276
104.6k

980+ Computer Networks Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Electrical Engineering , Bachelor of Science in Computer Science TY (BSc CS) , Bachelor of Science in Information Technology FY (BSc IT) , Bachelor of Science in Information Technology SY (BSc IT) .

951.

Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem
B. Cable
C. Hub
D. Router
Answer» D. Router
952.

Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
953.

Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
954.

_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» B. CRC
955.

The PSTN is an example of a ………………… network.

A. packet switched
B. circuit switched
C. message switched
D. None of these
Answer» B. circuit switched
956.

A subset of a network that includes all the routers but contains no loops is called:

A. spanning tree
B. spider structure
C. spider tree
D. none of the mentioned
Answer» A. spanning tree
957.

An endpoint of an inter-process communication flow across a computer network is called:

A. socket
B. pipe
C. port
D. none of the mentioned
Answer» A. socket
958.

In an Ethernet local area network, which one of the following statements is TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.
B. The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retransmissions
Answer» D. The exponential back off mechanism reduces the probability of collision on retransmissions
959.

A small network making up the Internet and also having a small numbers of computers within it is called

A. Host
B. Address
C. Subdomain
D. None of the above
Answer» C. Subdomain
960.

If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
961.

In CRC there is no error if the remainder at the receiver is _____.

A. equal to the remainder at the sender
B. zero
C. nonzero
D. the quotient at the sender
Answer» B. zero
962.

A modulator converts a _____ signal to a(n) _____ signal.

A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
Answer» C. analog; digital
963.

ASK, PSK, FSK, and QAM are examples of _____ encoding.

A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Answer» B. digital-to-analog
964.

With an IP address of 201.142.23.12, what is your default subnet mask?

A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Answer» D. 255.255.255.0
965.

DSL stands for ------------------------

A. data subscriber lines
B. dual subscriber lines
C. delay subscriber lines
D. digital subscriber lines
Answer» D. digital subscriber lines
966.

The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?

A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
Answer» B. Token passing
967.

One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?

A. It can be used to prioritize packets
B. It can be used to reduce delays
C. It can be used to optimize throughput
D. It can be used to prevent packet looping
Answer» D. It can be used to prevent packet looping
968.

Which of the following system calls results in the sending of SYN packets?

A. socket
B. bind
C. listen
D. connect
Answer» D. connect
969.

What is the maximum size of data that the application layer can pass on to the TCP layer below?

A. Any size
B. 2^16 bytes-size of TCP header
C. 2^16 bytes
D. 1500 bytes
Answer» A. Any size
970.

Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?

A. 12
B. 14
C. 16
D. 18
Answer» C. 16
971.

Which one of the following statements is FALSE?

A. Packet switching leads to better utilization of bandwidth resources than circuit switching.
B. Packet switching results in less variation in delay than circuit switching.
C. Packet switching requires more per packet processing than circuit switching
D. Packet switching can lead to reordering unlike in circuit switching
Answer» B. Packet switching results in less variation in delay than circuit switching.
972.

In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________.

A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Answer» D. 5 bytes
973.

In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called

A. Preamble
B. Post amble
C. Jam
D. None of the above
Answer» C. Jam
974.

How many digits of the DNIC (Data Network Identification Code) identify the country?

A. First three
B. First four
C. First five
D. First six
Answer» A. First three
975.

Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTP
B. SNMP
C. SMTP
D. RPC
Answer» C. SMTP
976.

Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hub
B. bridge
C. gateway
D. repeater
Answer» C. gateway
977.

_______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code
B. CRC
C. VRC
D. None of the above
Answer» B. CRC
978.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

A. 5
B. 10
C. 2
D. 6
Answer» D. 6
979.

In an Ethernet local area network, which one of the following statements is TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.
B. The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
D. The exponential back off mechanism reduces the probability of collision on retr
Answer» A. A station stops to sense the channel once it starts transmitting a frame.
980.

Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet.

A. Address Resolution Protocol (ARP)
B. Internet Protocol (IP)
C. Hypertext transfer Protocol (HTTP)
D. Tr
Answer» C. Hypertext transfer Protocol (HTTP)
981.

If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

A. 1 kbps
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Answer» D. 10 kbps
982.

Sending a file from your personal computer's primary memory or disk to another computer is called

A. uploading
B. downloading
C. logging on
D. hangs on
Answer» A. uploading
983.

Consider different activities related to email.
m1:Send an email from a mail client to mail server
m2:Download an email from mailbox server to a mail client
m3:Checking email in a web browser
Which is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP
B. m1:SMTP, m2:FTP, m3:HTTP
C. m1:SMTP, m2:POP, m3:HTTP
D. m1:POP, m2:SMTP, m3:IMAP
Answer» C. m1:SMTP, m2:POP, m3:HTTP
984.

In the slow start phase of the TCP congestion control algorithm, the size of the congestion window

A. does not increase
B. increases linearly
C. increases quadratically
D. increases exponentially
Answer» D. increases exponentially
985.

Match the following:
(P) SMTP (1) Application layer
(Q) BGP (2) Transport layer
(R) TCP (3) Data link layer
(S) PPP (4) Network layer
(5) Physical layer

A. P – 2 Q – 1 R – 3 S – 5
B. P – 1 Q – 4 R – 2 S – 3
C. P – 1 Q – 4 R – 2 S – 5
D. P – 2 Q – 4 R – 1 S – 3
Answer» B. P – 1 Q – 4 R – 2 S – 3
986.

In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because

A. Receiver is to be synchronized for byte reception
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
C. Padded bits are useful in parity computation
D. None of these
Answer» A. Receiver is to be synchronized for byte reception
987.

What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?

A. 20%
B. 25%
C. 40%
D. 66%
Answer» B. 25%

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.