out of the centers available to you
    (Once selected, you can not change your Exam Center)
  4. Select available exam date and start time of your own choice for each of your courses, then click "Confirm" button to confirm your selection.
  5. Repeat the Step-4 for all your remaining courses one by one.
  6. Finally click the button at the bottom of the page to get Examination Password and print your Examination Slip which you MUST keep with you for entry in Examination Center on each of the Exam Dates.



--
MIT VIRTUALIANS



--
MIT VIRTUALIANS

--
You received this message because you are subscribed to the Google
Groups "VU Students" group.
To post to this group, send email to vu-students@googlegroups.com
To unsubscribe from this group, send email to
vu-students+unsubscribe@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/vu-students?hl=en_PK?hl=en

*~* VuPak2009 *~* Make your date sheet now ...... MIT VIRTUALIANS



Asslam.o.Alaikum

Dear Virtual University Fellows


Published On: 
 Friday, January 06, 2012

As announced earlier, the web interface for making your date sheet is being placed on the following link:
http://datesheet.vu.edu.pk/

Note: You MUST make your date sheet on or before: Friday, Janurary 13, 2012. Seats will be available on a 'first come first served' basis.


INSTRUCTIONS

  1. Logon using your VULMS ID and Password 
    (In case of any password related problem contact at password@vu.edu.pk)
  2. Choose Your Exam City in which you want to appear for Exam (optional)
  3. Choose your Exam Center out of the centers available to you
    (Once selected, you can not change your Exam Center)
  4. Select available exam date and start time of your own choice for each of your courses, then click "Confirm" button to confirm your selection.
  5. Repeat the Step-4 for all your remaining courses one by one.
  6. Finally click the button at the bottom of the page to get Examination Password and print your Examination Slip which you MUST keep with you for entry in Examination Center on each of the Exam Dates.



--
MIT VIRTUALIANS



--
MIT VIRTUALIANS

--
You received this message because you are subscribed to the Google Groups "Virtual University of Pakistan 2009" group.
To post to this group, send email to virtual-university-of-pakistan-2009@googlegroups.com.
To unsubscribe from this group, send email to virtual-university-of-pakistan-2009+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/virtual-university-of-pakistan-2009?hl=en.

(VU-Study-Corner) Make your date sheet now ...... MIT VIRTUALIANS



Asslam.o.Alaikum

Dear Virtual University Fellows


Published On: 
 Friday, January 06, 2012

As announced earlier, the web interface for making your date sheet is being placed on the following link:
http://datesheet.vu.edu.pk/

Note: You MUST make your date sheet on or before: Friday, Janurary 13, 2012. Seats will be available on a 'first come first served' basis.


INSTRUCTIONS

  1. Logon using your VULMS ID and Password 
    (In case of any password related problem contact at password@vu.edu.pk)
  2. Choose Your Exam City in which you want to appear for Exam (optional)
  3. Choose your Exam Center out of the centers available to you
    (Once selected, you can not change your Exam Center)
  4. Select available exam date and start time of your own choice for each of your courses, then click "Confirm" button to confirm your selection.
  5. Repeat the Step-4 for all your remaining courses one by one.
  6. Finally click the button at the bottom of the page to get Examination Password and print your Examination Slip which you MUST keep with you for entry in Examination Center on each of the Exam Dates.



--
MIT VIRTUALIANS



--
MIT VIRTUALIANS

--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.

Re: (VU-Study-Corner) can any one help me telling about the summer semester in vu?

thanx for ur rply but can u just tell me from which month it starts?? and the duration of this semester? because normally it is not offered, we'll have to apply for it na?

On Thu, Jan 5, 2012 at 7:39 AM, Mohammad Sajjad <ghulamemastan@gmail.com> wrote:
as many as u want...

On Thu, Jan 5, 2012 at 12:46 PM, bc110201412 Hafsa Abdul Wahab <bc110201412@vu.edu.pk> wrote:
Does VU offers any summer semester?? If yes, then how many courses are offered in that semester?

--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.



--

Regard's 
Mohammad Sajjad

jis dawa kita "main"  ala o pal vich ho Iblees(Sheetan) gaya....
oonay yar no wakhraya samja c main q samjha je main howan...


--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.

--
Join us at facebook: https://www.facebook.com/VU.Study.Corner
 
Group Link: http://groups.google.com/group/VU-Study-Corner?hl=en
 
Group Rules: http://groups.google.com/group/VU-Study-Corner/web/group-rules
 
Unsubscribe: VU-Study-Corner+unsubscribe@googlegroups.com
 
Adult contents, Spamming, Immoral & Rudish talk, Cell number, Websites & Groups links specially in paper days are strictly prohibited and banned in group.

(Attock VU Group) Re: (VUStudyMasti) ............... CS610 subjective part all 2011 paperz

Thanks for sharing...........JazakALLAH.........

On Fri, Jan 6, 2012 at 11:24 AM, Shazia <shazia277@gmail.com> wrote:
Attached...........

--
---------------------------
Complete QURAN
http://www.quranflash.com/en/quranflash.html
http://tanzil.info
~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~
thanks for joing "vustudy&masti" group.
For group Rules view the link
http://groups.google.com.pk/group/vustudymasti/web/group-rules
To post to this group, send email to vustudymasti@googlegroups.com
Current web address: http://groups.google.com.pk/group/vustudymasti
------------------------------------------------------------------------------------------------



--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████

(Attock VU Group) Re: (VUStudyMasti) ...............CS610 Solved about 180 MCQs

Thanks for sharing............

On Fri, Jan 6, 2012 at 11:31 AM, Shazia <shazia277@gmail.com> wrote:

Computer Networks (CS610)

 

________ of TCP/IP layering model, corresponds to basic network hardware.

·                     Physical Layer

·                     Network Interface Layer

·                     Internet Layer

·                     Transport Layer

 

_______ protocols of TCP/IP layering model specify how to ensure reliable transfer.

·                     Physical Layer

·                     Network Interface Layer

·                     Internet Layer

·                     Transport Layer

 

________is called an end-to-end protocol because it provide a connection directly from an application on one computer to an application on a remote computer.

·                     IP

·                     UDP

·                     TCP

·                     None of the given

 

____________ uses distance vector approach to define routing

·                     BGP

·                     OSPF

·                     RIP

·                     None of the given

 

_______ is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

·                     Flood-and -Prune

·                     Configuration-and -Tunneling

·                     Core-Based Discovery

·                     None of the given

 

Router that decrements TTL to __ sends ICMP time exceeded message, with router s address as source address

·                     3

·                     2

·                     1

·                     0

 

Protocol addresses are abstractions provided by ___________.

·                     hardware

·                     software

·                     operating system

·                     internet

 

Although message exchange can be used to bind addresses, sending a request for each binding is hopelessly inefficient.

·                     True

·                     False

 

ARP is almost always used to bind a ___-bit IP address to a ___-bit Ethernet address.

·                     32, 48

·                     24, 32

·                     32, 64

·                     32, 128

 

In the 1970s large organizations began to acquire multiple networks. Each network in the organization formed island. Employees needed to choose a computer appropriate for each task. So they needed multiple screens, keyboards and computers.

·                     False

·                     True

 

In which method of Address Resolution Protocol the protocol address is determined by hardware address? Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T

·                     D

·                     C

·                     T, C

 

Which method of Address Resolution Protocol is useful with any hardware?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T

·                     C

·                     D

·                     C, D

 

In which method of Address Resolution Protocol the implimentation is more difficult?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T, C

·                     T

·                     C

·                     D

 

Which method of Address Resolution Protocol resolution with minimum delay?

Were "T" stands for Table lookup, "C" for Closed-form Computation and "D" for Data Exchange?

·                     T, D

·                     c

·                     T

·                     T, C

 

The general form of an IP datagram is with a header followed by data. The header contains information that controls where and how the datagram is to be sent.

·                     True

·                     False

 

To save traffic, an EGP does not summerize routing information from the autonomous system before passing it to another autonomous system.

·                     True

·                     False

 

------------- was especially concerned about the lack of high powered computers.

·                     IEEE

·                     APRA (wrong spelling)

·                     EIA

·                     None

 

Missing eot indicates sending computer crashed in frame format.

·                     True

·                     False

 

The -------------term refers to the general concept of a small block of data.

·                     Packets

·                     Data

·                     Frame

·                     None of given

 

CRC can detect more errors than a simple checksum.

·                     True

·                     False

 

The network that uses a -------------, usually consist of a single long cable to which computer attach.

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

LAN that use ATM technology have a -------------

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

A bridge uses --------------- to determine which computer is connected to which segment, and uses the --------------- to determine whether to forward a copy of frame.

·                     Source address, destination address.

·                     Destination adress, destination address.

·                     Destination adress, source address.

·                     source adress, source address.

 

--------------- has a jitter zero

·                     Virtual Private Network

·                     Isochronous Network

·                     Asynchronous Network

·                     None of the given

 

The network with Throughput T and Delay D has a total --------------- bits in transit at a time.

·                     D + T

·                     D – T

·                     D X T

·                     D / T

 

One repeater ---------------, two repeaters --------------- the maximum cable length limitation.

·                     Double, triple

·                     Double, 4 time

·                     half, triple

·                     Double, half

 

End-to-end delivery service is connection oriented.

·                     True

·                     False

 

A single networking technology is best for all needs.

·                     True

·                     False

 

Twice NAT allows a site to run servers. 

·                     True

·                     False

 

________ device is used for multicasting. 

·                     Hub

·                     Switch

·                     Router

·                     none of the given

 

___________ does not depend on any particular unicast routing protocol. 

·                     PIM-DM

·                     PIM-SM

·                     PIM-AM

·                     none of the given

 

A routing table contains_______ 

·                     The destination network ID

·                     The hop count to reach the network

·                     The router ID of the next hop

·                     All of the given

 

_______ can be used to propagate information about remote networks. 

·                     Dynamic routing

·                     Static routing

·                     Address resolution

·                     None of the given

 

________ protocol is designed to use within an organization. 

·                     OSPF

·                     MEOSPF

·                     MOSPF

·                     none of the given

 

NAPT stands for ________________ 

·                     Network Address and Protocol Translation

·                     Network Address and Port Translation

·                     Network Address and Packet Translation

·                     None of the given

 

In dynamic routing, the routing table is initialized when system boots. 

·                     True

·                     False

 

OSPF includes ________ address mask with each address. 

·                     30Bit

·                     32Bit

·                     34Bit

·                     none of the given

 

Twice NAT fails if an application uses the IP addresses instead of Domain Name. 

·                     True

·                     False

 

_________ uses window mechanism to control the flow of data. 

·                     IP

·                     UDP

·                     TCP

·                     none of the given

 

TCP uses _______ mechanism to control the flow of data.

·                     door

·                     window

·                     acknowledgment

·                     retransmission

 

IGPs stand for _________ 

·                     Internal Gateway Protocols 

·                     Interior Gateway Protocols

·                     Intermediate Gateway Protocols 

·                     None of the given

 

________ protocol uses distance vector algorithm. 

·                     IGP

·                     BGP

·                     RIP

·                     none of the given

 

__________measures distance in network hops, where each network between the source and destination counts as single hop. 

·                     BGP

·                     OSPF

·                     RIP

·                     Non of these

 

Network Address Translation (NAT) requires device to perform packet translation. 

·                     True

·                     False

 

We use the term _______ to refer to a measure of the path that routing software use when choosing a route.

·                     routing path

·                     routing metric

·                     routing

·                     switching

 

Which of the following is a correct representation of the IPv6?

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255

·                     105.220.136.100.255.255.255.256.0.0.18.128.140.10.255.255

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255.255.256

·                     105.220.136.100.255.255.255.255.0.0.18.128.140.10.255

 

Part of the 3-way handshake used to create a connection, requires each end to generate a random _____ sequence number.

·                     32 bit

·                     16 bit

·                     8 bit

·                     64 bit

 

Reconstruction of original datagram is called reassembly.

·                     True

·                     False

 

Reliability is the responsibility of the ______ layer.

·                     Transport

·                     Network

·                     Physical

·                     Internet

 

_______    is ideal in a situation where the group is small and all members are attached to contiguous Local Area Networks.

·                     Flood-and -Prune

·                     Configuration-and -Tunneling

·                     Core-Based Discovery

·                     None of the given

 

In Direct point to point communication adding the Nth computer requires------------ new connections.

·                     None of the given

·                     N2

·                     N-1

·                     (N2 –N)/2

 

The number of connections needed for N computer in direct point to point communication is equal to:

·                     (N2-N)/2

·                     N(N-1)

·                     N2

·                     None of the given

 

Hardware that calculates a CRC uses two simple components.

·                     AND unit and XOR unit

·                     Shift register and XOR unit

·                     Shift register and AND unit

·                     None of the given

 

The Gigabit Ethernet hardware operates at a rate of --------

·                     10 Mbps

·                     100 Mbps

·                     1000 Mbps

·                     None of the given

 

________ computes shortest paths in a graph by using weights on edges as a measure of distance.

·                     Greedy algorithm

·                     Distance vector algorithm

·                     Dijksta's algorithm

·                     Non of the given

 

Basic LAN technologies such as Ethernet, Token Ring, and FDDI use a _____.

·                     Connectionless service paradigm

·                     Connection-oriented service paradigm

·                     Both Connectionless and Connection-oriented service paradigm

·                     None of the given

 

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host

·                     48-bit

·                     32-bit

·                     24-bit

·                     None of the given

 

The address __________ identifies the physical network to which the computer is attached, while the _______ identifies an individual computer on that network.

·                     prefix , suffix

·                     suffix , prefix

·                     suffix , suffix

·                     None of the given

 

___________ places the boundary between the first and second octets

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

___________ places the boundary between the second and third octets.

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

___________ places the boundary between the third and fourth octets.

·                     Class A

·                     Class B

·                     Class C

·                     Class D

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.

·                     FLAGS

·                     FLAGMENT OFFSET

·                     IDENTIFICATION

·                     None of the given

 

______ provides connectionless service.

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

UDP and TCP are both_________ layer protocols

·                     Physical

·                     Data link

·                     Network

·                     Transport

 

________identifies which application program on receiving computer should receive the data

Logical address

·                     Source port

·                     Source port

·                     Destination Port

·                     None of the given

 

________ identifies the application program that sent the data.

·                     Destination Port

·                     Source port

·                     Logical address

·                     None of the given

 

The Border Gateway Protocol (BGP) uses_________ for all communication

·                     UDP

·                     TCP

·                     Both UDP and TCP

·                     None of the given

 

Which of the following protocols allows the sender and receiver to enforce polices.

·                     RIP

·                     OSPF

·                     BGP

·                     RIP and OSPF

 

ICMP message transport is acted upon by getting ICMP encrypted in IP.

·                     True

·                     False

 

These ICMP message transport is acted upon ________ as frames on ______

·                     Intranet, LAN

·                     Internet, WAN

·                     Intranet, WAN

·                     Internet, LAN

 

Address mask defines how many bits of address are in suffix?

·                     True

·                     False

 

A computer attached to a given network can only communicate with other computers attached to the same network. Is this a problem with multiple networks?

·                     True

·                     False

 

The term self-identifying is used for Classful IP addresses because the class of the address can be computed from the address__________.

·                     itself

·                     prefix

·                     suffix

·                     mask

 

Find the class of the address:

11110011 10011011 11111011 00001111

·                     A

·                     C

·                     E

·                     B

 

Find the class of the address.

10100111 11011011 10001011 01101111

·                     A

·                     B

·                     E

·                     C

 

On of the design goals for unicast route propagation is __________.

·                     consistency

·                     inconsistency

·                     stability

·                     dynamic addressing

 

Propagation multicast routing information differs dramatically from unicast route propagation?

·                     True

·                     False

 

The IP multicast abstraction allows an application running on an arbitrary computer to leave a multicast group at any time. While _____________ application on a computer remain a member of a group.

·                     one or more (????)

·                     only one

·                     no

·                     many

 

In IPv6 the type of address used for collection of computers with same prefix. Are known as_________.

·                     Anycast

·                     Unicast

·                     Multicast

·                     Non of the given

 

Special types of addresses in IPv6 used for multiple destinations; possibly not at same site. Are known as_________.

·                     Unicast

·                     Anycast

·                     Multicast

·                     Non of the given

 

UDP offers application programs a Message-Oriented Interface, applications can depend on protocol to preserve data boundaries.

·                     True

·                     False

 

The time for acknowledgement to arrival of packet depends on.

·                     Distance to destination and Current traffic conditions

·                     Current traffic conditions

·                     Distance to destination

·                     non of these

 

Cost, effort, risks, and resources are the factors included in--------

·                     Estimation

·                     Testing

·                     Development

·                     Maintenance

 

 

Final Quizs

 

 

There are _______ possibilities to detect the destination using Trace-route 

·                     1 

·                     2

·                     3 

·                     None of the given 

 

 _______ is used for single destination computer. 

·                     Multicast

·                     Broadcast

·                     unicast

·                     none of the given

·                      

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware addresses. ARP is almost always used to bind a 32-bit IP address to a ____ Ethernet address. 

·                     16-bit

·                     48-bit

·                     64-bit

·                     128-bit

 

Which is not the type of error messages defined by ICMP. 

·                     Source quench

·                     Time exceeded

·                     Destination unreachable

·                     none of the given

 

End to End delivery Service of IP datagram is _____ 

·                     Connection oriented

·                     Connectionless

·                     both a and b

·                     none of the given

 

________ is a type of address used for collection of computers with same prefix. 

·                     Cluster

·                     unicast

·                     Multicast

·                     none of the given

IPv6 ______________ is responsible for fragmentation. Routers simply drop datagram's larger than network 

·                     Destination

·                     Intermediate routers

·                     Source

·                     Medium

 

_______ Source is responsible for fragmentation. 

·                     IPV4

·                     IPV6

 

________ message is sent in response to incoming datagrams with problems. 

·                     TCP/IP 

·                     IGMP

·                     ICMP

·                     none of the given

 

 ________ field is used to identify a specific path through the network 

·                     FLOW LABEL

·                     TRAFFIC CLASS

·                     Both a and b

·                     none of the given

 

Connectionless service, Message-Oriented protocol, best-effort delivery service, arbitrary interaction & operating system independent are the characteristics of ___________________

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

The process of using a routing table to select a next hop for a given datagram is called __________.

·                     Encapsulation

·                     Reassembling

·                     Routing or forwarding

·                     None of the given

 

A multicast routing scheme in which the protocol software builds a delivery tree from a central point is called __________

·                     Distance Vector Multicast Routing Protocol (DVMRP)

·                     Core Based Tree (CBT)

·                     Protocol Independent Multicast_Sparse Mode (PIM-SM)

·                     Protocol Independent Multicast_Dense Mode (PIM-DM)

 

Whenever it handles a packet, IP software needs to separate the destination address into a _________ and ___________.

·                     postfix, Infix

·                     non of these

·                     Infix, prefix

·                     prefix, suffix

 

Connection-oriented service, Point-to-point, Complete reliability, Full-duplex communication, Stream interface, Reliable connection startup and Graceful connection shutdown are the services provided by__________

·                     None of the given

·                     TCP

·                     UDP

·                     IP

 

_____ Protocol provides error reporting mechanism.

·                     IGMP

·                     SNMP

·                     ICMP

·                     none of the given

 

________ encapsulates IP datagram as data area in hardware frame.

·                     Network Interface Layer

·                     Datalink Layer

·                     Network Layer

·                     None of the given

 

TTL stands for __________

·                     Time to Learn

·                     Time to Leave

·                     Time to Live

·                     none of the given

 

______ layer Provides reliable delivery of datagram.

·                     Network

·                     Transport

·                     Datalink

·                     none of the given

 

Which protocol is used to test different tools.

·                     ICMP

·                     IGMP

·                     TCP/IP

·                     none of the given

 

Routers use _______ to forward datagrams along prearranged path.

·                     Traffic class

·                     Flow label

·                     Destination address

·                     none of the given

 

NEXT HEADER field in the base header defines type of header it appears at the end of fixed-size base header.

·                     TRUE

·                     FALSE

 

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the ____________ Transmission Unit.

·                     Least

·                     Maximum

·                     Fragment

·                     Frame

 

Postfix defines how much of address used to identify network.

·                     TRUE

·                     FALSE

 

______ contains all information needed to deliver datagram to the destination.

·                     Header

 

The Source can configure outgoing datagram's to avoid _________

·                     Segmentation

·                     Defragmentation

·                     Fragmentation

·                     None of the given

 

The Current version of IP-Version 4 is _____ old

·                     18 years

·                     20 years

·                     22 years

·                     none of given

 

The Header format of IPv6 is entirely different.

·                     TRUE

·                     FALSE

 

_______ shows senders preference for low latency, high Reliability.

·                     TYPE

·                     SERVICE TYPE

·                     SERVICE PRIORITY

·                     None of the given

 

The Network Layer Protocol ICMP stands for____________

·                     Instant Control Message Protocol

·                     Internet Control Message Protocol

·                     Initial Control Message Protocol

·                     None of the given

 

IPV6 address consists of ________

·                     32 Bits

·                     64 Bits

·                     128 Bits

·                     none of the given

 

_______ is a technique used to Limit datagram size to small MTU of any network

·                     Segmentation

·                     Fragmentation

·                     Encapsulation

·                     none of the given

 

ICMP message transport is acted upon by getting ICMP _________ in IP.

·                     De-encapsulated

·                     Encapsulated

·                     Segmented

·                     none of the given

 

IETF stands for _____________ 

·                     Internet Engineering Task Force

·                     Internal Efficient Task Force

·                     Internet Engineering Technical Force

·                     none of the given

 

Which of the following protocols provide the routing information at the autonomous system level? 

·                     BGP

·                     OSPF

·                     RIP

·                     OSPF and RIP

 

A one-to-many communication between a source and a specific group of hosts is classified as a_______ communication. 

·                     Unicast

·                     Multicast

·                     Broadcast

·                     Unicast & Multicast

 

_______ includes a 32-bits address mask with each address, which allows the address to be classful, classless, or subnetted. 

·                     RIP

·                     OSPF

·                     BGP

·                     None of the given

 

In TCP when a computer sends a segment, the__________ and _______ fields refer to incoming data. 

·                     ACKNOWLEGE NUMBER, WINDOW

·                     SEQUENCE NUMBER, WINDOW

·                     ACKNOWLGEGE NUMBER, SEQUENCE NUMBER

·                     None of the given

 

 _________ is used to attach two autonomous systems.

·                     BGP

·                     IGP

·                     EGP

·                     none of the given

 

Routing inserts or changes values in _______

·                     MAC address

·                     routing table

·                     both (a) and (b)

·                     None of the given

 

NAT software does not allow a PC to connect with the Internet and act as a NAT device at the same time.

·                     True

·                     False

 

Each autonomous system used to communicate among autonomous systems by chooses an IGP.

·                     True

·                     False

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

·                     True

·                     False

 

The computer uses _________ to inform Local router about the last application when it leaves.

·                     ICMP

·                     IGMP

·                     SNMP

·                     None of the given

 

IPV6 address with ______ leading zeros is interpreted to hold an IPV4 address.

·                     96

·                     100

·                     120

·                     none of the given

 

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

·                     Efficiency

·                     Security

·                     Accuracy

·                     Anomalies

 

Class A mask is 255.0.0.0 which is used for ______

·                     Unicasting

·                     Multicasting

·                     Subnetting

·                     All of the given

 

When one computer sends an ARP message to another the message travels inside the hardware frame. Technically, placing a message inside a frame for transport is not called encapsulation.

·                     True

·                     False

 

Which one of these is not a main feature of connectionless service:

·                     It includes extension of LAN abstraction.

·                     It has universal addressing and the data is delivered in packets frames), each with a header.

·                     It combines collection of physical networks into a single virtual network.

·                     It has universal addressing and the data is delivered in packets frames), without a header.

 

Which one is NOT the function of ping program?

·                     Traceability

·                     Reach ability

·                     Both a and b

·                     None of the given

 

A datagram cannot be larger than ________ of a network over which it is sent.

·                     MTU

·                     Size

·                     IP header

·                     None of the given

 

MTU Stands for _______

·                     Minimum transmission unit

·                     Maximum transmission unit

·                     Multicast transmission unit

·                     None of the given

 

Fragmentation when using ICMP for path MTU should be avoided.

·                     True

·                     False

 

HEADER LEN field gives size of extention header.

·                     False

·                     True

 

The process of learning the path MTU is known as path MTU discovery.

·                     True

·                     False

 

________ is less complex and easy to understand.

·                     TCP

·                     UDP

·                     IP

·                     None of the given

 

IPV6 128 bits address includes network prefix and ________

·                     Host sufix

·                     Host prefix

·                     source Prefix

·                     None of the given

 

The Universal Datagram is not an end-to-end protocol.

·                     True

·                     False

 

 

MID Term Papers

 

Ethernet uses a ____________ static addressing scheme in which each device is assigned a unique address by the manufacturer.

·                     64

·                     48

·                     32

·                     8

 

The --------- bit preamble in the Ethernet frame format that precedes the frame contains alternating 1s and 0s that allow the receiver's hardware to synchronize with the incoming signal.

·                     64

·                     32

·                     16

·                     8

 

The third field of the header consists of ------ bit Ethernet frame type.

·                     48

·                     32

·                     16

·                     8

 

An interface for twisted pair Ethernet must have a ____________ connector, and must generate signals according to the_____________ specification.

 

·                     BNC- t base 10

·                     RJ 45- t base 10

·                     BNC-t base 5

·                     RJ 45-t base 2

 

A bridge uses the ___________ to determine which computers connect to which segment, and uses the __________ to determine whether to forward a copy of frame.

 

·                     Source , destination

·                     Source , source

·                     Destination, source

·                     None from above

 

Formally named __________ informally known as the thick wire Ethernet or Thick net.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Formally named --------------- informally known as thin wire Ethernet or thin net.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Formally named __________ informally known as the twisted pair Ethernet or TP Ethernet.

·                     10 Base 2

·                     10 Base 5

·                     10 Base T

·                     None of the given

 

Most NICs contain _______________ circuitry that allows the NIC to operate independent of the CPU.

·                     DMA(Direct Memory Access)

·                     Multiplexer

·                     Transceiver

·                     None of the given

 

A system with redundant bridges might have a problem with_______ in the system.

·                     Loop

·                     Filters

·                     Spamming

·                     All above

 

A Bridge can ________

·                     Filter a frame

·                     Forward a frame

·                     Extend a LAN

·                     Do all the above

 

________ has a jitter zero

  • None of the given
  • Virtual Private Network
  • Isochronous Network
  • Asynchronous Network

 

Unlike Frame Relay and ATM, SMDS (Switched multi-megabit Data service) offers_______ .

  • Connectionless service paradigm
  • Connection oriented service paradigm
  • Both Connectionless and Connection-oriented service paradigm
  • None of the given

 

ATM assigns each VC a _____________ identifier that is divided two parts to produce a hierarchy.

·                     21-bit

·                     22-bit

·                     23-bit

·                     24-bit

 

Most WAN systems include a mechanism that can be used to eliminate the common case of duplication routing is called___________

·                     Hierarchal address

·                     Default route

·                     Shortest path

·                     None of the given

 

The next hop to which a packet is sent depends only on

·                     Packet's destination

·                     Packet's original source

·                     Path the packet has taken

·                     Non of the given

 

When an application--------------- data, it makes a copy of the data available to all other computers on the network?

·                     Broadcasting

·                     Multicasting

·                     Unicasting

·                     None of the given

 

A ----------  provide a mechanism that a customer can use to set a physical  address.

·                     Static addressing scheme

·                     Configurable addressing scheme

·                     Dynamic addressing scheme

·                     None of the given

 

_____________ sense a signal on one cable and then transmits an amplified copy on the other cable.

·                     Repeater

·                     Bridge

·                     Hub

·                     None of the given

 

The maximum size of an Ethernet segment is___________

·                     250 meters

·                     500 meters

·                     700 meters

·                     None of the given

 

FDDI can transmits data at a rate of -----

·                     1000 million bits per second

·                     100 million bits per second

·                     10 million bits per second

·                     None of the given

 

Computers attached to an ether use ------ in which a computer waits for the ether to be idle before transmitting a frame.

·                     CSMA/CD

·                     CSMA/CA

·                     TOKEN PASSING

·                     None of the given

 

-------------- have advantages arisen from the size and ease of computation.

·                     CRC

·                     Parity

·                     Checksums

·                     None of given

 

The term -------- is used to denote the definition of a packet used with a specific type of network.

·                     Packet

·                     Frame

·                     Data

·                     None of the given

 

------ has no way to determine the cause of the problem.

·                     Ping

·                     Trace route

·                     ICMP

·                     Non of the given

 

In -------------, network occupies the smaller area like a room a floor or a building

·                     LAN

·                     WAN

·                     MAN

·                     None of the given

 

In ---------, network occupies larger areas like cities & countries.

·                     LAN

·                     WAN

·                     MAN

·                     None of the given

 

No error detection scheme is perfect because transmission errors can affect the additional information as well as the data.

·                     False

·                     True

 

A typical port on an ATM switch operates at __________ or higher.

·                     OC-2 speed (155Mbps)

·                     OC-3 speed (100Mbps)

·                     OC-3 speed (155Mbps)

·                     OC-3 speed (155Gbps)

 

The product of delay and throughput measures the _____ of data that can be present on the network.

·                     Area

·                     Volume

·                     Length

·                     None of the given

 

__________is used for compressed audio and video where the data rate depends on the level of compression that can be achieved.

·                     Constant Bit Rate (CBR) service

·                     Variable Bit Rate (VBR) service

·                     Available Bit Rate (ABR) service

·                     None of the given

 

Which of the following is a connecting device?

·                     Bridge

·                     Repeater

·                     Hub

·                     All the given

 

A bridges function in the _________ layers(s).

·                     Physical (MAC)

·                     Data link

·                     Network

·                     Physical (MAC) and Data link

 

A Bridge forwards or filters a frame by comparing the information in its address table to the frame's__________

·                     Layer 2 source address

·                     Source node's physical address

·                     Layer 2 destination address

·                     Layer 3 destination address

 

IEEE LLC/SNAP header is --------, which is used to specify the type of data.

·                     8 octets

·                     8 bytes

·                     8 bits

·                     None of the given

 

An ------------method, the network hardware designers specify how type information is included in the frame and the value use to identify various frame types.

·                     Explicit frame type

·                     Ideal frame type

·                     Implicit frame type

·                     None of the given

 

Local Talk is a LAN technology that employs -------------

·                     Star topology

·                     Bus topology

·                     Ring topology

·                     None of the given

 

The Fast Ethernet hardware operates at a rate of --------

·                     10 Mbps

·                     100 Mbps

·                     1000 Mbps

·                     None of the given

 

---------- scheme, which is designed to help detect transmissions errors, send one extra bit of information with each character

·                     Parity

·                     Checksums

·                     CRC

·                     None of given

 

Computer networks are often called -------------- because they use packet technology.

·                     Ethernet

·                     Switch networks

·                     Packet networks

·                     None of the given

 

------ Program sends a message to a remote computer and reports whether the computer responds.

·                     Ping

·                     Traceroute

·                     ICMP

·                     Non of the given

 

In Point-to-Point topology there are two topologies.

·                     Tree and Ring

·                     Star and Ring

·                     Star and Tree

·                     None of  the given

 

A network uses a ------arranges for computers to be connected in a closed loop.

·                     Star Topology

·                     Ring Topology

·                     Bus Topology

·                     None of the given

 

An interface for thin Ethernet must have an ____________ connector, and must generate signals according to the_____________ specification.

·                     RJ-45, 10 Base T

·                     RJ-45, 10 Base 5

·                     BNC, 10 Base 2

·                     BNC, 10 Base T

 

--
--



--






***Ya Allah! grant us good in this world and good in the hereafter,
and save us from the chastisement of the fire***

--
---------------------------
Complete QURAN
http://www.quranflash.com/en/quranflash.html
http://tanzil.info
~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~~*~*~*~
thanks for joing "vustudy&masti" group.
For group Rules view the link
http://groups.google.com.pk/group/vustudymasti/web/group-rules
To post to this group, send email to vustudymasti@googlegroups.com
Current web address: http://groups.google.com.pk/group/vustudymasti
------------------------------------------------------------------------------------------------



--










--
██████████████████ Basic Group Rules ███████████████████
Immoral & Rudish talk, Earning program links, Cell number for friendship purpose, Websites/Groups Links, Adult contents, Criticize-able Islamic stuff, Spreading disruption, Spamming are strictly prohibited and banned in group.
█████████████████████████████████████████████████
 
Follow these detailed Group Rules, otherwise you will be banned at any time.
https://docs.google.com/document/d/1YJxA8x3_U7C1lRc0EXfLrJpco4A1XkB1vDxOTqOd3Jg/edit?hl=en&authkey=CNDy9tkJ
 
Group Email Address:
Attock-VU-Group@Googlegroups.Com
 
Join group by sending a blank email from University ID at:
Attock-VU-Group+Subscribe@Googlegroups.Com
 
Join us at http://www.Vusr.net for Papers,Assignments,GDBs, Quizes.
 
████████████ Click here to Join this group at Facebook:████████████
♥ ♥ ♥ https://www.facebook.com/home.php?sk=group_111877855568034 ♥ ♥ ♥
█████████████████████████████████████████████████