Home > Download > SMU - Question Paper
> MCA > MC0087
Internetworking with TCP/IP
This is the collection of
Sikkim Manipal University (SMU) question and answers for Internetworking with TCP/IP. It will help
to prepare your examination. All question paper are
classified as per semester, subject code and question type of Part A, Part B and Part C with
multiple
choice options
as same as actual examination. SMU question papers includes
year 2025, 2024, 2023 Sem I, II, III, IV, V, VI examinations
of all subjects.
SMU question test set of old,
last and previous year are updated
regularly and it is absolutely free to use. Question paper includes Visual basic 6, VB.Net, C#, ASP.Net,
Web, Oracle, Database, SQL, Software Engineering, C, C++, OOPS, MBA, MCA, BSC IT I have requested
you kindly send me the question paper of Internetworking with TCP/IP, SMU - Master of Computer Application.
Course Name
MCA (Master of Computer Application)
Subject Code MC0087 (Internetworking with TCP/IP)
Get Questions
PART - A
PART - B
PART - C
Subject : Internetworking with TCP/IP
MC0087 : PART - C
Q. 1 | Pick out the wrong characteristics of asynchronous transmission 1. Transmitting and receiving clocks are independent of each other 2. Transmitting and receiving clocks are dependent of each other 3. Two ends of the (source and dest |
| A) | 1, 4 |
| B) | 2, 4 | | C) | 2, 3 | | D) | 1, 3 | | | | Q. 2 | Identify the Characteristics of Open environment under discretionary access control policy 1. Only those users who have access rights and action privileges can use the resources and all others are not allowed to use the resource. 2 |
| A) | 1, 2 |
| B) | 1 only | | C) | 3, 4 | | D) | 2 only | | | | Q. 3 | Match the following Set A 1. Serial Backbone 2. Distributed Backbone 3. Collapsed Backbone 4. Parallel Backbone Set B i. Known as Daisy Chaining ii. Can be built by installing a backbone hub in a central place iii. |
| A) | 1 – i, 2 – iii, 3 – ii, 4 – iv |
| B) | 1 – i, 2 – iv, 3 – ii, 4 – iii | | C) | 1 – i, 2 – ii, 3 – iii, 4 – iv | | D) | 1 – i, 2 – iii, 3 – iv, 4 – ii | | | | Q. 4 | Identify the wrong characteristics of List oriented approach 1. The access control mechanism assigns user a ticker for each resource they are permitted to access. 2. This has the advantage of runtime efficiency and increases the ov |
| A) | 1, 2 |
| B) | 3, 4 | | C) | 2, 4 | | D) | 1, 3 | | | | Q. 5 | Arrange the OSI layers in the correct order from layer 1 to layer 7 i. Physical ii. Application iii. Network iv. Transport v. Session vi. Data Link vii. Presentation |
| A) | i, iii, iv, ii, v, vii, vi |
| B) | i, iv, iii, iv, v, vii, ii | | C) | ii, vii, v, iii, iv, vii, I | | D) | ii, iii, iv, v, vii, vi, I | | | |
Click here to get
Internetworking with TCP/IP (MC0087)
New Question
Home > Download > SMU - Question Paper
> MCA > MC0087