Sei sulla pagina 1di 5

Q.

THE FLAG BIT PATTERN IN FRAME FORMAT OF HDLC IS A) 01111110 B) 10000001 C) 01111111 D) 10000000 THE NETWORK AREA WITHIN WHICH DATA PACKETS ORIGINATES AND COLLIDE IS CALLED AS A) COLLISION DOMAIN B) ROUTERS C) MAC D) FILTER IN WHICH MODE DATA IS PERMITTED TO FLOW IN EITHER DIRECTION, BUT NOT SIMULTANEOUSLY A) SIMPLEX MODE B) HALF-DUPLEX MODE C) FULL-DUPLEX MODE D) NONE OF THE ABOVE IN TOKEN BUS THE ACCESS CONTROL IS IMPLEMENTED BY PASSING OF A SPECIAL CONTROL SEQUENCE CALLED A) TOKEN B) FDDI C) IEEE D) NONE OF THE ABOVE WHAT IS ACROYMN FOR FDDI A) FIBRE DISTRIBUTING DATA INTERFACE B) FIBRE DISTRIBUTED DATA INTERFACE C) FIBRE DISTRIBUT DATA INTERFACE D) FIBRED DISTRIBUTING DATA INTERFACED HOW MANY NUMBERS OF LAYERS ARE PRESENT IN OSI REFERENCE MODEL A) FOUR B) FIVE C) SEVEN D) EIGHT WHICH OF THE FOLLOWING CAN BE THE TYPES OF TRANSMISSION TECHNOLOGY A) BROADCAST NETWORKS B) POINT TO POINT NETWORKS C) BOTH A AND B D) NONE OF THE ABOVE WHAT IS THE DATA THROUGHPUT SPEED FOR LEVEL 5 UTP CABLE A) 150 MBPS B) 100 MBPS C) 200 MBPS D) NONE OF THE ABOVE

Q. 2

Q. 10 WHICH TOPOLOGY IS THE MOST DIFFICULT TOPOLOGY TO IMPLEMENT AS THE NUMBER OF NODES INCREASE A) STAR B) MESH C) LINEAR BUS D) RING Q. 1 SNMP MODEL CONSISTS OF HOW MANY NUMBER OF COMPONENTS A) 4 B) 5 C) 6 D) 7 Q. 2 WHICH OF THE FOLLOWING LAYERS DOES TCP/IP HAS 1) PRESENTATION LAYER 2) APPLICATION LAYER 3) TRANSPORT LAYER 4) DATALINK LAYER 5) PHYSICAL LAYER 6) SESSION LAYER 7) NETWORK LAYER A) 1,2,3,5 B) 2,3,5,7 C) 2,3,4,7 D) 2,4,5,7 Q. 3 HAS IN LIST ORIENTED APPROACH EACH RESOURCE A) B) C) D) TICKET AND LIST ACCESS CONTROL LIST IDENTIFICATION NONE OF THE ABOVE ANSWERS THE RARP REQUESTS IN A RARP SERVER RARP CLIENT RARP ARP

Q. 2 INTERNET BROADLY HAS WHICH OF THE FOLLOWING APPLICATION AREAS 1) E-MAIL 2) NEWS 3) REMOTE LOGIN 4) FILE TRANSFER 5) HYPERTEXT TRANSFER A) 1,2,3,4,5 B) 1,2,3,4 C) 1,2,3,5 D) 1,2,4 Q. 3 WHICH OF THE FOLLOWING IS CONTENTS OF ONES DIGITAL CERTIFICATE INCLUDES 1) HOLDERS NAME, ORGANIZATION, ADDRESS 2) THE NAME OF CERTIFICATE AUTHORITY 3) PUBLIC KEY OF THE HOLDERS FOR CRYPTOGRAPHIC USE 4) TIME LIMIT, THESE CERTIFICATE ARE IS A) 1,2,3,4,5 B) 1,2,3,4,5,6 C) 1,2,3,4,6 D) 1,2,4,5,6 Q. 4 OUT OF THE FIVE PHASES GIVEN BELOW, WHICH TWO PHASES ARE DEFINED BY THE TRANSMISSION CONTROL PROCEDURE 1) CONNECT TO TRANSMISSION LINE 2) ESTABLISH DATA LINK 3) TRANSMIT INFORMATION 4) RELEASE DATA LINK 5) DISCONNECT FROM TRANSMISSION A) 1,3 B) 2,4 C) 3,5 D) 1,4 Q. 5 WHAT IS A SALIENT FEATURES OF ACCOUNT POLICY 1) MINIMUM PASSWORD LENGTH 2) LOCK OUT AFTER A PARTICULAR NUMBER OF BAD LOGONS ATTEMPTS 3) LOCK OUT DURATION 4) MAXIMUM PASSWORD AGE 5) PASSWORD UNIQUENESS A) 1,2,3,4 B) 1,2,3,5 C) 1,2,3,4,5 D) NONE OF THE ABOVE

Q. 3

Q. 4

Q. 5

Q. 6

Q. 4 WHO NETWORK A) B) C) D) Q. 5

Q. 7

Q. 8

Q. 9 IN WHICH TOPOLOGY EACH NODE IS CONNECTED TO A SINGLE, CENTRALLY LOCATED FILE SERVER A) STAR B) MESH C) LINEAR BUS D) RING

Q. 1 A 1) PHYSICAL 2) NETWORK 3) TRANSPORT 4) APPLICATION B I) ETHERNET, TOKEN RING II) IP III) TCP, UDP IV) HTTP, FTP A) 1-I, 2-II, 3-III, 4-IV B) 1-I, 2-III, 3-II, 4-IV C) 1-II, 2-I, 3-III, 4-IV D) 1-I, 2-II, 3-IV, 4-III

SERIAL BACKBONE IS ALSO KNOWN AS A) DAISY CHAINING B) SERVER FARM C) ROUTER D) NONE OF THE ABOVE MATCH THE FOLLOWING

Q. 1 For multiprocess operating systems, global space is ____________ A) Process B) Collection of all processes C) Same as execution space D) Same as execution space Q. 2 ____ A) B) C) D) MIS in it re engineered organization would be Process centered Evaluating customer satisfaction Expectations and perceptions All the above

D)

All of the above

Q. 10 Which of the following languages interact well with DCOM? A) Micro Focus COBOL B) Microsoft Visual Basic C) Delphi D) All of the above Q. 1 _____ is a way to synchronize threads access to shared data and ____are used to provide graceful and reliable thread termination. A) Alerts, mutexes B) Mutexes, condition variables C) Mutexes, Alerts D) Alerts, condition variables Q. 2 In RMI, when skeleton receives an incoming method invocation, it_____ the parameters for the remote method and _____ the result to the caller. A) Unmarshals, Marshals B) Marshals, Marshals C) Unmarshals, Uninarshals D) Marshals, Unmarshals Q. 3 In OMG reference model architecture_____ are domain independent interfaces that are used by many distributed object programs and ______is a runtime component that can be used for distributed computing using HOP communication. A) Object services, Object Request Broker B) Object services, Domain Interfaces C) Application interfaces, ORB D) Domain interfaces, Application Interfaces Q. 4 State True (T) or False (F) a. CORBA provides a distributed object framework, services to support framework and interoperability with other languages. b. Java platform provides a portable object infrastructure that works on every major A) a-T, b-F B) a-F, b-T C) a-T, b-T D) a-F, b-F Q. 5 Advantages of distributed computing environment is/are a. Resource sharing b. Availability of services c. Performance A) Only a and b B) Only b and c C) Only a D) All the above Q. 1 Select the features of OMG IDL. a. It is a declarative language, not a programming language.

b. Provides exception definitions to define exceptional conditions that may arise during the course of an operation. c. Provides features A) b, d and e B) a, b, c and e C) a, c and e D) b and d Q. 2 State True(T) or False(F) a. DCE is portable and flexible b. DCE provides an architecture in which new technologies can be included. c. DCE infrastructure does not support the construction and integration of client/server applicat A) a-T, b-T, c-F, d-F, e-T B) a-T, b-F, c-T, d-T, e-T C) a-F, b-F, c-T, d-T, e-F D) a-F, b-T, c-F, d-F, e- T Q. 3 Distributed file system component of OSF's DCE focuses on a. DCE DFS uses a set of tokens, which are allocated to a server by a client, when the client caches data. b. DCE DFS is compatible with the UNIX file system. C. DCE DFS A) a, b, c, d and e B) a and d C) b, c and e D) a, c and d Q. 4 Following paragraph is related to Directory service. In directory services _____ is the ability to perform straight forward name-to-entry lookups and ______ is the ability to perform lookups based on object attributes. ______is the abi A) tink service, group service, white pages, yellow pages B) White pages, yellow pages, alias service, group service C) Link service, yellow pages, white pages, group service D) White pages, yellow pages, group service, alias service. Q. 5 What happens when a stub method is invoked? a. Initiates a connection with the remote JVM containing the remote object. b. Writes and transmits the parameters to the remote JVM. C. Waits for the result of the method invocation A) a, b, c, d and e B) b and d C) Only d D) a, b, c and e

Q. 3 is used to enable clients to transparently locate and invoke persistent objects on servers in the CORBA environment. A) orbd B) ORB C) IDL D) DS1 Q. 4 A mechanism that allows the distributed application to maintain it self is ______ A) Cloning B) Ceasing C) Leasing D) Hashing Q. 5 Two-tier client server architectures are appropriate alternatives to the three-tier architecture, during situation A) number of users are greater than 100. B) number of users are less than 10 C) number of users are less than 100 D) number of users are greater than 1000 Q. 6 A) B) C) D) The types of data validations are Error specification and error execution Error detection and error execution Error detection and error correction Error execution and error correction among these is not a type of video One way video and one way audio One way video and two way audio Two way video and two way audio None of the above

Q. 7 Which conferencing? A) B) C) D)

Q. 8 ________defines a bounded sequence of not more than 10 strings. A) Sequence B) String C) Sequence <10, String> D) String <10, Sequence> Q. 9 _______ in CORBA, provides dynamic dispatch to the objects. A) Dynamic Invocation Interface B) Dynamic Stub Interface C) Dynamic Skeleton Interface

MSC IT IV CSA 2nd


MscIT 4th Semester Client Server Architecture 2 credit hours 1 Marks 1. __________ is the standard CORBA protocol for ORB-to-ORB interworking a) TCP/IP b) IIOP c) HTTP d) FTP 2. In a ___________ architecture server download files from shared location to the desktop environment. a. Mainframe architecture b. File Sharing architecture c. Client/Server architecture d. Distributed/Collaborative enterprise architecture 3. OSF stands for ______________________ a. Open Systems Foundation b. Open Source File c. Open Systems File d. None 4. File sharing architecture can support simultaneously _______________ number of users. a. 12 b. 8 c. 100 d. 20 5. In RMI a typical server application creates a number of remote objects. a) True -x b) False 6. The two tier architecture improves scalability by accommodating up to _____________ users. a. 12 b. 1000

c. 100 d. 200 7. New Java RMI functionality is added to _____________ software to expand the functionality of Java RMI. a) JDK 1.2 -x b) JDK 1.3 c) JDK 1.4 d) JDK 1.5 e) JDK 1.6 8. NFS stands for _____________________________ a. Network File System b. New File System c. Net File Sharing d. None 9. A way to synchronize threads access to shared data is __________________ a. Alerts b. Mutexes c. Time slicing d. None 10. The interfaces and classes that are responsible for specifying the remote behavior of the RMI system are defined in the _________________ package hierarchy. a) Java.rmi -x b) Javax.rmi c) Java.rmi.remote d) None

2 Marks 11. In CORBA, DSI stands for ________________ a) Dynamic Skeletmn Interface b) Dynamic Stub Interface c) Deferred Synchronous Invocation d) None

12. The RMI registry daemon listens on port ________. a. 80 b. 1099 c. 6000 d. 109 13. Video or voice data type are supported in ________________ a. RDBMS b. DBMS c. ODBMS d. None 14. OLAP stands for a. Online Analysis Processor b. On-line Anticipation processor c. On-line analytical processor d. None 15. A ________ for a remote object acts as a Servers local representative or proxy for the remote object. a) Skeleton -x b) Stub 16. Two phase commits are done to maintain ______________ and ___________ within the distributed databases through synchronized locking of all pieces of transaction. a. Data integrity, consistency b. Atomicity, consistency c. Data integrity, accuracy d. Durability, consistency 17. In RMI remote object is described by one or more_____________, which interfaces are written in the Java programming language that declare the methods of the remote object. a) Distributed objects b) remote interfaces x c) remote objects d) remote methods 18. _______________ is considered as second generation of TP Monitor

a. Messaging Server b. Application Server c. DBMS Server d. None 4 marks 19. The exception java.rmi.RemoteException is thrown when a remote method invocation fails for some reason: I. Communication failure(the remote server is unreachable or is refusing connections; the connection is close by the server, etc.) II. Failure during parameter or return value marshalling or unmarshalling III. Protocols errors Choose the correct answers a) I true, II and III false b) I false, II and III false c) I,II,III true x d) I, II, III false 20. What messaging communication component such as CORBA does? Select all possible answers? a. The implementation details of networking and protocols b. The location and distribution of data, process, and hosts c. Production environment services such as transaction management, security messaging reliability, and persistent storage d. All 21. Building powerful distributed applications with Java RMI technology is simple four step process: 1) Implement the remote objects 2) Define the interfaces to your remote objects 3) Run rmic on remote implementation classes 4) Make code network-accessible Choose correct order a) 1, 2, 3, 4 b) 2, 1, 3, 4 -x

c) 3, 1, 2, 4 d) 2, 3, 1, 4 22. Inter-process communication (IPC) is a mechanism to ___________ a. Transfer data over the network b. Memory management technique c. Share data between two host d. None 23. A) The ORB is the distributed service that implements the request to the remote object. B) ORB is the CORBA communication channel. a) Statement A true, statement B false b) Statement A false, statement true c) Both statement A and B are true d) Both statement A and B are false 24. _______________ is to synchronize the check of a local computer with Universal Coordinated Time (UTC), as well as clocks of other computers on the network. a. Directory Service b. Security services c. Time services d. None 25. Kerberos is ___________ a. Send data over the network b. Inter-process data exchange c. Allow the client to exchange encrypted information with authentication server d. All

(a) Transport (b) Presentation (c) Data Link (d) Physical 3. The Network driver software is in the layer: (a) Application (b) Presentation (c) Data Link (d) Physical 4. Which of the following protocols is in Transport layer of TCP/IP? (a) TCP (b) FTP (c) RPC (d) All of the above 5. Physical Address of NIC is also called: (a) TCP (b) IP (c) MAC (d) POP 6. The IP address is converted into physical address by: (a) ARP (b) RARP (c) SMTP (d) ICMP 7. The number of bits in IPv6 address is: (a) 32 (b) 64 (c) 128 (d) 256 8. The FTP has port number (a) 21 (b) 23 (c) 67 (d) 110 9. Which protocol is used to transfer HTML script over the network? (a) SMTP (b) HTTP (c) POP (d) FTP 10. TTL stands for: (a) Time to Link (b) Time to Leave (c) Transfer Time Limitation (d) Try to Leave B. Select the answer from: 10X2=20 1. IETF sands for: (a) Internet Engineers Task Force (b) Internet Electronic Task Force (c) Internet Engineers Time Force (d) Intranet Engineers Task Force

MSC IT IV TCP IP
A. Select the best answer from the alternates: 10X1=10 1. There are . Layers in OSI Reference Model: (a) 3 (b) 4 (c) 5 (d) 7 2. .. Layer is there in between Physical and Network layer in OSI Model:

2. RIP-2 supports: (a) CIDR and VLSM (b) Multitasking (c) RIP-1 (d) All of the above 3. What is Class-D IP address used for? (a) Broadcast (b) Multicast (c) Anycast (d) Future Use 4. In Class C, which of the following range of first octet is used in IP address? (a) 240-247 (b) 224-239 (c) 192-223 (d) 128191 5. WWW stands for: (a) Wide World Web (b) World Wide Wave (c) World Wide Web (d) Web World Wide 6. Which of the following organization is not related with IP Administration? (a) ARIN (b) RIPE (c) APNIC (d) ABU 7. Which of the following protocol is not connection oriented? (a) RPC (b) IP (c) UDP (d)All of the above 8. Which of the following is connection oriented protocol? (a) TFTP (b) DNS (c) TCP (d) UDP 9. Which of the following protocols use well known ports? (a) FTP (b) TCP (c) UDP (d) All of the above 10. The range of ephemeral port is: (a) 1-1023 (b) 1024-65535 (c) 1-100 (d) Non All of the above

C. Select the best answer from: 5X4=20 1. Which of the following protocols use TCP? (a) FTP (b) Telnet (c) IPC (d) All of the above 2. In OSI model, which of the following groups of layers belong to communication subnet boundary? (a) Application, Presentation and Session (b) Presentation, Session and Transport (c) Transport, Network and Data Link (d) Network, Data Link and Physical 3. IPC stands for: (a) Inter Packet Communication (b) Internet Packet Connection (c) Inter Process Communication (d) Non of the above 4. SACK stands for? (a) Selective Acknowledgement (b) Single Acknowledgement (c) Small Acknowledgement (d) Non of the above 5. In class A network, the maximum possible number of networks are: (a) 65534 (b) 254 (c) 14 (d) 30 D. Subjective Questions: 5X10=50 (a) Explain window principle applied in TCP. (b) What do you mean by sockets and ports? (c) Why is RIP-2 popular in comparision to RIP? (d) i. What is Fragmentation? ii. What is OSPF? (e) Write short notes on: i. TCP ii. UDP