0% found this document useful (0 votes)
14 views

IT 2ND YR MCQ

The document contains a series of questions and answers related to computer networks, including definitions, protocols, and network topologies. Key topics include the OSI model, types of networks, and the functions of various network devices. It serves as a comprehensive quiz or study guide for understanding fundamental networking concepts.

Uploaded by

Sidhartha Nayak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

IT 2ND YR MCQ

The document contains a series of questions and answers related to computer networks, including definitions, protocols, and network topologies. Key topics include the OSI model, types of networks, and the functions of various network devices. It serves as a comprehensive quiz or study guide for understanding fundamental networking concepts.

Uploaded by

Sidhartha Nayak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

1. What is a computer network?

a) A device used to display information on a computer screen


b) A collection of interconnected computers and devices that can communicate and share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components
View Answer

Answer: b
Explanation: A computer network refers to a collection of computers and devices linked together to share
information, resources, and services. This interconnection enables communication, data sharing, and collaboration
among the devices within the network.

2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
View Answer

Answer: c
Explanation: The internet is a global network formed by connecting wide area networks (WANs), enabling worldwide
communication and data sharing.

3. Which of the following is an example of Bluetooth?


a) wide area network
b) virtual private network
c) local area network
d) personal area network
View Answer

Answer: d
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up
to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.

4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
View Answer

Answer: a
Explanation: An overlay network is a computer network that is built on top of another network. Some examples of
an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P).

5. What is the full form of OSI?


a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
View Answer

Answer: c
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how
applications communicate over a network, which also helps us to have a structured plan for troubleshooting. It is
recognized by the ISO as the generalized model for computer network i.e. it can be modified to design any kind of
computer network.
6. When a collection of various computers appears as a single coherent system to its clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system
View Answer

Answer: d
Explanation: A Computer network is defined as a collection of interconnected computers which uses a single
technology for connection.
A distributed system is also the same as computer network but the main difference is that the whole collection of
computers appears to its users as a single coherent system.
Example: - World wide web

7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6
View Answer

Answer: a
Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session, Transport, Network,
Data link and Physical layer. OSI stands for Open System Interconnect and it is a generalized model.

8. What are nodes in a computer network?


a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned
View Answer

Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even
routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.

9. Which one of the following is not a function of network layer?


a) congestion control
b) error control
c) routing
d) inter-networking
View Answer

Answer: b
Explanation: In the OSI model, network layer is the third layer and it provides data routing paths for network
communications. Error control is a function of the data link layer and the transport layer.

10. How is a single channel shared by multiple signals in a computer network?


a) multiplexing
b) phase modulation
c) analog modulation
d) digital modulation
View Answer

Answer: a
Explanation: In communication and computer networks, the main goal is to share a scarce resource. This is done by
multiplexing, where multiple analog or digital signals are combined into one signal over a shared medium. The
multiple kinds of signals are designated by the transport layer which is the layer present on a higher level than the
physical layer.

11. Which of the following devices forwards packets between networks by processing the routing information
included in the packet?
a) firewall
b) bridge
c) hub
d) router
View Answer

Answer: d
Explanation: A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the
cheapest path to the destination.

12. What is the term for an endpoint of an inter-process communication flow across a computer network?
a) port
b) machine
c) socket
d) pipe
View Answer

Answer: c
Explanation: Socket is one end point in a two-way communication link in the network. TCP layer can identify the
application that data is destined to be sent by using the port number that is bound to socket.

13. How do two devices become part of a network?


a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in another device
c) a process is active and another is inactive
d) a process is running on both devices
View Answer

Answer: b
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to
share resources. In computer networks, computing devices exchange data with each other using connections
between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct
protocol.

14. Which layer does the data link layer take packets from and encapsulate them into frames for transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer
View Answer

Answer: c
Explanation: In computer networks, the data from application layer is sent to transport layer and is converted to
segments. These segments are then transferred to the network layer and these are called packets. These packets are
then sent to data link layer where they are encapsulated into frames. These frames are then transferred to physical
layer where the frames are converted to bits. Error control and flow control data is inserted in the frames at the data
link layer.

15. Which of this is not a network edge device?


a) Switch
b) PC
c) Smartphones
d) Servers
View Answer

Answer: a
Explanation: Network edge devices refer to host systems, which can host applications like web browser. A switch
can’t operate as a host, but as a central device which can be used to manage network communication.

16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
View Answer

Answer: d
Explanation: In a broadcast network, information is sent to all stations in a network whereas in a multicast network
the data or information is sent to a group of stations in the network. In unicast network, information is sent to only
one specific station. The broadcast address of the network is the last assigned address of the network.

17. Which topology requires a multipoint connection?


a) Ring
b) Bus
c) Star
d) Mesh
View Answer

Answer: b
Explanation: In bus topology, there is a single cable to which all the network nodes are connected. So whenever a
node tries to send a message or data to other nodes, this data passes through all other nodes in the network
through the cable. It is really simple to install but it’s not secure enough to be used in most of the computer network
applications.

18. Which of the following maintains the Domain Name System?


a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned
View Answer

Answer: c
Explanation: A domain name system is maintained by a distributed database system. It is a collection of multiple,
logically interrelated databases distributed over a computer network.

19. When discussing IDS/IPS, what is a signature?


a) It refers to “normal,” baseline network behavior
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file
View Answer

Answer: d
Explanation: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with
attack-definition files (signatures) that describe each type of known malicious activity. Nemean is a popular signature
generation method for conventional computer networks.
20. Which of the following are Gigabit Ethernets?
a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
View Answer

Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for
transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE
802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local
networks, as a result of being considerably faster.

21. Which of the following networks extends a private network across public networks?
a) virtual private network
b) local area network
c) storage area network
d) enterprise private network
View Answer

Answer: a
Explanation: A virtual private network extends a private network across a public network, and enables users to send
and receive data across shared or public networks as if their computing devices were directly connected to the
private network provides enhanced security and online anonymity to users on the internet. It is also used to unblock
websites which are unavailable in certain regions.

22. Which layer is responsible for process to process delivery in a general network model?
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer

Answer: c
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection between two
systems in a network. The protocols used in Transport layer is TCP and UDP. The transport layer is responsible for
segmentation of the data. It uses ports for the implementation of process-to-process delivery.

23. What does each packet contain in a virtual circuit network?


a) only source address
b) only destination address
c) full source and destination address
d) a short VC number
View Answer

Answer: d
Explanation: A short VC number also called as VCID (virtual circuit identifier) is a type of identifier which is used to
distinguish between several virtual circuits in a connection-oriented circuit switched network. Each virtual circuit is
used to transfer data over a larger packet switched network.

24. What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN
View Answer
Answer: b
Explanation: LAN is an abbreviation for Local Area Network. This network interconnects computers in a small area
such as schools, offices, residence etc. It is the most versatile kind of data communication system where most of the
computer network concepts can be visibly used.

25. What was the name of the first network?


a) ASAPNET
b) ARPANET
c) CNNET
d) NSFNET
View Answer

Answer: b
Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the first network to be
implemented which used the TCP/IP protocol in the year 1969.

26. Which of the following is the network layer protocol for the internet?
a) hypertext transfer protocol
b) file transfer protocol
c) ethernet
d) internet protocol
View Answer

Answer: d
Explanation: There are several protocols used in Network layer. Some of them are IP, ICMP, CLNP, ARP, IPX, HRSP
etc. Hypertext transfer protocol is for application layer and ethernet protocol is for data link layer.

27. Which network topology requires a central controller or hub?


a) Ring
b) Bus
c) Star
d) Mesh
Answer: c
Explanation: In star topology, no computer is connected to another computer directly but all the computers are
connected to a central hub. Every message sent from a source computer goes through the hub and the hub then
forwards the message only to the intended destination computer.

28. If a link transmits 4000 frames per second, and each slot has 8 bits, what is the transmission rate of the circuit
using Time Division Multiplexing (TDM)?
a) 500kbps
b) 32kbps
c) 32bps
d) 500bps
View Answer

Answer: b
Explanation: Transmission rate= frame rate * number of bits in a slot.
Given: Frame rate = 4000/sec and number of bits in slot = 8
Thus, Transmission rate = (4000 * 8) bps
= 32000bps
= 32kbps

29. Which of the following allows LAN users to share computer programs and data?
a) File server
b) Network
c) Communication server
d) Print server
View Answer

Answer: a
Explanation: A file server allows LAN users to share computer programs and data. It uses the File Transfer Protocol to
provide this feature on ports 20 and 21. The file server works as a medium for the transfer.

30. What type of transmission is involved in communication between a computer and a keyboard?
a) Half-duplex
b) Full-duplex
c) Simplex
d) Automatic
View Answer

Answer: c
Explanation: In simplex transmission, data flows in single direction which in this case refers to the data flowing from
the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to
the computer only.

31. Which layer provides the services to user?


a) physical layer
b) presentation layer
c) session layer
d) application layer
View Answer

Answer: d
Explanation: In networking, a user mainly interacts with application layer to create and send information to other
computer or network. Application layer provides the interface between applications and the network. It is the top-
most layer in both the TCP/IP and the OSI model.

32. Which connection is necessary for a computer to join the internet?


a) internet society
b) internet service provider
c) different computer
d) internet architecture board
View Answer

Answer: b
Explanation: The ISPs (Internet Service Providers) are the main agents through which every computer is connected to
the internet. They are licensed to allot public IP addresses to its customers in order to connect them to the internet.

33. Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet
View Answer

Answer: d
Explanation: Telnet provides access to the command-line interface on a remote computer. One can login to the
computer from the command-line interface.

34. Which of the following is used in an attempt to render a computer resource unavailable to its intended users?
a) botnet process
b) worms attack
c) virus attack
d) denial-of-service attack
View Answer

Answer: d
Explanation: In a Denial of Service attack, the attacker won’t let the victims access the network by using a certain
method that ensures that an essential network resource is unavailable to the victim. The methods that the attacker
can use are vulnerability attack, bandwidth flooding and connection flooding.
35. The IETF standards documents are called ________
a) RFC
b) RCF
c) ID
d) DFC

Answer: a
Explanation: RFC stands for Request For Comments and they are documents that describe methods, behaviors,
research, or innovations applicable to the working of the Internet.

36. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are ___________
a) Added
b) Removed
c) Rearranged
d) Modified

Answer: a
Explanation: Each layer adds its own header to the packet from the previous layer. For example, in the Internet layer,
the IP header is added over the TCP header on the data packet that came from the transport layer.

37. The structure or format of data is called ___________


a) Syntax
b) Semantics
c) Struct
d) Formatting

Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines how a particular pattern
to be interpreted, and what action is to be taken based on that interpretation. In programming languages, syntax of
the instructions plays a vital role in designing of the program.

38.Communication between a computer and a keyboard involves ______________ transmission.


a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex

Answer: d
Explanation: In simplex transmission, data flows in single direction which in this case refers to the data flowing from
the keyboard to the computer. Another example would be of the mouse where the data flows from the mouse to
the computer only.

39. The first Network was called ________


a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
Answer: d
Explanation: ARPANET stands for Advanced Research Projects Agency Networks. It was the first network to be
implemented which used the TCP/IP protocol in the year 1969.

40. A _______ is the physical path over which a message travels.


a) Path
b) Medium
c) Protocol
d) Route

Explanation: Messages travel from sender to receiver via a physical path called the medium using a set of
methods/rules called protocol. Mediums can be guided (wired) or unguided (wireless).

41. Which organization has authority over interstate and international commerce in the communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC

Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is responsible for regulating all
interstate communications originating or terminating in USA. It was founded in the year 1934.

42. Which of this is not a network edge device?


a) PC
b) Smartphones
c) Servers
d) Switch

Answer: d
Explanation: Network edge devices refer to host systems, which can host applications like web browser. A switch
can’t operate as a host, but as a central device which can be used to manage network communication.

43. A _________ set of rules that governs data communication.


a) Protocols
b) Standards
c) RFCs
d) Servers

44. Three or more devices share a link in ________ connection.


a) Unipoint
b) Multipoint
c) Point to point
d) Simplex

Answer: b
Explanation: A multipoint communication is established when three or many network nodes are connected to each
other. Frame relay, Ethernet and ATM are some examples of multipoint connections.

45. When collection of various computers seems a single coherent system to its client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system

Answer: b
Explanation: A Computer network is defined as a collection of interconnected computers which uses a single
technology for connection.
A distributed system is also the same as computer network but the main difference is that the whole collection of
computers appears to its users as a single coherent system.
Example:- World wide web

46. Two devices are in network if __________


a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive

Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to
share resources. In computer networks, computing devices exchange data with each other using connections
between nodes. The nodes have certain processes which enable them to share a specific type of data using a distinct
protocol.

47. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network

Answer: d
Explanation: An overlay network is a computer network that is built on top of another network. Some examples of
an overlay network are Virtual Private Networks (VPN) and Peer-to-Peer Networks (P2P).

48. In computer network nodes are _________


a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even
routing the data to its destination. Routers, Computers and Smartphones are some examples of network node

6. Bluetooth is an example of __________


a) personal area network
b) local area network
c) virtual private network
d) wide area network
View Answer

Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up
to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.

7. A __________ is a device that forwards packets between networks by processing the routing information included
in the packet.
a) bridge
b) firewall
c) router
d) hub
View Answer

Answer: c
Explanation: A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. They make use of routing protocols like RIP to find the
cheapest path to the destination.

8. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
View Answer

Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that are employed for the
implementation of network protocol suite. Each layer in the network model has to use one specific protocol from the
protocol stack.

9. Network congestion occurs _________


a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
View Answer

Answer: a
Explanation: Network congestion occurs when traffic in the network is more than the network could handle. To avoid
network congestion, the network management uses various open-loop and closed-loop congestion control
techniques.

10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer

Answer: b
Explanation: A virtual private network extends a private network across a public network, and enables users to send
and receive data across shared or public networks as if their computing devices were directly connected to the
private network.VPN provides enhanced security and online anonymity to users on the internet. It is also used to
unblock websites which are unavailable in certain regions.

1. Which of this is not a constituent of residential telephone line?


a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream channel
View Answer

Answer: c
Explanation: A low-speed downstream channel is not a constituent of a residential telephone line. But it might be
just a two-way telephone channel. Internet can be provided through a high-speed downstream channel in a
residential telephone line

2. DSL telcos provide which of the following services?


a) Wired phone access
b) ISP
c) Wired phone access and ISP
d) Network routing and ISP
View Answer.

Answer: c
Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet Service Provider. In a Digital Subscriber
Line system, the same company which provides phone connection is also an ISP. The internet is provided through the
pre-installed telephone lines.

3. The function of DSLAM is to __________


a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals
View Answer

Answer: a
Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by Telcos to convert the
analog signals to digital signals for the purpose of providing internet. The DSLAM located in a telco’s Central Office
does this function.

4. Which of the following terms is not associated with DSL?


a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer

Answer: d
Explanation: CMTS stands for Cable modem termination system. It is used in cable internet access. In cable internet
access, internet is not provided through telephone lines and the companies that provide such connections don’t
necessarily provide telephone access.

5. HFC contains _______


a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable
View Answer

Answer: c
Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that
combines optical fiber and coaxial cable. It has been popularly used since the early 1990s. It is stronger than the
optical fiber cables and faster than the co-axial cables.

6. Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer

Answer: d
Explanation: CMTS stands for Cable modem termination system. In cable access analog signal is converted to digital
signal by CMTS. In cable internet access, internet is not provided through telephone lines. DSLAM is used by Telecom
companies.
7. Among the optical-distribution architectures that are essentially switched ethernet is __________
a) AON
b) PON
c) NON
d) MON
View Answer

Answer:a
Explanation: AON stands for Active optical networks which are essentially switched Ethernets. Each user has his/her
own dedicated optical fiber line connecting to the ISP in an AON.

8. StarBand provides __________


a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer

Answer: d
Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015. It
was discontinued from September 30 2015 due to increasing competition from other ISPs.

9. Home Internet Access is provided by __________


a) DSL
b) FTTP
c) Cable
d) All of the mentioned
View Answer

Answer: d
Explanation: Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the fastest speeds followed by
the cable connections and then the DSLs. FTTP is popularly used in modern connections.

10. ONT is connected to splitter using _________


a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable
View Answer

Answer: c
Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with an
optical fibre cable. It translates light signals from the fibre optic line to electric signals that the router can read.

11. Which of the following factors affect transmission rate in DSL?


a) The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference
View Answer

Answer: d
Explanation: Because DSL is made of twisted wire copper pair, the gauge of twisted pair line i.e. the protection and
electrical interference would affect the transmission rate in DSL. Unlike DSL, FTTP is not really affected by these
factors.

You might also like