We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 31
Computer Network MCQs
11, What does PoP stand for?
Pre Office Protocol
Protocol of Post
None
2. What is the port number of PoP?
Hide
|3, What is the number of layers
the OSI model?
2 layers
4 layers
Hide
4.The
Hide
Slayers
full form of OSI is?
Operating System interface
‘Optical System interconnection
‘Operating System Internet
5. Identify the layer which provides service ta the user.
Hide
Session layer
Presentation error
Physical layer
6. What is a HUB?
SoftwareComputing device
Calculating device
7. What does a set of rules define?
SMTP.
Hide
{8 Identify among the following which is mainly used to host web site,
Mail server
None
Hide
‘9. Identity the full form of HTTP?
Hypertext Transfer Package
Hyper Transfer Text Package
Hyper Transfer Text Practice
10, Ident
&
g
;
8
i
:
i
3
:
rep
Hide
11, Identify the total versions of IP
Hide
12, Identify the first network which was based on TCP/IP protocol.HUB
Ethernet Card
Router
Hide
13, Choose among the following, which is the most common internet protocol.
PPP
FIP.
TcPAP
Hide
14, What does TCP/IP stand for?
Telephone control protocol / Internet Protocol
Transmission control protocol/Intermational protocol
None
ide
15, Which of the following layer isn’t present in the TCP/IP model but is
Network layer
Application layer
Transport layer
Hide
16. What is the collection of the hyperlinked decument on the internet known as?
HTML
Email
Internet
Hide
17. What is the location of a resource on the internet given by?
Email
iP
ProtocolHide
18, Identify the incorrect network topology,
Ring
Hide
20. What is the length of the IPv4 address?
Bits
bits
128 bits
Hide
21. What is the length of the IPv6 address?
B bits
1G bits
32 bits
lide
22. What is the term used when the main server sends mail to another mail server?
TCe/E
MIME
Hide
23, What is the port number of SMTP?
110
143Hide
24, What does MIME stand for?
Multipurpose Internet Mail Extra
Multi Internet Mail End
Multipurpose Internet Mail Email
Hide
25, What does port number 143 refer to?
ide
26. Identify among the following the network device used to connect two dis-similar types of networks.
switch,
Hub
g
|
Hide
27. Identify the device used to boost up a weak signal.
Modem
switch
Router
Hide
28, What does MAC stand for?
Mass Access Control
Media Access Carriage
None
Hide
29. What is the length of the MAC address?B bits
1G bits
32 bits
Hide
30. Which of the following is used to allocate and manage resources for a network?
Bluetooth
Node.
None of the above
Hide
131. The arrangement where all data pass through a central computer is known as
Ring topology
Mesh topology
Bus topology
Hide
132. What of the following device is used in the network layer?
Application gateway
Ss
Repeaters
Hide
122. Identify if the following statement is True or False: Network Interface Card{(NIC) is an YO device.
False
Depends on usage
None
Hide
34, What is required to use a Simple Network Management System?
Servers
8Hide
35, Identify the major difference between SNMPv3 and SNMPV2.
Classification
(1) integration
Management
ide
36. Identify the network which extends a private network across a public network.
Storage Area network
Enterprise Private network
Local area network.
Hide
37. Identify the layer which is responsible for data translating,
Network
Datalink,
Application
Hide
38, Identify the layer which determines the interface of the system with the user.
(Network
Datalink
Presentation
lide
39, Which of the following topology arrangements is @ point-to-point line configuration?
OD atog
Mesh
Star
40, Identify the device which links two homogeneous packed broadcast local networks.
Hub
OD RouterHide
a
Hide
Gateway
Why are party bits used?
To encrypt data
To identity user
Identify among the following which belongs to class A.
128.12.12.248
129.12.12.248,
130.12.12.248,
“43, What does LAN stand for?
Hide
Local Array Network
Local Area Net
None
44, Who keeps the private key in asymmetric key cryptography?
sender
Both Sender and Receiver
None
145, Calculate the maximum efficiency of pure ALOHA at G = 05
16%
CO t29%
19.49%
Hide
145, Identify the switching method in which the message is divided into small packets.
Viral switchingMessage switching
None
lide
47. What is a proxy server also known as?
Proxy tools
‘Application proxy
None
Hide
48, Identify among the following servers which allow LAN users to share data,
‘Communication server
Point server
Data server
Hide
49, Choose the correct formula for the total vulnerable time value of pure ALOHA.
‘ele
Hide
50. Choose among the following which is a bit-oriented protocel,
38L
All of the aboveComputer Network MCQ ——
1) Which of these is a standard interface for serial data transmission?
a. ASCIL
b. RS232C
a2
d. Centronics
D Hide answer [ Workopace
Answer: (b) RS232C
Explanation: The RS232C is a standard interface for serial data transmission that defines the
protacol and physical interface for transmitting serial data fairly easily between associated
appliances and computers.
2) Which type of topology is best suited for large businesses which must carefully control and coordinate the
operation of distributed branch outlets?
a. Ring
b. Local area
. Hierarchical
d. Star
®D Hite Answer (B Workspace
Answer: (d) Star
Explanation: The star topology is the best network topology for large businesses because it is
simple to control and coordinate from the central computer.
3) Which of the following transmission directions listed is not 4 legitimate channel?a. Simplex
b. Half Duplex
c. Full Duplex
d. Double Duplex
D hlideanswer (Workspace
Answer: (d) Double Duplex
Explanation: Double duplex is not a legitimate channel for trans
in computer network.
4) "Parity bits” are used for which of the following purposes?
a. Encryption of data
b. To transmit faster
c. To detect errors
d. To identify the user
D hlideanswer (Workspace
Answer: (c) To detect errors
Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1. It is used for
error detection for blocks of data.
5) What kind of transmission medium is most appropriate to carry data in a computer network that is exposed
to electrical interferences?
a. Unshielded twisted pair
b. Optical fiber
c. Coaxial cable
d. Microwave®D Hide Answer (PB Workspace
Answer: (b) Optical fiber
Explanation: The optical fiber is made of glass or plastic. In this cable, the transmission of data
‘occurs in the form of light rather than the electric current, so tt
cable provides higher data transfer
speed than other cables.
6) A collection of hyperlinked documents on the internet forms the ?.7
a. World Wide Web (WWW)
b. E-mail system
c. Mailing list
d. Hypertext markup language
D Hide answer (BF Workspace
Answer: (a) World Wide Web (WWW)
Explanation: World Wide Web (WWW) creates a collection of hyperlinked documents on the
Internet.
7) The location of a resource on the internet is given by its?
a. Protocol
b. URL
c. E-mail address
d. ICQ
@ Hide Anewer [B Workspace
‘Answer: (b) URL
Explanation: A URL (Uniform Resource Locator) is a database connection that describes the
database's location on a computer network and the retrieval process. A URL is a different form ofURI (Uniform Resource Identifier) although the two words are used interchangeably by many
people.
8) The term HTTP stands for?
a. Hyper terminal tracing program
b. Hypertext tracing protocol
c. Hypertext transfer protocol
d. Hypertext transfer program
D tide Answer Workspace
Answer: (c) Hypertext transfer protocol
Explanation: The term HTTP stands for Hypertext transfer protocol
9) A proxy server is used as the computer?
a. with external access
b. a
1g as a backup
c. performing file handling
d. accessing user permissions
®D Hide Answer (@ Workspace
Answer: (a) with external access
Explanation: A proxy server is a computer that acts as a gateway between a user’s computer and
the Internet. The proxy server is also called application level gateway. By this the client computer can
establish indirect network connection to another network.
10) Which one of the following would breach the integrity of a system?
a. Looking the room to prevent theftb. Full access rights for all users
c. Fitting the system with an anti-theft device
d. Protecting the device against willful or accidental damage
D Hide Answer (PF Workspace
Answer: (b) Full access rights for all users
Explanation: None
11) Which software prevents the external access to 2 system?
a. Firewall
b. Gateway
c. Router
d. Virus checker
D Hide Answer (PF Workspace
Answer: (a) Firewall
Explanation: A firewall is a network securing software that prevents unauthorized users and
dangerous elements from accessing the network. Software firewall acts as ¢ filter for our network
which prevents harmful information.
12) Which one of the following is a valid email address?
a. [email protected]
b. gmailcom
c. [email protected]
d. javetpoint@books