P2Pprogrammer 2 programmer

Home > Download > SMU - Question Paper > BSc IT > BT0076

TCP/IP


This is the collection of Sikkim Manipal University (SMU) question and answers for TCP/IP . It will help to prepare your examination. All question paper are classified as per semester, subject code and question type of Part A, Part B and Part C with multiple choice options as same as actual examination. SMU question papers includes year 2024, 2023, 2022 Sem I, II, III, IV, V, VI examinations of all subjects.

SMU question test set of old, last and previous year are updated regularly and it is absolutely free to use. Question paper includes Visual basic 6, VB.Net, C#, ASP.Net, Web, Oracle, Database, SQL, Software Engineering, C, C++, OOPS, MBA, MCA, BSC IT I have requested you kindly send me the question paper of TCP/IP , SMU - Bachelor of Science in Information Technology.

Course Name        BSc IT (Bachelor of Science in Information Technology)

Subject Code       BT0076 (TCP/IP )

Get Questions        PART - A    PART - B    PART - C

Subject : TCP/IP

     BT0076 : PART - C    


Q. 1Pick out the wrong characteristics of
asynchronous transmission
1. Transmitting and receiving clocks are
independent of each other
2. Transmitting and receiving clocks are
dependent of each other
3. Two ends of the (source and dest
 A)1, 4
 B)2, 4
 C)2, 3
 D)1, 3
   
Q. 2Identify the Characteristics of Open
environment under discretionary access control
policy
1. Only those users who have access rights and
action privileges can use the resources and all
others are not allowed to use the resource.
2
 A)1, 2
 B)1 only
 C)3, 4
 D)2 only
   
Q. 3Match the following
Set A
1. Serial Backbone
2. Distributed Backbone
3. Collapsed Backbone
4. Parallel Backbone
Set B
i. Known as Daisy Chaining
ii. Can be built by installing a backbone hub in a
central place
iii.
 A)1 – i, 2 – iii, 3 – ii, 4 – iv
 B)1 – i, 2 – iv, 3 – ii, 4 – iii
 C)1 – i, 2 – ii, 3 – iii, 4 – iv
 D)1 – i, 2 – iii, 3 – iv, 4 – ii
   
Q. 4Identify the wrong characteristics of List
oriented approach
1. The access control mechanism assigns user a
ticker for each resource they are permitted to
access.
2. This has the advantage of runtime efficiency
and increases the ov
 A)1, 2
 B)3, 4
 C)2, 4
 D)1, 3
   
Q. 5Arrange the OSI layers in the correct order
from layer 1 to layer 7
i. Physical
ii. Application
iii. Network
iv. Transport
v. Session
vi. Data Link
vii. Presentation
 A) i, iii, iv, ii, v, vii, vi
 B)i, iv, iii, iv, v, vii, ii
 C)ii, vii, v, iii, iv, vii, I
 D)ii, iii, iv, v, vii, vi, I
   
Click here to get TCP/IP (BT0076 ) New Question


Home > Download > SMU - Question Paper > BSc IT > BT0076