×

Multiple-Choice Questions

Web Technologies MCQs

Computer Science Subjects MCQs

Databases MCQs

Programming MCQs

Testing Software MCQs

Digital Marketing Subjects MCQs

Cloud Computing Softwares MCQs

AI/ML Subjects MCQs

Engineering Subjects MCQs

Office Related Programs MCQs

Management MCQs

More

Computer Network MCQs

Computer Network is a system of interconnected computers that enable the computers to communicate with each other and share their resources, data, and applications.

Computer Network MCQs: This section contains multiple-choice questions on Computer Network. All MCQs have the correct answers and explanations. These MCQs will help students and professionals to test their skills and to enhance their knowledge of Computer Network.

Here, you will find the top 130 Computer Network MCQs with answers and explanations. These Computer Network multiple-choice questions are helpful for the Gate, MCA, MTech, BTech, BE, BCA, PGDCA, DCA, and other classes like 12th, 11th, 10th, and 9th. These questions on Computer Networks can be practiced for the various entrances and competitive exams.

Computer Network MCQs with Answers

1. A computer network employs ____ processing.

  1. Centralized
  2. Distributed

Answer: B) Distributed

Explanation:

A computer network employs distributed processing, which divides tasks across multiple computers. Instead, one computer handles the entire operation, but each separate machine handles a piece of it.

Discuss this Question


2. What is the full form of NIC?

  1. Network ID card
  2. Network interface card
  3. National interface card
  4. New interface card

Answer: B) Network interface card

Explanation:

NIC stands for Network interface card.

Discuss this Question


3. What is NIC? Select the best answer.

  1. A network interface card (NIC) is a device that allows a computer to communicate with another device.
  2. A network interface card (NIC) is a central device that divides a network connection among several devices.
  3. A network interface card (NIC) is a networking device that connects all of the devices on the network to transport data to another device.

Answer: A) A network interface card (NIC) is a device that allows a computer to communicate with another device.

Explanation:

A network interface card (NIC) is a device that allows a computer to communicate with another device.

Discuss this Question


4. How many types of NIC are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

There are two types of NIC: Wireless NIC and Wired NIC.

Discuss this Question


5. All the modern laptops use ____ types of NIC.

  1. Wireless NIC
  2. Wired NIC

Answer: A) Wireless NIC

Explanation:

All modern laptops use Wireless types of NIC.

Discuss this Question


6. A ____ is a central device that divides a network connection among several devices.

  1. Switch
  2. Hub
  3. Router
  4. Modem

Answer: B) Hub

Explanation:

A hub is a central device that divides a network connection among several devices.

Discuss this Question


7. A ____ is a networking device that connects all of the devices on the network to transport data to another device.

  1. Switch
  2. Hub
  3. Router
  4. Modem

Answer: A) Switch

Explanation:

A switch is a networking device that connects all of the devices on the network to transport data to another device.

Discuss this Question


8. Among Switch or Hub which is better?

  1. Switch
  2. Hub

Answer: A) Switch

Explanation:

A switch is better than a hub because it does not broadcast the message across the network; instead, it transmits the message to the device to which it belongs.

Discuss this Question


9. How many types of cables are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

There are 3 types of cables:

  • Twisted pair cables
  • Coaxial cable
  • Fibre optic cable

Discuss this Question


10. Which of the following types of cable is installed at the government level?

  1. Twisted pair cables
  2. Coaxial cable
  3. Fibre optic cable

Answer: C) Fibre optic cable

Explanation:

Fibre optic cable is a high-speed data transmission wire that uses light beams to transport data. When compared to other cables, it gives a high data transmission speed. Because it is more expensive than other cables, it is installed at the government level.

Discuss this Question


11. Which of the following statement is True?

  1. A modem links a computer to the internet via an existing phone connection.
  2. A modem is a device that connects the local area network (LAN) to the internet.

Answer: A) A modem links a computer to the internet via an existing phone connection.

Explanation:

A modem links a computer to the internet via an existing phone connection.

Discuss this Question


12. How many types of network architecture are used?

  1. 4
  2. 3
  3. 2
  4. 1

Answer: C) 2

Explanation:

The two types of network architecture are used:

  • Peer-To-Peer network
  • Client/Server network

Discuss this Question


13. Which architecture is used for small environments?

  1. Peer-To-Peer network
  2. Client/Server network

Answer: A) Peer-To-Peer network

Explanation:

Peer-To-Peer network architecture is used for small environments usually up to 10 computers.

Discuss this Question


14. Peer-To-Peer network has ____ dedicated servers.

  1. 1
  2. 2
  3. 3
  4. None

Answer: D) None

Explanation:

Peer-To-Peer network has no dedicated server.

Discuss this Question


15. Does the Peer-To-Peer network backup the data?

  1. Yes
  2. No

Answer: B) No

Explanation:

A peer-to-peer network has no centralized system. As a result, it cannot back up the data because the data differs in different locations.

Discuss this Question


16. Does the client/server network back up the data?

  1. Yes
  2. No

Answer: A) Yes

Explanation:

A Client/Server network contains the centralized system. As a result, we can easily back up the data.

Discuss this Question


17. Does the Client/Server network have a dedicated server?

  1. Yes
  2. No

Answer: A) Yes

Explanation:

A Client/Server network includes a dedicated server, which increases overall system performance.

Discuss this Question


18. A computer network is mainly of how many types?

  1. 2
  2. 3
  3. 4
  4. 5

Answer: C) 4

Explanation:

A computer network is mainly of four types:

  • LAN(Local Area Network)
  • PAN(Personal Area Network)
  • MAN(Metropolitan Area Network)
  • WAN(Wide Area Network)

Discuss this Question


19. How many types of personal area networks are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

There are two types of Personal Area Networks: Wireless Personal Area Networks and wired Personal Area Networks.

Discuss this Question


20. How many types of internetworking are there?

  1. 2
  2. 3
  3. 4
  4. 5

Answer: B) 3

Explanation:

Mainly there are three types of internet working:

  • Extranet
  • Intranet
  • Internet

Discuss this Question


21. An ____ is a communication network that uses Internet protocols such as the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

  1. Extranet
  2. Intranet

Answer: A) Extranet

Explanation:

An extranet is a communication network that uses Internet protocols such as the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

Discuss this Question


22. Can an extranet have a single LAN?

  1. Yes
  2. No

Answer: B) No

Explanation:

An extranet cannot have a single LAN, but it must have at least one link to the outside network.

Discuss this Question


23. The ____ topology is designed such that all stations are linked by a single cable known as a backbone cable.

  1. Ring
  2. Tree
  3. Mesh
  4. Bus

Answer: D) Bus

Explanation:

The bus topology is designed such that all stations are linked by a single cable known as a backbone cable.

Discuss this Question


24. Which of the following statement is the common access method of the bus topologies?

  1. CSMA
  2. Token passing

Answer: A) CSMA

Explanation:

The most prevalent bus topology access method is CSMA.

Discuss this Question


25. What is the full form of CSMA?

  1. Carrier senses marginal access
  2. Carrier system multiple access
  3. Carrier sense multiple access
  4. Carrier sense mostly access

Answer: C) Carrier sense multiple access

Explanation:

CSMA stands for carrier sense multiple access.

Discuss this Question


26. The ring topology Data is ____.

  1. Unidirectional
  2. Bidirectional

Answer: A) Unidirectional

Explanation:

The ring topology Data moves in only one way, making it unidirectional.

Discuss this Question


27. In a ring topology, data flows in a ____ manner.

  1. Anti clockwise
  2. Clockwise

Answer: B) Clockwise

Explanation:

In a ring topology, data flows in a clockwise manner.

Discuss this Question


28. Which of the following is the most common access method of the ring topology?

  1. CSMA
  2. Token passing

Answer: B) Token passing

Explanation:

The most common access method of the ring topology is token passing.

Discuss this Question


29. Mesh topology can be created using which of the following formula?

  1. Number of cables = (n*(n-1))/2
  2. Number of cables = (n*(n-1))*2
  3. Number of cables = (n*(n+1))/2
  4. Number of cables = (n*(n+1))*2

Answer: A) Number of cables = (n*(n-1))/2

Explanation:

Mesh topology can be created using the following formula:Number of cables = (n*(n-1))/2.

Discuss this Question


30. Mesh topology is divided into how many categories?

  1. 3
  2. 4
  3. 5
  4. 2

Answer: D) 2

Explanation:

Mesh topology is classified into two types:

  • Fully connected mesh topology
  • Partially connected mesh topology

Discuss this Question


31. What is the other name of the transmission mode?

  1. Parallel node
  2. Series node
  3. Communication node
  4. Feedback node

Answer: C) Communication node

Explanation:

The transmission mode is also known as the communication mode.

Discuss this Question


32. The transmission node is defined in which layer?

  1. Physical layer
  2. Data link layer
  3. Transport layer
  4. Session layer

Answer: A) Physical layer

Explanation:

The transmission mode is defined at the physical layer.

Discuss this Question


33. How many types of transmission nodes are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

There are three types of transmission modes:

  • Simplex mode
  • Half-duplex mode
  • Full-duplex mode

Discuss this Question


34. In Simplex mode, communication is ____, with data flowing in only one direction.

  1. Unidirectional
  2. Bidirectional

Answer: A) Unidirectional

Explanation:

In Simplex mode, communication is unidirectional, with data flowing in only one direction.

Discuss this Question


35. Which of the following is the example of simplex mode?

  1. Walkie talkie
  2. Telephone
  3. Radio

Answer: C) Radio

Explanation:

Radio is an example of simplex mode since it sends the signal but never permits listeners to communicate back.

Discuss this Question


36. Which of the following is the example of Half duplex mode?

  1. Keyboard
  2. Television
  3. Mouse
  4. Walkie talkie

Answer: D) Walkie talkie

Explanation:

Half-duplex mode is illustrated via a walkie-talkie.

Discuss this Question


37. Which of the following is the fastest mode of communication between devices?

  1. Simplex mode
  2. Half-duplex mode
  3. Full-duplex mode

Answer: C) Full-duplex mode

Explanation:

The Full-duplex mode is the quickest form of communication between devices.

Discuss this Question


38. Which of the following is the most common application of full-duplex mode?

  1. Walkie talkie
  2. Telephone
  3. Television

Answer: B) Telephone

Explanation:

The most common application of full-duplex mode is a telephone network.

Discuss this Question


39. What is OSI?

  1. Open secure Intercommunication
  2. Open system Intercommunication
  3. Open shift Intercommunication
  4. Open swing Intercommunication

Answer: B) Open system Intercommunication

Explanation:

OSI stands for Open system Interconnection.

Discuss this Question


40. OSI consists of how many layers?

  1. 8
  2. 6
  3. 7
  4. 5

Answer: C) 7

Explanation:

OSI consists of seven layers:

  • Physical Layer
  • Data-Link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

Discuss this Question


41. Which layer's primary duty is to transmit individual bits from one node to another?

  1. Physical Layer
  2. Data-Link Layer
  3. Network Layer
  4. Transport Layer

Answer: A) Physical Layer

Explanation:

The physical layer's primary duty is to transmit individual bits from one node to another.

Discuss this Question


42. Which of the following Layer serves as a network data translator?

  1. Transport Layer
  2. Session Layer
  3. Presentation Layer
  4. Application Layer

Answer: C) Presentation Layer

Explanation:

The Presentation Layer serves as a network data translator.

Discuss this Question


43. Which of the following layer delivers network services to end users?

  1. Transport Layer
  2. Session Layer
  3. Data link Layer
  4. Application Layer

Answer: D) Application Layer

Explanation:

The application layer delivers network services to end users.

Discuss this Question


44. The ____ layer is in charge of the error-free transport of data frames.

  1. Transport Layer
  2. Session Layer
  3. Data link Layer
  4. Network Layer

Answer: C) Data link Layer

Explanation:

The Data-Link layer is in charge of the error-free transport of data frames.

Discuss this Question


45. The data link layer consists of how many sublayers?

  1. 2
  2. 3
  3. 4
  4. 5

Answer: A) 2

Explanation:

The data link layer contains two sub-layers:

  • Logical Link Control Layer
  • Media Access Control Layer.

Discuss this Question


46. Which of the following layer finds the optimum path to transport data from the source to the destination depending on network circumstances, service priority, and other considerations?

  1. Transport Layer
  2. Session Layer
  3. Data link Layer
  4. Network Layer

Answer: D) Network Layer

Explanation:

The network Layer finds the optimum path to transport data from the source to the destination depending on network circumstances, service priority, and other considerations.

Discuss this Question


47. Which of the following layer ensures that messages are transmitted in the sequence in which they are sent and that no data is duplicated?

  1. Physical Layer
  2. Data-Link Layer
  3. Network Layer
  4. Transport Layer

Answer: D) Transport Layer

Explanation:

The transport layer ensures that messages are transmitted in the sequence in which they are sent and that no data is duplicated.

Discuss this Question


48. Which of the following protocols are used in the transport layer?

  1. TCP
  2. UDP
  3. Both

Answer: C) Both

Explanation:

The two protocols used in the Transport layer are:

  • Transmission Control Protocol
  • User Datagram Protocol.

Discuss this Question


49. The ____ layer establishes, maintains, and synchronizes communication between devices.

  1. Session
  2. Transport
  3. Data link layer

Answer: A) Session

Explanation:

The Session layer establishes, maintains, and synchronizes communication between devices.

Discuss this Question


50. The TCP/IP model consists of how many layers?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: A) 5

Explanation:

There are five layers in the TCP/IP model: the application layer, transport layer, network layer, data link layer, and physical layer.

Discuss this Question


51. A network layer of TCP/IP is a mix of the ____ layer and the ____ layer as outlined by the OSI reference model.

  1. Physical Layer and Data-Link Layer
  2. Network Layer and Transport Layer
  3. Data-Link Layer and Network Layer
  4. Transport Layer and Physical layer

Answer: A) Physical Layer and Data-Link Layer

Explanation:

A network layer is a mix of the Physical layer and the Data Link layer as outlined by the OSI reference model.

Discuss this Question


52. Which of the following is the network layer protocol?

  1. IP Protocol
  2. ARP
  3. ICMP
  4. All of the above

Answer: D) All of the above

Explanation:

The network layer has three protocols:

  • IP Protocol
  • ARP
  • ICMP

Discuss this Question


53. UDP provides ____ service.

  1. Connectionless
  2. Connection-oriented

Answer: A) Connectionless

Explanation:

UDP provides a connectionless service.

Discuss this Question


54. Does UDP specify which packet is lost?

  1. Yes
  2. No

Answer: B) No

Explanation:

UDP does not disclose which packet was lost. UDP contains simply the checksum and no data segment ID.

Discuss this Question


55. Which of the following is the topmost layer in the TCP/IP model?

  1. Application layer
  2. Transport layer
  3. Network layer
  4. Data link layer
  5. Physical layer.

Answer: A) Application layer

Explanation:

The application layer is the topmost layer in the TCP/IP model.

Discuss this Question


56. Digital-to-digital encoding is divided into how many categories?

  1. 5
  2. 4
  3. 2
  4. 3

Answer: D) 3

Explanation:

Digital-to-digital encoding is divided into three categories:

  • Unipolar Encoding
  • Polar Encoding
  • Bipolar Encoding

Discuss this Question


57. In Unipolar Encoding, '1' represents a ____ voltage, and '0' represents a ____ voltage.

  1. High and Zero
  2. Zero and High

Answer: A) High and Zero

Explanation:

In Unipolar Encoding, '1' represents a high voltage, and '0' represents a zero voltage.

Discuss this Question


58. NRZ stands for?

  1. Not returning zero
  2. Non-return zero
  3. Number rendering zero

Answer: B) Non-return zero

Explanation:

NRZ stands for Non-return zero.

Discuss this Question


59. What is Biphase encoding?

  1. Biphase encoding is a type of encoding in which the signal changes in the middle of the bit interval but does not return to zero.
  2. Biphase encoding is a type of encoding in which the signal changes in the middle of the bit interval but does return to zero.

Answer: A) Biphase encoding is a type of encoding in which the signal changes in the middle of the bit interval but does not return to zero.

Explanation:

Biphase encoding is a type of encoding in which the signal changes in the middle of the bit interval but does not return to zero.

Discuss this Question


60. Bipolar encoding scheme represents how many voltage levels?

  1. 2
  2. 3
  3. 4
  4. 5

Answer: B) 3

Explanation:

Bipolar encoding scheme represents three voltage levels: positive, negative, and zero.

Discuss this Question


61. How many types of Bipolar encodings are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

Bipolar can be classified as AMI, B8ZS, HDB3.

Discuss this Question


62. What do you mean by PAM?

  1. Pulse amplification method
  2. Pulse amplifier method
  3. Public amplitude modulation
  4. Pulse amplitude modulation

Answer: D) Pulse amplitude modulation

Explanation:

PAM stands for pulse amplitude modulation.

Discuss this Question


63. PAM is a technique that is used in ____.

  1. Analog-to-digital conversion
  2. Digital-to-Analog-to conversion.

Answer: A) Analog-to-digital conversion

Explanation:

PAM is a technique used in analog-to-digital conversion.

Discuss this Question


64. What is PCM?

  1. Pulse control method
  2. Pulse control modulation
  3. Pulse code modulation

Answer: C) Pulse code modulation

Explanation:

PCM stands for Pulse code modulation.

Discuss this Question


65. What is the other name of guided media?

  1. Bounded media
  2. Enclosed media
  3. Fixed media

Answer: A) Bounded media

Explanation:

The other name of guided media is Bounded media.

Discuss this Question


66. How many types of twisted pair cables are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Types of twisted pair: An unshielded twisted pair and A shielded twisted pair.

Discuss this Question


67. An ____ twisted pair is commonly used in telecommunications.

  1. Unshielded twisted pair
  2. Shielded twisted pair.

Answer: A) Unshielded twisted pair

Explanation:

An unshielded twisted pair is commonly used in telecommunications.

Discuss this Question


68. In ____ twisted pairs, the wires are surrounded by a mesh, allowing a higher transmission rate.

  1. Unshielded twisted pair
  2. Shielded twisted pair.

Answer: B) Shielded twisted pair.

Explanation:

In shielded twisted pairs, the wires are surrounded by a mesh, allowing a higher transmission rate.

Discuss this Question


69. How many types of coaxial cables are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Types of coaxial cables: Baseband transmission and Broadband transmission.

Discuss this Question


70. What is a Broadband transmission?

  1. Broadband transmission is described as the process of sending numerous signals at the same time.
  2. Broadband transmission is the technique of sending a single signal at a high rate.

Answer: A) Broadband transmission is described as the process of sending numerous signals at the same time.

Explanation:

Broadband transmission is described as the process of sending numerous signals at the same time.

Discuss this Question


71. Unguided transmissions are also known as ____.

  1. Wired transmission
  2. Wireless transmission
  3. Feedback transmission

Answer: B) Wireless transmission

Explanation:

An unguided transmission sends electromagnetic waves without the use of a physical medium. As a result, it is often referred to as wireless transmission.

Discuss this Question


72. Radio waves are?

  1. Bi-directional
  2. Unidirectional
  3. Omnidirectional

Answer: C) Omnidirectional

Explanation:

Radio waves are omnidirectional, which means that signals can travel in all directions.

Discuss this Question


73. How many types of microwaves are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Microwaves are of two types:

  • Terrestrial microwave
  • Satellite microwave communication

Discuss this Question


74. Multiplexing is done in a ____ manner.

  1. One-to-one
  2. One-to-many
  3. Many-to-many
  4. Many-to-one

Answer: D) Many-to-one

Explanation:

Multiplexing is done in a many-to-one manner, with n input lines and one output line.

Discuss this Question


75. DEMUX follows which of the following approach?

  1. One-to-one
  2. One-to-many
  3. Many-to-many
  4. Many-to-one

Answer: B) One-to-many

Explanation:

DEMUX divides a signal into its constituent signals (one input and n outputs). As a result, demultiplexing follows the one-to-many strategy.

Discuss this Question


76. Frequency-division Multiplexing (FDM) is an ____ technique.

  1. Analog
  2. Digital

Answer: A) Analog

Explanation:

Frequency-division Multiplexing (FDM) is an Analog technique.

Discuss this Question


77. Which of the following is mainly used in radio broadcasts and TV networks?

  1. FDM
  2. TDM
  3. Prism

Answer: A) FDM

Explanation:

FDM is mainly used in radio broadcasts and TV networks.

Discuss this Question


78. Time Division Multiplexing is a ____ technique.

  1. Analog
  2. Digital

Answer: B) Digital

Explanation:

Time Division Multiplexing is a digital technique.

Discuss this Question


79. Which of the following statement is True about TDM?

  1. When using Time Division Multiplexing, all signals run at the same frequency and at the same time.
  2. When using Time Division Multiplexing, all signals run at the same frequency but at separate times.
  3. When using Time Division Multiplexing, all signals run at a different frequencies and at different times.

Answer: B) When using Time Division Multiplexing, all signals run at the same frequency but at separate times.

Explanation:

When using Time Division Multiplexing, all signals run at the same frequency but at separate times.

Discuss this Question


80. How many types of TDM are there?

  1. 5
  2. 3
  3. 2
  4. 1

Answer: C) 2

Explanation:

There are two types of TDM:

  • Synchronous TDM
  • Asynchronous TDM

Discuss this Question


81. Most of the slots in Synchronous TDM are ____.

  1. Fully utilized
  2. Unutilized

Answer: B) Unutilized

Explanation:

Most of the slots in Synchronous TDM are unutilized, whereas slots in asynchronous TDM are fully utilized.

Discuss this Question


82. How many types of switching modes are there?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

There are 3 types of switching modes:

  • Store-and-forward
  • Cut-through
  • Fragment-free

Discuss this Question


83. In which of the following switching modes/techniques do intermediate nodes store the received frame before checking for defects and passing the packets to the next node?

  1. Store-and-forward
  2. Cut-through
  3. Fragment-free

Answer: A) Store-and-forward

Explanation:

Store-and-forward is a strategy in which intermediate nodes store the received frame before checking for defects and passing the packets to the next node.

Discuss this Question


84. Does the Cut-through switching technique have an error-checking technique?

  1. Yes
  2. No

Answer: B) No

Explanation:

Cut-through switching technique lacks an error-checking method.

Discuss this Question


85. Which of the following switching technique creates a dedicated path between the sender and the receiver?

  1. Circuit switching
  2. Space division switches
  3. Packet switching

Answer: A) Circuit switching

Explanation:

Circuit switching is a switching technique that creates a dedicated path between the sender and the receiver.

Discuss this Question


86. In the public telephone network, ____ switching is employed.

  1. Circuit switching
  2. Space division switches
  3. Packet switching

Answer: A) Circuit switching

Explanation:

In the public telephone network, circuit switching is employed. It is used to transmit voice.

Discuss this Question


87. Space Division Switches can be categorized in how many ways?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Space Division Switches can be categorized in two ways:

  • Crossbar Switch
  • Multistage Switch

Discuss this Question


88. A ____ switch is a switch with n input and n output lines.

  1. Crossbar switch
  2. Multistage switch

Answer: A) Crossbar switch

Explanation:

A Crossbar switch is a switch with n input and n output lines.

Discuss this Question


89. The number of cross points ____ as the number of stations is increased.

  1. Decreases
  2. Increases

Answer: B) Increases

Explanation:

The number of cross points increases as the number of stations is increased.

Discuss this Question


90. A ____ switch is created by dividing a crossbar switch into smaller components and then connecting them.

  1. Multiphase
  2. Multistage
  3. Fixed

Answer: B) Multistage

Explanation:

A multistage switch is created by dividing a crossbar switch into smaller components and then connecting them.

Discuss this Question


91. ____ is a switching technique in which the communication is broken into smaller bits and sent separately rather than all at once.

  1. Circuit switching
  2. Space division switches
  3. Packet switching

Answer: C) Packet switching

Explanation:

Packet switching is a switching technique in which the communication is broken into smaller bits and sent separately rather than all at once.

Discuss this Question


92. Which of the following are the data link layer protocols?

  1. Ethernet
  2. Token ring
  3. FDDI
  4. PPP
  5. All of the above

Answer: E) All of the above

Explanation:

Ethernet, token ring, FDDI, and PPP are Data Link Layer protocols.

Discuss this Question


93. Errors can be categorized into how many types?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Errors can be classified into two categories:

  • Single-Bit Error
  • Burst Error

Discuss this Question


94. Single-Bit Error mainly occurs in ____ Data Transmission.

  1. Serial
  2. Parallel

Answer: B) Parallel

Explanation:

Single-Bit Error mainly occurs in Parallel Data Transmission.

Discuss this Question


95. ____ Error occurs when two or more bits are altered from 0 to 1 or from 1 to 0.

  1. Single-Bit Error
  2. Burst Error

Answer: B) Burst Error

Explanation:

Burst Error occurs when two or more bits are altered from 0 to 1 or from 1 to 0.

Discuss this Question


96. The ____ Error is calculated by counting the number of corrupted bits from the first to the last.

  1. Single-Bit Error
  2. Burst Error

Answer: B) Burst Error

Explanation:

The Burst Error is calculated by counting the number of corrupted bits from the first to the last.

Discuss this Question


97. The noise duration in Burst Error is ____ than the noise duration in Single-Bit.

  1. Greater
  2. Smaller
  3. Same

Answer: A) Greater

Explanation:

The noise duration in Burst Error is greater than the noise duration in Single-Bit.

Discuss this Question


98. Burst errors are the most common type of error in ____ data transmission.

  1. Serial
  2. Parallel

Answer: A) Serial

Explanation:

Burst errors are the most common type of error in serial data transmission.

Discuss this Question


99. In Single Parity checking, If the number of 1s bits is odd, then parity bit ___ is appended.

  1. 1
  2. 0

Answer: A) 1

Explanation:

In Single Parity checking, If the number of 1s bits is odd, then parity bit 1 is appended.

Discuss this Question


100. In Single Parity checking, if the number of 1s bits is even, then parity bit ____ is appended at the end of the data unit.

  1. 1
  2. 0

Answer: B) 0

Explanation:

In Single Parity checking, if the number of 1s bits is even, then parity bit 0 is appended at the end of the data unit.

Discuss this Question


101. Single parity checking can detect just ____ errors, which are extremely unusual.

  1. Single-bit errors
  2. Burst errors

Answer: A) Single-bit errors

Explanation:

Single parity checking can detect extremely unusual and just single-bit errors.

Discuss this Question


102. Which of the following functionality determines which device can send, and when it can send the data?

  1. Flow control
  2. Error control
  3. Line discipline

Answer: C) Line discipline

Explanation:

Line discipline determines which device can send, and when it can send the data.

Discuss this Question


103. Line Discipline can be achieved in how many ways?

  1. 1
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

Line Discipline can be achieved in two ways:

  • ENQ/ACK
  • Poll/Select

Discuss this Question


104. How many methods have been developed to control the flow of data?

  1. 5
  2. 4
  3. 2
  4. 6

Answer: C) 2

Explanation:

Two methods have been developed to control the flow of data:

  • Stop-and-wait
  • Sliding window

Discuss this Question


105. Which layer is responsible for converting logical addresses into physical addresses?

  1. Physical layer
  2. Data link layer
  3. Transport layer
  4. Network layer

Answer: D) Network layer

Explanation:

The network layer is responsible for converting logical addresses into physical addresses.

Discuss this Question


106. An IP address is divided into how many parts?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

An IP address is divided into two parts:

  • Network ID
  • Host ID

Discuss this Question


107. Class A IP address have ____ bits long Host ID.

  1. 16
  2. 8
  3. 24
  4. 32

Answer: C) 24

Explanation:

The host ID is 24 bits long in a Class A IP address.

Discuss this Question


108. Class C IP address have ____ bits long network ID.

  1. 16
  2. 8
  3. 24
  4. 32

Answer: C) 24

Explanation:

Class C IP addresses have 24 bits-long network IDs.

Discuss this Question


109. Class C IP address have ____ bits long Host ID.

  1. 16
  2. 8
  3. 24
  4. 32

Answer: B) 8

Explanation:

Class C IP addresses have 8 bits-long host IDs.

Discuss this Question


110. Routing can be classified into how many categories?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

Routing can be classified into three categories:

  • Static Routing
  • Default Routing
  • Dynamic Routing

Discuss this Question


111. Static Routing is also known as ____ Routing.

  1. Nonadaptive Routing
  2. Adaptive Routing

Answer: A) Nonadaptive Routing

Explanation:

Static Routing is also known as Nonadaptive Routing.

Discuss this Question


112. When networks have a single exit point, ____ routing is employed.

  1. Static Routing
  2. Default Routing
  3. Dynamic Routing

Answer: B) Default Routing

Explanation:

When networks have a single exit point, default routing is employed.

Discuss this Question


113. Dynamic routing is also known as ____ Routing.

  1. Nonadaptive Routing
  2. Adaptive Routing

Answer: B) Adaptive Routing

Explanation:

Dynamic routing is also known as Adaptive Routing.

Discuss this Question


114. In Dynamic Routing, which protocols are utilized to discover new routes?

  1. RIP
  2. OSPF
  3. Both
  4. None

Answer: C) Both

Explanation:

In Dynamic Routing, the protocols RIP and OSPF are utilized to discover new routes.

Discuss this Question


115. What is ARP?

  1. Address recommendation protocol
  2. Address routing protocol
  3. Address Resolution Protocol.

Answer: C) Address Resolution Protocol.

Explanation:

ARP stands for Address Resolution Protocol.

Discuss this Question


116. Which address is used to identify the actual device?

  1. MAC address
  2. IP address

Answer: A) MAC address

Explanation:

The MAC address is used to identify the actual device.

Discuss this Question


117. RARP stands for ____.

  1. RARP stands for Route Address Resolution Protocol.
  2. RARP stands for Render Address Resolution Protocol.
  3. RARP stands for Reverse Address Resolution Protocol.

Answer: C) RARP stands for Reverse Address Resolution Protocol.

Explanation:

RARP is an abbreviation for Reverse Address Resolution Protocol. Reverse Address Resolution Protocol is the protocol used to acquire an IP address from a server.

Discuss this Question


118. The ICMP protocol handles how many sorts of errors?

  1. 6
  2. 5
  3. 4
  4. 3

Answer: B) 5

Explanation:

Five types of errors are handled by the ICMP protocol:

  • Destination unreachable
  • Source Quench
  • Time Exceeded
  • Parameter problems
  • Redirection

Discuss this Question


119. What is IGMP?

  1. IP Group Message Protocol.
  2. Internet Group MAC Protocol.
  3. Internet Group Message Protocol.

Answer: C) Internet Group Message Protocol.

Explanation:

IGMP is an abbreviation for Internet Group Message Protocol.

Discuss this Question


120. The IGMP protocol is used by the hosts and router to support ____.

  1. Multicasting
  2. Unicasting

Answer: A) Multicasting

Explanation:

The IGMP protocol is used by the hosts and router to support multicasting.

Discuss this Question


121. The Routing algorithm is divided into how many categories?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: D) 2

Explanation:

The Routing algorithm is divided into two categories:

  • Adaptive Routing algorithm
  • Non-adaptive Routing algorithm

Discuss this Question


122. How many types of adaptive routing algorithms are there?

  1. 3
  2. 4
  3. 5
  4. 6

Answer: A) 3

Explanation:

An adaptive routing algorithm can be classified into three parts:

  • Centralized algorithm
  • Isolation algorithm
  • Distributed algorithm

Discuss this Question


123. Which of the following type of adaptive routing algorithm is also known as the global routing algorithm because it computes the least-cost path between source and destination using comprehensive and global network knowledge?

  1. Centralized algorithm
  2. Isolation algorithm
  3. Distributed algorithm

Answer: A) Centralized algorithm

Explanation:

Centralized algorithm is also known as the global routing algorithm because it computes the least-cost path between source and destination using comprehensive and global network knowledge.

Discuss this Question


124. ____ is an algorithm that obtains routing information by utilizing local data rather than getting data from other nodes.

  1. Centralized algorithm
  2. Isolation algorithm
  3. Distributed algorithm

Answer: B) Isolation algorithm

Explanation:

The isolation algorithm is an algorithm that obtains routing information by utilizing local data rather than getting data from other nodes.

Discuss this Question


125. Distributed algorithm is also known as ____.

  1. Decentralized algorithm
  2. Computing algorithm
  3. Feedback algorithm

Answer: A) Decentralized algorithm

Explanation:

The distributed algorithm is also known as the Decentralized algorithm.

Discuss this Question


126. How many types of non-adaptive routing algorithms are there?

  1. 3
  2. 4
  3. 2
  4. 5

Answer: C) 2

Explanation:

The Non-Adaptive Routing algorithm is of two types:

  • Flooding
  • Random walks

Discuss this Question


127. The Distance vector algorithm is a ____ algorithm.

  1. Dynamic
  2. Static

Answer: A) Dynamic

Explanation:

The Distance vector algorithm is a dynamic algorithm.

Discuss this Question


128. DNS is a ____ protocol used on different platforms.

  1. UDP
  2. TCP/IP

Answer: B) TCP/IP

Explanation:

DNS is a TCP/IP protocol used on different platforms.

Discuss this Question


129. The domain name space is divided into how many different sections?

  1. 5
  2. 4
  3. 3
  4. 2

Answer: C) 3

Explanation:

The domain name space is divided into three different sections: generic domains, country domains, and inverse domains.

Discuss this Question


130. What is SNMP?

  1. Social Network Management Protocol.
  2. Strict Network Management Protocol.
  3. Simple Network Management Protocol.
  4. Soft Network Management Protocol.

Answer: C) Simple Network Management Protocol.

Explanation:

SNMP is an abbreviation for Simple Network Management Protocol.

Discuss this Question




Comments and Discussions!

Load comments ↻





Copyright © 2024 www.includehelp.com. All rights reserved.