Computer Network Multiple Choice Questions


Computer Network Multiple Choice Questions

1) In which of the following switching methods, the message is divided into small packets?
Message switching
Packet switching
Virtual switching
None of the these 



Answer: (b) Packet switching

Explanation: In packet switching, the message is divided into small parts. These small parts of the message are called packets, and each packet has its own source and destination address. Each packet is transmitted forward in the network only on the basis of these addresses.

2) Which of the following switch methods creates a point-to-point physical connection between two or more computers?
Message switching
Packet switching
Circuit switching
None of the these 



Answer: (a) Circuit switching

Explanation: Circuit switching is a switching technique in which a point-to-point physical connection is made between two or more devices.

For example: Telephone system, in which sender and receiver are connected by physical connection, such as wire.

3) What is the second name of the proxy server?
Proxy tools
Application proxy
Application-level gateway
All of the these 



Answer: (c) Application-level gateway

Explanation: The proxy server is also known as the application-level gateway. It allows client computers to establish indirect network connections to other networks.

4) Which of the following servers allows LAN users to share data?
Data server
Point server
File server
Communication server 



Answer: (c) File server

Explanation: A file server allows LAN users to share the data. It acts as a medium for data transfer. It uses the FTP protocol to transfer information and data.

5) What is the total vulnerable time value of pure Aloha?
Tfr
1/2 Tfr
2 * Tfr
4 * Tfr 



Answer: 2 * Tfr

Explanation: Total vulnerable time of pure Aloha = 2 * Tfr

6) How many fields are in the SMDS packet?
Two
Three
Four
Five 



Answer: (b) Three

Explanation: SMDS packet consists of three fields: Destination address, Source address, and User data. In this, the destination and source addresses are 8 bytes, while the user data is up to 9188 bytes.

7) What is the maximum data transfer rate of the optical fiber wire?
50 kbps
1000 kbps
1000 Mbps
None of the these 



Answer: (c) 1000 Mbps

Explanation: 1000 Mbps is the max data transfer rate for optical fiber cables. It is the fastest among the other kinds of cables like STP and coaxial cables. People are now using optical fiber cables instead of STP for LANs due to their fast data transfer capability.

8) POTS network works on the principle of ________
Telephone switching
Proxy server
File system
Circuit system 



Answer: (d) Circuit switching

Explanation: POTS stands for Plain-old-telephone-service, and it works on the principle of circuit switching. In this, the analog signal is transmitted by copper wire.

9) Which of the following protocols is the bit-oriented protocol?
SSL
http
HDLC
All of the these 



Answer: (c) HDLC

Explanation: HDLC stands for High-level data link control. It is a set of protocols that are used to transmit information from one network to another. It is a bit-oriented protocol that supports both wireless and wired communication.

10) SLIP stands for _______
System line internet protocol
Serial line internet protocol
Signal line internet protocol
Signal internet protocol 



Answer: (b) Serial line internet protocol

Explanation: SLIP stands for Serial-line-internet-protocol. It is an internet protocol through which a user accesses the internet using a computer modem.

11) The second port is used to ____________ in the two-port network.
Input terminal
Output terminal
Signal terminal
Bandwidth terminal 



Answer: (b) Output terminal

Explanation: A two-port network is an electrical network consisting of two ports. The first port is used for the input terminal, and the second pair is used for the output terminal.

12) Which of the following layers does the HTTP protocol work on?
Physical layer
Data-link layer
Application layer
None of the these 



Answer: (c) Application layer

Explanation: The HTTP application works on the application layer protocol. It is used to transmit messages across the World Wide Web.

13) Which of the following statement correct about the cipher in cryptography?
It is a method for performing encryption and decryption
It is used to establish the network connection
It is a message event
All of the these 



Answer: (a) It is a method for performing encryption and decryption

Explanation: A cipher is a method of implementing encryption and decryption of messages traveling in a network. It is used to increase the confidentiality of messages.

14) SONET stands for ______________.
Signal Operation Network
Synchronous Optical Network
System Optical Network
Signal Optical Network 



Answer: (b) Synchronous Optical Network

Explanation: SONet stands for Synchronous Optical Network. It is used in the telephone system. SONet is a technology that converts signals of different capacities into optical signals.

15) How many layers does the SONET contain?
2 layers
3 layers
4 layers
5 layers 



Answer: (c) 4 layers

Explanation: Sonet consists of 4 layers.

Path layer → Line layer → Section layer → Photonic layer

16) RAKE receiver designed for _____.
Multipath fading
Signals
Data network
Network connection 



Answer: (a) Multipath fading

Explanation: Rake receiver is a radio receiver. It is designed to counter the effects of multipath fading. It is most commonly used in CDMA and W-CDMA radio devices, such as wireless LAN devices and mobile phones.

17) What is the formula of high rate in zigzag code?
J / (J * 1)
-Z / (1 + J)
Z * (1 + J)
J / (J + 1) 



Answer: (d) J / (J + 1)

Explanation: Zigzag code is a type of linear error-correcting code. The formula of high code rate is = J / (J + 1), Where J is the number of Bits per segment.

18) What is the size of the sender window in the Go Back N (ARQ) protocol?
0
1
10



Answer: (d) n

Explanation: Go back N (ARQ) protocol is a data-link layer protocol that uses sliding window technology. The size of the sender window is N. For example: Go back 8, then the size of the sender window will be 8.

19) What is the efficiency of the Go back N (ARQ) protocol?
N = N / (2a + 2a)
N = N / (1 + 2a)
N = N * (2a + 2a)
N = N * (1 + 2a) 



Answer: (b) N = N / (1 + 2a)

Explanation: Go back N (ARQ) protocol is a data link layer protocol that uses sliding window technology. The efficiency of the Go back N ARQ protocol is: N = N / (1 + 2a), Where N is the sender window size.

20) What is the size of the destination port in the UDP protocol?
8 bits
16 bits
20 bits
32 bits 



Answer: (b) 16 bits

Explanation: The size of the destination port is 16 bits in UDP protocol, and it is used to identify the destination port of the data.

21) What network utility uses the time-To-Live (TTL) field in the IP header to elicit ICMP error messages?
Ping
Route
Traceroute
Ifconfig 



Answer: (c) Traceroute

Explanation: Traceroute works by sending packets of data with a reduced time-to-live (TTL) that specifies how many steps (hops) a packet can survive before returning. It finds the exact route taken by each step to arrive at the server and time.

22) A client of the DNS (Domain Name System) application is called _____.
DNS server
DNS Name
DNS resolver
DNS inquirer 



Answer: (c) DNS resolver

Explanation: A DNS client is a device that is set up to send name resolution requests to the DNS server. It is also called the DNS resolver.

23) How many characters consist of the entire hostname?
511 characters
255 characters
127 characters
31 characters 



Answer: (a) 255 characters

Explanation: A hostname is a label that is assigned to a network-device. A total of 255 characters can be used in an entire hostname. However, each label must be between 1 and 63 characters.

24) During normal IP packet forwarding by a router, which of the following fields of the IP header is updated?
Repeater
Source address
Destination address
Checksum 



Answer: (d) Checksum

Explanation: When an IPv4 (Internet Protocol version 4) datagram sends an IP packet by a router, its header checksum needs to be updated as a result of reducing the TTL field.

25) Which of the following statements is correct about the DWDM?
It can transmit data at very high speeds
It can transmit data at very slow speeds
DWSM stands for digital wave division multiplexing
None of the these 



Answer: (a) It can transmit data at very high speeds

Explanation: DWSM stands for Dense-Wavelength-Division-Multiplexing. It is a fiber optic transmission technique in which light wavelengths are used to transmit data. Therefore, it can transmit data at very high speeds.

26) MAC address is also called ______.
Physical address
Logical address
Source address
Destination address 



Answer: (a) Physical address

Explanation: Physical address is also known as MAC address. The physical address is unique because it cannot be changed. This address is stored in the main memory in the system.

27) Which of the following addresses is 32-bit?
MAC address
Virtual address
Source address
Destination address 



Answer: (a) Virtual address

Explanation: The virtual address is also called a logical address, and this address is stored in virtual memory in the system. The length of this address is 32-bit. For example, IP address: 190.10.134.76

28) EDI stands for ____.
Electronic Data Interchange
Electronic Digital Internet
Electronic Digital Interchange
Electronic Data Internet 



Answer: (a) Electronic Data Interchange

Explanation: EDI stands for Electronic-Data-Interchange. It is a communication system in which data is transferred electronically from one computer to another computer.

29) What is the maximum data transfer rate of the ISDN?
1024 Mbps
64 Mbps
64 kbps
1024 kbps 



Answer: (b) 64 kbps

Explanation: The ISDN supports data transfer rates up to 64 kbps. ISDN is a circuit-switched telephone network system. It is a set of communication standards for digital transmission (e.g., audio, video, and other network-related data).

30) ARPANET stands for _______.
Advanced Recheck Projects Agency Internet
Advanced Recheck Projects Agency Network
Advanced Research Projects Agency Network
Advanced Research Projects Agency Internet 



Answer: (c) Advanced Research Projects Agency Network

Explanation: ARPANET stands for Advanced-Research-Projects-Agency-Network. It was the world's first packet-switching network and the first in the world to use the TCP/IP model.

31) What is the size of the UDP header?
8 bytes
16 bytes
20 bytes
64 bytes 



Answer: (a) 8 bytes

Explanation: The size of the UDP header is 64 bits (64 bit means 8 bytes). It is a simple transport layer communication protocol. It has four parameters: Source port, Destination port, Length, and Checksum.

32) Which of the following protocols is the connection-less protocol?
UDP
TCP
IP
All of the these 



Answer: (a) UDP

Explanation: UDP is a connection-less protocol which means that when data transfer occurs, this protocol does not establish a connection between the sender and the receiver.

33) Wildcard domain name labels begin with a ______.
.
0
@
*



Answer: (c) *

Explanation: A wildcard record is a type of resource record that matches one or more subdomains. It is started with a "*". For example: *.javatpoint.com

34) What is the maximum length of the STP wire?
20 ft
50 ft
50 meters
100 meters 



Answer: (d) 100 meters

Explanation: STP is the full name Shielded twisted-pair. This cable is similar to UTP, but it has an extra mesh coating or metal foil, and all the wires are inside it. The maximum length of this wire is 100 meters. If the length is more than 100 meters, then this cable loses its signals. Therefore, this wire is more suitable for small networks such as LANs.

35) Which network is suitable for a building?
WAN
LAN
MAN
PAN 



Answer: (b) LAN

Explanation: LAN network is used to connect computers in a small area such as school, office, residence, etc. It is less expensive and very secure.

36) ________ is a 2G mobile telecommunications based on the CDMA.
IS-95
ISO 1990
IS-97
None of the these 



Answer: (a) IS-95

Explanation: The full name of IS-95 is interim standard 95. It is a second-generation mobile telecommunications standard based on CDMA (code division multiple access). It was developed by Qualcomm.

37) Which of the following statements is correct about IRC?
It sends the messages in virtual time
It is an application layer protocol
It works on the proxy model
All of the these 



Answer: (b) It is an application layer protocol

Explanation: IRC stands for Internet relay chat. It is an application layer protocol that is used to communicate over the internet as a text message. It sends messages in real-time.

38) Which of the following devices is not a networking device?
Hub
Switch
Bridge
None of the these 



Answer: (d) None of the these

Explanation: Hub, Switch, and Bridge are networking devices. Therefore, option d is the correct answer.

39) Which of the following devices does not require power to forward the signals?
Active hub
Passive hub
Repeater
Bridge 



Answer: (b) Passive hub

Explanation: The passive hub sends the signal forward as it is, so it does not need a power supply.

40) How many pins does RJ-45 contain?
Two
Four
Eight
Ten 



Answer: (c) Eight

Explanation: The RJ-45 has eight pins of different colors. The four pins have solid colors, and the other four pins have light colors.


Comments

Popular posts from this blog

Mini-Max Algorithm in Artificial Intelligence

Alpha-Beta Pruning

SQL Multiple Choice Questions