0% found this document useful (0 votes)
26 views4 pages

CN MCQ'S

Uploaded by

maheshsibbala00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views4 pages

CN MCQ'S

Uploaded by

maheshsibbala00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

COMPUTER NETWORK MCQ’S

1) Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server
2) MAC address is also called
a) Physical address
b) Logical address
c) Source address
d) Destination address
3) Which of the following protocols is the connection-less protocol?
a) UDP
b) TCP
c) IP
d) NONE
4) Which topology requires a multipoint connection?
a) Ring
b) Bus
c) Star
d) mesh
5) The data link layer takes the packets from _________ and encapsulates them into frames for
transmission.
a) network layer
b) physical layer
c) transport layer
d) application layer
6) What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
7) What was the name of the first network?
ASAPNET
ARPANET
CNNET
NSFNET
8) In the TCP/IP model, which layer corresponds to the OSI model's Physical and Data Link layers
Application
Transport
Internet
Network Interface
9) What type of transmission is involved in communication between a computer and a keyboard?
Half-duplex
Full-duplex
Simplex
Automatic
10) Which software prevents the external access to a system
Firewall
Gateway
Router
Virus checker
11) Which connection is necessary for a computer to join the internet?
a) internet society
b) internet service provider
c) different computer
d) internet architecture board
12) In which of the following switching methods, the message is divided into small packets?
Message switching
Packet switching
Virtual switching
none
13) Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
14) Which of the following delay is faced by the packet in travelling from one end system to another?
Propagation delay
Queuing delay
Transmission delay
All
15) Which of the following is used in an attempt to render a computer resource unavailable to its
intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack
16) Which of the following is not a service of data link layer
Framming
Routing
Flow control
Error control
17) Which layer provides the services to user?
physical layer
presentation layer
session layer
application layer
18) The datagram packet switching is a _______ switching
Connection oriented
Connection less
Hybrid
None
19) Which sublayer of the data link layer performs data link functions that depend upon the type of
medium?
a) logical link control sublayer
b) media access control sublayer
c) network interface control sublayer
d) error control sublayer
20) Parity is used for
Error detection
Error Correction
Both A & B
None
21) What is the size of the sender window in the Go Back N (ARQ) protocol?
1
0
10
n
22) The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto
the next outgoing data frame is called ____________
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
23) Header of a frame generally contains ______________
a) synchronization bytes
b) addresses
c) frame identifier
d) all
24) What is the total vulnerable time value of pure Aloha?
Tfr
1/2 Tfr
2 * Tfr
4 * Tfr
25) Character Stuffing is also known as
Bit stuffing
Byte Stuffing
Character Count
None
26) Which of this is not a network edge device?
Switch
PC
Smartphones
Servers
27) Which network topology requires a central controller or hub?
Ring
Bus
Star
Mesh
28) Which of the following is an example of Bluetooth?
LAN
WAN
MAN
PAN
29) CRC stands for __________
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
30) The location of a resource on the internet is given by its?
Protocol
URL
E-mail address
ICQ

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy