(82,'IT','Network','Physical Layer',2,'Which transmission media provides the highest transmission speed in a network?','coaxial cable','twisted pair cable','optical fiber','electrical cable',3),
(83,'IT','Network','Physical Layer',3,'Bits can be sent over guided and unguided media as analog signal by ___________','digital modulation','amplitude modulation','frequency modulation','phase modulation',1),
(84,'IT','Network','Physical Layer',4,'The portion of physical layer that interfaces with the media access control sublayer is called ___________','?physical signalling sublayer','physical data sublayer','physical address sublayer','physical transport sublayer',1),
(85,'IT','Network','Physical Layer',5,'The physical layer provides __________','mechanical specifications of electrical connectors and cables','electrical specification of transmission line signal level','specification for IR over optical fiber','?all of the mentioned',4),
(86,'IT','Network','Physical Layer',1,'In asynchronous serial communication the physical layer provides ___________','start and stop signalling','flow control','both start & stop signalling and flow control','?only start signalling',3),
(87,'IT','Network','Physical Layer',2,'The physical layer is responsible for __________','line coding','channel coding','modulation','all of the mentioned',4),
(88,'IT','Network','Physical Layer',3,'The physical layer translates logical communication requests from the ______ into hardware specific operations.','data link layer','network layer','trasnport layer','application layer',1),
(89,'IT','Network','Physical Layer',4,'A single channel is shared by multiple signals by ____________','analog modulation','digital modulation','multiplexing','?phase modulation',3),
(90,'IT','Network','Physical Layer',5,'Wireless transmission of signals can be done via ___________','radio waves','microwaves','infrared','all of the mentioned',4),
(91,'IT','Network','Network Layer',1,'The network layer is concerned with __________ of data.','bits','frames','packets','bytes',3),
(92,'IT','Network','Network Layer',2,'Which one of the following is not a function of network layer?','routing','inter-networking','congestion control','error control',4),
(93,'IT','Network','Network Layer',3,'A 4 byte IP address consists of __________','only network address','only host address','network address & host address','network address & MAC address',3),
(94,'IT','Network','Network Layer',4,'?In virtual circuit network each packet contains ___________','?full source and destination address','a short VC number','only source address','only destination address',2),
(95,'IT','Network','Network Layer',5,'?Which of the following routing algorithms can be used for network layer design?','?shortest path algorithm','distance vector routing','link state routing','all of the mentioned',4),
(96,'IT','Network','Network Layer',1,'Which of the following is not correct in relation to multi-destination routing?','?is same as broadcast routing','contains the list of all destinations','data is not sent by packets','?there are multiple receivers',3),
(97,'IT','Network','Network Layer',2,'A subset of a network that includes all the routers but contains no loops is called ________','spanning tree','spider structure','?spider tree','special tree',1),
(98,'IT','Network','Network Layer',3,'Which one of the following algorithm is not used for congestion control?','?traffic aware routing','admission control','load shedding','routing information protocol',4),
(99,'IT','Network','Network Layer',4,'?The network layer protocol for internet is __________','ethernet','internet protocol','hypertext transfer protocol','file transfer protocol',2),
(100,'IT','Network','Network Layer',5,'ICMP is primarily used for __________','error and diagnostic functions','addressing','forwarding','routing',1),
(101,'IT','Network','Data Link Layer',1,'The data link layer takes the packets from _________ and encapsulates them into frames for transmission','network layer','physical layer','transport layer','application layer',1),
(102,'IT','Network','Data Link Layer',2,'Which of the following tasks is not done by data link layer?','framing','?error control','flow control','channel coding',4),
(103,'IT','Network','Data Link Layer',3,'Which sublayer of the data link layer performs data link functions that depend upon the type of medium?','logical link control sublayer','media access control sublayer','network interface control sublayer','error control sublayer',2),
(104,'IT','Network','Data Link Layer',4,'Header of a frame generally contains ______________','synchronization bytes','addresses','frame identifier','all of the mentioned',4),
(105,'IT','Network','Data Link Layer',5,'Automatic repeat request error management mechanism is provided by ________','?logical link control sublayer','media access control sublayer','network interface control sublayer','application access control sublayer',1),
(106,'IT','Network','Data Link Layer',1,'When 2 or more bits in a data unit has been changed during the transmission, the error is called ____________','random error','burst error','?inverted error','double error',2),
(107,'IT','Network','Data Link Layer',2,'CRC stands for __________','cyclic redundancy check','code repeat check','code redundancy check','cyclic repeat check',1),
(108,'IT','Network','Data Link Layer',3,'Which of the following is a data link protocol?','ethernet','point to point protocol','hdlc','all of the mentioned',4),
(109,'IT','Network','Data Link Layer',4,'Which of the following is the multiple access protocol for channel access control?','CSMA/CD','CSMA/CA','Both CSMA/CD & CSMA/CA','HDLC',3),
(110,'IT','Network','Data Link Layer',5,'The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is called ____________','piggybacking','cyclic redundancy check','fletcher?s checksum','parity check',1),
(111,'IT','Network','Transport Layer',1,'Transport layer aggregates data from different applications into a single stream before passing it to ____________','network layer','data link layer','application layer','physical layer',1),
(112,'IT','Network','Transport Layer',2,'Which of the following are transport layer protocols used in networking?','TCP and FTP','UDP and HTTP','TCP and UDP','HTTP and FTP',3),
(113,'IT','Network','Transport Layer',3,'User datagram protocol is called connectionless because _____________','all UDP packets are treated independently by transport layer','?it sends data as a stream of related packets','?it is received in the same order as sent order','?it sends data very quickly',1),
(114,'IT','Network','Transport Layer',4,'Transmission control protocol ___________','?is a connection-oriented protocol','uses a three way handshake to establish a connection','receives data from application as a single stream','all of the mentioned',4),
(115,'IT','Network','Transport Layer',5,'An endpoint of an inter-process communication flow across a computer network is called __________','socket','pipe','port','machine',1),
(116,'IT','Network','Transport Layer',1,'Socket-style API for windows is called ____________','wsock','?winsock','wins','?sockwi',2),
(117,'IT','Network','Transport Layer',2,'Which one of the following is a version of UDP with congestion control?','datagram congestion control protocol','?stream control transmission protocol','structured stream transport','user congestion control protocol',1),
(118,'IT','Network','Transport Layer',3,'A _____ is a TCP name for a transport service access point.','port','pipe','node','protocol',1),
(119,'IT','Network','Transport Layer',4,'Transport layer protocols deals with ____________','application to application communication','process to process communication','node to node communication','man to man communication',2),
(120,'IT','Network','Transport Layer',5,'Which of the following is a transport layer protocol?','stream control transmission protocol','internet control message protocol','neighbor discovery protocol','dynamic host configuration protocol',1),
(121,'IT','Network','Topology',1,'Physical or logical arrangement of network is __________','Topology','Routing','Networking','Control',1),
(122,'IT','Network','Topology',2,'Which network topology requires a central controller or hub?','Star','Mesh','Ring','Bus',1),
(123,'IT','Network','Topology',3,'?_______ topology requires a multipoint connection.','Star','Mesh','Ring','Bus',4),
(124,'IT','Network','Topology',4,'Data communication system spanning states, countries, or the whole world is ________','LAN','WAN','MAN','PAN',2),
(125,'IT','Network','Topology',5,'Data communication system within a building or campus is________','LAN','WAN','MAN','PAN',1),
(126,'IT','Network','Topology',1,'WAN stands for __________','World area network','Wide area network','Web area network','Web access network',2),
(127,'IT','Network','Topology',2,'In TDM, slots are further divided into __________','Seconds','?Frames','Packets','Bits',2),
(128,'IT','Network','Topology',3,'_____ is the multiplexing technique that shifts each signal to a different carrier frequency.','FDM','TDM','Both FDM & TDM','PDM',1),
(129,'IT','Network','Multiplexing',4,'The sharing of a medium and its link by two or more devices is called _________','Fully duplexing','Multiplexing','Micropleixng','Duplexing',2),
(130,'IT','Network','Multiplexing',5,'Multiplexing is used in _______','Packet switching','Circuit switching','Data switching','Packet & Circuit switching',2),
(131,'IT','Network','Multiplexing',1,'Which multiplexing technique used to transmit digital signals?','FDM','TDM','WDM','FDM & WDM',2),
(132,'IT','Network','Multiplexing',2,'If there are n signal sources of same data rate, then the TDM link has _______ slots.','?n','n/2','n*2','2n',1),
(133,'IT','Network','Multiplexing',3,'If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is _________','32kbps','500bps','?500kbps','32bps',1),
(134,'IT','Network','Multiplexing',4,'The state when dedicated signals are idle are called __________','Death period','Poison period','Silent period','Stop period',3),
(136,'IT','Network','Multiplexing',1,'In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.','Greater than','Lesser than','Equal to','Equal to or greater than',1),
(137,'IT','Network','Multiplexing',2,'In TDM, slots are further divided into _________','Seconds','Frames','Packets','Bits',2),
(138,'IT','Network','Network Attacks',3,'The attacker using a network of compromised devices is known as _____________','?Internet','Botnet','Telnet','D-net',2),
(139,'IT','Network','Network Attacks',4,'Which of the following is a form of DoS attack?','Vulnerability attack','Bandwidth flooding','Connection flooding','All of the mentioned',4),
(140,'IT','Network','Network Attacks',5,'The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________','Vulnerability attack','Bandwidth flooding','Connection flooding','UDP flooding',3),
(141,'IT','Network','Network Attacks',1,'The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________','Vulnerability attack','Bandwidth flooding','Connection flooding','UDP flooding',2),
(143,'IT','Network','Network Attacks',3,'?Sniffers can be prevented by using _______________','Wired environment','WiFi','Ethernet LAN','Switched network',4),
(144,'IT','Network','Network Attacks',4,'Firewalls are often configured to block ___________','UDP traffic','TCP traffic','Sensitive traffic','Best-effort traffic',1),
(145,'IT','Network','Network Attacks',5,'In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?','Propagation delay','Queuing delay','Transmission delay','Processing delay',2),
(146,'IT','OS','Basics',1,'What is operating system?','?collection of programs that manages hardware resources','system service provider to the application programs','link to interface the hardware and application programs','?all of the mentioned',4),
(147,'IT','OS','Basics',2,'To access the services of operating system, the interface is provided by the ___________','System calls','API','Library','Assembly instructions',1),
(148,'IT','OS','Basics',3,'Which one of the following is not true?','kernel is the program that constitutes the central core of the operating system','kernel is the first part of operating system to load into memory during booting','?kernel is made of various modules which can not be loaded in running operating system','?kernel remains in the memory during the entire computer session',3),
(149,'IT','OS','Basics',4,'Which one of the following error will be handle by the operating system?','power failure','lack of paper in printer','connection failure in the network','all of the mentioned',4),
(150,'IT','OS','Basics',5,'What is the main function of the command interpreter?','to get and execute the next user-specified command','to provide the interface between the API and application program','to handle the files in operating system','none of the mentioned',1),
(151,'IT','OS','Basics',1,'?By operating system, the resource management can be done via __________','time division multiplexing','?space division multiplexing','time and space division multiplexing','none of the mentioned',3),
(152,'IT','OS','Basics',2,'If a process fails, most operating system write the error information to a ______','?log file','another running process','new file','none of the mentioned',1),
(153,'IT','OS','Basics',3,'?Which facility dynamically adds probes to a running system, both in user processes and in the kernel?','DTrace','DLocate','DMap','DAdd',1),
(154,'IT','OS','Basics',4,'Which one of the following is not a real time operating system?','VxWorks','Windows CE','RTLinux','Palm OS',4),
(155,'IT','OS','Basics',5,'The OS X has ____________','monolithic kernel','hybrid kernel','microkernel','monolithic kernel with modules',2);