Home » Computer Network MCQ (Multiple Choice Questions) Part 2

Computer Network MCQ (Multiple Choice Questions) Part 2

by Online Tutorials Library

Computer Network MCQ Part 2

1) In which of the following switching methods, the message is divided into small packets?

  1. Message switching
  2. Packet switching
  3. Virtual switching
  4. None of the these

Answer: (b) Packet switching

Explanation: In packet switching, the message is divided into small parts. These small parts of the message are called packets, and each packet has its own source and destination address. Each packet is transmitted forward in the network only on the basis of these addresses.


2) Which of the following switch methods creates a point-to-point physical connection between two or more computers?

  1. Message switching
  2. Packet switching
  3. Circuit switching
  4. None of the these

Answer: (a) Circuit switching

Explanation: Circuit switching is a switching technique in which a point-to-point physical connection is made between two or more devices.

For example: Telephone system, in which sender and receiver are connected by physical connection, such as wire.


3) What is the second name of the proxy server?

  1. Proxy tools
  2. Application proxy
  3. Application-level gateway
  4. All of the these

Answer: (c) Application-level gateway

Explanation: The proxy server is also known as the application-level gateway. It allows client computers to establish indirect network connections to other networks.


4) Which of the following servers allows LAN users to share data?

  1. Data server
  2. Point server
  3. File server
  4. Communication server

Answer: (c) File server

Explanation: A file server allows LAN users to share the data. It acts as a medium for data transfer. It uses the FTP protocol to transfer information and data.


5) What is the total vulnerable time value of pure Aloha?

  1. Tfr
  2. 1/2 Tfr
  3. 2 * Tfr
  4. 4 * Tfr

Answer: 2 * Tfr

Explanation: Total vulnerable time of pure Aloha = 2 * Tfr


6) How many fields are in the SMDS packet?

  1. Two
  2. Three
  3. Four
  4. Five

Answer: (b) Three

Explanation: SMDS packet consists of three fields: Destination address, Source address, and User data. In this, the destination and source addresses are 8 bytes, while the user data is up to 9188 bytes.


7) What is the maximum data transfer rate of the optical fiber wire?

  1. 50 kbps
  2. 1000 kbps
  3. 1000 Mbps
  4. None of the these

Answer: (c) 1000 Mbps

Explanation: 1000 Mbps is the max data transfer rate for optical fiber cables. It is the fastest among the other kinds of cables like STP and coaxial cables. People are now using optical fiber cables instead of STP for LANs due to their fast data transfer capability.


8) POTS network works on the principle of ________

  1. Telephone switching
  2. Proxy server
  3. File system
  4. Circuit system

Answer: (d) Circuit switching

Explanation: POTS stands for Plain-old-telephone-service, and it works on the principle of circuit switching. In this, the analog signal is transmitted by copper wire.


9) Which of the following protocols is the bit-oriented protocol?

  1. SSL
  2. http
  3. HDLC
  4. All of the these

Answer: (c) HDLC

Explanation: HDLC stands for High-level data link control. It is a set of protocols that are used to transmit information from one network to another. It is a bit-oriented protocol that supports both wireless and wired communication.


10) SLIP stands for _______

  1. System line internet protocol
  2. Serial line internet protocol
  3. Signal line internet protocol
  4. Signal internet protocol

Answer: (b) Serial line internet protocol

Explanation: SLIP stands for Serial-line-internet-protocol. It is an internet protocol through which a user accesses the internet using a computer modem.


11) The second port is used to ____________ in the two-port network.

  1. Input terminal
  2. Output terminal
  3. Signal terminal
  4. Bandwidth terminal

Answer: (b) Output terminal

Explanation: A two-port network is an electrical network consisting of two ports. The first port is used for the input terminal, and the second pair is used for the output terminal.


12) Which of the following layers does the HTTP protocol work on?

  1. Physical layer
  2. Data-link layer
  3. Application layer
  4. None of the these

Answer: (c) Application layer

Explanation: The HTTP application works on the application layer protocol. It is used to transmit messages across the World Wide Web.


13) Which of the following statement correct about the cipher in cryptography?

  1. It is a method for performing encryption and decryption
  2. It is used to establish the network connection
  3. It is a message event
  4. All of the these

Answer: (a) It is a method for performing encryption and decryption

Explanation: A cipher is a method of implementing encryption and decryption of messages traveling in a network. It is used to increase the confidentiality of messages.


14) SONET stands for ______________.

  1. Signal Operation Network
  2. Synchronous Optical Network
  3. System Optical Network
  4. Signal Optical Network

Answer: (b) Synchronous Optical Network

Explanation: SONet stands for Synchronous Optical Network. It is used in the telephone system. SONet is a technology that converts signals of different capacities into optical signals.


15) How many layers does the SONET contain?

  1. 2 layers
  2. 3 layers
  3. 4 layers
  4. 5 layers

Answer: (c) 4 layers

Explanation: Sonet consists of 4 layers.

Path layer → Line layer → Section layer → Photonic layer


16) RAKE receiver designed for _____.

  1. Multipath fading
  2. Signals
  3. Data network
  4. Network connection

Answer: (a) Multipath fading

Explanation: Rake receiver is a radio receiver. It is designed to counter the effects of multipath fading. It is most commonly used in CDMA and W-CDMA radio devices, such as wireless LAN devices and mobile phones.


17) What is the formula of high rate in zigzag code?

  1. J / (J * 1)
  2. -Z / (1 + J)
  3. Z * (1 + J)
  4. J / (J + 1)

Answer: (d) J / (J + 1)

Explanation: Zigzag code is a type of linear error-correcting code. The formula of high code rate is = J / (J + 1), Where J is the number of Bits per segment.


18) What is the size of the sender window in the Go Back N (ARQ) protocol?

  1. 0
  2. 1
  3. 10
  4. n

Answer: (d) n

Explanation: Go back N (ARQ) protocol is a data-link layer protocol that uses sliding window technology. The size of the sender window is N. For example: Go back 8, then the size of the sender window will be 8.


19) What is the efficiency of the Go back N (ARQ) protocol?

  1. N = N / (2a + 2a)
  2. N = N / (1 + 2a)
  3. N = N * (2a + 2a)
  4. N = N * (1 + 2a)

Answer: (b) N = N / (1 + 2a)

Explanation: Go back N (ARQ) protocol is a data link layer protocol that uses sliding window technology. The efficiency of the Go back N ARQ protocol is: N = N / (1 + 2a), Where N is the sender window size.


20) What is the size of the destination port in the UDP protocol?

  1. 8 bits
  2. 16 bits
  3. 20 bits
  4. 32 bits

Answer: (b) 16 bits

Explanation: The size of the destination port is 16 bits in UDP protocol, and it is used to identify the destination port of the data.


21) What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages?

  1. Ping
  2. Route
  3. Traceroute
  4. Ifconfig

Answer: (c) Traceroute

Explanation: Traceroute works by sending packets of data with a reduced time-to-live (TTL) that specifies how many steps (hops) a packet can survive before returning. It finds the exact route taken by each step to arrive at the server and time.


22) A client of the DNS (Domain Name System) application is called _____.

  1. DNS server
  2. DNS Name
  3. DNS resolver
  4. DNS inquirer

Answer: (c) DNS resolver

Explanation: A DNS client is a device that is set up to send name resolution requests to the DNS server. It is also called the DNS resolver.


23) How many characters consist of the entire hostname?

  1. 511 characters
  2. 255 characters
  3. 127 characters
  4. 31 characters

Answer: (a) 255 characters

Explanation: A hostname is a label that is assigned to a network-device. A total of 255 characters can be used in an entire hostname. However, each label must be between 1 and 63 characters.


24) During normal IP packet forwarding by a router, which of the following fields of the IP header is updated?

  1. Repeater
  2. Source address
  3. Destination address
  4. Checksum

Answer: (d) Checksum

Explanation: When an IPv4 (Internet Protocol version 4) datagram sends an IP packet by a router, its header checksum needs to be updated as a result of reducing the TTL field.


25) Which of the following statements is correct about the DWDM?

  1. It can transmit data at very high speeds
  2. It can transmit data at very slow speeds
  3. DWSM stands for digital wave division multiplexing
  4. None of the these

Answer: (a) It can transmit data at very high speeds

Explanation: DWSM stands for Dense-Wavelength-Division-Multiplexing. It is a fiber optic transmission technique in which light wavelengths are used to transmit data. Therefore, it can transmit data at very high speeds.


26) MAC address is also called ______.

  1. Physical address
  2. Logical address
  3. Source address
  4. Destination address

Answer: (a) Physical address

Explanation: Physical address is also known as MAC address. The physical address is unique because it cannot be changed. This address is stored in the main memory in the system.


27) Which of the following addresses is 32-bit?

  1. MAC address
  2. Virtual address
  3. Source address
  4. Destination address

Answer: (a) Virtual address

Explanation: The virtual address is also called a logical address, and this address is stored in virtual memory in the system. The length of this address is 32-bit. For example, IP address: 190.10.134.76


28) EDI stands for ____.

  1. Electronic Data Interchange
  2. Electronic Digital Internet
  3. Electronic Digital Interchange
  4. Electronic Data Internet

Answer: (a) Electronic Data Interchange

Explanation: EDI stands for Electronic-Data-Interchange. It is a communication system in which data is transferred electronically from one computer to another computer.


29) What is the maximum data transfer rate of the ISDN?

  1. 1024 Mbps
  2. 64 Mbps
  3. 64 kbps
  4. 1024 kbps

Answer: (b) 64 kbps

Explanation: The ISDN supports data transfer rates up to 64 kbps. ISDN is a circuit-switched telephone network system. It is a set of communication standards for digital transmission (e.g., audio, video, and other network-related data).


30) ARPANET stands for _______.

  1. Advanced Recheck Projects Agency Internet
  2. Advanced Recheck Projects Agency Network
  3. Advanced Research Projects Agency Network
  4. Advanced Research Projects Agency Internet

Answer: (c) Advanced Research Projects Agency Network

Explanation: ARPANET stands for Advanced-Research-Projects-Agency-Network. It was the world’s first packet-switching network and the first in the world to use the TCP/IP model.


31) What is the size of the UDP header?

  1. 8 bytes
  2. 16 bytes
  3. 20 bytes
  4. 64 bytes

Answer: (a) 8 bytes

Explanation: The size of the UDP header is 64 bits (64 bit means 8 bytes). It is a simple transport layer communication protocol. It has four parameters: Source port, Destination port, Length, and Checksum.


32) Which of the following protocols is the connection-less protocol?

  1. UDP
  2. TCP
  3. IP
  4. All of the these

Answer: (a) UDP

Explanation: UDP is a connection-less protocol which means that when data transfer occurs, this protocol does not establish a connection between the sender and the receiver.


33) Wildcard domain name labels begin with a ______.

  1. .
  2. 0
  3. @
  4. *
  5. #

Answer: (c) *

Explanation: A wildcard record is a type of resource record that matches one or more subdomains. It is started with a “*”. For example: *.tutoraspire.com


34) What is the maximum length of the STP wire?

  1. 20 ft
  2. 50 ft
  3. 50 meters
  4. 100 meters

Answer: (d) 100 meters

Explanation: STP is the full name Shielded twisted-pair. This cable is similar to UTP, but it has an extra mesh coating or metal foil, and all the wires are inside it. The maximum length of this wire is 100 meters. If the length is more than 100 meters, then this cable loses its signals. Therefore, this wire is more suitable for small networks such as LANs.


35) Which network is suitable for a building?

  1. WAN
  2. LAN
  3. MAN
  4. PAN

Answer: (b) LAN

Explanation: LAN network is used to connect computers in a small area such as school, office, residence, etc. It is less expensive and very secure.


36) ________ is a 2G mobile telecommunications based on the CDMA.

  1. IS-95
  2. ISO 1990
  3. IS-97
  4. None of the these

Answer: (a) IS-95

Explanation: The full name of IS-95 is interim standard 95. It is a second-generation mobile telecommunications standard based on CDMA (code division multiple access). It was developed by Qualcomm.


37) Which of the following statements is correct about IRC?

  1. It sends the messages in virtual time
  2. It is an application layer protocol
  3. It works on the proxy model
  4. All of the these

Answer: (b) It is an application layer protocol

Explanation: IRC stands for Internet relay chat. It is an application layer protocol that is used to communicate over the internet as a text message. It sends messages in real-time.


38) Which of the following devices is not a networking device?

  1. Hub
  2. Switch
  3. Bridge
  4. None of the these

Answer: (d) None of the these

Explanation: Hub, Switch, and Bridge are networking devices. Therefore, option d is the correct answer.


39) Which of the following devices does not require power to forward the signals?

  1. Active hub
  2. Passive hub
  3. Repeater
  4. Bridge

Answer: (b) Passive hub

Explanation: The passive hub sends the signal forward as it is, so it does not need a power supply.


40) How many pins does RJ-45 contain?

  1. Two
  2. Four
  3. Eight
  4. Ten

Answer: (c) Eight

Explanation: The RJ-45 has eight pins of different colors. The four pins have solid colors, and the other four pins have light colors.


You may also like