GkSeries.com

Computer Network Multiple Choice Questions and Answers | Computers & IT MCQs

1. What are nodes in a computer network?
  1. the computer that routes the data
  2. the computer that terminates the data
  3. the computer that originates the data
  4. all of the mentioned

Answer: all of the mentioned

2. How do two devices become part of a network?
  1. PIDs of the processes running of different devices are same
  2. a process in one device is able to exchange information with a process in another device
  3. a process is active and another is inactive
  4. a process is running on both devices

Answer: a process in one device is able to exchange information with a process in another device

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3. Which topology requires a multipoint connection?
  1. Ring
  2. Bus
  3. Star
  4. Mesh

Answer: Bus

4. Which of the following are Gigabit Ethernets?
  1. 1000 BASE-LX
  2. 1000 BASE-CX
  3. 1000 BASE-SX
  4. All of the mentioned

Answer: All of the mentioned

5. The source can be a _______
  1. Computer
  2. Telephone handset
  3. Video camera
  4. Any of the above

Answer: Any of the above

6. Which one of the following would breach the integrity of a system?
  1. Looking the room to prevent theft
  2. Full access rights for all users
  3. Fitting the system with an anti-theft device
  4. Protecting the device against willful or accidental damage

Answer: Full access rights for all users

7. Which of the following statements could be valid with respect to the ICMP (Internet Control Message Protocol)?
  1. It reports all errors which occur during transmission.
  2. A redirect message is used when a router notices that a packet seems to have been routed wrongly.
  3. It informs routers when an incorrect path has been taken.
  4. The "destination unreachable" type message is used when a router cannot locate the destination.

Answer: A redirect message is used when a router notices that a packet seems to have been routed wrongly.

8. What kind of transmission medium is most appropriate to carry data in a computer network that is exposed to electrical interferences?
  1. Unshielded twisted pair
  2. Optical fiber
  3. Coaxial cable
  4. Microwave

Answer: Optical fiber

9. Which of this is not a network edge device?
  1. Switch
  2. PC
  3. Smartphones
  4. Servers

Answer: Switch

10. Which of the following maintains the Domain Name System?
  1. a single server
  2. a single computer
  3. distributed database system
  4. none of the mentioned

Answer: distributed database system

11. Which layer provides the services to user?
  1. physical layer
  2. presentation layer
  3. session layer
  4. application layer

Answer: application layer

12. The receiver can be a _______.
  1. Computer
  2. Telephone handset
  3. Video camera
  4. Any of the above

Answer: Any of the above

13. The correct order of corresponding OSI layers for having functionalities of routing and reconciling machine representation differences with shared access resolution and ASCII test protocol is?
  1. Network, Physical, Transport, Data link
  2. Network, Physical, Data link, Application
  3. Network, Presentation, Data link, Application
  4. Network, Presentation, Physical, Transport

Answer: Network, Presentation, Data link, Application

14. The private key in asymmetric key cryptography is kept by?
  1. Sender
  2. Receiver
  3. Sender and Receiver
  4. None of the these

Answer: Receiver

15. At what speed does tele-computed refer?
  1. Interface speed
  2. Cycles per second
  3. Baud rate
  4. Megabyte load

Answer: Baud rate

16. "Parity bits" are used for which of the following purposes?
  1. Encryption of data
  2. To transmit faster
  3. To detect errors
  4. To identify the user

Answer: To detect errors

17. What is the term for an endpoint of an inter-process communication flow across a computer network?
  1. port
  2. machine
  3. socket
  4. pipe

Answer: socket

18. What is a computer network?
  1. A device used to display information on a computer screen
  2. A collection of interconnected computers and devices that can communicate and share resources
  3. A type of software used to create documents and presentations
  4. The physical casing that protects a computer’s internal components

Answer: A collection of interconnected computers and devices that can communicate and share resources

19. Which of the following computer networks is built on the top of another network?
  1. overlay network
  2. prime network
  3. prior network
  4. chief network

Answer: overlay network

20. When a collection of various computers appears as a single coherent system to its clients, what is this called?
  1. mail system
  2. networking system
  3. computer network
  4. distributed system

Answer: distributed system

21. Which of the following devices forwards packets between networks by processing the routing information included in the packet?
  1. firewall
  2. bridge
  3. hub
  4. router

Answer: router

22. Which of the following allows LAN users to share computer programs and data?
  1. File server
  2. Network
  3. Communication server
  4. Print server

Answer: File server

23. The _______ is the information (data) to be communicated
  1. Protocol
  2. Message
  3. Medium
  4. Sender

Answer: Message

24. Which of the following statement is true about error detection techniques used on communications link?
  1. Cyclic Redundancy Check (CRC) sequence can detect as well as correct errors.
  2. Error detection cannot be used on simplex links.
  3. Hamming code can detect up to 3-bit errors.
  4. All of the these

Answer: All of the these

25. How many digits of the Data Network Identification Code (DNIC) identify the country?
  1. first three
  2. first four
  3. first five
  4. first six

Answer: first three

26. Which one of the following is the most common internet protocol?
  1. HTML
  2. NetBEUI
  3. TCP/IP
  4. IPX/SPX

Answer: TCP/IP

27. When discussing IDS/IPS, what is a signature?
  1. It refers to “normal,” baseline network behavior
  2. It is used to authorize the users on a network
  3. An electronic signature used to authenticate the identity of a user on the network
  4. Attack-definition file

Answer: Attack-definition file

28. Which layer does the data link layer take packets from and encapsulate them into frames for transmission?
  1. transport layer
  2. application layer
  3. network layer
  4. physical layer

Answer: network layer

29. Which one of the following is not a function of network layer?
  1. congestion control
  2. error control
  3. routing
  4. inter-networking

Answer: error control

30. What is the full form of OSI?
  1. optical service implementation
  2. open service Internet
  3. open system interconnection
  4. operating system interface

Answer: open system interconnection

31. The message can consist of _______
  1. Text
  2. Images
  3. Video
  4. Any of the above

Answer: Any of the above

32. The _______ is the physical path by which a message travels from sender to
  1. receiver
  2. Protocol
  3. Message
  4. Transmission medium

Answer: Transmission medium

33. What is the maximum efficiency of slotted aloha at G = 1?
  1. 36.8
  2. 35.8
  3. 35.5
  4. 37.8

Answer: 36.8

34. In the cryptography, the sequence of the letters is rearranged by?
  1. Transposition ciphers
  2. Substitution ciphers
  3. Both 1 and 2
  4. None of these

Answer: Transposition ciphers

35. Which of the following is true with regard to the ping command?
  1. Ping stands for Packet Internet Generator.
  2. The ping command checks the port level connectivity between source destinations end points.
  3. Ping summarizes the packet loss and round-trip delay between two IP end points.
  4. The ping command activates the RARP protocol of the IP layer.

Answer: Ping summarizes the packet loss and round-trip delay between two IP end points.

36. The maximum length (in bytes) of an IPv4 datagram is?
  1. 32
  2. 1024
  3. 65535
  4. 512

Answer: 65535

37. The term FTP stands for?
  1. File transfer program
  2. File transmission protocol
  3. File transfer protocol
  4. File transfer protection

Answer: File transfer protocol

38. Which software prevents the external access to a system?
  1. Firewall
  2. Gateway
  3. Router
  4. Virus checker

Answer: Firewall

39. The location of a resource on the internet is given by its?
  1. Protocol
  2. URL
  3. E-mail address
  4. ICQ

Answer: URL

40. Which of the following transmission directions listed is not a legitimate channel?
  1. Simplex
  2. Half Duplex
  3. Full Duplex
  4. Double Duplex

Answer: Double Duplex

41. Which of the following algorithms is not used in asymmetric-key cryptography?
  1. RSA algorithm
  2. Diffie-Hellman algorithm
  3. Electronic code book algorithm
  4. None of the mentioned

Answer: Electronic code book algorithm

42. Which of the following methods is used to broadcast two packets on the medium at a time?
  1. Collision
  2. Synchronous
  3. Asynchronous
  4. None of the above

Answer: Collision

43. Which one of the following is not a network topology?
  1. Star
  2. Ring
  3. Bus
  4. Peer to Peer

Answer: Peer to Peer

44. Software programs that allow you to legally copy files and give them away at no cost are called which of the following?
  1. Probe ware
  2. Timeshare
  3. Shareware
  4. Public domain

Answer: Public domain

45. Which of the following best describes uploading information?
  1. Sorting data on a disk drive
  2. Sending information to a host computer
  3. Receiving information from a host computer
  4. Sorting data on a hard drive

Answer: Sending information to a host computer

46. A proxy server is used as the computer?
  1. with external access
  2. acting as a backup
  3. performing file handling
  4. accessing user permissions

Answer: with external access

47. Which one of the following is a valid email address?
  1. javat@point.com
  2. gmail.com
  3. tpoint@.com
  4. javatpoint@books

Answer: javat@point.com

48. The term HTTP stands for?
  1. Hyper terminal tracing program
  2. Hypertext tracing protocol
  3. Hypertext transfer protocol
  4. Hypertext transfer program

Answer: Hypertext transfer protocol

49. A collection of hyperlinked documents on the internet forms the ?.?
  1. World Wide Web (WWW)
  2. E-mail system
  3. Mailing list
  4. Hypertext markup language

Answer: World Wide Web (WWW)

50. Which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?
  1. Ring
  2. Local area
  3. Hierarchical
  4. Star

Answer: Star

51. What is the maximum efficiency of pure aloha at G = 1/2?
  1. 1.89
  2. 17.99
  3. 18.999
  4. 18.4

Answer: 18.4

52. Twisted-pair wire, coaxial cable, and fiber-optic cable are all types of _______
  1. Protocols
  2. Messages
  3. Media
  4. Data

Answer: Media

53. What type of transmission is involved in communication between a computer and a keyboard?
  1. Half-duplex
  2. Full-duplex
  3. Simplex
  4. Automatic

Answer: Simplex

54. Which type of network shares the communication channel among all the machines?
  1. anycast network
  2. multicast network
  3. unicast network
  4. broadcast network

Answer: broadcast network

55. A _______ is a set of devices (nodes) connected by media links
  1. Message
  2. Protocol
  3. Distributor
  4. broadcast network

Answer: broadcast network

56. A _______ is a set of rules governing data communication between two devices
  1. Protocol
  2. Message
  3. Medium
  4. Sender

Answer: Protocol

57. Which connection is necessary for a computer to join the internet?
  1. internet society
  2. internet service provider
  3. different computer
  4. internet architecture board

Answer: internet service provider

58. Which of the following is an example of Bluetooth?
  1. wide area network
  2. virtual private network
  3. local area network
  4. personal area network

Answer: personal area network

59. The _______ is the device that sends the message
  1. Protocol
  2. Network
  3. Sender
  4. Medium

Answer: Sender

60. What is internet?
  1. A network of interconnected local area networks
  2. A collection of unrelated computers
  3. Interconnection of wide area networks
  4. A single network

Answer: Interconnection of wide area networks

61. Which of these is a standard interface for serial data transmission?
  1. ASCII
  2. RS232C
  3. 2
  4. Centronics

Answer: RS232C

62. How is a single channel shared by multiple signals in a computer network?
  1. multiplexing
  2. phase modulation
  3. analog modulation
  4. digital modulation

Answer: multiplexing

Please share this page

Click Here to Read more questions

Teacher Eligibility Test