Computer Network MCQ (1)
Computer Network MCQ (1)
2. What kind of transmission medium is most appropriate to carry data in a computer network that
is exposed to electrical interferences?
14. is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM b) TDM c) Both FDM & TDM d) PDM
18. A subset of a network that includes all the routers but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) special tree
19. The vast network of computers that connects millions of people all over the world is called
22. Which of the following device is used to connect two systems, especially if the systems use different
protocols?
a) 124.201.3.1.52
b) 01.200.128.123
c) 300.142.210.64
d) 128.64.0.0
25. Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
a. Host to host
b. Application
c. Internet
d. Network Access
26. Which sublayer of the data link layer performs data link functions that depend upon the type of
medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
27. Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
28. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto
the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
31. The sharing of a medium and its link by two or more devices is called
a) Fully duplexing
b) Multiplexing
c) Micropleixng
d) Duplexing
33. In TDM, the transmission rate of a multiplexed path is always the sum of the transmission
rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
34. What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
37. The field is used to detect errors over the entire user datagram.
a) udp header
b) checksum
c) source port
d) destination port
a) Physical address
b) Logical address
c) Source address
d) Destination address
corrupts a signal.
47. What is the size of the sender window in the Go Back N (ARQ) protocol?
a) 0 b) 1 c)10 d)n
51. is a type of transmission impairment in which the signal loses strength due to the
different propagation speeds of each frequency that makes up the signal.
a. Attenuation
b. Noise
c. Distortion
d. Decibel
a) composite; single-frequency
b) single-frequency; composite
c) single-frequency; double-frequency
d) none of the above
54. A periodic signal completes one cycle in 0.001 s. What is the frequency?
a) 1 Hz
b) 100 Hz
c) 1 KHz
d) 1 MHz
55. is a multiple-access method in which the available bandwidth of a link is shared in time,
frequency, or through code, between different stations.
a) Random access
b) Controlled access
c) Channelization
d) none of the above
56. In each station sends a frame whenever it has a frame to send.
a) pure ALOHA
b) slotted ALOHA
c) both (a) and (b)
d) neither (a) nor (b)
a) 4
b) 8
c) 16
d) none of the above
58. When does the fixed path get established between the source and destination in the virtual packet
switching network?
a. Go-Back-N ARQ
b. Selective Repeat ARQ
c. Stop-and-Wait ARQ
d. All of the above
60. The ability of a single network to span multiple physical networks is known as
a. Subnetting
b. Masking
c. Fragmenting
d. Hopping
a) Memory
b) Stores routing table
c) Both a and b
d) None of the above
a) Discrete
c) Globally synchronized
d) Both a and c
63. Machine that places the request to access the data is generally called as .
a. Server Machine
b. Client Machine
c. Request Machine
67. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) TCP protocol
68. In FTP protocol, client contacts server using as the transport protocol.
a) transmission control protocol
b) user datagram protocol
c) datagram congestion control protocol
d) stream control transmission protocol
74. In Go-Back-N window, when the timer of the packet times out, several packets have to be resent
even some may have arrived safe. Whereas in Selective Repeat window, the sender resends
A) 0000
B) 1111
C) 1110
D) 0111
86. In cyclic redundancy checking, the divisor is the CRC.
A) one bit less than
B) one bit more than
C) The same size as
D) none of the above
87. The between two words is the number of differences between corresponding bits.
A) Hamming rule
B) Hamming code
C) Hamming distance
D) none of the above
88. In modulo-2 arithmetic, give the same results.
A) addition and subtraction
B) addition and multiplication
C) addition and division
D) none of the above
89. Which error detection method consists of just one redundant bit per data unit?
A) CRC
B) Checksum
C) Simple parity check
D) Two-dimensional parity check
90. In coding, we divide our message into blocks, each of k bits, called .
A) block; blockwords
B) block; datawords
C) linear; datawords
D) none of the above
91. Adding 1 and 1 in modulo-2 arithmetic results in .
A) 0
B) 1
C) 2
D) none of the above
92. In modulo-2 arithmetic, we use the operation for both addition and subtraction.
A) OR
B) XOR
C) AND
D) none of the above
93. A generator that contains a factor of can detect all odd-numbered errors.
A) x
B) 1
C) x + 1
D) none of the above
94. Version 6 of IP address has how many bits.
a) 64 bits
b) 128 bits
c) 32 bits
d) 256 bits
95. What is the uses of subnetting?
a) Tfr
b) 1/2 Tfr
c) 2 * Tfr
d) 4 * Tfr
a) 8 bytes
b) 16 bytes
c) 20 bytes
d) 64 bytes
99. If there are n signal sources of same data rate, then the TDM link has slots.
a) n
b) n/2
c) n*2
d) 2n