0% found this document useful (0 votes)
9 views

Computer Network MCQ (1)

The document contains a series of multiple-choice questions (MCQs) related to computer networks, covering topics such as transmission media, network protocols, data communication methods, and error detection techniques. Each question presents four options, with various concepts related to networking, including the OSI model, TCP/IP stack, and different types of network topologies. The questions aim to assess knowledge in computer networking fundamentals and principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Computer Network MCQ (1)

The document contains a series of multiple-choice questions (MCQs) related to computer networks, covering topics such as transmission media, network protocols, data communication methods, and error detection techniques. Each question presents four options, with various concepts related to networking, including the OSI model, TCP/IP stack, and different types of network topologies. The questions aim to assess knowledge in computer networking fundamentals and principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Computer Networks MCQ (Multiple Choice Questions)

1. The is the physical path over which a message travels

a) Protocol b) path c)Medium d)Route

2. What kind of transmission medium is most appropriate to carry data in a computer network that
is exposed to electrical interferences?

a) Unshielded twisted pair b)Optical fiber c)Coaxial cable d)Microwave

3. Communication between a computer and a keyboard involves transmission.


a)Automatic b)Half-duplex c)Full-duplex d) Simplex

4. The first Network was called


a) CNNET b)NSFNET c)ASAPNET d) ARPANET

5. A set of rules that governs data communication.


a)Protocols b)Standards c)RFCs d) Servers

6. Three or more devices share a link in connection.


a) Unipoint b) Multipoint c) Point to point d) Simplex

7. Two devices are in network if


a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive

8. A is a device that forwards packets between networks by processing the routing


information included in the packet.
a) bridge b) firewall c) router d) hub

9. Network congestion occurs


a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure

10. Which network topology requires a central controller or hub?


a) Star b) Mesh c) Ring d) Bus

11. topology requires a multipoint connection.


a) Star b) Mesh c) Ring d) Bus
12. Data communication system within a building or campus is
a) LAN b) WAN c) MAN d) PAN

13. In TDM, slots are further divided into


a) Seconds b) Frames c) Packets d) Bits

14. is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM b) TDM c) Both FDM & TDM d) PDM

15. The network layer is concerned with of data.


a) bits b) frames c) packets d) bytes

16. Which one of the following is not a function of network layer?


a) routing
b) inter-networking
c) congestion control
d) error control

17. In virtual circuit network each packet contains


a) full source and destination address
b) a short VC number
c) only source address
d) only destination address

18. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) special tree

19. The vast network of computers that connects millions of people all over the world is called

(A) Internet (B) Hypertext (C) LAN (D) Web

20. A term related sending data to a satellite is?

A. Downlink B. Modulate C. Demodulate D. Uplink

21. The common name for a modulator-demodulator is

A. Modem B. Joiner C. Networker D. Connector

22. Which of the following device is used to connect two systems, especially if the systems use different
protocols?

A. Repeater B. Gateway C. Bridge D. Hub


23. Which of the following is correct IPv4 address?

a) 124.201.3.1.52
b) 01.200.128.123
c) 300.142.210.64
d) 128.64.0.0

24. How many versions available of IP?

a. 6 version b. 4 version c. 2 version d. 1 version

25. Which layer of the TCP / IP stack corresponds to the OSI model transport layer?

a. Host to host
b. Application
c. Internet
d. Network Access
26. Which sublayer of the data link layer performs data link functions that depend upon the type of
medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
27. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC

28. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto
the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check

29. A 4 byte IP address consists of


a) only network address
b) only host address
c) network address & host address
d) network address & MAC address

30. Transmission control protocol


a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned

31. The sharing of a medium and its link by two or more devices is called
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing

32. Multiplexing is used in


a) Packet switching
b) Circuit switching
c) Data switching
d) Packet & Circuit switching

33. In TDM, the transmission rate of a multiplexed path is always the sum of the transmission
rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than

34. What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m

35. A local telephone network is an example of a network.


a) Packet switched
b) Circuit switched
c) Bit switched
d) Line switched

36. Most packet switches use this principle


a) Stop and wait
b) Store and forward
c) Store and wait
d) Stop and forward

37. The field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port

38. MAC address is also called .

a) Physical address
b) Logical address
c) Source address
d) Destination address

39. Which has continuous transmission?


a) Asynchronous
b) Synchronous
c) Asynchronous & Synchronous
d) None of the mentioned

40. How error detection and correction is done?


a) By passing it through equalizer
b) By passing it through filter
c) By amplifying it
d) By adding redundancy bits

41. Which is more efficient?


a) Parity check
b) Cyclic redundancy check
c) Parity & Cyclic redundancy check
d) None of the mentioned

42. Which can detect two bit errors?


a) Parity check
b) Cyclic redundancy check
c) Parity & Cyclic redundancy check
d) None of the mentioned

43. What frequency range is used for FM radio transmission?

(a) Very Low Frequency: 3 kHz to 30 kHz


(b) Low Frequency: 30 kHz to 300 kHz
(c) High Frequency: 3 MHz to 30 MHz
(d) Very High Frequency: 30 MHz to 300 MHz
44. Frequency and period are .
a) proportional to each other

b) inverse of each other


c) the same

d) none of the above

45. is a type of transmission impairment in which an outside source such as crosstalk

corrupts a signal.

a) Noise b) Distortion c) Attenuation d) Decibel

46. Both Go-Back-N and Selective-Repeat Protocols use a .

a) sliding frame b)sliding window c)sliding packet d)none of the above

47. What is the size of the sender window in the Go Back N (ARQ) protocol?

a) 0 b) 1 c)10 d)n

48. are the random access protocols

a) ALOHA, CSMA, CSMA/CA, CSMA/CD

b) Reservation, polling, token passing

c) FDMA, TDMA, CDMA

d) All of the above

49. framing uses two categories of protocols: character-oriented and bit-

oriented. a)Fixed-size b)Variable-size c)Standard d)None of the above

50. In framing ,there is no need for defining the boundaries of frames.

a) fixed size b)variable size c)standard d)none of the above

51. is a type of transmission impairment in which the signal loses strength due to the
different propagation speeds of each frequency that makes up the signal.
a. Attenuation
b. Noise
c. Distortion
d. Decibel

52. The wavelength of a signal depends on the .


a. Frequencies of the signal
b. Medium
c. Phase of the signal
d. (a) and (b)
53.A sine wave is not useful in data communications; we need to send a signal.

a) composite; single-frequency
b) single-frequency; composite
c) single-frequency; double-frequency
d) none of the above

54. A periodic signal completes one cycle in 0.001 s. What is the frequency?

a) 1 Hz
b) 100 Hz
c) 1 KHz
d) 1 MHz
55. is a multiple-access method in which the available bandwidth of a link is shared in time,
frequency, or through code, between different stations.
a) Random access
b) Controlled access
c) Channelization
d) none of the above
56. In each station sends a frame whenever it has a frame to send.
a) pure ALOHA
b) slotted ALOHA
c) both (a) and (b)
d) neither (a) nor (b)

57. An IPv6 address consists of bytes (octets)

a) 4
b) 8
c) 16
d) none of the above

58. When does the fixed path get established between the source and destination in the virtual packet
switching network?

a. Before the transmission of packets


b. After the transmission of packets
c. During the transmission of packets
d. All of the above
59. Which ARQ mechanism deals with the transmission of only damaged or lost frames despite
the other multiple frames by increasing the efficiency & its utility in noisy channels?

a. Go-Back-N ARQ
b. Selective Repeat ARQ
c. Stop-and-Wait ARQ
d. All of the above

60. The ability of a single network to span multiple physical networks is known as

a. Subnetting
b. Masking
c. Fragmenting
d. Hopping

61. The router has a

a) Memory
b) Stores routing table
c) Both a and b
d) None of the above

62. In slotted ALOHA the time is

a) Discrete

b) Not globally synchronized

c) Globally synchronized

d) Both a and c

63. Machine that places the request to access the data is generally called as .

a. Server Machine

b. Client Machine

c. Request Machine

d. None of the above

64. Which is not a application layer protocol?


a) HTTP b) SMTP c) FTP d) TCP
65. Application layer offers service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned

66. Electronic mail uses which Application layer protocol?


a) SMTP
b) HTTP
c) FTP
d) SIP

67. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol

68. In FTP protocol, client contacts server using as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol

69. TCP sliding windows are oriented.


a. packet
b. segment
c. byte
d. none of the above
70. Reliable data delivery guarantees that
A. The receiver application receives the complete message data without any loss
B. The data will not choke the network Download Videos
C. The data will not overflow the receiver’s buffer
D. None of the above
71. A DNS client is called
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned

72. DNS database contains


a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned

73. The domain name system is maintained by


a) distributed database system
b) a single server
c) a single computer
d) none of the mentioned

74. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent
even some may have arrived safe. Whereas in Selective Repeat window, the sender resends

a) Packet which are not lost


b) Only those packets which are lost or corrupted
c) Packet from starting
d) All the packets

75. allows you to connect and login to a remote computer


a) Telnet
b) FTP
c) HTTP
d) SMTP

76. Which operating mode of telnet is full duplex?


a) default mode
b) server mode
c) line mode
d) character mode

77. To do multicast routing, each router computes a .....................

(A) Binary tree (B) AVL tree


(C) Spanning tree (D) None of these
78. Sending a packet to all destinations simultaneously is called ...................
(A) Multicasting (B) Unicasting
(C) Telecasting (D) Broadcasting
79. Sending a message to a well defined group that are numerically large in size but small compared
to the network as a whole is called ...................
(A) Unicasting (B) Multicasting
(C) Broadcasting (D) None of these
80. The router algorithm takes the decision to changes the route when .................
(A) router changes
(B) topology changes
(C) user changes
(D) transmission time does not change
81. If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls
along the same route is known as ....................
(A) Routing principle (B) Optimality principle

(C) Sink tree principle (D) Network principle


82. The set of optimal routes from all sources to a given destination from a tree rooted to the
destination is known as .................
(A) Binary tree (B) Sparse tree
(C) Sink tree (D) AVL tree
83. The technique which requires no network information required is ….
A. flooding
B. variable routing
C. fixed routing
D. random routing
84. Why do we require hamming codes?
a) Error correction
b) Encryption only
c) Decryption
d) Bit stuffing

85. The checksum of 1111 and 1111 is .

A) 0000
B) 1111
C) 1110
D) 0111
86. In cyclic redundancy checking, the divisor is the CRC.
A) one bit less than
B) one bit more than
C) The same size as
D) none of the above
87. The between two words is the number of differences between corresponding bits.
A) Hamming rule

B) Hamming code
C) Hamming distance
D) none of the above
88. In modulo-2 arithmetic, give the same results.
A) addition and subtraction
B) addition and multiplication
C) addition and division
D) none of the above
89. Which error detection method consists of just one redundant bit per data unit?
A) CRC
B) Checksum
C) Simple parity check
D) Two-dimensional parity check
90. In coding, we divide our message into blocks, each of k bits, called .
A) block; blockwords
B) block; datawords
C) linear; datawords
D) none of the above
91. Adding 1 and 1 in modulo-2 arithmetic results in .
A) 0
B) 1
C) 2
D) none of the above
92. In modulo-2 arithmetic, we use the operation for both addition and subtraction.
A) OR
B) XOR
C) AND
D) none of the above
93. A generator that contains a factor of can detect all odd-numbered errors.
A) x
B) 1
C) x + 1
D) none of the above
94. Version 6 of IP address has how many bits.
a) 64 bits
b) 128 bits
c) 32 bits
d) 256 bits
95. What is the uses of subnetting?

a) It divides one large network into several smaller ones


b) It divides network into network classes
c) It speeds up the speed of network
d) None of above
96. What IP address class allocates 8 bits for the host identification part?
a) Class A
b) Class B
c) Class C
d) Class D
97. What is the total vulnerable time value of pure Aloha?

a) Tfr
b) 1/2 Tfr
c) 2 * Tfr
d) 4 * Tfr

98. What is the size of the UDP header?

a) 8 bytes
b) 16 bytes
c) 20 bytes
d) 64 bytes

99. If there are n signal sources of same data rate, then the TDM link has slots.
a) n
b) n/2
c) n*2
d) 2n

100. Transmission delay does not depend on


a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
Answer script
1. c 40.d 79.b
2. b 41.b 80.b
3.d 42.b 81.b
4.d 43.d 82.c
5.a 44.b 83.a
6.b 45.a 84.a
7.a 46.b 85.a
8.c 47.d 86.b
9.a 48.a 87.C
10.a 49.b 88.a
11.d 50.a 89.c
12.a 51.c. 90.b
13.b 52.d. 91.a
14.a 53.b 92.b
15.c 54.c 93.c
16.d 55.c 94.b
17.b 56.a 95.a
18.a 57.c 96.c
19.a 58.a 97.c
20.d 59.b 98.a
21.a 60.a 99.a
22.b 61.c 100.b
23.d 62.d
24.c 63.b
25.a 64.d
26.b 65.a
27.c 66.a
28.a 67.a
29.c 68.a
30.d 69.c
31.b 70.a
32.b 71.b
33.a 72.d
34.c 73.a
35.b 74.b
36.b 75.a
37.b 76.c
38.a 77.C
39.b 78.d

You might also like