Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

MCQ CN

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

COMPUTER NETWORKS MCQ

UNIT-I
PART-A

1. A distributed network configuration in which all data/information pass through a central


computer is
A. Bus network
B. Star network
C. Ring network
D. Point-to-point network

Answer: B. Star network

2. Which of the following communications modes support two-way traffic but in only one
direction of a time ?
A. Simplex
B. Half-duplex
C. Three-quarters duplex
D. Full duplex

Answer : B. Half-duplex

3. A ____ typically connects personal computers within a very limited geographical area,
usually within a single building.
A. LAN
B. WAN
C. MAN
D. TAN

Answer : A.LAN

4. Officer LANs that are spread geographically apart on a large scale can be connected
using a corporate
A. LAN
B. WAN
C. MAN
D. CAN

Answer : B.WAN

5. A ____ is a set of rule s.


A. Resource locator
B. Protocol
C. Domain
D. URL

Answer : B. Protocol

6. The slowest transmission speeds are those of


A. Coaxial cable
B. Twisted-pair wir e
C. Fiber-optic cable
D. Microwaves

Answer : B.Twisted-pair wire

7. Physical layer provides:


A . Mechanical specifications of electrical connectors and cables
B . Electrical specification of transmission line signal level
C. Specification for IR over optical fiber
D. All of the mentioned

Answer: D. All of the mentioned

8. Which type o f topology is best suited for large businesses which must
carefully control and coordinate the operation of distributed branch outl ets?
a. Ring
b. Local area
c . Hierarchical
d. Star

Answer: (d) Star

9. The OSI model contains


a) 7 layers
b) 5 layers
c) 8 layers
d) None of the above

Answer: a) 7 layers

10.The function of data link layer is


a) Physical addressing
b) Logical addressing
c) Routing
D) Dialog Control

Answer: a) Physical addressing

PART-B

1. What kind o f transmission medium is most appropriate to carry data in a


computer network that is exposed to electrical interferences?
a. Unshielded twisted pair
b. Optical fiber
c . Coaxial cable
d. Microwave

Answer: (b) Optical fiber

2. The common name for a modulator -de modulator is


A. Modem
B. Joiner
C. Networker
D. Connector

Answer : A. Modem

3. The Internet is
A. A communication system for some state s of India
B. A communication system for the Indian government
C. An internal communication system for a business
D. A large network of networks

Answer : D. A large network of networks

4. Several computers linked to a server to shared programs and storage space .


A. Library
B. Network
C. Grouping
D. Integrated system

Answer : B. Network

UNIT-II
PART-A

1. A modem is connected to
A. A telephone line
B. A keyboard
C. A printer
D. A monitor

Answer : A. A telephone line

2. A popular way to learn about computers without ever going to a classroom is called
A. E-learning
B. Star network
C. I-learning
D. Close learning

Answer: A. E- learning

3. Codec refers to
A. Coder-decoder
B. Co-declaration
C. Command declaration
D. Command decoding

Answer: A. Coder- decoder

4. What is a modem connected to?


A. Phone line
B. Processor
C. Printer
D. Mother boar d
Answer : A. Phone line
5. Which of the following is not a disadvantage of wireless LA N?
A. Slower data transmission
B. Higher error rate
C. Interference of transmissions from different computers
D. All of the above

Answer : D. All of the above

6. "Parity bi ts" are used for which of the following purposes?


a. Encryption of data
b. To transmit faster
c . T o detect errors
d. To identify the user

Answer: c)T o detect errors

7. Bluetooth is an example of
A. Personal are a network
B. Local area network
C. Virtual private network
D. Wide area network

Answer: A. Personal are a network

PART-B
1. The speed of the fast Ethernet is
a) 10 Mbps
b) 100 Mbps
c) 1 Gbps
d) 10 Gbps

Answer: 100 Mbps

2. The Length of the Ethernet address is


a) 32 bits
b) 48 bits
c) 64 bits
d) 128 bits

Answer: b) 48 bits

3. 10Base5 refers for


a) Thick Ethernet
b) Thin Ethernet
c) Fiber Ethernet
d) Bridged Ethernet

Answer: a) Thick Ethernet

4. A Piconet in Blutooth can have up to


a) 6 stations
b) 8 stations
c) 10 stations
d) 12 stations

Answer: b) 8 stations

UNIT-III
PART-A

1. Which of the following device is use d to connect two systems, especially if the systems
use different protocols?
A. Repeater
B. Gateway
C. Bridge
D. Hub

Answer : B. Gateway

2. A term related sending data to a satellite is?


A. Downlink
B. Modulate
C. Demodulate
D. Uplink

Answer : D. Uplink

3. Networks are monitored by security personnel and supervised by _____ who set(s) up
accounts and passwords for authorized network users.
A. IT managers
B. The government
C. Password administrators
D. Network administrators

Answer : D. Network administrators

4. A device that connects to a network without the use of cables is said to be


A. Distributed
B. Centralized
C. Wireless
D. Open source

Answer : C. Wireless

5. What device separates a single network into two segments but lets the two segments
appear as one to higher protocols?
A. Switch
B. Router
C. Bridge
D. Gate way

Answer : C .Bridge
6. The connection between your computer at home and y our local ISP is called _____
A. The last mile
B. The home stretch
C. The home page
D. The backbone

Answer : C .The home page

7. A device which can be connected to a network without using cable is called


A. Centralized device
B. Distributed device
C. Wireless device
D. Open-source device

Answer : C .Wireless device

8. Frames from one LAN can be transmitted to another LAN via the device
A. Router
B. Bridge
C. Repeater
D. Modem

Answer : B. Bridge

PART-B

1. To connect networks of similar protocols ______ are use d.


A. Routers
B. Bridges
C. Gate ways
D. Dial-up route rs

Answer : B. Bridges

2. Which one of the following routing algorithm can be used for network layer
design?
A . Shortest path algorithm
B . Distance vector routing
C. Link state routing
D . All of the mentioned

Answer: D. All of the mentioned

3. The length of an IPV4 address is


a) 32 bits
b) 64 bits
c) 128 buts
d) 256 bits

Answer: a) 32 bits

4. The class of the IP address11000001 1000011 00011011 11111111 is


a) Class A
b) Class B
c) Class C
d) Class D

Answer: c) Class C

UNIT-IV
PART-A

1. Computers that control processes accept data in a continuous


A. Data traffic pattern
B. Data highway
C. Infinite loop
D. Feedback loop

Answer : C .Infinite loop

2. What is a benefit of networking y our computer with other compute rs?


A. Increase in the computer 's speed
B. Sharing of cables to cut down on expenses and clutter
C. Sharing of resources to cut down on the amount of equipment needed
D. Increase in the speed of the network

Answer : C. Sharing of resources to cut down on the amount of equipment


needed

3. Which of the following is required to communicate between two compute r s?


A. Communications software
B. Protocol
C. Communications hardware
D. All of the above

Answer: D. All of the above

4. Which of the following type s of channels moves data relatively slowly ?


A. Wide band channel
B. Voice band channel
C. Broadband channel
D. Narrowband channel

Answer : D .Narrowband channel

5. Computers connected to a LA N (local area network) can


A. Run faster
B. Go on line
C. E–mail
D. Share information and/or share peripheral equipment

Answer : D. Share information and/or share peripheral equipment

6. _______ is a technique that is use d to send more than one call over a single line .
A. Digital transmission
B. Infrared transmission
C. Digitizing
D. Multiplexing

Answer : D. Multiplexing

7. A collection of compute r s and devices connected together via communication device s


and transmission media is called a
A. Workgroup
B. Server
C. Mainframe
D. Network

Answer : D .Network

8.The ASCII encoding of binary data is called:


A . base 64 encoding
B . base 32 encoding
C. base 16 encoding
D. base 8 encoding

Answer: A . base 64 encoding

9. Automatic repeat request error management mechanism is provided by:


A . Logical link control sub layer
B . Media access control sub layer
C. Network interface control sub layer
D. None of the mentioned

Answer: A . Logical link control sub layer

10. Transmission control protocol is:


A . Connection oriented protocol
B . Uses a three way handshake to establish a connect ion
C. Receives data from application as a single stream
D. All of the mentioned

Answer: A .Connect ion oriented protocol

PART-B
1. Which of these is a standard interface for seri al data transmission?
a. ASCII
b. R S232C
c. 2
d. Centronics

Answer: (b) R S232C

2. The well known port number used by TCP for telnet is


a) 20
b) 21
c) 23
d) 25
Answer: c) 23
3. UDP is a suitable protocol for
a) Unicasting
b) Multicasting
c) Broadcasting
d) None of the above

Answer: b) Multicasting

UNIT-V
PART-A

1. The collection of links thr oughout the Internet creates an inter connected network called
the
A. WWW
B. Web
C. Wide Area Web
D. All of the above

Answer : D. All of the above

2. P2P is a _____ application architecture .


A. Client/server
B. Distributed C.Centralized
D. 1-tier

Answer : B. Distributed

3. _______ is the most important/powerful computer in a typical networ k.


A. Desktop
B. Network server
C. Network client
D. Network switch

Answer : B. Network server

4. A MODEM is connected in between a telephone line and a


A. Compute r
B. Communication
A dapter
C. Serial Port
D. Networ k

Answer : A. Computer

5. Which device is use d to access your compute r by other compute r or for talk over
phone ?
A. RAM
B. Modem
C. CD ROM Drive
D. Hard disk
Answer : B.Modem
6. The vast network of compute r s that connects millions of people all over the wor ld is
called
A. LAN
B. Web
C. Hypertext
D. Interne t

Answer : D .Internet

7. Which of the following terms is just the collection of networks that can be joined
together ?
A. Virtual private network
B. Intranet
C. Extranet
D. LAN

Answer : B. Intranet

8. Telnet is a ______ base d compute r protocol.


A. Sound
B. Text
C. Image
D. Animation

Answer : B. Text

PART-B
1. The hard of the SMTP is
a) UA
b) MIME
c) MTA
d) POP3

Answer: b) MIME

2. HTTP uses the services of TCP on well-known port number


a) 40
b) 60
c) 80
d) 100

Answer: c) 80

4. Computer and communication technology , such as communication links to the Inter net,
that provide help and understanding to the end use r is known as
A. Presentation file
B. Information technology
C. Worksheet file
D. FTP

Answer : D.FTP
5. What is data encrypt ion standard (DES)?
A . block cipher
B . stream cipher
C. bit cipher
D. none of the mentioned

Answer: A. block cipher

You might also like