Computer Networking

MCQ questions and answers

  • 4.5/5.0
  • 1k Enrolled
  • All levels
  • Last updated 11/2023
  • English

Computer Networking MCQ (96)

1. ____ is a variation of the packet arrival time.
A Timeliness
B Jitter
C Accuracy
D Delay
Answer: B
2. In_____ mode of communication, the station can transmit and receive data, not at the same time?
A Simplex
B Full duplex
C Half duplex
D Duplex
Answer: C
3. In which topology, every device has a dedicated link (point to point) with every connected device?
A Star
B Bus
C Ring
D Mesh
Answer: D
4. When one node sends data to another, the data passes through each intermediate node on the ring until it reaches its destination is called ____
A Star topology
B Bus topology
C Ring topology
D Mesh topology
Answer: C
5. _____ is a set of rules used for data communications.
A Protocols
B Semantics
C TCP/IP
D OSI model
Answer: A
6. ______ is used to carry a data over the physical medium?
A Network layer
B Transport layer
C Physical layer
D Presentation layer
Answer: C
7. Which layer is used to move the frame from one hop to the next hop?
A Physical layer
B Datalink layer
C Transport layer
D Network layer
Answer: B
8. _____ is a digital data transmission unit in computer networking and telecommunication.
A packet
B frame
C message
D none of these
Answer: B
9. Which OSI layer is responsible for the delivery of an individual packet from the source to destination host?
A Network layer
B Transport layer
C Session layer
D Data link layer
Answer: A
10. Which layer is responsible for end-to-end communication over a network?
A Session layer
B Application layer
C Network layer
D Transport layer
Answer: D
11. Which layer is responsible for translation, compression, and encryption?
A Application
B Presentation layer
C Session layer
D Data link layer
Answer: B
12. Which OSI layer is responsible for providing a services to the user?
A Data link layer
B Data link layer
C Application layer
D Physical layer
Answer: C
13. What is the length of a port address in the TCP/IP protocol?
A 8 bit
B 16 bit
C 1024 bit
D 32 bit
Answer: B
14. ______ has a discrete state in the communication.
A Analog data
B Digital data
C Electromagnetic signal
D None
Answer: B
15. __________ analog signal and __________ digital signals are used for data communications.
A non-periodic, periodic
B periodic, discrete
C periodic, non-periodic
D continuous, discrete
Answer: C
16. _____ is the rate of change with respect to the time.
A Frequency
B Amplitude
C Wave
D Intensity
Answer: A
17. The loss of frequency is known as _____?
A Distortion
B Attenuation
C Noise
D Latency
Answer: B
18. _______ is the fundamental maximum transmission capacity that can be achieved on a channel given any combination of any coding scheme, transmission or decoding scheme.
A Shannon’s capacity limit
B Medium capacity limit
C von neumann capacity limit
D None
Answer: A
19. ______ is a standard unit for measuring the strength of Wi-Fi wireless radio signals
A Attenuation
B Decibel
C Baud rate
D Amplitude
Answer: B
20. Modulation uses the __________.
A broadband channel
B lowpass channel
C bandpass channel
D high bandwidth channel
Answer: C
21. __________ transmission means sending a digital signal over a channel without conversion of the original signal.
A Baseband
B Broadband
C Lowpass channel
D Wide bandwidth
Answer: A
22. In baseband transmission, required ______ is proportional to the bit rate.
A Frequency
B Bandwidth
C Harmonics
D Attenuation
Answer: B
23. ______is a standard unit for measuring the strength of Wi-Fi wireless radio signals
A MHz
B Decibel
C cm
D GHz
Answer: B
24. The process of conversion of digital data into digital signals is knonw as_____.
A Line coding
B Block coding
C Scrambling
D Multiplexing
Answer: A
25. The data rate is also called __________.
A baud rate
B modulation rate
C pulse rate
D bit rate
Answer: D
26. The signal rate (s) is / are also known as __________.
A baud rate
B modulation rate
C pulse rate
D all of the above
Answer: D
27. ______ is a form of digital encoding in which data bits are represented by transitions from one logical state to the other.
A Manchester encoding
B biphase encoding
C NRZ-L encoding
D nyquist bit rate
Answer: A
28. Which network topology uses the central hub?
A Bus
B Ring
C Star
D Mesh
Answer: C
29. _____ states that an analog signal waveform may be uniquely reconstructed, without error, from samples taken at equal time intervals.
A Manchester theorem
B Nyquist’s theorem
C Amplifier
D None
Answer: B
30. _____ transmission is a data transfer method in which a continuous stream of data signals is accompanied by timing signals.
A Synchronous
B Asynchronous
C Isochronous
D Serial transmission
Answer: A
31. In which OSI layer the byte synchronization take place?
A Physical layer
B Network layer
C Data link layer
D Transport layer
Answer: C
32. ______ signal is a signal in which the time interval separating any two significant instants is equal to the unit interval or a multiple of the unit interval.
A Asynchronous
B Manchester encoding
C Synchronous
D Isochronous
Answer: D
33. __________ is a set of technique which allows the simultaneous transmission of multiple signals across the single data link.
A Multiplexing
B Synchronization
C Spreading
D Pulse stuffing
Answer: A
34. ______ is an analog multiplexing technique which is used to combine an analog signal for the communication.
A FDM
B TDM
C WDM
D None
Answer: A
35. What is an analog multiplexing technique used to combine an optical signal?
A WDM
B TDM
C FDM
D ASK
Answer: A
36. _____ is a digital multiplexing technique for combining several low rate channels into one high rate channels.
A FDM
B TDM
C DWDM
D WDM
Answer: B
37. What is name of the band which is ranging in between 1 and 300GHz?
A VLF
B Radio waves
C Micro waves
D LF
Answer: C
38. In __________ switching technique, the resources remain dedicated to the entire duration of the data transmission until the tear-down phase occurs.
A circuit
B packet
C message
D virtual circuit
Answer: A
39. in which layer the datagram switching technique is used for the transmission.
A Data link layer
B Network layer
C Transport layer
D Session layer
Answer: B
40. _____ means that two or more bits in the data unit have changed from 0 to 1 or vice-versa.
A Single bit error
B Forword error
C Burst error
D Convolution
Answer: C
41. ______ means that only one bit of given data unit (such as a byte, character, or data unit) is changed from 1 to 0 or from 0 to 1.
A Single-bit error
B Burst error
C CRC error
D None
Answer: A
42. ____ is a bit-oriented protocol of communication which uses over a point to point and multipoint link communication.
A HDLC
B TCP
C IP
D SOAP
Answer: A
43. Which frame is used to store the transport control information?
A I-frame
B U-frame
C S-frame
D Piggybacking
Answer: C
44. _____ is a group of communication protocols of the data link layer for transmitting data between network points or nodes.
A User Datagram Protocol (UDP)
B Transmission Control Protocol(TCP)
C High-level Data Link Control (HDLC)
D Simple Object Access Protocol (SOAP)
Answer: C
45. Which frame is used to transport the user data and control information releted to the user data?
A I-frame
B U-frame
C S-frame
D D-frame
Answer: A
46. _____ protocol is used to define the format of the frame which is used to exchange between the devices.
A HDLC
B Point to point
C Multipoint
D TCP
Answer: B
47. Which protocol is responsible for establishing, maintaining, configuring, and terminating the links?
A Point to point
B Link control
C TCP
D HDLC
Answer: B
48. _____ is a messaging protocol specification for exchanging structured information in the implementation of web services in computer networks.
A TCP
B IP
C UDP
D SOAP
Answer: D
49. It allows several users to share the same frequency channel by dividing the signal into different time slot, is called _______.
A Code Division Multiple Access(CDMA)
B Time-division multiple access (TDMA)
C Frequency Division Multiple Access (FDMA)
D Carrier Sense Multiple Access (CSMA)
Answer: B
50. ____ is that the station should be able to receive while transmitting to detect a collision from different stations.
A Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
B Code Division Multiple Access(CDMA)
C Time-division multiple access (TDMA)
D Frequency Division Multiple Access (FDMA)
Answer: A
51. In IEEE project 802, The flow control error and parts of the framing duties are combined into the one sub-layer called __________.
A Media Access Control (MAC)
B Physical layer
C Logical Link Control (LLC)
D Source service access point (SSAP)
Answer: C
52. ______ is a device that creates a wireless local area networt.
A Access Point (AP)
B Basic Service Set (BSS)
C Extended Service Set (ESS)
D None of these
Answer: A
53. Piconets can be combined to form __________.
A Piconet
B Scatternet
C Bluetooth
D LAN
Answer: B
54. In __________ the repeater is a used for establishing the network communication.
A Network layer
B Physical layer
C Data link layer
D Transport layer
Answer: B
55. A bridge operates in __________ and __________ OSI model.
A Physical layer
B Data link layer
C A and B
D None of these
Answer: C
56. What is used to connect the devices between two internetworks which are based on different models?
A Bridge
B HUB
C Repeater
D Gateway
Answer: D
57. ______ is a reference model for how applications communicate over a network
A WiFi(Wireless Fidelity)
B OSI (Open Systems Interconnection)
C WWW(World Wide Web)
D IEEE(Institute of Electrical and Electronics Engineers)
Answer: B
58. ________ network is configured by the software not by the physical wiring.
A LAN
B MAN
C Internet
D Virtual LAN
Answer: D
59. IPv4 address is __________ bit long.
A 32 bit
B 16 bit
C 128 bit
D 64 bit
Answer: A
60. Which class of IP addresses are used for the unicast communication?
A A- class
B B-class
C C- class
D All of the above
Answer: D
61. Which class of IP addresses are use for the multicast communication?
A A-class
B C-class
C D-class
D E-class
Answer: C
62. What is the length of IPv6 protocol?
A 32 bit
B 64 bit
C 128 bit
D 127 bit
Answer: C
63. _______ occurs when an IP datagram traverses a network which has a maximum transmission unit (MTU) that is smaller than the size of the datagram
A Fragmentation
B Segmentation
C Framing
D Stuffing
Answer: A
64. _____ is an obsolete computer networking protocol used by a client computer to request its Internet Protocol (IPv4) address from a computer network, when all it has available is its link-layer or hardware address, such as a MAC address.
A Reverse Address Resolution Protocol (RARP)
B Bootstrap Protocol(BooTP)
C Logical Link Control (LLC)
D High-level Data Link Control (HDLC)
Answer: A
65. The ______ is a computer networking protocol used in Internet Protocol networks to automatically assign an IP address to network devices from a configuration server
A High-bandwidth Digital Content Protection (HDCP)
B High-level Data Link Control (HDLC)
C Bootstrap Protocol (BOOTP)
D Hypertext Transmission Protocol(HTTP)
Answer: C
66. ____ is a protocol for assigning dynamic IP addresses to devices on a network.
A Dynamic Host Configuration Protocol (DHCP)
B High-bandwidth Digital Content Protection (HDCP)
C High-level Data Link Control (HDLC)
D Internet Control Message Protocol(ICMP)
Answer: A
67. ______ is an error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets
A High-level Data Link Control (HDLC)
B Dynamic Host Configuration Protocol (DHCP)
C High-bandwidth Digital Content Protection (HDCP)
D Internet Control Message Protocol (ICMP)
Answer: D
68. The ______ is a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships.
A High-level Data Link Control (HDLC)
B Dynamic Host Configuration Protocol (DHCP)
C Internet Group Management Protocol (IGMP)
D Internet Control Message Protocol(ICMP)
Answer: C
69. What is a length of the MAC address?
A 25 bit
B 32 bit
C 48 bit
D 64 bit
Answer: C
70. The term ______ refers to the fact that the protocol manipulates vectors (arrays) of distances to other nodes in the network.
A Distance vector
B Dynamic routing
C Inter domain routing
D RIP (Routing Information Protocol)
Answer: A
71. _____ is used to detect an error in the user datagram.
A Port number
B Packet length
C Checksum
D none
Answer: C
72. ______ is a message oriented protocol which combine the feature of UDP and TCP protocol?
A Stream Control Transmission Protocol (SCTP)
B Transmission Control Protocol (TCP)
C Internet Protocol (IP)
D High-level Data Link Control (HDLC)
Answer: A
73. ____ is used to inform the congestion problem to the other nodes.
A Choke packet
B Burst packet
C ACK packet
D none
Answer: A
74. _______ is used to implement the traffic policing and traffic shaping in Ethernet and cellular data networks
A Token bucket
B Leaky bucket
C Choke packet
D Distance Vector
Answer: B
75. ____ maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.
A Domain Name Servers (DNS)
B Dynamic Host Configuration Protocol (DHCP)
C Internet Group Management Protocol (IGMP)
D None of the above
Answer: A
76. MIME stands for
A Multiprocess Internet Mail Extension
B Multipurpose Intranet Mail Extension
C Multipurpose Internet Mail Extension
D Multipurpose Internet Main Execution
Answer: C
77. ______is an extension to the Internet email protocol that allows it’s users to exchange different kinds of data files over the Internet such as images, audio, and video.
A MIME
B FTP
C TCP
D SMTP
Answer: A
78. _______ protocol is used for sending e-mail messages between servers.
A POP3
B SMTP
C FTP
D IMAP4
Answer: B
79. __________ and __________are used for pulling a messages from the mail server.
A POP3, FTP
B TCP, IP
C POP3, IMAP4
D SMTP, POP3
Answer: C
80. _____ is a client/server application which allows a user to access the remote terminal by using the login procedure?
A TELNET
B ping
C NVT
D NET
Answer: A
81. MTA stands for
A Mail Translate Agent
B Main Transfer Area
C Mail Translate Area
D Mail Transfer Agent
Answer: D
82. Each __________ consist of three parts such as controller, client protocol and interpreters.
A server
B browser
C terminal
D web
Answer: B
83. _____ is a default port for HTTP protocol.
A 25
B 20
C 80
D 128
Answer: C
84. What is the error no of “The document not found” message?
A 401
B 402
C 403
D 404
Answer: D
85. SNMP stand for
A Simple Network Management Protocol
B Simple Network Manager Protocol
C Simple Network Management Project
D Simple Networking Management Protocol
Answer: A
86. Dynamic documents are also known as __________ document.
A Server-site
B Client- site
C Proxy-site
D Localhost
Answer: A
87. www project was initiated by __________.
A Bell lab
B ANSI (American Nation Standards Institute)
C CERN (European Organization for Nuclear Research)
D none
Answer: C
88. What is the default mode of the FTP?
A Block mode
B Compressed
C Stream mode
D none
Answer: C
89. Which is the standard mechanism provided by TCP/IP for coping a file from one host to another?
A FTP
B HTTP
C SMTP
D POP3
Answer: A
90. Converting analog signals to digital signals is called __________.
A modulation
B demodulation
C multiplexer
D none
Answer: B
91. Which device is used for modulation and demodulation process?
A Hub
B Modem
C Gateway
D Bridge
Answer: B
92. Which OSI model layer is used to perform a routing?
A Data link layer
B Transport layer
C Network layer
D Physical layer
Answer: C
93. In which network topology, the bi-directional link is established between the each possible node?
A Hybrid
B Ring
C Star
D Mesh
Answer: D
94. Communication in the computer devices are called as __________ communication.
A serial
B direct
C parallel
D full duplex
Answer: A
95. Which device is used to combines the transmission from several I/O devices into single line?
A Modifier
B Repeater
C Multiplexer
D Router
Answer: C
96. How many pairs of station can simultaneously communicate in ethernet LAN?
A Two
B One
C Four
D Many
Answer: B

Video Lectures of C Language

Icon
Icon
Icon

Subscribe to our Newsletter for Newest Course Updates