Friday, 14 June 2013

CS610 QUIZ # 3 SPRING 2013 SOLVED BY UMAIR SAULAT



On Tue, Jan 15, 2013 at 6:41 PM, muhammad ashfaq <ashfaq.muhammad133@gmail.com> wrote:
Please send me solution of cs 614 quiz 3  and assignment 3 cs 304

On Mon, Jan 14, 2013 at 7:59 AM, Umair Saulat <saulat.umair@gmail.com> wrote:

CS610 - Computer Network

Quiz #3 JAN 14, 2013

 

NAT device stores state information in translation table.

Select correct option:

True

 False

 

A _____________ address-binding table is used for each physical network.

Select correct option:

 new

 similar

 separate

 old

Fragmentation when using ICMP for path MTU should be avoided.

Select correct option:

 True

 False

Static routing

_______ can be used to propagate information about remote networks.

Select correct option:

 Dynamic routing

 Static routing

 Address resolution

 None of the given

 

TCP stands for _______

Select correct option:

Transport control protocol

Transmission control protocol

 

The Universal Datagram Protocol is not an end-to-end protocol.

Select correct option:

True

False

 

For _____________, information about forwarding is stored in a routing table, which is initialized at system initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies

 

IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

 96

 100

 120

 none of the given

 

_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given

 

The Universal Datagram Protocol is a message-oriented protocol.  
Select correct option:  

True 
False

 Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix  
Select correct option:  
True 
False

 

which is not the type of error messages defined by ICMP.  
Select correct option:  
Source quench 
Time exceeded 
Destination unreachable 
none of the given

 

Which protocol is used to test different tools.  
Select correct option:  
ICMP 
IGMP 
TCP/IP 
none of the given

 

HEADER LEN field gives size of extention header.  
Select correct option:  
False 
True

 

is a ____ protocol.  
Select correct option:  
Point-to-Point 
Multi-Point 
Both (a) and (b) 
None of the given

CP

 

NAT device stores state information in translation table.  
Select correct option:  
True 
False

 

Postfix defines how much of address used to identify network.  
Select correct option:  
True 
False

 

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of______ possible sizes.  

Select correct option:  
three 
two 
four 
five

 

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________Transmission Unit.  
Select correct option: 

Least 
Maximum 
Fragment 
Frame

 

Twice NAT allows a site to run servers.  
Select correct option:  
True 
False

 

 

 

 

The maximum segment size of TCP flow control is_________  
Select correct option:  

3000 octets 
2000 octets 
1000 octets 
none of the given

 

In IP routing, forwarding refers to ____ transfer.  
Select correct option:  
packet 
datagram 
message 
None of the given

 

There are _____ possibilities to detect the destination using Trace-route  
Select correct option:  
1  
2 
3  
None of the given

 

dynamic routing, the routing table is initialized when system boots.  
Select correct option:  
True 
False

 

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.  
Select correct option:  
True 
False

 

Dotted decimal represents each octet in ______ and uses a dot to separate octets.  
Select correct option:  

binary 
decimal 
hexadecimal 
Octal

 

 

 

The amount of buffer space available at any time is called the window.  
Select correct option:  
True 
False

 

In IPV6 the 128 bit addresses unwidely in dotted decimal;requires ___numbers.  
Select correct option:  
12 
14 
16 
none of the given

 

______ field is used to identify a specific path through the network  
Select correct option:  
FLOW LABEL 
TRAFFIC CLASS 
Both a and b 
none of the given

 

IPV6 address consists of ______  
Select correct option:  
32 Bits 
64 Bits 
128 Bits 
none of the given

 

The IP class scheme does not divide the______ address space into equal size class and the classes do not contain the same number of networks.  
Select correct option:  
16-bit  
32-bit  
48-bit  
64-bit

 

A datagram cannot be larger than ______ of a network over which it is sent.  
Select correct option:  
MTU 
Size 
IP header
None of the given

 

An Internet Address (IP address) is a unique ________ binary number assigned to a host and used for all communication with host  
Select correct option:  
48-bit 
32-bit 
24-bit 
None of the given

 

IP datagram can contains ______ octets.  
Select correct option:  
0-65,535 
1-65,535 
1-65,536 
none of the given

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.  
Select correct option:  
True 
False

 

Due to revolutionalization of IP-V6 the speed has increased from_____  
Select correct option:  
56kbps to 512kbps 
512kbps to 1gbps 
56kbps to 1gbps 
none of the given

 

 _______uses window mechanism to control the flow of data.  
Select correct option:  
IP 
UDP 
TCP 
none of the given

window mechanism

 

Mapping between a protocol address and a hardware address is called Address Resolution.  
Select correct option:  
True 
False

 

UPD is operating system independent.  
Select correct option:  
True 
False

 

A________ is a special-purpose computer dedicated to the task of interconnecting networks.  
Select correct option:  
Router 
Bridge 
Switch 
None of the given

 

Network having short intervals has a large timeout and the network having large interval has short timeout.  
Select correct option:  
True 
False

_________ places the boundary between the first and second octets  
Select correct option:  
Class A 
Class B 
Class C 
Class D

Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix  
Select correct option:  

True 
False

 

There are three standard implementations to improve computational efficiency: Hashing, Direct Indexing and InDirect Indexing  
True 
False

 

IPV6 128 bits address includes network prefix and ______  
Select correct option:  
Host Suffix 
Host prefix 
Source Prefix 
none of the given

 

ICMP message transport is acted upon by getting ICMP_______ in IP.  
Select correct option:  
De-encapsulated 
Encapsulated 
Segmented 
none of the given

 

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of three possible sizes.

Select correct option:

True

False 

 

Twice NAT allows a site to run servers.

Select correct option:

True

False

 

Preliminary version of IP was called _________.

Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given 

 

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.

Select correct option:

True

False 

 

_________ uses window mechanism to control the flow of data.

Select correct option:

IP

UDP

TCP

none of the given 

 

 

 

 

The Internet service providers coordinate with the Internet assigned number authority to obtain their network numbers.

Select correct option:

True

False

 

Which protocol is used to test different tools.

Select correct option:

ICMP

IGMP

TCP/IP

none of the given

 

________ identifies the application program that sent the data.

Select correct option:

Destination Port

Source port

Logical address

None of the given

 

The Source can configure outgoing datagram's to avoid _________

Select correct option:

Segmentation

Defragmentation

Fragmentation

None of the given

 

The time for acknowledgement to arrive depends on __________

Select correct option:

Distance to destination

Current traffic conditions

Both a and b

none of the given

 

which is not the type of error messages defined by ICMP.

Select correct option:

Source quench

Time exceeded

Destination unreachable

none of the given 

 

 

 

 

Preliminary version of IP was called _________.

Select correct option:

IP - New Generation (IPng)

IP - Next Generation (IPng)

IP - Net Generation (IPng)

None of the given

 

HEADER LEN field gives size of extention header.

Select correct option:

False

True

 

_______ shows senders preference for low latency, high Reliability.

Select correct option:

TYPE

SERVICE TYPE

SERVICE PRIORITY

None of the given

 

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of two possible sizes.

Select correct option:

True

False

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.

Select correct option:

FLAGS

FRAGMENT OFFSET

IDENTIFICATIONNo.3

None of the given (not sure) Page 105

 

In ______________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.

Select correct option:

Address Resolution

Table Lookup

Message Exchange

Closed-form Computation Page 94

 

 

 

Postfix defines how much of address used to identify network.

Select correct option:

True

False

 

______________field tells the receiver how to order fragments within a given datagram.

Select correct option:

FLAGSNo.4

FRAGMENT OFFSET

IDENTIFICATION

None of the given (not sure) Page 105

 

 

H.LEN shows the header length in units of ____ Bits

Select correct option:

34

32 Page 105

30

None of the given

 

In Closed-form computation, the protocol address assigned to a computer is chosen carefully so

that computer's hardware address can be computed from the protocol address using basic Boolean and _________ operations.

Select correct option:

arithmetic

XOR

Shift

XNORNo.5

 

For _____________, information about forwarding is stored in a routing table, which is initialized atsystem initialization and must be updated as network topology changes.

Select correct option:

Efficiency

Security

Accuracy

Anomalies

 

End to End delivery Service of IP datagram is _____

Select correct option:

Connection oriented

Connectionless Page 120

both a and b

none of the given

 

______ contains all information needed to deliver datagram to the destination.

Select correct option:

Header

Data AreaPage No.6

Identifier

none of the given

 

IPV6 addresses are _____ bits.

Select correct option:

32

64

128

256


The Header format of IPv6 is entirely different.
Select correct option:
True
False

____ contains all information needed to deliver datagram to the destination.
Select correct option:
Header
Data Area
Identifier
none of the given

Which one of these is not a main feature of connectionless service:
Select correct option:
It includes extension of LAN abstraction.
It has universal addressing and the data is delivered in packets frames), each with a header.
It combines collection of physical networks into a single virtual network.
It has universal addressing and the data is delivered in packets frames), without a header.


H.LEN shows the header length in units of __ Bits
Select correct option:
34
32
30
None of the given

____ layer Provides reliable delivery of datagram.
Select correct option:
Network
Transport
Datalink
none of the given

Routers use _______ to forward datagrams along prearranged path.

Select correct option:
Traffic class
Flow label
Destination address
none of the given


______ field is used to identify a specific path through the network
Select correct option:
FLOW LABEL
TRAFFIC CLASS
Both a and b
none of the given


_____ is a technique used to Limit datagram size to small MTU of any network
Select correct option:
Segmentation
Fragmentation
Encapsulation
none of the given

The Current version of IP-Version 4 is _____ old

Select correct option:
18 years
20 years
22 years
none of given

The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.
Select correct option:
Encrypted
Decrypted
Translated
Non of these

Inside a computer, each address mask is stored as a __-bit value.
Select correct option:
48
64
16
32

_____ Source is responsible for fragmentation.
Select correct option:
IPV4
IPV6

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.
Select correct option:
Least
Maximum
Fragment
Frame

IP datagram can contains ______ octets.
Select correct option:
0-65,535
1-65,535
1-65,536
none of the given


MTU Stands for _______
Select correct option:
Mininum transmission unit
Maximun transmission unit
Multicast transmission unit
None of the given

As the Internet grew, the original Classful addressing scheme became a limitation. The IP address space was being exhausted because all networks had to choose one of ______ possible sizes.

Select correct option:

three

two

four

five

 

End to End delivery Service of IP datagram is ___

Select correct option:

Connection oriented

Connectionless

Both a and b

None of the given

 

______________field tells the receiver how to order fragments within a given datagram.

Select correct option:

FLAGS

FRAGMENT OFFSET

IDENTIFICATION

None of the given

 

Postfix defines how much of address used to identify network.

Select correct option:

True

False

 

Every hardware technology specification includes the definition of the maximum size of the frame data area, which is called the __________ Transmission Unit.

Select correct option:

Least

Maximum

Fragment

Frame

 

 

 

 

 

_____ shows senders preference for low latency, high Reliability.

Select correct option:

TYPE

SERVICE TYPE

SERVICE PRIORITY

None of the given

 

IPV6 address consists of ______

Select correct option:

32 Bits

64 Bits

128 Bits

None of the given

 

There are two standard implementations to improve computational efficiency: Hashing and direct indexing

Select correct option:

True

False

 

________ field of header indicates whether a datagram is a fragment or a complete datagram.

Select correct option:

FLAGS

FRAGMENT OFFSET

IDENTIFICATION

None of the given

 

The Header format of IPv6 is entirely different.

Select correct option:

True

False

 

Inside a computer, each address mask is stored as a __-bit value.

Select correct option:

48

64

16

32

 

 

 

 

 

The protocol address of the next hop must be ___________ to an equivalent hardware address before a packet can be sent.

Select correct option:

Encrypted

Decrypted

Translated

Non of these

 

HEADER LEN field gives size of extension header.

Select correct option:

False

True

 

In ____________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic Boolean and arithmetic operations.

Select correct option:

Address Resolution

Table Lookup

Message Exchange

Closed-form Computation

 

_____ Source is responsible for fragmentation.

Select correct option:

IPV4

IPV6

 

The routers within an autonomous system use a _____________ to exchange routing information.

Interior Gateway protocols(IGPs)

Exterior Gateway protocol (EGPs)

Both Interior Gateway protocols(IGPs) and Exterior Gateway protocol (EGPs)

None of the given

 

UDP datagram format is _____ bits.

Select correct option:

8

16

32

64

 

 

 

 

A routing table contains_______

Select correct option:

The destination network ID

The hop count to reach the network

The router ID of the next hop

All of the given

 

NAT device stores state information in translation table.

Select correct option:

True

False

 

TCP achieves _________ by retransmission.

Select correct option:

Efficiency

Accuracy

Reliability

none of the given

 

________ identifies the application program that sent the data.

Select correct option:

Destination Port

Source port

Logical address

None of the given

 

_____ Protocol provides error reporting mechanism.

Select correct option:

IGMP

SNMP

ICMP

none of the given

 

Routing refers to the _________ of routing information.

Select correct option:

transmission

propagation

communication

None of the given

 

 

 

 

 

______ layer Provides reliable delivery of datagram.

Select correct option:

 

Network

Transport

Datalink

none of the given

 

End to End delivery Service of IP datagram is _____

Select correct option:

Connection oriented

Connectionless

both a and b

none of the given

 

TCP is a connectionless and reliable transport protocol.

Select correct option:

True

False

 

TCP is a ______ protocol.

Select correct option:

Point-to-Point

Multi-Point

Both (a) and (b)

None of the given

 

 

Routing inserts or changes values in _______

Select correct option:

MAC address

routing table

both (a) and (b)

None of the given

 

Network Address Translation (NAT) requires device to perform packet translation.

Select correct option:

True

False

 

 

 

 

 

EGPs stand for ________

Select correct option:

 

Exterior Gateway Protocols

External Gateway Protocols

Extra Gateway Protocols

None of the given

 

________identifies which application program on receiving computer should receive the data

Select correct option:

Logical address

Source port

Destination Port

None of the given

 

 _______ Source is responsible for fragmentation.

Select correct option:

IPV4

IPV6

 

In dynamic routing, the routing table is initialized when system boots.

Select correct option:

True

False

 

 

Fragmentation when using ICMP for path MTU should be avoided.

Select correct option:

 

True

False

 

UDP provides connection-oriented service.

Select correct option:

True

False

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet

Routing Protocol.

True

False

 

A routing table contains_______

The destination network ID

The hop count to reach the network

The router ID of the next hop

All of the given

 

An Internet Address (IP address) is a unique __________ binary number assigned to a host and used for all communication with host

48-bit

32-bit

24-bit

None of the given

 

 

UDP provides connection-oriented service.

Select correct option:

True

False

 

 

Network having short intervals has a large timeout and the network having large interval has short timeout.

Select correct option:

True

False

 

TCP is a connectionless and reliable transport protocol.
Select correct option:

True

False

 

_______ is used for single destination computer.

Multicast

Broadcast

unicast

none of the given

 

 

_____ is a technique used to Limit datagram size to small MTU of any network

Segmentation

Fragmentation
Encapsulation
none of the given

 

 

The UDP stands for________.

Select correct option:

Universal Datagram Protocol
User Datagram Protocol
United Datagram Protocol
None of the given

 

 

In 3-way handshake TCP requires to generate a random ______ sequence number

30 bit

32 bit
34 bit

none of the given

 

The TCP/IP suite contains________ transport protocols

Internet Protocol and Transmission Control Protocol

Internet Protocol and user Datagram Protocol

User datagram and Transmission  control Protocol

None of the given

 

 

Protocol of TCP/IP layering model specify how to ensure reliable transfer

Physical

Layer

Network Interface Layer

Internet Layer

Transport Layer

 

Although the ARP message format is sufficiently general to allow arbitrary protocol and hardware  addresses, ARP is almost always used to bind a 32-bit IP address to a _______ Ethernet address.

16-bits

48-bits

64-bits

128-bits

 

The Universal datagram Protocol is not an end-to-end protocol.

True

False

 

A _______ is a special-purpose computer dedicated to the task of interconnecting networsk.

Router

Bridge

Switch

None of the given

 

TCP provides reliable connection startup

True

False

 

TCP provides ____communication

Half-duplex

Full-duplex

Both (a) and (b)

None of the given

 

 

The process of using a routing table to select a next hop for a given datagram is called_______.

Select correct option:
Encapsulation

Reassembling

Routing or forwarding
None of the given

 

Question # 2 of 10 ( Start time: 01:54:12 PM ) Total Marks: 1

Basic NAT does not work well for communication initiated from the Internet. Select correct option:

True

False

 

 

Question # 3 of 10 ( Start time: 01:55:02 PM ) Total Marks: 1

In dynamic routing, the routing table is initialized when system boots. Select correct option:

True

False

 

 

The address ________ identifies the physical network to which the computer is attached, while the _____ identifies an individual computer on that network.
Select correct option:

prefix , suffix

suffix , prefix

suffix , suffix

None of the given

 

HEADER LEN field gives size of extention header.
Select correct option:

False

True

 

Network Address and Port Translation (NAPT) is by far the most popular form of

Select correct option:

Network Address Transmission
Network Address Translation
Network Address Transformation

None of the given

 

TCP uses _____ format for all messages.
Select correct option:

 

single

double

multiple

None of the given

 

There are two standard implementations to improve computational efficiency: Hashing and Direct indexing

True

False

 

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.

Select correct option:

 

True

False

____ layer Provides reliable delivery of datagram

 

Network

Transport
Datalink

none of the given

 

_____ is used for single destination computer.

Multicast

Broadcast
unicast

none of the given

 

 

 

IPV6 addresses are ___ bits.
Select correct option:

 

32

64

128
256

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

Select correct option:

True

False

 

In TCP/IP, ____ provides reliable transport service.
Select correct option:

IP

TCP

Both IP and TCP
None of the given

 

 

UDP uses best-effort delivery service.

Select correct option:

True

False

 

IPV6 address with ____ leading zeros is interpreted to hold an IPV4 address.

Select correct option:

96

100
120

none of the given

 

Routers use _____ to forward datagrams along prearranged path. Select correct option:

Traffic class

Flow label

Destination address
none of the given

 

The Header format of IPv6 is entirely different.
Select correct option:

True

False

 

________ protocols of TCP/IP layering model specify how to organize data into frame and how a computer transmits frames over a network.

Select correct option:

Physical Layer

Network Interface Layer
Internet Layer

Transport Layer

 

IPv6 ____________ is responsible for fragmentation. Routers simply drop datagram's larger than network

Select correct option:
Destination

Intermediate routers
Source

Medium

 

Inside a computer, each address mask is stored as a __-bit value. Select correct option:

48

64

16
32

 

 

The Network Layer Protocol ICMP stands for____________

Instant Control Message Protocol
Internet Control Message Protocol
Initial Control Message Protocol
None of the given

 

 

Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs) two broad classes of Internet Routing Protocol.

Select correct option:

True

False

 

TCP provides reliable connection startup.

Select correct option:

True

False

 

UPD is operating system independent.

Select correct option:

True

False

 

 

In ____________, the protocol address assigned to a computer is chosen carefully so that computer's hardware address can be computed from the protocol address using basic

Boolean and arithmetic operations.
Select correct option:

Address Resolution
Table Lookup

Message Exchange

Closed-form Computation

 

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or a key that represents the original string.

Select correct option:

True

False

 

 

The maximum segment size of TCP flow control is ___________ Select correct option:

3000 octets

2000 octets
1000 octets

none of the given

 

______ of TCP/IP layering model, corresponds to basic network hardware. Select correct option:

Physical Layer

Network Interface Layer
Internet Layer

Transport Layer

 

Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

Select correct option:

False

True

 

One of the parameters, which motivated IP for change is address space. The

___________ address space allows for over a million networks. But most networks are class C and too small for many organizations.

Select correct option:

32-bit

128-bit
16-bit
64-bit

 

TCP is a ____ protocol.

Select correct option:
Point-to-Point

Multi-Point

Both (a) and (b)
None of the given

 

IGPs stand for _________

Select correct option:

Internal Gateway Protocols

Interior Gateway Protocols

Intermediate Gateway Protocols
None of the given

 

The Universal Datagram Protocol is not an end-to-end protocol

True

False

 

The TCP/IP suite contains ________ transport protocols.

 

Internet Protocol and Transmission Control Protocol

Internet Protocol and User Datagram Protocol

User Datagram Protocol and Transmission Control Protocol

None of the given

 

Whenever it handles a packet, IP software needs to separate the destination address into a prefix and suffix

Select correct option:
True

False

 

Question # 4 of 10 ( Start time: 02:33:13 PM ) Total Marks: 1 IPV6 address consists of ________

Select correct option:

32 Bits

64 Bits
128 Bits

none of the given

 

 

____ contains all information needed to deliver datagram to the destination.

Header

Data Area
Identifier

none of the given

 

Fragmentation when using ICMP for path MTU should be avoided. Select correct option:

True

False

 

Twice NAT is another variant of NAT. it is used with site that runs server. In this process NAT box is connected to Domain Name.

Select correct option:

False

True

 

_____ Source is responsible for fragmentation.
Select correct option:

IPV4

IPV6

 

There are _____ possibilities to detect the destination using Trace-route

1

2
3

None of the given

 

 

Which of the following statements is wrong regarding PVC?

PVC last as long as the customer pay the periodic fee for its uses

Forwarding tables are automatically restored after power of equipments failure.

Forwarding table entries for PVC's are dynamically configured

All of the above are wrong.

 

Dotted decimal notation is a syntactic form the IP software uses to express ________ binary values when interacting with humans.

8-bit

16-bit

32-bit

64-bit

 

 

 

 

Two computers with a connection through an ATM network will likely have same VPI/VCI values for each end of the connection

True

False

 

________ encapsulates IP datagram as data area in hardware frame.

Network Interface Layer

Datalink Layer

Network Layer

None of the given

 

Class A mask is 255.0.0.0 which is used for ______

Unicasting

Multicasting

Subnetting

All of the given

 

QoS specifications are of ………… types

2

3

4

5

 

_________ Serve Same purpose in Internet as frames on LAN

Packets

Virtual Packets

Virtual Frames

Both b and c

 

 

Which of the following statement is true

CBR is one of the types of QoS specifications

CBR is a networking technique depending on data type

CBR is used for compressed audio and video

All of the above

 

The term signaling is used to describe------------

Communication about the internet

Communication about the extranet

Communication about the network

None of above

 

VBR stands for…………….

Virtual Bit Rate

Virtual Byte Rate

Variable Byte Redundancy

Variable Bit Rate

 

CBR stands for…………….

Select correct option:

Constant Byte Rate

Constant Bit Rate

Connection break Recovery

None of the above


--
Zindagi mein 2 Logo ka buhat khayal rahkoooo
Ist woh jiss ney tumhari jeet ke Liye buhat kuch hara hoo
(Father)
2nd woh jiss ko tum ney har dukh me pukaara hoo (Mother)
Regards,
Umair Saulat Mc100403250



--
asdfff



--
Need Your Comments.....!

-- 

For University of Pakistan Study Material Sharing, Discussion, etc, Come and join us at http://4e542a34.linkbucks.com
You received this message because you are subscribed to the Google
Groups "Study" group.
To post to this group, send email to http://ca13054d.tinylinks.co
For more options, visit this group at
http://004bbb67.any.gs

No comments:

Post a Comment

Note: only a member of this blog may post a comment.