Computer Network MCQ - ANSWERS
Computer Network MCQ - ANSWERS
a. ASCII
b. RS232C
c. 2
d. Centronics
Explanation: The RS232C is a standard interface for serial data transmission that defines the
protocol and physical interface for transmitting serial data fairly easily between associated
appliances and computers.
2) Which type of topology is best suited for large businesses which must carefully control and
coordinate the operation of distributed branch outlets?
a. Ring
b. Local area
c. Hierarchical
d. Star
Explanation: The star topology is the best network topology for large businesses because it is
simple to control and coordinate from the central computer.
a. Simplex
b. Half Duplex
c. Full Duplex
d. Double Duplex
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation: Double duplex is not a legitimate channel for transmission in computer network.
a. Encryption of data
b. To transmit faster
c. To detect errors
d. To identify the user
Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is used
for error detection for blocks of data.
5) What kind of transmission medium is most appropriate to carry data in a computer network
that is exposed to electrical interferences?
Explanation: The optical fiber is made of glass or plastic. In this cable, the transmission of data
occurs in the form of light rather than the electric current, so this cable provides higher data
transfer speed than other cables.
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
c. Mailing list
d. Hypertext markup language
Explanation: World Wide Web (WWW) creates a collection of hyperlinked documents on the
Internet.
a. Protocol
b. URL
c. E-mail address
d. ICQ
Explanation: A URL (Uniform Resource Locator) is a database connection that describes the
database's location on a computer network and the retrieval process. A URL is a different form
of URI (Uniform Resource Identifier) although the two words are used interchangeably by many
people.
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation: A proxy server is a computer that acts as a gateway between a user's computer and
the Internet. The proxy server is also called application level gateway. By this the client
computer can establish indirect network connection to another network.
10) Which one of the following would breach the integrity of a system?
Explanation: None
a. Firewall
b. Gateway
c. Router
d. Virus checker
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation: A firewall is a network securing software that prevents unauthorized users and
dangerous elements from accessing the network. Software firewall acts as a filter for our network
which prevents harmful information.
a. [email protected]
b. gmail.com
c. [email protected]
d. annauniv@books
Explanation: A proper email address is a combination of the email prefix and email domain,
both in appropriate formats. The domain appears to the right side of the @ symbol and the prefix
appears to the left side of the @ symbol.
For example, in this email address [email protected], "annauniv" is the prefix, and "point.com" is
the domain.
Explanation: None
14) Which one of the following is the most common internet protocol?
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
a. HTML
b. NetBEUI
c. TCP/IP
d. IPX/SPX
15) Software programs that allow you to legally copy files and give them away at no cost are
called which of the following?
a. Probe ware
b. Timeshare
c. Shareware
d. Public domain
a. Interface speed
b. Cycles per second
c. Baud rate
d. Megabyte load
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation: In telecommunication, baud rate is a specific unit of the speed rate. It is one of the
significant functions that determine the speed of the communication over the data channel.
a. Star
b. Ring
c. Bus
d. Peer to Peer
Explanation: Peer to Peer network is a network to which all computers are used the same
resources and rights as other computers. Its network designed primarily for the small local area.
a. 32
b. 1024
c. 65535
d. 512
Explanation: None
20) Which of the following statements could be valid with respect to the ICMP (Internet Control
Message Protocol)?
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Answer: (b) A redirect message is used when a router notices that a packet seems to have been
routed wrongly.
Explanation: None
21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the
following subnet masks can be used for the above requirement?
a. 255.243.240
b. 255.255.0.0
c. 255.255.0
d. 255.255.255
Explanation: This address belongs to class C, so 8 bits are reserved for the host ID. 24 bits are
reserved for network ID.
22) When the mail server sends mail to other mail servers it becomes ___ ?
a. SMTP client
b. SMTP server
c. Peer
d. Master
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation: The SMTP client is an organization that allows sending emails using the SMTP
server. SMTP servers can't send emails to other SMTP servers separately. It is based on client-
server architecture.
a. 32 bits
b. 64 bits
c. 128 bits
d. 256 bits
Explanation: An IPv6 address is 128 bits long, which has 2^128 address space.
Which of the above is consider as (a) signal transmission medium is data communications?
Explanation: None
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
a. 121.12.12.248
b. 130.12.12.248
c. 128.12.12.248
d. 129.12.12.248
Explanation: 121.12.12.248 address belongs the class A because the first octet value of this
address lies between 0 and 127.
a. 124.201.3.1.52
b. 01.200.128.123
c. 300.142.210.64
d. 10110011.32.16.8
e. 128.64.0.0
Explanation: 128.64.0.0 is correct IPv4 address because IPv4 is a standard numbering system
that uses four integers from 0 to 255. The IP address is a group of numbers that identify user
system on the network.
27) Which of the following IP addresses can be used as (a) loop-back addresses?
a. 0.0.0.0
b. 127.0.0.1
c. 255.255.255.255
d. 0.255.255.255
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
29) Which of the following cannot be used as a medium for 802.3 ethernet?
Explanation: A microwave link cannot be used as a medium for 802.3 ethernets, because a
microwave link is a transmission network that utilizes a beam of radio waves in the microwave
frequency spectrum to relay video, audio, or data between two places.
30) What IP address class allocates 8 bits for the host identification part?
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
a. Class A
b. Class B
c. Class C
d. Class D
Explanation: In class C only, 8 bits are reserved for the host ID, and 24 bits are reserved for
network ID.
Explanation: The term IANA stands for Internet Assigned Numbers Authority.
a. 6 version
b. 4 version
c. 2 version
d. 1 version
Explanation: There are only two IP versions are avilable in the present: IP version 4 (IPv4) and
IP version 6 (IPv6).
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
33) Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
a. Host to host
b. Application
c. Internet
d. Network Access
Explanation: The host to host layer conforms the transport layer of the OSI model. This layer is
responsible for the final correspondence and error-free distribution of data.
34) An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long
size. Calculate the maximum throughput.
a. 5999
b. 6900
c. 6027
d. 5027
= 1/2e * 3.276
= 0.6027
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
35) On a simplex data link, which of the following is a possible error recovery technique?
Explanation: The hamming codes is an error recovery technique that can be used to detect and
correct the errors. It was developed by R.W. Hamming.
36) Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its
variants?
a. Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the
data stream is probabilistic.
b. TDM requires the transmitter and receiver to be synchronized periodically.
c. TDM performs efficiently if the arrival pattern of the data stream is probabilistic.
d. Statistical TDM is efficient if the data stream is deterministic.
Explanation: None
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
a. Library
b. Network
c. Grouping
d. Integrated system
Explanation: There are many ways to share data between two computers, but a network
connection is established before data sharing.
40) In specific, if the systems use separate protocols, which one of the following devices is used
to link two systems?
a. Repeater
b. Gateway
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
c. Bridge
d. Hub
Explanation: If the system used separate protocols, gateway device is used to link two systems.
41) How many digits of the Data Network Identification Code (DNIC) identify the country?
a. first three
b. first four
c. first five
d. first six
e. None of the above
Explanation: The first three digits of the Data Network Identification Code (DNIC) is identify
the country (first digit to identify a zone and other two digits to identify the country within the
zone).
42) Which of the following methods is used to broadcast two packets on the medium at a time?
a. Collision
b. Synchronous
c. Asynchronous
d. None of the above
Explanation: A collision occurs when two or more computers are attempting to transfer data
across a network at a time.
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
43) Which of the following is true with regard to the ping command?
Answer: (c) Ping summarizes the packet loss and round-trip delay between two IP end points.
Explanation: None
a. Sender
b. Receiver
c. Sender and Receiver
d. None of the these
Explanation: Only the receiver keeps the private key. Its purpose is to ensure that the message
can only be decrypted by the intended receiver.
a. RSA algorithm
b. Diffie-Hellman algorithm
c. Electronic code book algorithm
d. None of the mentioned
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation: An electronic code book algorithm is a mode of operation for a block cipher,
where each frame of text in an encrypted document refers to a data field. In other terms, the same
plaintext value would also give the same value for ciphertext.
a. Transposition ciphers
b. Substitution ciphers
c. Both a and b
d. None of these
47) Which of the following statement is true about error detection techniques used on
communications link?
a. Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
b. Error detection cannot be used on simplex links.
c. Hamming code can detect up to 3-bit errors.
d. All of the these
Explanation: None
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
48) The correct order of corresponding OSI layers for having functionalities of routing and
reconciling machine representation differences with shared access resolution and ASCII test
protocol is?
Explanation: None
Ans: D
• A. Persistent
• B. Non-persistent
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
Explanation:
None.
51) The HTTP request message is sent in ____ part of three-way handshake.
• A. First
• B. Second
• C. Third
• A. 2
• B. 1
• C. 4
• D. 3
• A. Request line
• B. Header line
• C. Status line
• D. Entity line
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
The line followed by request line are called header lines and status line is the initial part of
response message.
54) The values GET, POST, HEAD etc are specified in ____ of HTTP message
• A. Request line
• B. Header line
• C. Status line
• D. Entity body
55) The ______ method when used in the method field, leaves entity body empty.
• A. POST
• B. GET
56) Transport layer aggregates data from different applications into a single stream before
passing it to:
• A. network layer
• C. application layer
• D. physical layer
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
57) Which one of the following is a transport layer protocol used in internet?
• A. TCP
• B. UDP
• A. socket
• B. pipe
• C. port
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
• A. wsock
• B. winsock
• C. wins
• A. port
• B. pipe
• C. node
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
• A. MAC address
• B. IP address
• A. 24 bits
• B. 36 bits
• C. 42 bits
• D. 48 bits
• A. pure ethernet
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
• A. coaxial cable
• C. optical fiber
70) An ethernet frame that is less than the IEEE 802.3 minimum length of 64 octets is called:
• A. short frame
• B. run frame
• C. mini frame
• D. man frame
JCET-CSE
JAYA COLLEGE OF ENGG & TECHNOLOGY - CSE
JCET-CSE