0% found this document useful (0 votes)
8 views48 pages

Unit_7

The document outlines key topics for MCQ preparation in Computer Networks, specifically focusing on the OSI and TCP/IP models, Data Link Layer, Network Layer, Transmission Basics, and Application Layer Protocols. It includes a series of multiple-choice questions (MCQs) with explanations for each topic, starting with the OSI model and TCP/IP model. The document emphasizes the importance of understanding these concepts for exam success.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views48 pages

Unit_7

The document outlines key topics for MCQ preparation in Computer Networks, specifically focusing on the OSI and TCP/IP models, Data Link Layer, Network Layer, Transmission Basics, and Application Layer Protocols. It includes a series of multiple-choice questions (MCQs) with explanations for each topic, starting with the OSI model and TCP/IP model. The document emphasizes the importance of understanding these concepts for exam success.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

probable/high-weightage topics from Unit 7: Computer Network, selected for MCQ

preparation:

Most Important & High-Probability Topics from Unit 7: Computer Networks

1. OSI Model and TCP/IP Model (Layering, Design Issues, Functionality of Each Layer)

2. Data Link Layer – Flow Control, Error Control, Framing, MAC Protocols

3. Network Layer – IP (especially IPv4), Routing, Subnetting, ARP, Congestion Control

4. Transmission Basics – Data Transmission Modes (Serial/Parallel), Transmission Media,


Bandwidth, Signal Encoding, Impairments

5. Application Layer Protocols – HTTP, FTP, SMTP, Telnet, SNMP

I’ll now begin creating 20 well-explained MCQs for each of these 5 topics (one at a time),
starting with:

Topic 1: OSI Model and TCP/IP Model

Would you like me to proceed with the first set of 20 MCQs now?

4o

You said:

Yes

ChatGPT said:

Here are 20 MCQs on "OSI Model and TCP/IP Model" with detailed explanations. These are
selected and framed as per Bihar STET Paper 2 trend.

Topic: OSI Model & TCP/IP Model – MCQs with Explanations

1. Which layer of the OSI model is responsible for end-to-end communication and reliability?
A. Transport layer
B. Network layer
C. Data link layer
D. Session layer

Answer: A. Transport layer


Explanation: The transport layer ensures reliable data transfer, error recovery, and flow control
using TCP/UDP protocols.

2. How many layers are there in the OSI model?


A. 5
B. 6
C. 7
D. 4

Answer: C. 7
Explanation: The OSI model has seven layers: Physical, Data Link, Network, Transport, Session,
Presentation, and Application.

3. Which layer of the OSI model is responsible for logical addressing?


A. Network
B. Data Link
C. Transport
D. Application

Answer: A. Network
Explanation: The network layer uses IP addresses to route packets between devices across
networks.

4. In which layer does HTTP operate?


A. Application
B. Session
C. Presentation
D. Transport

Answer: A. Application
Explanation: HTTP is an application-layer protocol used for transferring web pages.
5. Which TCP/IP layer is equivalent to the OSI model's Network layer?
A. Internet layer
B. Transport layer
C. Application layer
D. Network Access layer

Answer: A. Internet layer


Explanation: The Internet layer in TCP/IP corresponds to the Network layer in OSI.

6. Which OSI layer is responsible for encryption and compression?


A. Session
B. Presentation
C. Application
D. Transport

Answer: B. Presentation
Explanation: The presentation layer handles data translation, encryption, and compression.

7. Which of the following is NOT a function of the OSI Transport layer?


A. Flow control
B. Routing
C. Error correction
D. End-to-end delivery

Answer: B. Routing
Explanation: Routing is a function of the network layer, not the transport layer.

8. Which protocol is used at the Transport layer of TCP/IP?


A. IP
B. TCP
C. HTTP
D. FTP

Answer: B. TCP
Explanation: TCP (Transmission Control Protocol) operates at the transport layer and provides
reliable delivery.
9. Which layer is responsible for establishing, maintaining, and terminating connections
between applications?
A. Session
B. Transport
C. Application
D. Data Link

Answer: A. Session
Explanation: The session layer manages sessions between applications.

10. In the OSI model, which layer deals with physical transmission of data?
A. Data Link
B. Network
C. Physical
D. Application

Answer: C. Physical
Explanation: The physical layer manages the actual hardware connection and transmission of
raw bits.

11. Match the layers with their functions:

OSI Layer Function

1. Network A. Reliable delivery

2. Transport B. IP addressing and routing

3. Application C. User interface and protocols like HTTP

A. 1-B, 2-A, 3-C


B. 1-A, 2-B, 3-C
C. 1-C, 2-B, 3-A
D. 1-B, 2-C, 3-A

Answer: A. 1-B, 2-A, 3-C


12. The TCP/IP model has how many layers?
A. 4
B. 5
C. 6
D. 7

Answer: A. 4
Explanation: The TCP/IP model has 4 layers: Application, Transport, Internet, and Network
Access.

13. Which OSI layer is responsible for defining voltages and cable specifications?
A. Network
B. Data Link
C. Transport
D. Physical

Answer: D. Physical
Explanation: The physical layer defines the hardware characteristics.

14. FTP runs on which layer of the OSI model?


A. Application
B. Transport
C. Session
D. Presentation

Answer: A. Application
Explanation: FTP (File Transfer Protocol) is an application layer protocol.

15. What is the function of the Data Link layer?


A. Path selection
B. Logical addressing
C. Frame transmission and error detection
D. Routing

Answer: C. Frame transmission and error detection


16. Which layer adds source and destination port numbers?
A. Transport
B. Network
C. Data Link
D. Application

Answer: A. Transport
Explanation: Port numbers are used by the transport layer to identify services.

17. Which layer uses MAC addresses?


A. Physical
B. Data Link
C. Network
D. Transport

Answer: B. Data Link


Explanation: MAC addresses are used by the data link layer for local addressing.

18. Which of these layers appears in the TCP/IP model but not separately in OSI?
A. Session
B. Presentation
C. Network Access
D. Data Link

Answer: C. Network Access


Explanation: The TCP/IP model merges OSI's physical and data link into one: Network Access.

19. Which protocol resolves IP address to MAC address?


A. DNS
B. ARP
C. DHCP
D. ICMP

Answer: B. ARP
Explanation: ARP (Address Resolution Protocol) maps IP addresses to MAC addresses.
20. Which layer is responsible for converting data into segments?
A. Transport
B. Network
C. Data Link
D. Application

Answer: A. Transport
Explanation: The transport layer segments data for transmission.

If you'd like, I can now continue with MCQs from the next selected topic: Data Link Layer –
Flow Control, Error Control, Framing, MAC Protocols. Should I proceed?

4o

You said:

Yes

ChatGPT said:

Here are 20 MCQs on "Data Link Layer – Flow Control, Error Control, Framing, and MAC
Protocols" with explanations, tailored for Bihar STET Computer Science Paper 2:

Topic: Data Link Layer – MCQs with Explanations

1. Which of the following is a data link layer protocol?


A. IP
B. TCP
C. HDLC
D. HTTP

Answer: C. HDLC
Explanation: HDLC (High-Level Data Link Control) is a bit-oriented protocol used at the Data Link
Layer.

2. What is the main function of the data link layer?


A. Path determination
B. Reliable node-to-node data transfer
C. Encryption
D. Email delivery

Answer: B. Reliable node-to-node data transfer


Explanation: The data link layer ensures error-free transfer of frames between adjacent nodes.

3. Which method is used for flow control in the data link layer?
A. CRC
B. Stop and Wait
C. DNS
D. ARP

Answer: B. Stop and Wait


Explanation: Stop and Wait is a flow control method where the sender waits for an
acknowledgment after sending a frame.

4. What is framing in the data link layer?


A. Breaking data into packets
B. Creating logical address
C. Creating boundaries for data units
D. Encrypting the data

Answer: C. Creating boundaries for data units


Explanation: Framing is the process of dividing a stream of bits into manageable data units
called frames.

5. Which error control method retransmits lost or corrupted frames?


A. Flow Control
B. FEC
C. ARQ
D. Token Passing

Answer: C. ARQ (Automatic Repeat Request)


Explanation: ARQ techniques detect errors and retransmit the frames.
6. What type of error is detected using parity bits?
A. Burst errors
B. Single-bit errors
C. Framing errors
D. Jitter

Answer: B. Single-bit errors


Explanation: Parity bits are simple error detection methods used for identifying single-bit
errors.

7. Which of the following is a contention-based MAC protocol?


A. ALOHA
B. Token Ring
C. Polling
D. FDDI

Answer: A. ALOHA
Explanation: ALOHA is a random access MAC protocol with no centralized control, hence
contention-based.

8. CSMA/CD is used in which type of network?


A. Wi-Fi
B. Token Ring
C. Ethernet
D. Bluetooth

Answer: C. Ethernet
Explanation: Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection).

9. What is the purpose of MAC (Medium Access Control)?


A. Encrypt the data
B. Define IP addressing
C. Regulate access to shared media
D. Establish connection
Answer: C. Regulate access to shared media
Explanation: MAC handles how devices in a network uniquely access the communication
channel.

10. In which framing technique are special flag bytes used?


A. Bit stuffing
B. Character count
C. Byte stuffing
D. CRC

Answer: A. Bit stuffing


Explanation: Bit stuffing involves inserting extra bits into the data to prevent confusion with
frame delimiters.

11. What is used for detecting errors in frames?


A. MAC address
B. Checksum
C. TTL
D. Routing Table

Answer: B. Checksum
Explanation: Checksums are added to frames to detect data corruption during transmission.

12. Which MAC protocol uses a token to control access?


A. ALOHA
B. CSMA
C. Token Ring
D. Slotted ALOHA

Answer: C. Token Ring


Explanation: Token Ring uses a special control frame (token) to prevent collision by controlling
access.

13. Which of the following is not a function of the data link layer?
A. Error detection
B. Addressing
C. Encryption
D. Framing

Answer: C. Encryption
Explanation: Encryption is typically handled at the presentation or application layer, not data
link.

14. What is a drawback of pure ALOHA?


A. No error checking
B. High collision rate
C. Complexity
D. Slow token passing

Answer: B. High collision rate


Explanation: Pure ALOHA is highly inefficient due to frequent data collisions.

15. What does the term “piggybacking” mean in flow control?


A. Encrypting the acknowledgment
B. Sending acknowledgment with data frame
C. Sending multiple ACKs at once
D. Using checksum twice

Answer: B. Sending acknowledgment with data frame


Explanation: Piggybacking improves efficiency by combining ACKs with data in return frames.

16. What is the efficiency of Slotted ALOHA?


A. 36.8%
B. 50%
C. 18.4%
D. 100%

Answer: A. 36.8%
Explanation: Slotted ALOHA doubles the efficiency of pure ALOHA but still has collisions.

17. Which mechanism is used in CSMA/CD after a collision is detected?


A. Token passing
B. Retry after fixed time
C. Binary exponential backoff
D. Stop transmission

Answer: C. Binary exponential backoff


Explanation: After detecting a collision, devices wait a random time using exponential backoff.

18. What is the purpose of flow control?


A. Prevent frame collisions
B. Handle errors in data
C. Match sender and receiver speeds
D. Encrypt data

Answer: C. Match sender and receiver speeds


Explanation: Flow control prevents overflow of data at the receiver end.

19. Which layer of OSI uses framing?


A. Physical
B. Data Link
C. Network
D. Transport

Answer: B. Data Link


Explanation: Framing is a core function of the data link layer.

20. Polling is what type of MAC protocol?


A. Contention-based
B. Random access
C. Reservation-based
D. Controlled access

Answer: D. Controlled access


Explanation: In polling, a central controller asks devices one-by-one, avoiding collisions.

Let me know if you'd like the next topic from Network Layer (Routing, IP addressing,
Subnetting) or any specific subtopic.
4o

You said:

Yes

ChatGPT said:

Updated saved memory

Great! We’ll now proceed with Unit 7: Computer Networks, focusing on the most probable
topics for Bihar STET Paper 2. Based on previous trends and syllabus relevance, the following
topics are prioritized:

High-Probability Topics:

1. OSI and TCP/IP Models (Layering, Protocols, Functions)

2. Data Link Layer (Framing, Error and Flow Control, MAC protocols)

3. Network Layer (IP addressing, Subnetting, Routing, Congestion Control)

4. Transport Layer Basics (UDP, TCP, Sockets, Multiplexing)

5. Application Layer Protocols (HTTP, FTP, SMTP, SNMP)

We'll start with Topic 1: OSI and TCP/IP Models. Shall I begin with 20 MCQs with explanations
for this topic?

You said:

3. Network Layer – IP (especially IPv4), Routing, Subnetting, ARP, Congestion Control 4.


Transmission Basics – Data Transmission Modes (Serial/Parallel), Transmission Media,
Bandwidth, Signal Encoding, Impairments 5. Application Layer Protocols – HTTP, FTP, SMTP,
Telnet, SNMP

ChatGPT said:

Got it! Here are the most important topics you’ve selected for Unit 7:

 Network Layer: IPv4 addressing, Routing, Subnetting, ARP, Congestion Control

 Transmission Basics: Data Transmission Modes (Serial/Parallel), Transmission Media,


Bandwidth, Signal Encoding, Transmission Impairments

 Application Layer Protocols: HTTP, FTP, SMTP, Telnet, SNMP

I'll prepare 20 MCQs with detailed explanations for each of these three topics in turn.
Shall I start with Network Layer (IPv4, Routing, Subnetting, ARP, Congestion Control) first?

You said:

ChatGPT said:

Here are 20 MCQs on Network Layer – IPv4, Routing, Subnetting, ARP, Congestion Control with
detailed explanations:

1. What is the default subnet mask for a Class B IPv4 address?

a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255

Answer: b) 255.255.0.0
Explanation: Class B addresses have the first two octets for network and the last two for host.
The default subnet mask is 255.255.0.0.

2. Which protocol resolves IP addresses into MAC addresses?

a) DHCP
b) DNS
c) ARP
d) ICMP

Answer: c) ARP
Explanation: Address Resolution Protocol (ARP) translates IPv4 addresses to MAC addresses in a
local network.

3. Which of the following is a routing protocol?

a) FTP
b) RIP
c) SMTP
d) TCP
Answer: b) RIP
Explanation: Routing Information Protocol (RIP) is a distance-vector routing protocol used to
find the best path in networks.

4. What is the maximum number of hosts in a subnet with a subnet mask of 255.255.255.240?

a) 14
b) 16
c) 30
d) 32

Answer: a) 14
Explanation: 255.255.255.240 corresponds to /28, leaving 4 bits for hosts. Max hosts = 2^4 - 2 =
14.

5. Which layer of the OSI model handles routing?

a) Data Link
b) Network
c) Transport
d) Application

Answer: b) Network
Explanation: The Network layer is responsible for packet forwarding including routing through
intermediate routers.

6. What does subnetting help to achieve?

a) Increase the size of a network


b) Divide a large network into smaller sub-networks
c) Assign IP addresses dynamically
d) Convert IP addresses to MAC addresses

Answer: b) Divide a large network into smaller sub-networks


Explanation: Subnetting breaks a large network into smaller logical segments for better
management.
7. What is the purpose of congestion control in the network layer?

a) To avoid data loss due to network congestion


b) To translate domain names to IP addresses
c) To find the physical address of a host
d) To encrypt data

Answer: a) To avoid data loss due to network congestion


Explanation: Congestion control mechanisms manage traffic to prevent packet loss and delay.

8. Which IP address class is reserved for multicast?

a) Class A
b) Class B
c) Class C
d) Class D

Answer: d) Class D
Explanation: Class D addresses (224.0.0.0 to 239.255.255.255) are reserved for multicast
groups.

9. Which of the following IP addresses is a valid Class C address?

a) 10.10.10.1
b) 130.45.50.1
c) 192.168.1.1
d) 224.0.0.5

Answer: c) 192.168.1.1
Explanation: Class C addresses range from 192.0.0.0 to 223.255.255.255.

10. What is the role of ARP in IPv4 communication?

a) Maps IP addresses to physical MAC addresses


b) Maps domain names to IP addresses
c) Translates between IPv4 and IPv6 addresses
d) Provides routing paths
Answer: a) Maps IP addresses to physical MAC addresses
Explanation: ARP enables communication within a local network by resolving IP to MAC
addresses.

11. Which of these is NOT a valid subnet mask?

a) 255.255.255.0
b) 255.255.254.0
c) 255.255.255.128
d) 255.255.255.3

Answer: d) 255.255.255.3
Explanation: Valid subnet masks have contiguous ones in binary; 3 (00000011) is invalid.

12. Which field in the IPv4 header is used for fragmentation?

a) TTL
b) Identification
c) Flags
d) Protocol

Answer: c) Flags
Explanation: Flags indicate whether the packet can be fragmented or is the last fragment.

13. What does CIDR stand for in networking?

a) Classless Inter-Domain Routing


b) Computer Inter-Domain Routing
c) Class Internet Data Routing
d) Circuit Internet Data Routing

Answer: a) Classless Inter-Domain Routing


Explanation: CIDR allows flexible IP address allocation without class-based restrictions.

14. Which routing algorithm is based on the shortest path first?

a) Distance vector
b) Link state
c) Flooding
d) Random routing

Answer: b) Link state


Explanation: Link state protocols like OSPF use shortest path first algorithm.

15. What is the broadcast address for the subnet 192.168.10.0/24?

a) 192.168.10.0
b) 192.168.10.1
c) 192.168.10.255
d) 192.168.11.0

Answer: c) 192.168.10.255
Explanation: The broadcast address has all host bits set to 1.

16. What is the range of valid host addresses in the subnet 192.168.1.64/26?

a) 192.168.1.65 to 192.168.1.126
b) 192.168.1.64 to 192.168.1.127
c) 192.168.1.1 to 192.168.1.62
d) 192.168.1.128 to 192.168.1.191

Answer: a) 192.168.1.65 to 192.168.1.126


Explanation: /26 means subnet mask 255.255.255.192 with 64 addresses; first is network, last is
broadcast.

17. Which of these is NOT a function of the network layer?

a) Routing
b) Addressing
c) Flow control
d) Packet forwarding

Answer: c) Flow control


Explanation: Flow control is a data link or transport layer function, not network layer.

18. Which IP address is a loopback address?


a) 127.0.0.1
b) 192.168.1.1
c) 255.255.255.255
d) 0.0.0.0

Answer: a) 127.0.0.1
Explanation: 127.0.0.1 is the standard loopback IP used to test the network stack.

19. What is the function of TTL (Time To Live) in an IP packet?

a) To specify packet priority


b) To limit packet lifetime and avoid routing loops
c) To indicate packet size
d) To encrypt the packet

Answer: b) To limit packet lifetime and avoid routing loops


Explanation: TTL is decremented by each router and packet is discarded when TTL=0.

20. What type of congestion control technique uses packet buffering at routers?

a) Flow control
b) Packet scheduling
c) Traffic shaping
d) Congestion avoidance

Answer: d) Congestion avoidance


Explanation: Congestion avoidance techniques like RED use buffering and selective packet
drops.

If you want, I can continue with the next topic on Transmission Basics or explain any question in
detail. What do you say?

You said:

Yes

ChatGPT said:

Great! I’ll continue with Transmission Basics — focusing on Data Transmission Modes,
Transmission Media, Bandwidth, Signal Encoding, and Transmission Impairments.
Here are 20 MCQs on this topic with detailed explanations:

1. Which of the following is a type of serial transmission?

a) Parallel transmission
b) Simplex transmission
c) Synchronous transmission
d) Asynchronous transmission

Answer: c) Synchronous transmission


Explanation: Synchronous transmission sends data in a continuous stream with timing signals;
it’s a type of serial transmission.

2. In which transmission mode do data flow in both directions but not simultaneously?

a) Simplex
b) Half-duplex
c) Full-duplex
d) Parallel

Answer: b) Half-duplex
Explanation: Half-duplex allows data flow both ways but only one direction at a time.

3. Which transmission medium is most resistant to electromagnetic interference?

a) Twisted pair cable


b) Coaxial cable
c) Optical fiber
d) Radio waves

Answer: c) Optical fiber


Explanation: Optical fibers use light pulses and are immune to electromagnetic interference.

4. Bandwidth in data communications is measured in:

a) Bytes per second


b) Bits per second
c) Hertz
d) Decibels

Answer: c) Hertz
Explanation: Bandwidth refers to the range of frequencies available for data transmission,
measured in Hertz (Hz).

5. Which of the following is a disadvantage of parallel transmission?

a) Higher data rate


b) Longer cable length
c) Timing skew between bits
d) Simple hardware

Answer: c) Timing skew between bits


Explanation: In parallel transmission, timing differences between wires can cause data errors
(skew).

6. What is the primary purpose of signal encoding?

a) To encrypt data
b) To reduce errors during transmission
c) To convert data into a form suitable for transmission
d) To increase bandwidth

Answer: c) To convert data into a form suitable for transmission


Explanation: Encoding transforms data into signals that can be transmitted over a medium.

7. Which encoding scheme uses two signal levels to represent binary 0 and 1?

a) Manchester encoding
b) Non-return-to-zero (NRZ)
c) Frequency modulation
d) Phase modulation

Answer: b) Non-return-to-zero (NRZ)


Explanation: NRZ uses two distinct voltage levels for 0 and 1 without returning to zero.
8. What does attenuation refer to in data transmission?

a) Increase in signal power


b) Loss of signal strength over distance
c) Interference from other signals
d) Noise added to the signal

Answer: b) Loss of signal strength over distance


Explanation: Attenuation is the gradual loss of signal strength as it travels.

9. Which transmission impairment causes signal distortion due to overlapping of pulses?

a) Attenuation
b) Noise
c) Delay distortion
d) Crosstalk

Answer: c) Delay distortion


Explanation: Delay distortion occurs when different frequencies travel at different speeds
causing pulse overlap.

10. What type of noise is caused by sudden spikes in electrical circuits?

a) Thermal noise
b) Impulse noise
c) Crosstalk
d) Intermodulation noise

Answer: b) Impulse noise


Explanation: Impulse noise consists of sudden, short bursts of disturbance often caused by
switching.

11. Which of the following is NOT a transmission media?

a) Coaxial cable
b) Microwave
c) FTP
d) Optical fiber
Answer: c) FTP
Explanation: FTP (File Transfer Protocol) is a network protocol, not a transmission medium.

12. Which data transmission mode allows sending multiple bits simultaneously?

a) Serial transmission
b) Parallel transmission
c) Simplex
d) Half-duplex

Answer: b) Parallel transmission


Explanation: Parallel transmission sends several bits at once across multiple channels.

13. In data communication, throughput is:

a) The maximum capacity of a channel


b) The actual data rate achieved
c) The time delay in transmission
d) The distance data travels

Answer: b) The actual data rate achieved


Explanation: Throughput is the real rate of successful data transfer.

14. Which of the following is a digital-to-digital encoding method?

a) Amplitude Shift Keying (ASK)


b) Frequency Shift Keying (FSK)
c) Manchester encoding
d) Phase modulation

Answer: c) Manchester encoding


Explanation: Manchester encoding combines clock and data into a self-synchronizing signal,
digital-to-digital encoding.

15. What is crosstalk?

a) Interference from one signal to another in adjacent wires


b) Signal fading over distance
c) Loss due to improper shielding
d) Delay in signal transmission

Answer: a) Interference from one signal to another in adjacent wires


Explanation: Crosstalk is unwanted coupling of signals in nearby wires.

16. Which of the following has the highest bandwidth capacity?

a) Twisted pair cable


b) Coaxial cable
c) Optical fiber
d) Wireless radio

Answer: c) Optical fiber


Explanation: Optical fiber offers the highest bandwidth and lowest attenuation.

17. What is the main advantage of serial transmission over parallel transmission?

a) Higher speed
b) Lower cost and less interference
c) Can transmit multiple bits simultaneously
d) More complex hardware

Answer: b) Lower cost and less interference


Explanation: Serial transmission is cheaper and less prone to timing issues compared to parallel.

18. Which layer of the OSI model deals directly with physical transmission of raw bits?

a) Network layer
b) Data link layer
c) Physical layer
d) Transport layer

Answer: c) Physical layer


Explanation: The physical layer is responsible for the actual transmission of raw bit streams.

19. What does a modem do in data communication?


a) Converts digital signals to analog and vice versa
b) Encrypts data
c) Routes packets
d) Controls congestion

Answer: a) Converts digital signals to analog and vice versa


Explanation: Modem modulates digital data into analog signals and demodulates received
analog signals.

20. What is the term for the maximum data rate that can be transmitted over a channel
without error?

a) Bandwidth
b) Throughput
c) Channel capacity
d) Latency

Answer: c) Channel capacity


Explanation: Channel capacity is the theoretical maximum data rate for error-free transmission.

Want me to proceed with Application Layer Protocols next?

You said:

Yes

ChatGPT said:

Here are 20 MCQs on Application Layer Protocols (HTTP, FTP, SMTP, Telnet, SNMP) for your
Bihar STET Computer Science Paper 2 prep:

1. What is the default port number for HTTP?

a) 20
b) 21
c) 80
d) 443

Answer: c) 80
Explanation: HTTP uses port 80 by default for web communication.
2. Which protocol is used to transfer files between client and server over a network?

a) SMTP
b) FTP
c) HTTP
d) SNMP

Answer: b) FTP
Explanation: FTP (File Transfer Protocol) is designed for file transfers.

3. SMTP is primarily used for:

a) Sending emails
b) Receiving emails
c) File transfer
d) Remote login

Answer: a) Sending emails


Explanation: SMTP (Simple Mail Transfer Protocol) is used to send emails.

4. Which protocol is used for remote terminal access?

a) FTP
b) HTTP
c) Telnet
d) SNMP

Answer: c) Telnet
Explanation: Telnet allows remote login to computers over a network.

5. Which protocol monitors and manages network devices?

a) HTTP
b) SNMP
c) FTP
d) SMTP
Answer: b) SNMP
Explanation: SNMP (Simple Network Management Protocol) is used for network management.

6. FTP uses which ports for control and data connections respectively?

a) 20 and 21
b) 21 and 20
c) 80 and 443
d) 25 and 110

Answer: b) 21 and 20
Explanation: FTP uses port 21 for control commands and port 20 for data transfer.

7. What does HTTP stand for?

a) HyperText Transfer Protocol


b) HyperText Transmission Protocol
c) Hyperlink Text Transfer Protocol
d) HyperText Transport Protocol

Answer: a) HyperText Transfer Protocol


Explanation: HTTP is used to transfer hypertext web pages.

8. Which command is used in SMTP to send a mail from client to server?

a) HELO
b) MAIL FROM
c) RCPT TO
d) DATA

Answer: b) MAIL FROM


Explanation: The MAIL FROM command specifies the sender in SMTP.

9. Telnet operates on which port number?

a) 22
b) 23
c) 25
d) 80

Answer: b) 23
Explanation: Telnet uses port 23 for remote terminal sessions.

10. SNMP works on which transport protocol?

a) TCP
b) UDP
c) FTP
d) HTTP

Answer: b) UDP
Explanation: SNMP typically uses UDP for communication.

11. Which protocol is used to receive emails?

a) SMTP
b) POP3
c) FTP
d) Telnet

Answer: b) POP3
Explanation: POP3 (Post Office Protocol) is used to retrieve emails.

12. Which HTTP status code indicates a successful request?

a) 404
b) 500
c) 200
d) 301

Answer: c) 200
Explanation: Status code 200 means OK, successful request.

13. FTP can operate in which two modes?


a) Active and Passive
b) Simple and Complex
c) Online and Offline
d) Local and Remote

Answer: a) Active and Passive


Explanation: FTP supports active and passive modes for data connection establishment.

14. Which SMTP command starts the email sending process?

a) HELO
b) DATA
c) MAIL FROM
d) QUIT

Answer: a) HELO
Explanation: HELO command identifies the client to the SMTP server.

15. Telnet is considered insecure because:

a) It does not encrypt data


b) It uses UDP
c) It uses multiple ports
d) It has slow transmission

Answer: a) It does not encrypt data


Explanation: Telnet sends data in plaintext, vulnerable to interception.

16. What is the primary function of SNMP agents?

a) Send emails
b) Monitor network devices and send data to SNMP managers
c) Transfer files
d) Serve web pages

Answer: b) Monitor network devices and send data to SNMP managers


Explanation: Agents collect and report management data.
17. Which command in FTP is used to change directories?

a) PWD
b) CWD
c) LIST
d) RETR

Answer: b) CWD
Explanation: CWD (Change Working Directory) changes the current directory.

18. Which is a secure alternative to Telnet?

a) SSH
b) FTP
c) HTTP
d) SMTP

Answer: a) SSH
Explanation: SSH encrypts data for secure remote login.

19. HTTP is a:

a) Stateful protocol
b) Stateless protocol
c) Connection-oriented protocol
d) Data link protocol

Answer: b) Stateless protocol


Explanation: HTTP does not retain session information between requests.

20. In SNMP, the manager communicates with the agent using:

a) GET and SET operations


b) PUT and POST operations
c) SEND and RECEIVE operations
d) CONNECT and DISCONNECT operations

Answer: a) GET and SET operations


Explanation: SNMP manager retrieves and modifies data using GET and SET commands.
Would you like MCQs on Network Layer next or want to cover something else?

You said:

Yes

ChatGPT said:

Great! Here are 20 MCQs on Network Layer topics like IPv4, Routing, Subnetting, ARP, and
Congestion Control for your Bihar STET Paper 2 prep:

1. What is the size of an IPv4 address?

a) 16 bits
b) 32 bits
c) 64 bits
d) 128 bits

Answer: b) 32 bits
Explanation: IPv4 addresses are 32-bit numbers written in dotted decimal format.

2. Which class of IPv4 address is used for large networks?

a) Class A
b) Class B
c) Class C
d) Class D

Answer: a) Class A
Explanation: Class A addresses support 126 networks with many hosts each.

3. What does ARP stand for?

a) Address Resolution Protocol


b) Automatic Routing Protocol
c) Address Routing Process
d) Automatic Resolution Process
Answer: a) Address Resolution Protocol
Explanation: ARP maps IP addresses to MAC addresses on a LAN.

4. Which of the following is a private IP address range?

a) 10.0.0.0 to 10.255.255.255
b) 192.168.0.0 to 192.168.255.255
c) 172.16.0.0 to 172.31.255.255
d) All of the above

Answer: d) All of the above


Explanation: These ranges are reserved for private network use.

5. What is the subnet mask for a Class C network by default?

a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255

Answer: c) 255.255.255.0
Explanation: Class C networks have default subnet mask 255.255.255.0.

6. What is the purpose of subnetting?

a) To reduce broadcast domains


b) To increase IP addresses
c) To provide security only
d) To connect different networks

Answer: a) To reduce broadcast domains


Explanation: Subnetting divides a large network into smaller subnetworks.

7. Which routing protocol uses hop count as a metric?

a) OSPF
b) BGP
c) RIP
d) EIGRP

Answer: c) RIP
Explanation: RIP (Routing Information Protocol) uses hop count for routing decisions.

8. What is the maximum hop count allowed in RIP?

a) 15
b) 16
c) 30
d) 255

Answer: a) 15
Explanation: RIP considers 16 hops as unreachable.

9. What type of address is 255.255.255.255?

a) Network address
b) Broadcast address
c) Subnet mask
d) Default gateway

Answer: b) Broadcast address


Explanation: It is the limited broadcast address for sending to all hosts.

10. What does CIDR stand for?

a) Classless Inter-Domain Routing


b) Classful Internet Domain Routing
c) Centralized Internet Domain Routing
d) Class Independent Domain Routing

Answer: a) Classless Inter-Domain Routing


Explanation: CIDR allows flexible IP addressing beyond classful limits.

11. Which field in the IPv4 header specifies the next-level protocol?
a) Source Address
b) Protocol
c) TTL
d) Checksum

Answer: b) Protocol
Explanation: This field identifies the protocol in the data portion (TCP, UDP, etc.).

12. What does the TTL field in an IP header signify?

a) Time To Live
b) Total Transmission Length
c) Transport Transmission Limit
d) Temporary Transfer Limit

Answer: a) Time To Live


Explanation: TTL limits packet lifetime to avoid infinite loops.

13. What is the main function of the routing table?

a) Store MAC addresses


b) Decide the best path for packets
c) Convert IP to physical address
d) Encrypt data

Answer: b) Decide the best path for packets


Explanation: Routing table stores routes to different networks.

14. Which of the following is a connectionless protocol?

a) TCP
b) UDP
c) FTP
d) SMTP

Answer: b) UDP
Explanation: UDP is connectionless and does not guarantee delivery.
15. Congestion control in networks aims to:

a) Increase packet loss


b) Avoid network congestion
c) Reduce routing paths
d) Encrypt data

Answer: b) Avoid network congestion


Explanation: Congestion control prevents overload and packet loss.

16. Which algorithm is commonly used for congestion control in TCP?

a) Slow Start
b) Distance Vector
c) Link State
d) ARP

Answer: a) Slow Start


Explanation: TCP uses Slow Start to gradually increase transmission rate.

17. What is the function of ARP in a network?

a) Translate IP address to MAC address


b) Find the routing path
c) Control congestion
d) Assign IP addresses

Answer: a) Translate IP address to MAC address


Explanation: ARP resolves IP to physical MAC addresses for LAN communication.

18. Which protocol handles the delivery of packets between networks?

a) IP
b) TCP
c) FTP
d) HTTP

Answer: a) IP
Explanation: Internet Protocol routes packets between networks.
19. What is subnetting used to create?

a) Smaller broadcast domains within a network


b) Larger IP addresses
c) A VPN
d) A firewall

Answer: a) Smaller broadcast domains within a network


Explanation: It divides networks to reduce traffic and improve management.

20. Which IP class is used for multicast addresses?

a) Class A
b) Class B
c) Class C
d) Class D

Answer: d) Class D
Explanation: Class D addresses (224.0.0.0 to 239.255.255.255) are reserved for multicast

🧠 Topic: Transmission Basics – 20 MCQs with Explanations

1. Which of the following is true about serial transmission?

A. Data is sent in groups


B. Data is sent simultaneously on multiple lines
C. Data is sent one bit at a time
D. Data is sent in parallel channels

Answer: C
Explanation: In serial transmission, data bits are sent sequentially over a single channel. It's
slower but more reliable over long distances.

2. In parallel transmission, how many bits are transmitted at once?

A. One
B. Two
C. Eight or more
D. None of the above

Answer: C
Explanation: Parallel transmission sends multiple bits (usually 8, 16, or 32) simultaneously using
multiple lines or wires.

3. Which transmission mode is better suited for long-distance communication?

A. Parallel
B. Serial
C. Synchronous
D. Asynchronous

Answer: B
Explanation: Serial transmission is more reliable for long distances due to less interference and
signal degradation.

4. Which of the following is a guided transmission medium?

A. Radio waves
B. Infrared
C. Twisted pair cable
D. Microwave

Answer: C
Explanation: Twisted pair cable is a guided medium where data is transmitted through a
physical conductor.

5. Which of these offers the highest bandwidth?

A. Coaxial cable
B. Twisted pair
C. Optical fiber
D. Microwave

Answer: C
Explanation: Optical fiber provides the highest bandwidth and is ideal for high-speed, long-
distance communication.
6. Which of the following transmission media is most immune to electromagnetic
interference?

A. Coaxial cable
B. Twisted pair cable
C. Optical fiber
D. Microwave

Answer: C
Explanation: Optical fibers are immune to electromagnetic interference since data travels as
light.

7. What does bandwidth refer to in data communication?

A. The width of the cable


B. The speed of light
C. The data capacity of the channel
D. The voltage level

Answer: C
Explanation: Bandwidth indicates how much data can be transmitted in a given time, typically
measured in bits per second (bps).

8. Which of the following is a digital encoding technique?

A. NRZ (Non-Return to Zero)


B. Amplitude Modulation
C. Frequency Modulation
D. Phase Modulation

Answer: A
Explanation: NRZ is a digital line coding method where binary 1s and 0s are represented by
voltage levels.

9. The distortion that occurs due to different signal components traveling at different speeds
is called:
A. Attenuation
B. Noise
C. Delay distortion
D. Jitter

Answer: C
Explanation: Delay distortion happens when components of a signal arrive at different times,
distorting the signal.

10. Which impairment causes gradual loss of signal strength?

A. Delay
B. Attenuation
C. Crosstalk
D. Echo

Answer: B
Explanation: Attenuation refers to the weakening of the signal over distance.

11. Which type of cable is commonly used in LANs due to its cost-effectiveness and flexibility?

A. Coaxial
B. Twisted Pair
C. Optical Fiber
D. Microwave

Answer: B
Explanation: Twisted pair cables are inexpensive, flexible, and widely used in LAN setups.

12. Which encoding scheme uses three voltage levels for better synchronization?

A. NRZ
B. Manchester
C. AMI (Alternate Mark Inversion)
D. Bipolar NRZ

Answer: C
Explanation: AMI uses three voltage levels (positive, zero, and negative) and is used to improve
synchronization.
13. Which factor does not directly affect bandwidth?

A. Transmission medium
B. Signal frequency
C. Noise
D. Voltage

Answer: D
Explanation: Voltage levels are not a primary factor in determining bandwidth, unlike medium,
signal frequency, and noise.

14. In digital transmission, the interval between the start of one bit and the start of the next is
called:

A. Bit period
B. Bit rate
C. Byte cycle
D. Clock cycle

Answer: A
Explanation: Bit period is the time taken to transmit one bit.

15. Which of the following is an unguided medium?

A. Fiber optics
B. Twisted pair
C. Radio wave
D. Coaxial cable

Answer: C
Explanation: Radio waves are transmitted without physical conductors, making them an
unguided medium.

16. Which encoding method ensures transition in every bit for synchronization?

A. NRZ
B. RZ
C. Manchester
D. Differential Manchester

Answer: C
Explanation: Manchester encoding ensures a transition at the midpoint of each bit, useful for
synchronization.

17. Which transmission mode allows data to be transmitted in both directions but not
simultaneously?

A. Simplex
B. Half-duplex
C. Full-duplex
D. Multiplex

Answer: B
Explanation: Half-duplex allows two-way communication but only one direction at a time.

18. Which term describes unwanted alteration in signal during transmission?

A. Attenuation
B. Noise
C. Delay
D. Distortion

Answer: B
Explanation: Noise is any unwanted signal that distorts the original data during transmission.

19. Which media has the lowest bandwidth among the following?

A. Fiber Optic
B. Twisted Pair
C. Coaxial
D. Satellite link

Answer: B
Explanation: Twisted pair cable generally has the lowest bandwidth compared to others.
20. Jitter in transmission refers to:

A. Signal distortion
B. Variation in packet arrival time
C. Decrease in signal strength
D. Network traffic congestion

Answer: B
Explanation: Jitter is the variation in the delay of received packets in a network.

✅ Key Takeaways:

 Serial transmission is reliable for long distances.

 Optical fiber is best for bandwidth and minimal interference.

 Manchester encoding aids synchronization.

 Attenuation, delay, noise, and jitter are key impairments.

 Know how bandwidth, media, and encoding impact performance.

🧠 Topic: Application Layer Protocols – 20 MCQs with Explanations

1. Which of the following protocols is used for transferring web pages?

A. FTP
B. HTTP
C. SMTP
D. SNMP

Answer: B
Explanation: HTTP (HyperText Transfer Protocol) is used for transferring web documents
between clients and servers.

2. Which protocol is used to transfer files over the Internet?

A. FTP
B. Telnet
C. SMTP
D. SNMP

Answer: A
Explanation: FTP (File Transfer Protocol) is designed for uploading and downloading files across
a network.

3. SMTP is primarily used for:

A. Receiving emails
B. Sending emails
C. Downloading emails
D. Reading emails offline

Answer: B
Explanation: SMTP (Simple Mail Transfer Protocol) is used to send emails from a client to a
server or between servers.

4. Which protocol enables terminal emulation for remote login?

A. FTP
B. Telnet
C. HTTP
D. SNMP

Answer: B
Explanation: Telnet (Telecommunication Network) allows users to log into remote computers
and interact with them as if they were local terminals.

5. SNMP is used for:

A. Sending emails
B. Monitoring and managing network devices
C. Uploading files
D. Remote terminal access

Answer: B
Explanation: SNMP (Simple Network Management Protocol) is used to monitor and manage
network devices such as routers and switches.
6. HTTP works on which port number by default?

A. 20
B. 21
C. 23
D. 80

Answer: D
Explanation: Port 80 is the default port for HTTP traffic.

7. Which protocol uses port 25 by default?

A. FTP
B. Telnet
C. SMTP
D. SNMP

Answer: C
Explanation: SMTP operates on port 25 to transfer emails.

8. FTP uses which ports for control and data transfer respectively?

A. 20 (Control), 21 (Data)
B. 21 (Control), 20 (Data)
C. 80 (Control), 21 (Data)
D. 23 (Control), 25 (Data)

Answer: B
Explanation: FTP uses port 21 for control commands and port 20 for data transfer.

9. Which protocol is considered insecure due to transmission of data in plaintext?

A. HTTPS
B. Telnet
C. SNMPv3
D. SFTP
Answer: B
Explanation: Telnet does not encrypt data, making it insecure for remote communication.

10. Which version of SNMP includes security features like encryption and authentication?

A. SNMPv1
B. SNMPv2
C. SNMPv3
D. SNMPv4

Answer: C
Explanation: SNMPv3 added support for encrypted communication and secure authentication.

11. Which protocol is used to access emails from a remote server?

A. SMTP
B. IMAP
C. FTP
D. SNMP

Answer: B
Explanation: IMAP (Internet Message Access Protocol) is used to access and manage email
messages directly on the mail server.

12. HTTPS differs from HTTP because it:

A. Uses a different port


B. Encrypts data during transfer
C. Uses SSL/TLS
D. All of the above

Answer: D
Explanation: HTTPS uses SSL/TLS over port 443 to provide secure communication, unlike HTTP.

13. Which of the following protocols supports interactive file transfers?

A. HTTP
B. FTP
C. SNMP
D. SMTP

Answer: B
Explanation: FTP supports interactive sessions like file listing, renaming, downloading, etc.

14. Which protocol is mainly used in network monitoring tools?

A. FTP
B. SMTP
C. SNMP
D. HTTP

Answer: C
Explanation: SNMP is widely used in tools like Nagios, PRTG for monitoring and managing
network infrastructure.

15. Which protocol allows uploading a file to a web server?

A. HTTP
B. FTP
C. SMTP
D. Telnet

Answer: B
Explanation: FTP supports both uploading and downloading files.

16. What is the full form of HTTP?

A. Hyperlink Transfer Protocol


B. HyperText Transport Protocol
C. HyperText Transfer Protocol
D. High Transfer Text Protocol

Answer: C
Explanation: HTTP stands for HyperText Transfer Protocol.

17. Telnet provides a __________ interface to communicate with remote systems.


A. GUI
B. Command-line
C. Binary
D. Audio

Answer: B
Explanation: Telnet provides a text-based, command-line interface for interacting with remote
systems.

18. SMTP is a _______ layer protocol.

A. Transport
B. Network
C. Application
D. Session

Answer: C
Explanation: SMTP is an Application Layer protocol used to send emails.

19. HTTP is a _______ protocol.

A. Stateful
B. Stateless
C. Secure
D. Encrypted

Answer: B
Explanation: HTTP is stateless, meaning each request is independent of previous ones.

20. Which of the following is NOT an application layer protocol?

A. FTP
B. HTTP
C. SNMP
D. TCP

Answer: D
Explanation: TCP is a Transport Layer protocol, while the others operate at the Application
Layer.
✅ Key Takeaways:

 HTTP: Transfers web content (Port 80)

 FTP: File transfer protocol (Ports 21 & 20)

 SMTP: Sends email (Port 25)

 Telnet: Remote terminal login (Insecure, Port 23)

 SNMP: Network device management (Port 161), SNMPv3 is secure

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy