Home > Download > SMU - Question Paper
> BSc IT > BT0076
TCP/IP
This is the collection of
Sikkim Manipal University (SMU) question and answers for TCP/IP . It will help
to prepare your examination. All question paper are
classified as per semester, subject code and question type of Part A, Part B and Part C with
multiple
choice options
as same as actual examination. SMU question papers includes
year 2024, 2023, 2022 Sem I, II, III, IV, V, VI examinations
of all subjects.
SMU question test set of old,
last and previous year are updated
regularly and it is absolutely free to use. Question paper includes Visual basic 6, VB.Net, C#, ASP.Net,
Web, Oracle, Database, SQL, Software Engineering, C, C++, OOPS, MBA, MCA, BSC IT I have requested
you kindly send me the question paper of TCP/IP , SMU - Bachelor of Science in Information Technology.
Course Name
BSc IT (Bachelor of Science in Information Technology)
Subject Code BT0076 (TCP/IP )
Get Questions
PART - A
PART - B
PART - C
Subject : TCP/IP
BT0076 : PART - C
Q. 1 | Pick out the wrong characteristics of asynchronous transmission 1. Transmitting and receiving clocks are independent of each other 2. Transmitting and receiving clocks are dependent of each other 3. Two ends of the (source and dest |
| A) | 1, 4 |
| B) | 2, 4 | | C) | 2, 3 | | D) | 1, 3 | | | | Q. 2 | Identify the Characteristics of Open environment under discretionary access control policy 1. Only those users who have access rights and action privileges can use the resources and all others are not allowed to use the resource. 2 |
| A) | 1, 2 |
| B) | 1 only | | C) | 3, 4 | | D) | 2 only | | | | Q. 3 | Match the following Set A 1. Serial Backbone 2. Distributed Backbone 3. Collapsed Backbone 4. Parallel Backbone Set B i. Known as Daisy Chaining ii. Can be built by installing a backbone hub in a central place iii. |
| A) | 1 – i, 2 – iii, 3 – ii, 4 – iv |
| B) | 1 – i, 2 – iv, 3 – ii, 4 – iii | | C) | 1 – i, 2 – ii, 3 – iii, 4 – iv | | D) | 1 – i, 2 – iii, 3 – iv, 4 – ii | | | | Q. 4 | Identify the wrong characteristics of List oriented approach 1. The access control mechanism assigns user a ticker for each resource they are permitted to access. 2. This has the advantage of runtime efficiency and increases the ov |
| A) | 1, 2 |
| B) | 3, 4 | | C) | 2, 4 | | D) | 1, 3 | | | | Q. 5 | Arrange the OSI layers in the correct order from layer 1 to layer 7 i. Physical ii. Application iii. Network iv. Transport v. Session vi. Data Link vii. Presentation |
| A) | i, iii, iv, ii, v, vii, vi |
| B) | i, iv, iii, iv, v, vii, ii | | C) | ii, vii, v, iii, iv, vii, I | | D) | ii, iii, iv, v, vii, vi, I | | | |
Click here to get
TCP/IP (BT0076 )
New Question
Home > Download > SMU - Question Paper
> BSc IT > BT0076