Computer Network MCQ Questions and Answers
1) Which of these is a standard interface for serial data transmission?
- ASCII
- RS232C
- 2
- Centronics
Answer: RS232C
2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?
-
- Ring
- Local area
- Hierarchical
- Star
Answer: (d) Star
3) Which of the following transmission directions listed is not a legitimate channel?
- Simplex
- Half Duplex
- Full Duplex
- Double Duplex
Answer: (d) Double Duplex
4) “Parity bits” are used for which of the following purposes?
- Encryption of data
- To transmit faster
- To detect errors
- To identify the user
Answer: (c) To detect errors
5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?
- Unshielded twisted pair
- Optical fiber
- Coaxial cable
- Microwave
Answer: (b) Optical fiber
6) A collection of hyperlinked documents on the internet forms the ?.?
- World Wide Web (WWW)
- E-mail system
- Mailing list
- Hypertext markup language
Answer: (a) World Wide Web (WWW)
7) The location of a resource on the internet is given by its?
- Protocol
- URL
- E-mail address
- ICQ
Answer: (b) URL
8) The term HTTP stands for?
- Hyper terminal tracing program
- Hypertext tracing protocol
- Hypertext transfer protocol
- Hypertext transfer program
Answer: (c) Hypertext transfer protocol
9) A proxy server is used as the computer?
- with external access
- acting as a backup
- performing file handling
- accessing user permissions
Answer: (a) with external access
10) Which one of the following would breach the integrity of a system?
- Looking the room to prevent theft
- Full access rights for all users
- Fitting the system with an anti-theft device
- Protecting the device against willful or accidental damage
Answer: (b) Full access rights for all users
11) Which software prevents the external access to a system?
- Firewall
- Gateway
- Router
- Virus checker
Answer: (a) Firewall
12) Which one of the following is a valid email address?
- [email protected]
- gmail.com
- [email protected]
- javatpoint@books
Answer: (a) [email protected]
13) Which of the following best describes uploading information?
- Sorting data on a disk drive
- Sending information to a host computer
- Receiving information from a host computer
- Sorting data on a hard drive
Answer: (b) Sending information to a host computer
14) Which one of the following is the most common internet protocol?
- HTML
- NetBEUI
- TCP/IP
- IPX/SPX
Answer: (c) TCP/IP
15) Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
- Probe ware
- Timeshare
- Shareware
- Public domain
Answer: (d) Public domain
16) The term FTP stands for?
- File transfer program
- File transmission protocol
- File transfer protocol
- File transfer protection
Answer: (c) File transfer protocol
17) At what speed does tele-computed refer?
- Interface speed
- Cycles per second
- Baud rate
- Megabyte load
Answer: (c) Baud rate
18) Which one of the following is not a network topology?
- Star
- Ring
- Bus
- Peer to Peer
Answer: (d) Peer to Peer
19) The maximum length (in bytes) of an IPv4 datagram is?
- 32
- 1024
- 65535
- 512
Answer: (c) 65535
20) Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?
- It reports all errors which occur during transmission.
- A redirect message is used when a router notices that a packet seems to have been routed wrongly.
- It informs routers when an incorrect path has been taken.
- The “destination unreachable” type message is used when a router cannot locate the destination.
Answer: (b) A redirect message is used when a router notices that a packet seems to have been routed wrongly.
21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?
- 255.243.240
- 255.255.0.0
- 255.255.0
- 255.255.255
Answer: (c) 255.255.255.0
22) When the mail server sends mail to other mail servers it becomes ___ ?
- SMTP client
- SMTP server
- Peer
- Master
Answer: (a) SMTP client
23) The length of an IPv6 address is?
- 32 bits
- 64 bits
- 128 bits
- 256 bits
Answer: (c) 128 bits
24) Consider the following:
- Twisted pair cables
- Microwaves and Satellite Signals
- Repeaters
- Analog Transmissions
- Fiber optics
Which of the above is consider as (a) signal transmission medium is data communications?
- (1) and (5)
- (1) and (2)
- (1) (2) and (5)
- (1) (2) (3) and (5)
Answer: (c) (1) (2) and (5)
25) Which of the following address belongs class A?
- 121.12.12.248
- 130.12.12.248
- 128.12.12.248
- 129.12.12.248
Answer: (a) 121.12.12.248
26) Which of the following is correct IPv4 address?
- 124.201.3.1.52
- 01.200.128.123
- 300.142.210.64
- 10110011.32.16.8
- 128.64.0.0
Answer: (e) 128.64.0.0
27) Which of the following IP addresses can be used as (a) loop-back addresses?
- 0.0.0.0
- 127.0.0.1
- 255.255.255.255
- 0.255.255.255
Answer: (b) 127.0.0.1
28) The term WAN stands for?
- Wide Area Net
- Wide Access Network
- Wide Area Network
- Wide Access Net
Answer: (c) Wide Area Network
29) Which of the following cannot be used as a medium for 802.3 ethernet?
- A thin coaxial cable
- A twisted pair cable
- A microwave link
- A fiber optical cable
Answer: (c) A microwave link
30) What IP address class allocates 8 bits for the host identification part?
- Class A
- Class B
- Class C
- Class D
Answer: (c) Class C
31) The term IANA stands for?
- Internet Assigned Numbers Authority
- Internal Assigned Numbers Authority
- Internet Associative Numbers Authoritative
- Internal Associative Numbers Authority
Answer: (a) Internet Assigned Numbers Authority
32) How many versions available of IP?
- 6 version
- 4 version
- 2 version
- 1 version
Answer: (c) 2 version
33) Which layer of the TCP / IP stack corresponds to the OSI model transport layer?
- Host to host
- Application
- Internet
- Network Access
Answer: (a) Host to Host
34) An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long size. Calculate the maximum throughput.
- 5999
- 6900
- 6027
- 5027
Answer: (c) 0.6027
35) On a simplex data link, which of the following is a possible error recovery technique?
- Backward error correction (BEC)
- The use of hamming codes
- Automatic Repeat Request (ARQ)
- Downward error correction (DEC)
Answer: (b) The use of hamming codes
36) Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its variants?
- Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the data stream is probabilistic.
- TDM requires the transmitter and receiver to be synchronized periodically.
- TDM performs efficiently if the arrival pattern of the data stream is probabilistic.
- Statistical TDM is efficient if the data stream is deterministic.
Answer: (a) and (b)
37) The term IPv4 stands for?
- Internet Protocol Version 4
- Internet Programming Version 4
- International Programming Version 4
- None of these
Answer: (a) Internet Protocol Version 4
38) The term LAN stands for?
- Local Area Net
- Local Aera Network
- Local Array Network
- Local Array Net
Answer: (b) Local Area Network
39) Which of the through is share the data of two computer?
- Library
- Network
- Grouping
- Integrated system
Answer: (b) Network
40) In specific, if the systems use separate protocols, which one of the following devices is used to link two systems?
- Repeater
- Gateway
- Bridge
- Hub
Answer: (b) Gateway
41) How many digits of the Data Network Identification Code (DNIC) identify the country?
- first three
- first four
- first five
- first six
- None of the above
Answer: (a) first three
42) Which of the following methods is used to broadcast two packets on the medium at a time?
- Collision
- Synchronous
- Asynchronous
- None of the above
Answer: (a) Collision
43) Which of the following is true with regard to the ping command?
- Ping stands for Packet Internet Generator.
- The ping command checks the port level connectivity between source destinations end points.
- Ping summarizes the packet loss and round-trip delay between two IP end points.
- The ping command activates the RARP protocol of the IP layer.
Answer: (c) Ping summarizes the packet loss and round-trip delay between two IP end points.
44) The private key in asymmetric key cryptography is kept by?
- Sender
- Receiver
- Sender and Receiver
- None of the these
Answer: (b) Receiver
45) Which of the following algorithms is not used in asymmetric-key cryptography?
- RSA algorithm
- Diffie-Hellman algorithm
- Electronic code book algorithm
- None of the mentioned
Answer: (c) Electronic code book algorithm
46) In the cryptography, the sequence of the letters is rearranged by?
- Transposition ciphers
- Substitution ciphers
- Both a and b
- None of these
Answer: (a) Transposition ciphers
47) What is the maximum efficiency of pure aloha at G = 1/2?
- 1.89
- 17.99
- 18.999
- 18.4
Answer: (d) 18.4
48) What is the maximum efficiency of slotted aloha at G = 1?
- 36.8
- 35.8
- 35.5
- 37.8
Answer: (a) 36.8
49) Which of the following statement is true about error detection techniques used on communications link?
- Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
- Error detection cannot be used on simplex links.
- Hamming code can detect up to 3-bit errors.
- All of the these
Answer: (d) All of the these
50) The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine representation differences with shared access resolution and ASCII test protocol is?
- Network, Physical, Transport, Data link
- Network, Physical, Data link, Application
- Network, Presentation, Data link, Application
- Network, Presentation, Physical, Transport
Answer: (c) Network, Presentation, Data link, Application
51) In which of the following switching methods, the message is divided into small packets?
- Message switching
- Packet switching
- Virtual switching
- None of the these
Answer: (b) Packet switching
52) Which of the following switch methods creates a point-to-point physical connection between two or more computers?
- Message switching
- Packet switching
- Circuit switching
- None of the these
Answer: (a) Circuit switching
53) What is the second name of the proxy server?
- Proxy tools
- Application proxy
- Application-level gateway
- All of the these
Answer: (c) Application-level gateway
54) Which of the following servers allows LAN users to share data?
- Data server
- Point server
- File server
- Communication server
Answer: (c) File server
55) What is the total vulnerable time value of pure Aloha?
- Tfr
- 1/2 Tfr
- 2 * Tfr
- 4 * Tfr
Answer: 2 * Tfr
56) How many fields are in the SMDS packet?
- Two
- Three
- Four
- Five
Answer: (b) Three
57) What is the maximum data transfer rate of the optical fiber wire?
- 50 kbps
- 1000 kbps
- 1000 Mbps
- None of the these
Answer: (c) 1000 Mbps
58) POTS network works on the principle of ________
- Telephone switching
- Proxy server
- File system
- Circuit system
Answer: (d) Circuit switching
59) Which of the following protocols is the bit-oriented protocol?
- SSL
- http
- HDLC
- All of the these
Answer: (c) HDLC
60) SLIP stands for _______
- System line internet protocol
- Serial line internet protocol
- Signal line internet protocol
- Signal internet protocol
Answer: (b) Serial line internet protocol
61) The second port is used to ____________ in the two-port network.
- Input terminal
- Output terminal
- Signal terminal
- Bandwidth terminal
Answer: (b) Output terminal
62) Which of the following layers does the HTTP protocol work on?
- Physical layer
- Data-link layer
- Application layer
- None of the these
Answer: (c) Application layer
63) Which of the following statement correct about the cipher in cryptography?
- It is a method for performing encryption and decryption
- It is used to establish the network connection
- It is a message event
- All of the these
Answer: (a) It is a method for performing encryption and decryption
64) SONET stands for ______________.
- Signal Operation Network
- Synchronous Optical Network
- System Optical Network
- Signal Optical Network
Answer: (b) Synchronous Optical Network
65) How many layers does the SONET contain?
- 2 layers
- 3 layers
- 4 layers
- 5 layers
Answer: (c) 4 layers
66) RAKE receiver designed for _____.
- Multipath fading
- Signals
- Data network
- Network connection
Answer: (a) Multipath fading
67) What is the formula of high rate in zigzag code?
- J / (J * 1)
- -Z / (1 + J)
- Z * (1 + J)
- J / (J + 1)
Answer: (d) J / (J + 1)
68) What is the size of the sender window in the Go Back N (ARQ) protocol?
- 0
- 1
- 10
- n
Answer: (d) n
69) What is the efficiency of the Go back N (ARQ) protocol?
- N = N / (2a + 2a)
- N = N / (1 + 2a)
- N = N * (2a + 2a)
- N = N * (1 + 2a)
Answer: (b) N = N / (1 + 2a)
70) What is the size of the destination port in the UDP protocol?
- 8 bits
- 16 bits
- 20 bits
- 32 bits
Answer: (b) 16 bits
71) What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages?
- Ping
- Route
- Traceroute
- Ifconfig
Answer: (c) Traceroute
72) A client of the DNS (Domain Name System) application is called _____.
- DNS server
- DNS Name
- DNS resolver
- DNS inquirer
Answer: (c) DNS resolver
73) How many characters consist of the entire hostname?
- 511 characters
- 255 characters
- 127 characters
- 31 characters
Answer: (a) 255 characters
74) During normal IP packet forwarding by a router, which of the following fields of the IP header is updated?
- Repeater
- Source address
- Destination address
- Checksum
Answer: (d) Checksum
75) Which of the following statements is correct about the DWDM?
- It can transmit data at very high speeds
- It can transmit data at very slow speeds
- DWSM stands for digital wave division multiplexing
- None of the these
Answer: (a) It can transmit data at very high speeds
76) MAC address is also called ______.
- Physical address
- Logical address
- Source address
- Destination address
Answer: (a) Physical address
77) Which of the following addresses is 32-bit?
- MAC address
- Virtual address
- Source address
- Destination address
Answer: (a) Virtual address
78) EDI stands for ____.
- Electronic Data Interchange
- Electronic Digital Internet
- Electronic Digital Interchange
- Electronic Data Internet
Answer: (a) Electronic Data Interchange
79) What is the maximum data transfer rate of the ISDN?
- 1024 Mbps
- 64 Mbps
- 64 kbps
- 1024 kbps
Answer: (b) 64 kbps
80) ARPANET stands for _______.
- Advanced Recheck Projects Agency Internet
- Advanced Recheck Projects Agency Network
- Advanced Research Projects Agency Network
- Advanced Research Projects Agency Internet
Answer: (c) Advanced Research Projects Agency Network
81) What is the size of the UDP header?
- 8 bytes
- 16 bytes
- 20 bytes
- 64 bytes
Answer: (a) 8 bytes
82) Which of the following protocols is the connection-less protocol?
- UDP
- TCP
- IP
- All of the these
Answer: (a) UDP
83) Wildcard domain name labels begin with a ______.
- .
- 0
- @
- *
- #
Answer: (c) *
84) What is the maximum length of the STP wire?
- 20 ft
- 50 ft
- 50 meters
- 100 meters
Answer: (d) 100 meters
85) Which network is suitable for a building?
- WAN
- LAN
- MAN
- PAN
Answer: (b) LAN
86) ________ is a 2G mobile telecommunications based on the CDMA.
- IS-95
- ISO 1990
- IS-97
- None of the these
Answer: (a) IS-95
87) Which of the following statements is correct about IRC?
- It sends the messages in virtual time
- It is an application layer protocol
- It works on the proxy model
- All of the these
Answer: (b) It is an application layer protocol
88) Which of the following devices is not a networking device?
- Hub
- Switch
- Bridge
- None of the these
Answer: (d) None of the these
89) Which of the following devices does not require power to forward the signals?
- Active hub
- Passive hub
- Repeater
- Bridge
Answer: (b) Passive hub
90) How many pins does RJ-45 contain?
- Two
- Four
- Eight
- Ten
Answer: (c) Eight
91)Which of the following does not allow multiple uses or devices to share one communication line?
a) concentrator
b) multiplexer
c) doubleplexer
d) controller
92)A term used to describe interconnected computer configuration is
a) Micro program sequence
b) Modulation
c) Multiprocessing
d) Multiprogramming
e) None of these
Answer: Multiprogramming
93)A device that connects to a network without the use pf cables is said to be—
a) distributed
b) open source
c) centralized
d) wireless
e) None of these
Answer: wireless
94) If you want to connect to your own computer through the Internet from another location, you can use
a) e-mail
b) FTP
c) instant message
d) Telnet
e) None of these
Answer: (d) Telnet
95)Which file keeps commands to execute automatically when OS Is started?
a) autoexec.bat
b) any batch file
c) command.com
d) config.sys
e) none of the above
Answer: autoexec.bat
96) __________ is the most important/powerful computer in a typical network.
a) Desktop
b) Network client
c) Network server
d) Network station
e) Network switch
Answer: (c) Network server
97)A MODEM is connected in between a telephone line and a __________.
a) Network
b) Computer
c) Communication Adapter
d) Serial Port
Answer: (b) Computer
98) The most important or powerful computer in a typical network is
a) desktop
b) network cliejit
c) network station
d) network server
e) None of these
Answer: (d) network server
99) Computers connected to a LAN can
a) run faster
b) go on line
c) share information and/or share peripheral equipment
d) E-mail
e) None of these
Answer: (c) share information and/or share peripheral equipment
100) A dumb terminal has
a) An embedded micro process
b) Extensive memory
c) A keyboard and screen
d) Independent processing
e) None of these
Answer: (c) A keyboard and screen
101) What device separates a single network into two segments but lets the two segments appear as one to higher protocols?
a) Switch
b) Bridge
c) Gateway
d) Router
e) None of these
Answer: (b) Bridge
102)An example of a telecommunications device is a ________.
a) keyboard
b) mouse
c) printer
d) modem
e) None of these
Answer: (d) modem
103) Computer and communication technology, such as communication links to the Internet, that provide help and understanding to the end user is known as
a) presentation file
b) information technology
c) program
d) worksheet file
e) FTP
Answer: (e) FTP
104) To make a notebook act as a desktop model, the notebook can, be connected to a__ which is connected to a monitor and other devices.
a) bay
b) network
c) port
d) docking station
e) None of these
Answer: (d) docking station
105) If you wish to extend the length of the network without having the signal degrade, you would use a
a) resonance
b) router
c) gateway
d) switch
e) repeater
Answer: (e) repeater
106) Which type of switching uses the entire capacity of a dedicated link?
a) Datagram Packet Switching
b) Virtual Circuit Packet Switching
c) Circuit switching
d) Message Switching
e) None of these
Answer: (a) Datagram Packet Switching
107) What is a modem connected to ?
a) processor
b) motherboard
c) printer
d) phone line
e) None of these
Answer: (d) phone line
108) Which device is used to access your computer by other computer or for talk over phone?
a) RAM
b) CD ROM Drive
c) Modem
d) Hard Disk
e) None of these
Answer: (c) Modem
109) Which of the following Operating systems is better for Implementing a Client-Server network
a) MS DOS
b) Windows 2000
c) Windows 98
d) Windows 95
e) none of the above
Answer: (b) Windows 2000
110) A protocol is a set of rules governing a time sequence of events that must take place
a) between modems
b) between an interface
c) between peers
d) across an interface
e) none of the above
Answer: (c) between peers
111) Codec refers to
a) Coder-decoder
b) Co-declaration
c) Command declaration
d) Command decoding
e) None of these
Answer: (a) Coder-decoder
112) Smaller and less expensive PC-based servers are replacing ____ in many businesses.
a) supercomputers
b) mainframes
c) laptops
d) clients
e) None of these
Answer: (b) mainframes
113) Usually, in MSDOS, the primary hard disk drives has the drive letter __
a) A
b) B
c) D
d) C
e) none of the above
Answer: (d) C
114) The synchronous modems are more costly than the asynchronous modems because
a) they produce large volume of data
b) they contain clock recovery circuits
c) they transmit the data with stop and start bits.
d) they operate with a larger bandwidth
e) None of these
Answer: (b) they contain clock recovery circuits
115) Officer LANs that are spread geographically apart on a large scale can be connected using a corporate
a) CAN
b) LAN
c) DAN
d) WAN
e) TAN
Answer: WAN