adplus-dvertising
11. A list of protocols used by a system, one protocol per layer, is called
a. protocol architecture
b. protocol stack
c. protocol suit
d. none of the mentioned
Discuss
Answer: (b).protocol stack

12. Network congestion occurs
a. in case of traffic overloading
b. when a system terminates
c. when connection between two nodes terminates
d. none of the mentioned
Discuss
Answer: (a).in case of traffic overloading

13. Which one of the following extends a private network across public networks?
a. local area network
b. virtual private network
c. enterprise private network
d. storage area network
Discuss
Answer: (b).virtual private network

14. The IETF standards documents are called
a. RFC
b. RCF
c. ID
d. IEEE
Discuss
Answer: (a). RFC

15. The structure or format of data is called
a. Syntax
b. Semantics
c. Struct
d. None of the mentioned
Discuss
Answer: (a).Syntax

16. Communication between a computer and a keyboard involves ______________ transmission
a. Automatic
b. Half-duplex
c. Half-duplex
d. Simplex
Discuss
Answer: (d).Simplex

17. The first Network was
a. CNNET
b. NSFNET
c. ASAPNET
d. ARPANET
Discuss
Answer: (d).ARPANET

18. The _______ is the physical path over which a message travels
a. path
b. Medium
c. Protocol
d. Route
Discuss
Answer: (b).Medium

19. Which organization has authority over interstate and international commerce in the communications field?
a. ITU-T
b. IEEE
c. FCC
d. ISOC
Discuss
Answer: (c).FCC

20. Which of this is not a network edge device?
a. PC
b. Smartphones
c. Servers
d. Switch
Discuss
Answer: (d).Switch

Page 2 of 54