276
104.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

851.

The process of keeping addresses in memory for future use is called

A. Routing
B. Resolving
C. Caching
D. None of the above
Answer» C. Caching
852.

A small network making up the Internet and also having a small numbers of computers within it is called

A. Host
B. Address
C. Subdomain
D. None of the above
Answer» C. Subdomain
853.

If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is .

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
854.

In CRC there is no error if the remainder at the receiver is .

A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» B. zero
855.

Internet-like networks within an enterprise.

A. Intranets
B. Switching alternating
C. Inter organizational networks
D. Extranets
Answer» A. Intranets
856.

Sending a file from your personal computer's primary memory or disk to another computer is called

A. uploading
B. downloading
C. logging on
D. hangs on
Answer» A. uploading
857.

FDDI is a

A. ring network
B. star network
C. mesh network
D. bus based network
Answer» A. ring network
858.

Which address is the loopback address?

A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
Answer» C. 127.0.0.1
859.

A modulator converts a signal to a(n) signal.

A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer» C. analog; digital
860.

The birthplace of the World Wide Web is considered to be

A. the Department of Defence
B. CERN
C. ARPA
D. Netscape
Answer» B. CERN
861.

What is the port number for HTTP?

A. 99
B. 86
C. 80
D. 23
Answer» C. 80
862.

The communication mode that supports data in both directions at the same time is

A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Answer» C. full-duplex
863.

The basic Ethernet design does not provide

A. access control
B. addressing
C. automatic retransmission of a message
D. multiple virtual networks
Answer» C. automatic retransmission of a message
864.

What does the acronym ISDN stand for?

A. Indian Standard Digital Network
B. Integrated Services Digital Network
C. Intelligent Services Digital Network
D. Integrated Services Data Network
Answer» B. Integrated Services Digital Network
865.

ASK, PSK, FSK, and QAM are examples of encoding.

A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer» B. digital-to-analog
866.

Who invented the modem?

A. Wang Laboratories Ltd.
B. AT & T Information Systems, USA
C. Apple Computers Inc.
D. Digital Equipment Corpn
Answer» B. AT & T Information Systems, USA
867.

With an IP address of 201.142.23.12, what is your default subnetmask?

A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» D. 255.255.255.0
868.

Which utility is an all-purpose tool for troubleshooting TCP/IP problems?

A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Answer» C. PING
869.

Which Layer is Responsible for Congestion Control?

A. Network Layer
B. Data link Layer
C. Transport Layer
D. Application layer
Answer» C. Transport Layer
870.

Pure ALOHA has a maximum throughput of -----------

A. 16.4 %
B. 18.4 %
C. 7.4 %
D. 1 %
Answer» B. 18.4 %
871.

Which of these is a feature of hubs?

A. Hubs amplifies the incoming signal.
B. Hubs understand frames, packets or headers
C. All lines coming into a Hub must operate at a same speed.
D. all of these
Answer» C. All lines coming into a Hub must operate at a same speed.
872.

DSL stands for

A. data subscriber lines
B. dual subscriber lines
C. delay subscriber lines
D. digital subscriber lines
Answer» D. digital subscriber lines
873.

Which of the following is a MAC address?

A. 192.166.200.50
B. 00056A:01A01A5CCA7FF60
C. 568, Airport Road
D. 01:A5: BB: A7: FF: 60
Answer» D. 01:A5: BB: A7: FF: 60
874.

The main difference between TCP and UDP is

A. UDP is connection oriented whereas TCP is datagram service
B. TCP is an Internet protocol whereas UDP is an ATM protocol
C. UDP is a datagram whereas TCP is a connection oriented service
D. All of the above
Answer» C. UDP is a datagram whereas TCP is a connection oriented service
875.

What operates in the Data Link and the Network layer?

A. NIC
B. Bridge
C. Brouter
D. Router
Answer» C. Brouter
876.

Which file transfer protocol uses UDP?

A. NFS
B. TELNET
C. TFTP
D. FTP
Answer» C. TFTP
877.

Which of the following network access standard is used for connecting stations to a circuit-switched network?

A. X.3
B. X.21
C. X.25
D. X.75
Answer» B. X.21
878.

In OSI model, which of the following layer provides error-free delivery of data?

A. Data link
B. Network
C. transport
D. Session
Answer» C. transport
879.

To avoid transmission errors, a check figure is calculated by the

A. transmitting computer
B. receiving computer
C. both (a) and (b)
D. Start and stop bit
Answer» C. both (a) and (b)
880.

What is the first octet range for a class A IP address?

A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
Answer» A. 1 - 126
881.

CSMA (Carrier Sense Multiple Access) is

A. a method of determining which device has access to the transmission medium at any time
B. a method access control technique for multiple-access transmission media.
C. a very common bit-oriented data link protocol issued by ISO.
D. network access standard for connecting stations to a circuit-switched network
Answer» B. a method access control technique for multiple-access transmission media.
882.

What is the first octet range for a class B IP address?

A. 128 - 255
B. 1 - 127
C. 192 - 223
D. 128 - 191
Answer» D. 128 - 191
883.

ARP (Address Resolution Protocol) is

A. a TCP/IP protocol used to dynamically bind a high level IP Address to a lowlevel physical hardware address
B. a TCP/IP high level protocol for transferring files from one machine to another
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
Answer» A. a TCP/IP protocol used to dynamically bind a high level IP Address to a lowlevel physical hardware address
884.

The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?

A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
Answer» B. Token passing
885.

Terminals are required for

A. real time, batch processing, and timesharing
B. real time, timesharing, and distributed processing
C. real time, distributed processing, and manager inquiry
D. real time, timesharing, and message switching
Answer» D. real time, timesharing, and message switching
886.

What OSI layer handles logical address to logical name resolution?

A. Transport
B. Physical
C. Presentation
D. Data Link
Answer» A. Transport
887.

Consider different activities related to email. m1:Send an email from a mail client to mail server m2:Download an email from mailbox server to a mail client m3:Checking email in a web browser Which is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» C. m1:SMTP, m2:POP, m3:HTTP
888.

One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?

A. It can be used to prioritize packets
B. It can be used to reduce delays
C. It can be used to optimize throughput
D. It can be used to prevent packet looping
Answer» D. It can be used to prevent packet looping
889.

Which of the following system calls results in the sending of SYNpackets?

A. socket
B. bind
C. listen
D. connect
Answer» D. connect
890.

In the slow start phase of the TCP congestion control algorithm, the size of the congestion window

A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» D. increases exponentially
891.

What is the maximum size of data that the application layer can pass on to the TCP layer below?

A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» A. Any size
892.

A computer on a 10Mbps network is regulated by a token bucket. The token bucket is filled at a rate of 2Mbps. It is initially filled to capacity with 16Megabits. What is the maximum duration for which the computer can transmit at the full 10Mbps?

A. 1.6 seconds
B. 2 seconds
C. 5 seconds
D. 8 seconds
Answer» B. 2 seconds
893.

In Ethernet when Manchester encoding is used, the bit rate is:

A. Half the baud rate.
B. Twice the baud rate.
C. Same as the baud rate.
D. none of the above
Answer» A. Half the baud rate.
894.

Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what isthe number of packets that A will transmit for sending the message to B?

A. 12
B. 14
C. 16
D. 18
Answer» C. 16
895.

Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s.

A. 1
B. 2
C. 2.5
D. 5
Answer» B. 2
896.

Let G(x) be the generator polynomial used for CRC checking. What is the condition that should be satisfied by G(x) to detect odd number of bits in error?

A. G(x) contains more than two terms
B. G(x) does not divide 1+x^k, for any k not exceeding the frame length
C. 1+x is a factor of G(x)
D. G(x) has an odd number of terms.
Answer» C. 1+x is a factor of G(x)
897.

In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because

A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» A. Receiver is to be synchronized for byte reception
898.

Which one of the following statements is FALSE?

A. Packet switching leads to better utilization of bandwidth resources than circuit switching.
B. Packet switching results in less variation in delay than circuitswitching.
C. Packet switching requires more per packet processing than circuitswitching
D. Packet switching can lead to reordering unlike in circuitswitching
Answer» B. Packet switching results in less variation in delay than circuitswitching.
899.

Which of the following statements is FALSE regarding a bridge?

A. Bridge is a layer 2 device
B. Bridge reduces collision domain
C. Bridge is used to connect two or more LAN segments
D. Bridge reduces broadcast domain
Answer» D. Bridge reduces broadcast domain
900.

In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is .

A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» D. 5 bytes

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.