IT 2ND YR MCQ
IT 2ND YR MCQ
Answer: b
Explanation: A computer network refers to a collection of computers and devices linked together to share
information, resources, and services. This interconnection enables communication, data sharing, and collaboration
among the devices within the network.
2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
View Answer
Answer: c
Explanation: The internet is a global network formed by connecting wide area networks (WANs), enabling worldwide
communication and data sharing.
Answer: d
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up
to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
View Answer
Answer: a
Explanation: An overlay network is a computer network that is built on top of another network. Some examples of
an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P).
Answer: c
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how
applications communicate over a network, which also helps us to have a structured plan for troubleshooting. It is
recognized by the ISO as the generalized model for computer network i.e. it can be modified to design any kind of
computer network.
6. When a collection of various computers appears as a single coherent system to its clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system
View Answer
Answer: d
Explanation: A Computer network is defined as a collection of interconnected computers which uses a single
technology for connection.
A distributed system is also the same as computer network but the main difference is that the whole collection of
computers appears to its users as a single coherent system.
Example: - World wide web
7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6
View Answer
Answer: a
Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session, Transport, Network,
Data link and Physical layer. OSI stands for Open System Interconnect and it is a generalized model.
Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even
routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.
Answer: b
Explanation: In the OSI model, network layer is the third layer and it provides data routing paths for network
communications. Error control is a function of the data link layer and the transport layer.
Answer: a
Explanation: In communication and computer networks, the main goal is to share a scarce resource. This is done by
multiplexing, where multiple analog or digital signals are combined into one signal over a shared medium. The
multiple kinds of signals are designated by the transport layer which is the layer present on a higher level than the
physical layer.
11. Which of the following devices forwards packets between networks by processing the routing information
included in the packet?
a) firewall
b) bridge
c) hub
d) router
View Answer
Answer: d
Explanation: A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the
cheapest path to the destination.
12. What is the term for an endpoint of an inter-process communication flow across a computer network?
a) port
b) machine
c) socket
d) pipe
View Answer
Answer: c
Explanation: Socket is one end point in a two-way communication link in the network. TCP layer can identify the
application that data is destined to be sent by using the port number that is bound to socket.
Answer: b
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to
share resources. In computer networks, computing devices exchange data with each other using connections
between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct
protocol.
14. Which layer does the data link layer take packets from and encapsulate them into frames for transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer
View Answer
Answer: c
Explanation: In computer networks, the data from application layer is sent to transport layer and is converted to
segments. These segments are then transferred to the network layer and these are called packets. These packets are
then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical
layer where the frames are converted to bits. Error control and flow control data is inserted in the frames at the data
link layer.
Answer: a
Explanation: Network edge devices refer to host systems, which can host applications like web browser. A switch
can’t operate as a host, but as a central device which can be used to manage network communication.
16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
View Answer
Answer: d
Explanation: In a broadcast network, information is sent to all stations in a network whereas in a multicast network
the data or information is sent to a group of stations in the network. In unicast network, information is sent to only
one specific station. The broadcast address of the network is the last assigned address of the network.
Answer: b
Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever a
node tries to send a message or data to other nodes, this data passes through all other nodes in the network
through the cable. It is really simple to install but it’s not secure enough to be used in most of the computer network
applications.
Answer: c
Explanation: A domain name system is maintained by a distributed database system. It is a collection of multiple,
logically interrelated databases distributed over a computer network.
Answer: d
Explanation: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with
attack-definition files (signatures) that describe each type of known malicious activity. Nemean is a popular signature
generation method for conventional computer networks.
20. Which of the following are Gigabit Ethernets?
a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
View Answer
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for
transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE
802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local
networks, as a result of being considerably faster.
21. Which of the following networks extends a private network across public networks?
a) virtual private network
b) local area network
c) storage area network
d) enterprise private network
View Answer
Answer: a
Explanation: A virtual private network extends a private network across a public network, and enables users to send
and receive data across shared or public networks as if their computing devices were directly connected to the
private network provides enhanced security and online anonymity to users on the internet. It is also used to unblock
websites which are unavailable in certain regions.
22. Which layer is responsible for process to process delivery in a general network model?
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer
Answer: c
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection between two
systems in a network. The protocols used in Transport layer is TCP and UDP. The transport layer is responsible for
segmentation of the data. It uses ports for the implementation of process-to-process delivery.
Answer: d
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to
distinguish between several virtual circuits in a connection-oriented circuit switched network. Each virtual circuit is
used to transfer data over a larger packet switched network.
24. What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN
View Answer
Answer: b
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area
such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the
computer network concepts can be visibly used.
Answer: b
Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the first network to be
implemented which used the TCP/IP protocol in the year 1969.
26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol
View Answer
Answer: d
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP
etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.
28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission rate of the circuit
using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps
View Answer
Answer: b
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps
29. Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server
View Answer
Answer: a
Explanation: A file server allows LAN users to share computer programs and data. It uses the File Transfer Protocol to
provide this feature on ports 20 and 21. The file server works as a medium for the transfer.
30. What type of transmission is involved in communication between a computer and a keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic
View Answer
Answer: c
Explanation: In simplex transmission, data flows in single direction which in this case refers to the data flowing from
the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to
the computer only.
Answer: d
Explanation: In networking, a user mainly interacts with application layer to create and send information to other
computer or network. Application layer provides the interface between applications and the network. It is the top-
most layer in both the TCP/IP and the OSI model.
Answer: b
Explanation: The ISPs (Internet Service Providers) are the main agents through which every computer is connected to
the internet. They are licensed to allot public IP addresses to its customers in order to connect them to the internet.
33. Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet
View Answer
Answer: d
Explanation: Telnet provides access to the command-line interface on a remote computer. One can login to the
computer from the command-line interface.
34. Which of the following is used in an attempt to render a computer resource unavailable to its intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack
View Answer
Answer: d
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network by using a certain
method that ensures that an essential network resource is unavailable to the victim. The methods that the attacker
can use are vulnerability attack, bandwidth flooding and connection flooding.
35. The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC
Answer: a
Explanation: RFC stands for Request For Comments and they are documents that describe methods, behaviors,
research, or innovations applicable to the working of the Internet.
36. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified
Answer: a
Explanation: Each layer adds its own header to the packet from the previous layer. For example, in the Internet layer,
the IP header is added over the TCP header on the data packet that came from the transport layer.
Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines how a particular pattern
to be interpreted, and what action is to be taken based on that interpretation. In programming languages, syntax of
the instructions plays a vital role in designing of the program.
Answer: d
Explanation: In simplex transmission, data flows in single direction which in this case refers to the data flowing from
the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to
the computer only.
Explanation: Messages travel from sender to receiver via a physical path called the medium using a set of
methods/rules called protocol. Mediums can be guided (wired) or unguided (wireless).
41. Which organization has authority over interstate and international commerce in the communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is responsible for regulating all
interstate communications originating or terminating in USA. It was founded in the year 1934.
Answer: d
Explanation: Network edge devices refer to host systems, which can host applications like web browser. A switch
can’t operate as a host, but as a central device which can be used to manage network communication.
Answer: b
Explanation: A multipoint communication is established when three or many network nodes are connected to each
other. Frame relay, Ethernet and ATM are some examples of multipoint connections.
45. When collection of various computers seems a single coherent system to its client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system
Answer: b
Explanation: A Computer network is defined as a collection of interconnected computers which uses a single
technology for connection.
A distributed system is also the same as computer network but the main difference is that the whole collection of
computers appears to its users as a single coherent system.
Example:- World wide web
Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to
share resources. In computer networks, computing devices exchange data with each other using connections
between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct
protocol.
47. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Answer: d
Explanation: An overlay network is a computer network that is built on top of another network. Some examples of
an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P).
Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even
routing the data to its destination. Routers, Computers and Smartphones are some examples of network node
Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up
to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
7. A __________ is a device that forwards packets between networks by processing the routing information included
in the packet.
a) bridge
b) firewall
c) router
d) hub
View Answer
Answer: c
Explanation: A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the
cheapest path to the destination.
8. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
View Answer
Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that are employed for the
implementation of network protocol suite. Each layer in the network model has to use one specific protocol from the
protocol stack.
Answer: a
Explanation: Network congestion occurs when traffic in the network is more than the network could handle. To avoid
network congestion, the network management uses various open-loop and closed-loop congestion control
techniques.
10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer
Answer: b
Explanation: A virtual private network extends a private network across a public network, and enables users to send
and receive data across shared or public networks as if their computing devices were directly connected to the
private network.VPN provides enhanced security and online anonymity to users on the internet. It is also used to
unblock websites which are unavailable in certain regions.
Answer: c
Explanation: A low-speed downstream channel is not a constituent of a residential telephone line. But it might be
just a two-way telephone channel. Internet can be provided through a high-speed downstream channel in a
residential telephone line
Answer: c
Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet Service Provider. In a Digital Subscriber
Line system, the same company which provides phone connection is also an ISP. The internet is provided through the
pre-installed telephone lines.
Answer: a
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by Telcos to convert the
analog signals to digital signals for the purpose of providing internet. The DSLAM located in a telco’s Central Office
does this function.
Answer: d
Explanation: CMTS stands for Cable modem termination system. It is used in cable internet access. In cable internet
access, internet is not provided through telephone lines and the companies that provide such connections don’t
necessarily provide telephone access.
Answer: c
Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that
combines optical fiber and coaxial cable. It has been popularly used since the early 1990s. It is stronger than the
optical fiber cables and faster than the co-axial cables.
6. Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer
Answer: d
Explanation: CMTS stands for Cable modem termination system. In cable access analog signal is converted to digital
signal by CMTS. In cable internet access, internet is not provided through telephone lines. DSLAM is used by Telecom
companies.
7. Among the optical-distribution architectures that are essentially switched ethernet is __________
a) AON
b) PON
c) NON
d) MON
View Answer
Answer:a
Explanation: AON stands for Active optical networks which are essentially switched Ethernets. Each user has his/her
own dedicated optical fiber line connecting to the ISP in an AON.
Answer: d
Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015. It
was discontinued from September 30 2015 due to increasing competition from other ISPs.
Answer: d
Explanation: Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the fastest speeds followed by
the cable connections and then the DSLs. FTTP is popularly used in modern connections.
Answer: c
Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with an
optical fibre cable. It translates light signals from the fibre optic line to electric signals that the router can read.
Answer: d
Explanation: Because DSL is made of twisted wire copper pair, the gauge of twisted pair line i.e. the protection and
electrical interference would affect the transmission rate in DSL. Unlike DSL, FTTP is not really affected by these
factors.