0% found this document useful (0 votes)
58 views8 pages

CHAPTER 1 Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views8 pages

CHAPTER 1 Questions

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

MCQ Questions on Chapter 1

1. What defines a computer network?


a) A device that shows output on a monitor

b) A group of connected computers and devices that share resources and communicate

c) Software for creating documents and presentations

d) The outer casing that protects internal computer parts.

2. Which device forwards data packets between networks by using routing


information in the packet?
a) Firewall

b) Bridge

c) Hub

d) Router

3. Which of the following is NOT a network edge device?


a) Switch

b) PC

c) Smartphone

d) Server

4. What does a "router" primarily do in a computer network?


a) Routes data packets between different networks

b) Filters network traffic for security

c) Connects computers within a local network

d) Converts analog signals to digital signals

5. Protocols are a set of rules to govern _________


a) Communication
b) Standard
c) Metropolitan communication
d) Bandwidth

6. Which of the following is an example of Bluetooth?


a) wide area network
b) virtual private network
c) local area network
d) personal area network

7. When a collection of various computers appears as a single coherent


system to its clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system

8. What is the term for an endpoint of an inter-process communication flow


across a computer network?
a) port
b) machine
c) socket
d) pipe

9. Which of these is not a network edge device?


a) Switch
b) PC
c) Smartphones
d) Servers

10. Which of the following allows you to connect and login to a remote
computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet

11. Which of these is not a guided media?


a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire

12. Fiber optics possess the following properties __________


a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned

13. Coaxial cable consists of _______ concentric copper conductors.


a) 1
b) 2
c) 3
d) 4
14. Radio channels are attractive medium because __________
a) Can penetrate walls
b) Connectivity can be given to a mobile user
c) Can carry signals for long-distance
d) All of the mentioned
15. What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit switching
16. As the resources are reserved between two communicating end systems in circuit switching,
___________ is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
17-In which one of the following switching, the bandwidth is fixed?

a) Circuit switching

b) Packet switching

c) Both a and b

d) None of the above

18-The internet is an example for _____________ circuit network?

a) Datagram subnet

b) Virtual circuit subnet

c) Both a and b

d) None of the above

19- The robustness to failures is more in _____________ type of circuit?

a) Datagram subnet
b) Virtual circuit subnet

c) Both a and b

d) None of the above

20- Which one of the following circuits is connectionless?

a) Datagram subnet

b) Virtual circuit subnet

c) Both a and b

d) None of the above

21. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is
____________ (in microseconds)
a) 3.2
b) 32
c) 0.32
d) 320
22. Transmission delay does not depend on _____________
a) Packet length
b) Distance between the routers
c) Transmission rate
d) Bandwidth of medium
23. In a network, If P is the only packet being transmitted and there was no earlier transmission, which
of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay
24. How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
25.Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
26.The functionalities of the presentation layer include ____________
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned

27. Delimiting and synchronization of data exchange is provided by __________


a) Application layer
b) Session layer
c) Transport layer
d) Link layer

28.In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) Randomized

29. Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model

30.Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer

31.Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned

32.Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned

33.Which address is used to identify a process on a host by the transport layer?


a) physical address
b) logical address
c) port address
d) specific address

34.Transmission data rate is decided by ____________


a) network layer
b) physical layer
c) data link layer
d) transport layer

35. Encryption and Compression are functions of which OSI layer?


a) Presentation Layer
b) Application Layer
c) Session Layer
d) Data Link Layer

36. File, Transfer, Access and Management (FTAM) is a function of which layer?
a) Presentation Layer
b) Application Layer
c) Session Layer
d) Data Link Layer

37. The attacker using a network of compromised devices is known as _____________


a) Internet
b) Botnet
c) Telnet
d) D-net

38. Which of the following is a form of DoS attack?


a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) All of the mentioned

39. The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP
connections at the target host is ________
a) Vulnerability attack
b) Bandwidth flooding
c) Connection flooding
d) UDP flooding

40. Packet sniffers involve ____________


a) Active receiver
b) Passive receiver
c) Legal receiver
d) Partially-active receiver
41.In a network, If P is the only packet being transmitted and there was no earlier
transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay

42.ARPANET stands for?


a) Advanced Research Project Agency Network.
b) Advanced Research Programmed Auto Network.
c) Advanced Research Project Automatic Network.
d) Advanced Research Project Authorized Network.

43.A technique that marked the beginning of computer communications.


a) Batch Environment
b) Message passing
c) User Environment
d) Time Sharing

44.TCP stands for?


a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol

45.Which is not a application layer protocol?


a) HTTP
b) SMTP
c) FTP
d) TCP

46.Given L = number of bits in the packet, a = average rate and R = transmission rate. The
Traffic intensity in the network is given by ____________
a) La/R
b) LR/a
c) R/La
d) Ra/L

47. In the transfer of file between server and client, if the transmission rates along the
path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ___________
a) 20Mbps
b) 10Mbps
c) 40Mbps
d) 50Mbps
48. The total nodal delay is given by ____________
a) dnodal = dproc – dqueue + dtrans + dprop
b) dnodal = dproc + dtrans – dqueue
c) dnodal = dproc + dqueue + dtrans + dprop
d) dnodal = dproc + dqueue – dtrans – dprop

49. In a network, If P is the only packet being transmitted and there was no earlier
transmission, which of the following delays could be zero?
a) Propagation delay
b) Queuing delay
c) Transmission delay
d) Processing delay

50. Propagation delay depends on ___________


a) Packet length
b) Transmission rate
c) Distance between the routers
d) Speed of the CPU

You might also like