Computer Network MCQ Questions and Answers



Computer Network MCQ Questions and Answers

1) Which of these is a standard interface for serial data transmission?

  1. ASCII
  2. RS232C
  3. 2
  4. Centronics

Answer: RS232C

2) Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?

    1. Ring
    2. Local area
  1. Hierarchical
  2. Star

Answer: (d) Star

3) Which of the following transmission directions listed is not a legitimate channel?

  1. Simplex
  2. Half Duplex
  3. Full Duplex
  4. Double Duplex

Answer: (d) Double Duplex

4) “Parity bits” are used for which of the following purposes?

  1. Encryption of data
  2. To transmit faster
  3. To detect errors
  4. To identify the user

Answer: (c) To detect errors

5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?

  1. Unshielded twisted pair
  2. Optical fiber
  3. Coaxial cable
  4. Microwave

Answer: (b) Optical fiber

6) A collection of hyperlinked documents on the internet forms the ?.?

  1. World Wide Web (WWW)
  2. E-mail system
  3. Mailing list
  4. Hypertext markup language

Answer: (a) World Wide Web (WWW)

7) The location of a resource on the internet is given by its?

  1. Protocol
  2. URL
  3. E-mail address
  4. ICQ

Answer: (b) URL

8) The term HTTP stands for?

  1. Hyper terminal tracing program
  2. Hypertext tracing protocol
  3. Hypertext transfer protocol
  4. Hypertext transfer program

Answer: (c) Hypertext transfer protocol

9) A proxy server is used as the computer?

  1. with external access
  2. acting as a backup
  3. performing file handling
  4. accessing user permissions

Answer: (a) with external access

10) Which one of the following would breach the integrity of a system?

  1. Looking the room to prevent theft
  2. Full access rights for all users
  3. Fitting the system with an anti-theft device
  4. Protecting the device against willful or accidental damage

Answer: (b) Full access rights for all users

11) Which software prevents the external access to a system?

  1. Firewall
  2. Gateway
  3. Router
  4. Virus checker

Answer: (a) Firewall

12) Which one of the following is a valid email address?

  1. [email protected]
  2. gmail.com
  3. [email protected]
  4. javatpoint@books

Answer: (a) [email protected]

13) Which of the following best describes uploading information?

  1. Sorting data on a disk drive
  2. Sending information to a host computer
  3. Receiving information from a host computer
  4. Sorting data on a hard drive

Answer: (b) Sending information to a host computer

14) Which one of the following is the most common internet protocol?

  1. HTML
  2. NetBEUI
  3. TCP/IP
  4. IPX/SPX

Answer: (c) TCP/IP

15) Software programs that allow you to legally copy files and give them away at no cost are called which of the following?

  1. Probe ware
  2. Timeshare
  3. Shareware
  4. Public domain

Answer: (d) Public domain

16) The term FTP stands for?

  1. File transfer program
  2. File transmission protocol
  3. File transfer protocol
  4. File transfer protection

Answer: (c) File transfer protocol

17) At what speed does tele-computed refer?

  1. Interface speed
  2. Cycles per second
  3. Baud rate
  4. Megabyte load

Answer: (c) Baud rate

18) Which one of the following is not a network topology?

  1. Star
  2. Ring
  3. Bus
  4. Peer to Peer

Answer: (d) Peer to Peer

19) The maximum length (in bytes) of an IPv4 datagram is?

  1. 32
  2. 1024
  3. 65535
  4. 512

Answer: (c) 65535


20) Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?

  1. It reports all errors which occur during transmission.
  2. A redirect message is used when a router notices that a packet seems to have been routed wrongly.
  3. It informs routers when an incorrect path has been taken.
  4. The “destination unreachable” type message is used when a router cannot locate the destination.

Answer: (b) A redirect message is used when a router notices that a packet seems to have been routed wrongly.

 

21) The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement?

  1. 255.243.240
  2. 255.255.0.0
  3. 255.255.0
  4. 255.255.255

Answer: (c) 255.255.255.0

22) When the mail server sends mail to other mail servers it becomes ___ ?

  1. SMTP client
  2. SMTP server
  3. Peer
  4. Master

Answer: (a) SMTP client

23) The length of an IPv6 address is?

  1. 32 bits
  2. 64 bits
  3. 128 bits
  4. 256 bits

Answer: (c) 128 bits

24) Consider the following:

  1. Twisted pair cables
  2. Microwaves and Satellite Signals
  3. Repeaters
  4. Analog Transmissions
  5. Fiber optics

Which of the above is consider as (a) signal transmission medium is data communications?

  1. (1) and (5)
  2. (1) and (2)
  3. (1) (2) and (5)
  4. (1) (2) (3) and (5)

Answer: (c) (1) (2) and (5)

25) Which of the following address belongs class A?

  1. 121.12.12.248
  2. 130.12.12.248
  3. 128.12.12.248
  4. 129.12.12.248

Answer: (a) 121.12.12.248

26) Which of the following is correct IPv4 address?

  1. 124.201.3.1.52
  2. 01.200.128.123
  3. 300.142.210.64
  4. 10110011.32.16.8
  5. 128.64.0.0

Answer: (e) 128.64.0.0

27) Which of the following IP addresses can be used as (a) loop-back addresses?

  1. 0.0.0.0
  2. 127.0.0.1
  3. 255.255.255.255
  4. 0.255.255.255

Answer: (b) 127.0.0.1

28) The term WAN stands for?

  1. Wide Area Net
  2. Wide Access Network
  3. Wide Area Network
  4. Wide Access Net

Answer: (c) Wide Area Network

29) Which of the following cannot be used as a medium for 802.3 ethernet?

  1. A thin coaxial cable
  2. A twisted pair cable
  3. A microwave link
  4. A fiber optical cable

Answer: (c) A microwave link

30) What IP address class allocates 8 bits for the host identification part?

  1. Class A
  2. Class B
  3. Class C
  4. Class D

Answer: (c) Class C

31) The term IANA stands for?

  1. Internet Assigned Numbers Authority
  2. Internal Assigned Numbers Authority
  3. Internet Associative Numbers Authoritative
  4. Internal Associative Numbers Authority

Answer: (a) Internet Assigned Numbers Authority

32) How many versions available of IP?

  1. 6 version
  2. 4 version
  3. 2 version
  4. 1 version

Answer: (c) 2 version

33) Which layer of the TCP / IP stack corresponds to the OSI model transport layer?

  1. Host to host
  2. Application
  3. Internet
  4. Network Access

Answer: (a) Host to Host

34) An Aloha network uses an 18.2 kbps channel for sending message packets of 100 bits long size. Calculate the maximum throughput.

  1. 5999
  2. 6900
  3. 6027
  4. 5027

Answer: (c) 0.6027

35) On a simplex data link, which of the following is a possible error recovery technique?

  1. Backward error correction (BEC)
  2. The use of hamming codes
  3. Automatic Repeat Request (ARQ)
  4. Downward error correction (DEC)

Answer: (b) The use of hamming codes

36) Which of the statement is correct with regard to Time Division Multiplexing (TDM) and its variants?

  1. Statistical TDM makes efficient use of the bandwidth only if the arrival pattern of the data stream is probabilistic.
  2. TDM requires the transmitter and receiver to be synchronized periodically.
  3. TDM performs efficiently if the arrival pattern of the data stream is probabilistic.
  4. Statistical TDM is efficient if the data stream is deterministic.

Answer: (a) and (b)

37) The term IPv4 stands for?

  1. Internet Protocol Version 4
  2. Internet Programming Version 4
  3. International Programming Version 4
  4. None of these

Answer: (a) Internet Protocol Version 4

38) The term LAN stands for?

  1. Local Area Net
  2. Local Aera Network
  3. Local Array Network
  4. Local Array Net

Answer: (b) Local Area Network

39) Which of the through is share the data of two computer?

  1. Library
  2. Network
  3. Grouping
  4. Integrated system

Answer: (b) Network

40) In specific, if the systems use separate protocols, which one of the following devices is used to link two systems?

  1. Repeater
  2. Gateway
  3. Bridge
  4. Hub

Answer: (b) Gateway


41) How many digits of the Data Network Identification Code (DNIC) identify the country?

  1. first three
  2. first four
  3. first five
  4. first six
  5. None of the above

Answer: (a) first three

42) Which of the following methods is used to broadcast two packets on the medium at a time?

  1. Collision
  2. Synchronous
  3. Asynchronous
  4. None of the above

Answer: (a) Collision

43) Which of the following is true with regard to the ping command?

  1. Ping stands for Packet Internet Generator.
  2. The ping command checks the port level connectivity between source destinations end points.
  3. Ping summarizes the packet loss and round-trip delay between two IP end points.
  4. The ping command activates the RARP protocol of the IP layer.

Answer: (c) Ping summarizes the packet loss and round-trip delay between two IP end points.

44) The private key in asymmetric key cryptography is kept by?

  1. Sender
  2. Receiver
  3. Sender and Receiver
  4. None of the these

Answer: (b) Receiver

45) Which of the following algorithms is not used in asymmetric-key cryptography?

  1. RSA algorithm
  2. Diffie-Hellman algorithm
  3. Electronic code book algorithm
  4. None of the mentioned

Answer: (c) Electronic code book algorithm

46) In the cryptography, the sequence of the letters is rearranged by?

  1. Transposition ciphers
  2. Substitution ciphers
  3. Both a and b
  4. None of these

Answer: (a) Transposition ciphers

47) What is the maximum efficiency of pure aloha at G = 1/2?

  1. 1.89
  2. 17.99
  3. 18.999
  4. 18.4

Answer: (d) 18.4

48) What is the maximum efficiency of slotted aloha at G = 1?

  1. 36.8
  2. 35.8
  3. 35.5
  4. 37.8

Answer: (a) 36.8

49) Which of the following statement is true about error detection techniques used on communications link?

  1. Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
  2. Error detection cannot be used on simplex links.
  3. Hamming code can detect up to 3-bit errors.
  4. All of the these

Answer: (d) All of the these

50) The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine representation differences with shared access resolution and ASCII test protocol is?

  1. Network, Physical, Transport, Data link
  2. Network, Physical, Data link, Application
  3. Network, Presentation, Data link, Application
  4. Network, Presentation, Physical, Transport

Answer: (c) Network, Presentation, Data link, Application

51) In which of the following switching methods, the message is divided into small packets?

  1. Message switching
  2. Packet switching
  3. Virtual switching
  4. None of the these

Answer: (b) Packet switching

52) Which of the following switch methods creates a point-to-point physical connection between two or more computers?

  1. Message switching
  2. Packet switching
  3. Circuit switching
  4. None of the these

Answer: (a) Circuit switching

53) What is the second name of the proxy server?

  1. Proxy tools
  2. Application proxy
  3. Application-level gateway
  4. All of the these

Answer: (c) Application-level gateway

54) Which of the following servers allows LAN users to share data?

  1. Data server
  2. Point server
  3. File server
  4. Communication server

Answer: (c) File server

55) What is the total vulnerable time value of pure Aloha?

  1. Tfr
  2. 1/2 Tfr
  3. 2 * Tfr
  4. 4 * Tfr

Answer: 2 * Tfr

56) How many fields are in the SMDS packet?

  1. Two
  2. Three
  3. Four
  4. Five

Answer: (b) Three

57) What is the maximum data transfer rate of the optical fiber wire?

  1. 50 kbps
  2. 1000 kbps
  3. 1000 Mbps
  4. None of the these

Answer: (c) 1000 Mbps

58) POTS network works on the principle of ________

  1. Telephone switching
  2. Proxy server
  3. File system
  4. Circuit system

Answer: (d) Circuit switching

59) Which of the following protocols is the bit-oriented protocol?

  1. SSL
  2. http
  3. HDLC
  4. All of the these

Answer: (c) HDLC

60) SLIP stands for _______

  1. System line internet protocol
  2. Serial line internet protocol
  3. Signal line internet protocol
  4. Signal internet protocol

Answer: (b) Serial line internet protocol

61) The second port is used to ____________ in the two-port network.

  1. Input terminal
  2. Output terminal
  3. Signal terminal
  4. Bandwidth terminal

Answer: (b) Output terminal

62) Which of the following layers does the HTTP protocol work on?

  1. Physical layer
  2. Data-link layer
  3. Application layer
  4. None of the these

Answer: (c) Application layer

63) Which of the following statement correct about the cipher in cryptography?

  1. It is a method for performing encryption and decryption
  2. It is used to establish the network connection
  3. It is a message event
  4. All of the these

Answer: (a) It is a method for performing encryption and decryption

64) SONET stands for ______________.

  1. Signal Operation Network
  2. Synchronous Optical Network
  3. System Optical Network
  4. Signal Optical Network

Answer: (b) Synchronous Optical Network

65) How many layers does the SONET contain?

  1. 2 layers
  2. 3 layers
  3. 4 layers
  4. 5 layers

Answer: (c) 4 layers

66) RAKE receiver designed for _____.

  1. Multipath fading
  2. Signals
  3. Data network
  4. Network connection

Answer: (a) Multipath fading

67) What is the formula of high rate in zigzag code?

  1. J / (J * 1)
  2. -Z / (1 + J)
  3. Z * (1 + J)
  4. J / (J + 1)

Answer: (d) J / (J + 1)

68) What is the size of the sender window in the Go Back N (ARQ) protocol?

  1. 0
  2. 1
  3. 10
  4. n

Answer: (d) n

69) What is the efficiency of the Go back N (ARQ) protocol?

  1. N = N / (2a + 2a)
  2. N = N / (1 + 2a)
  3. N = N * (2a + 2a)
  4. N = N * (1 + 2a)

Answer: (b) N = N / (1 + 2a)

70) What is the size of the destination port in the UDP protocol?

  1. 8 bits
  2. 16 bits
  3. 20 bits
  4. 32 bits

Answer: (b) 16 bits


71) What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages?

  1. Ping
  2. Route
  3. Traceroute
  4. Ifconfig

Answer: (c) Traceroute

72) A client of the DNS (Domain Name System) application is called _____.

  1. DNS server
  2. DNS Name
  3. DNS resolver
  4. DNS inquirer

Answer: (c) DNS resolver

73) How many characters consist of the entire hostname?

  1. 511 characters
  2. 255 characters
  3. 127 characters
  4. 31 characters

Answer: (a) 255 characters

74) During normal IP packet forwarding by a router, which of the following fields of the IP header is updated?

  1. Repeater
  2. Source address
  3. Destination address
  4. Checksum

Answer: (d) Checksum

75) Which of the following statements is correct about the DWDM?

  1. It can transmit data at very high speeds
  2. It can transmit data at very slow speeds
  3. DWSM stands for digital wave division multiplexing
  4. None of the these

Answer: (a) It can transmit data at very high speeds

76) MAC address is also called ______.

  1. Physical address
  2. Logical address
  3. Source address
  4. Destination address

Answer: (a) Physical address

77) Which of the following addresses is 32-bit?

  1. MAC address
  2. Virtual address
  3. Source address
  4. Destination address

Answer: (a) Virtual address

78) EDI stands for ____.

  1. Electronic Data Interchange
  2. Electronic Digital Internet
  3. Electronic Digital Interchange
  4. Electronic Data Internet

Answer: (a) Electronic Data Interchange

79) What is the maximum data transfer rate of the ISDN?

  1. 1024 Mbps
  2. 64 Mbps
  3. 64 kbps
  4. 1024 kbps

Answer: (b) 64 kbps

80) ARPANET stands for _______.

  1. Advanced Recheck Projects Agency Internet
  2. Advanced Recheck Projects Agency Network
  3. Advanced Research Projects Agency Network
  4. Advanced Research Projects Agency Internet

Answer: (c) Advanced Research Projects Agency Network

81) What is the size of the UDP header?

  1. 8 bytes
  2. 16 bytes
  3. 20 bytes
  4. 64 bytes

Answer: (a) 8 bytes

82) Which of the following protocols is the connection-less protocol?

  1. UDP
  2. TCP
  3. IP
  4. All of the these

Answer: (a) UDP

83) Wildcard domain name labels begin with a ______.

  1. .
  2. 0
  3. @
  4. *
  5. #

Answer: (c) *

84) What is the maximum length of the STP wire?

  1. 20 ft
  2. 50 ft
  3. 50 meters
  4. 100 meters

Answer: (d) 100 meters

85) Which network is suitable for a building?

  1. WAN
  2. LAN
  3. MAN
  4. PAN

Answer: (b) LAN

86) ________ is a 2G mobile telecommunications based on the CDMA.

  1. IS-95
  2. ISO 1990
  3. IS-97
  4. None of the these

Answer: (a) IS-95

87) Which of the following statements is correct about IRC?

  1. It sends the messages in virtual time
  2. It is an application layer protocol
  3. It works on the proxy model
  4. All of the these

Answer: (b) It is an application layer protocol

88) Which of the following devices is not a networking device?

  1. Hub
  2. Switch
  3. Bridge
  4. None of the these

Answer: (d) None of the these

89) Which of the following devices does not require power to forward the signals?

  1. Active hub
  2. Passive hub
  3. Repeater
  4. Bridge

Answer: (b) Passive hub

90) How many pins does RJ-45 contain?

  1. Two
  2. Four
  3. Eight
  4. Ten

Answer: (c) Eight

91)Which of the following does not allow multiple uses or devices to share one communication line?

a) concentrator

b) multiplexer

c) doubleplexer

d) controller

Answer: doubleplexer

92)A term used to describe interconnected computer configuration is

a) Micro program sequence

b) Modulation

c) Multiprocessing

d) Multiprogramming

e) None of these

Answer: Multiprogramming

 

93)A device that connects to a network without the use pf cables is said to be—

a) distributed

b) open source

c) centralized

d) wireless

e) None of these

Answer: wireless

 

94) If you want to connect to your own computer through the Internet from another location, you can use

a) e-mail

b) FTP

c) instant message

d) Telnet

e) None of these

Answer: (d) Telnet

 

95)Which file keeps commands to execute automatically when OS Is started?

a) autoexec.bat

b) any batch file

c) command.com

d) config.sys

e) none of the above

Answer: autoexec.bat 

96) __________ is the most important/powerful computer in a typical network.

a) Desktop

b) Network client

c) Network server

d) Network station

e) Network switch

Answer: (c) Network server 

 

97)A MODEM is connected in between a telephone line and a __________.

a) Network

b) Computer

c) Communication Adapter

d) Serial Port

Answer: (b) Computer 

 

98) The most important or powerful computer in a typical network is

a) desktop

b) network cliejit

c) network station

d) network server

e) None of these

Answer: (d) network server

 

99) Computers connected to a LAN can

a) run faster

b) go on line

c) share information and/or share peripheral equipment

d) E-mail

e) None of these

Answer: (c)  share information and/or share peripheral equipment

 

100) A dumb terminal has

a) An embedded micro process

b) Extensive memory

c) A keyboard and screen

d) Independent processing

e) None of these

Answer: (c) A keyboard and screen

 

101) What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

a) Switch

b) Bridge

c) Gateway

d) Router

e) None of these

Answer: (b) Bridge

 

102)An example of a telecommunications device is a ________.

a) keyboard

b) mouse

c) printer

d) modem

e) None of these

Answer: (d) modem

 

103) Computer and communication technology, such as communication links to the Internet, that provide help and understanding to the end user is known as

a) presentation file

b) information technology

c) program

d) worksheet file

e) FTP

Answer: (e) FTP

 

104) To make a notebook act as a desktop model, the notebook can, be connected to a__ which is connected to a monitor and other devices.

a) bay

b) network

c) port

d) docking station

e) None of these

Answer: (d) docking station

 

105) If you wish to extend the length of the network without having the signal degrade, you would use a

a) resonance

b) router

c) gateway

d) switch

e) repeater

Answer: (e)  repeater

106)  Which type of switching uses the entire capacity of a dedicated link?

a) Datagram Packet Switching

b) Virtual Circuit Packet Switching

c) Circuit switching

d) Message Switching

e) None of these

Answer: (a)  Datagram Packet Switching 

 

107)  What is a modem connected to ?

a) processor

b) motherboard

c) printer

d) phone line

e) None of these

Answer: (d) phone line

 

108) Which device is used to access your computer by other computer or for talk over phone?

a) RAM

b) CD ROM Drive

c) Modem

d) Hard Disk

e) None of these

Answer: (c) Modem

 

109) Which of the following Operating systems is better for Implementing a Client-Server network

a) MS DOS

b) Windows 2000

c) Windows 98

d) Windows 95

e) none of the above

Answer: (b) Windows 2000

 

110) A protocol is a set of rules governing a time sequence of events that must take place

a) between modems

b) between an interface

c) between peers

d) across an interface

e) none of the above

Answer: (c)  between peers

111) Codec refers to

a) Coder-decoder

b) Co-declaration

c) Command declaration

d) Command decoding

e) None of these

Answer: (a) Coder-decoder 

 

112)  Smaller and less expensive PC-based servers are replacing ____ in many businesses.

a) supercomputers

b) mainframes

c) laptops

d) clients

e) None of these

Answer: (b) mainframes

 

113) Usually, in MSDOS, the primary hard disk drives has the drive letter __

a) A

b) B

c) D

d) C

e) none of the above

Answer: (d) C 

 

114) The synchronous modems are more costly than the asynchronous modems because

a) they produce large volume of data

b) they contain clock recovery circuits

c) they transmit the data with stop and start bits.

d) they operate with a larger bandwidth

e) None of these

Answer: (b) they contain clock recovery circuits

 

115) Officer LANs that are spread geographically apart on a large scale can be connected using a corporate

a) CAN

b) LAN

c) DAN

d) WAN

e) TAN

Answer: WAN

Leave a Comment