1. What are nodes in a computer network?
- the computer that routes the data
- the computer that terminates the data
- the computer that originates the data
- all of the mentioned
Answer: all of the mentioned
2. How do two devices become part of a network?
- PIDs of the processes running of different devices are same
- a process in one device is able to exchange information with a process in another device
- a process is active and another is inactive
- a process is running on both devices
Answer: a process in one device is able to exchange information with a process in another device
3. Which topology requires a multipoint connection?
- Ring
- Bus
- Star
- Mesh
Answer: Bus
4. Which of the following are Gigabit Ethernets?
- 1000 BASE-LX
- 1000 BASE-CX
- 1000 BASE-SX
- All of the mentioned
Answer: All of the mentioned
5. The source can be a _______
- Computer
- Telephone handset
- Video camera
- Any of the above
Answer: Any of the above
6. Which one of the following would breach the integrity of a system?
- Looking the room to prevent theft
- Full access rights for all users
- Fitting the system with an anti-theft device
- Protecting the device against willful or accidental damage
Answer: Full access rights for all users
7. Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?
- It reports all errors which occur during transmission.
- A redirect message is used when a router notices that a packet seems to have been routed wrongly.
- It informs routers when an incorrect path has been taken.
- The "destination unreachable" type message is used when a router cannot locate the destination.
Answer: A redirect message is used when a router notices that a packet seems to have been routed wrongly.
8. What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?
- Unshielded twisted pair
- Optical fiber
- Coaxial cable
- Microwave
Answer: Optical fiber
9. Which of this is not a network edge device?
- Switch
- PC
- Smartphones
- Servers
Answer: Switch
10. Which of the following maintains the Domain Name System?
- a single server
- a single computer
- distributed database system
- none of the mentioned
Answer: distributed database system
11. Which layer provides the services to user?
- physical layer
- presentation layer
- session layer
- application layer
Answer: application layer
12. The receiver can be a _______.
- Computer
- Telephone handset
- Video camera
- Any of the above
Answer: Any of the above
13. The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine representation differences with shared access resolution and ASCII test protocol is?
- Network, Physical, Transport, Data link
- Network, Physical, Data link, Application
- Network, Presentation, Data link, Application
- Network, Presentation, Physical, Transport
Answer: Network, Presentation, Data link, Application
14. The private key in asymmetric key cryptography is kept by?
- Sender
- Receiver
- Sender and Receiver
- None of the these
Answer: Receiver
15. At what speed does tele-computed refer?
- Interface speed
- Cycles per second
- Baud rate
- Megabyte load
Answer: Baud rate
16. "Parity bits" are used for which of the following purposes?
- Encryption of data
- To transmit faster
- To detect errors
- To identify the user
Answer: To detect errors
17. What is the term for an endpoint of an inter-process communication flow across a computer network?
- port
- machine
- socket
- pipe
Answer: socket
18. What is a computer network?
- A device used to display information on a computer screen
- A collection of interconnected computers and devices that can communicate and share resources
- A type of software used to create documents and presentations
- The physical casing that protects a computer’s internal components
Answer: A collection of interconnected computers and devices that can communicate and share resources
19. Which of the following computer networks is built on the top of another network?
- overlay network
- prime network
- prior network
- chief network
Answer: overlay network
20. When a collection of various computers appears as a single coherent system to its clients, what is this called?
- mail system
- networking system
- computer network
- distributed system
Answer: distributed system
21. Which of the following devices forwards packets between networks by processing the routing information included in the packet?
- firewall
- bridge
- hub
- router
Answer: router
22. Which of the following allows LAN users to share computer programs and data?
- File server
- Network
- Communication server
- Print server
Answer: File server
23. The _______ is the information (data) to be communicated
- Protocol
- Message
- Medium
- Sender
Answer: Message
24. Which of the following statement is true about error detection techniques used on communications link?
- Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
- Error detection cannot be used on simplex links.
- Hamming code can detect up to 3-bit errors.
- All of the these
Answer: All of the these
25. How many digits of the Data Network Identification Code (DNIC) identify the country?
- first three
- first four
- first five
- first six
Answer: first three
26. Which one of the following is the most common internet protocol?
- HTML
- NetBEUI
- TCP/IP
- IPX/SPX
Answer: TCP/IP
27. When discussing IDS/IPS, what is a signature?
- It refers to “normal,” baseline network behavior
- It is used to authorize the users on a network
- An electronic signature used to authenticate the identity of a user on the network
- Attack-definition file
Answer: Attack-definition file
28. Which layer does the data link layer take packets from and encapsulate them into frames for transmission?
- transport layer
- application layer
- network layer
- physical layer
Answer: network layer
29. Which one of the following is not a function of network layer?
- congestion control
- error control
- routing
- inter-networking
Answer: error control
30. What is the full form of OSI?
- optical service implementation
- open service Internet
- open system interconnection
- operating system interface
Answer: open system interconnection
31. The message can consist of _______
- Text
- Images
- Video
- Any of the above
Answer: Any of the above
32. The _______ is the physical path by which a message travels from sender to
- receiver
- Protocol
- Message
- Transmission medium
Answer: Transmission medium
33. What is the maximum efficiency of slotted aloha at G = 1?
- 36.8
- 35.8
- 35.5
- 37.8
Answer: 36.8
34. In the cryptography, the sequence of the letters is rearranged by?
- Transposition ciphers
- Substitution ciphers
- Both 1 and 2
- None of these
Answer: Transposition ciphers
35. Which of the following is true with regard to the ping command?
- Ping stands for Packet Internet Generator.
- The ping command checks the port level connectivity between source destinations end points.
- Ping summarizes the packet loss and round-trip delay between two IP end points.
- The ping command activates the RARP protocol of the IP layer.
Answer: Ping summarizes the packet loss and round-trip delay between two IP end points.
36. The maximum length (in bytes) of an IPv4 datagram is?
- 32
- 1024
- 65535
- 512
Answer: 65535
37. The term FTP stands for?
- File transfer program
- File transmission protocol
- File transfer protocol
- File transfer protection
Answer: File transfer protocol
38. Which software prevents the external access to a system?
- Firewall
- Gateway
- Router
- Virus checker
Answer: Firewall
39. The location of a resource on the internet is given by its?
- Protocol
- URL
- E-mail address
- ICQ
Answer: URL
40. Which of the following transmission directions listed is not a legitimate channel?
- Simplex
- Half Duplex
- Full Duplex
- Double Duplex
Answer: Double Duplex
41. Which of the following algorithms is not used in asymmetric-key cryptography?
- RSA algorithm
- Diffie-Hellman algorithm
- Electronic code book algorithm
- None of the mentioned
Answer: Electronic code book algorithm
42. Which of the following methods is used to broadcast two packets on the medium at a time?
- Collision
- Synchronous
- Asynchronous
- None of the above
Answer: Collision
43. Which one of the following is not a network topology?
- Star
- Ring
- Bus
- Peer to Peer
Answer: Peer to Peer
44. Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
- Probe ware
- Timeshare
- Shareware
- Public domain
Answer: Public domain
45. Which of the following best describes uploading information?
- Sorting data on a disk drive
- Sending information to a host computer
- Receiving information from a host computer
- Sorting data on a hard drive
Answer: Sending information to a host computer
46. A proxy server is used as the computer?
- with external access
- acting as a backup
- performing file handling
- accessing user permissions
Answer: with external access
47. Which one of the following is a valid email address?
- javat@point.com
- gmail.com
- tpoint@.com
- javatpoint@books
Answer: javat@point.com
48. The term HTTP stands for?
- Hyper terminal tracing program
- Hypertext tracing protocol
- Hypertext transfer protocol
- Hypertext transfer program
Answer: Hypertext transfer protocol
49. A collection of hyperlinked documents on the internet forms the ?.?
- World Wide Web (WWW)
- E-mail system
- Mailing list
- Hypertext markup language
Answer: World Wide Web (WWW)
50. Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?
- Ring
- Local area
- Hierarchical
- Star
Answer: Star
51. What is the maximum efficiency of pure aloha at G = 1/2?
- 1.89
- 17.99
- 18.999
- 18.4
Answer: 18.4
52. Twisted-pair wire, coaxial cable, and fiber-optic cable are all types of _______
- Protocols
- Messages
- Media
- Data
Answer: Media
53. What type of transmission is involved in communication between a computer and a keyboard?
- Half-duplex
- Full-duplex
- Simplex
- Automatic
Answer: Simplex
54. Which type of network shares the communication channel among all the machines?
- anycast network
- multicast network
- unicast network
- broadcast network
Answer: broadcast network
55. A _______ is a set of devices (nodes) connected by media links
- Message
- Protocol
- Distributor
- broadcast network
Answer: broadcast network
56. A _______ is a set of rules governing data communication between two devices
- Protocol
- Message
- Medium
- Sender
Answer: Protocol
57. Which connection is necessary for a computer to join the internet?
- internet society
- internet service provider
- different computer
- internet architecture board
Answer: internet service provider
58. Which of the following is an example of Bluetooth?
- wide area network
- virtual private network
- local area network
- personal area network
Answer: personal area network
59. The _______ is the device that sends the message
- Protocol
- Network
- Sender
- Medium
Answer: Sender
60. What is internet?
- A network of interconnected local area networks
- A collection of unrelated computers
- Interconnection of wide area networks
- A single network
Answer: Interconnection of wide area networks
61. Which of these is a standard interface for serial data transmission?
- ASCII
- RS232C
- 2
- Centronics
Answer: RS232C
62. How is a single channel shared by multiple signals in a computer network?
- multiplexing
- phase modulation
- analog modulation
- digital modulation
Answer: multiplexing
Please share this page