Bca501: Core - 18: Computer Networks Multiple Choice Questions
Bca501: Core - 18: Computer Networks Multiple Choice Questions
56. Telnet is a
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
Answer: c
57. Expansion of FTP is
a) Fine Transfer Protocol
b) File Transfer Protocol
c) First Transfer Protocol
d) None of the mentioned
Answer: b
58. FTP is built on _____ architecture
a) Client-server
b) P2P
c) Both of the mentioned
d) None of the mentioned
Answer: a
59. FTP uses _____ parallel TCP connections to transfer a file
a) 1
b) 2
c) 3
d) 4
Answer: b
60. Identify the incorrect statement
a) FTP stands for File Transfer Protocol
b) FTP uses two parallel TCP connections
c) FTP sends its control information in-band
d) FTP sends exactly one file over the data connection
Answer: c
61. Which of this is not a guided media?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
Answer: c
62. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
Answer: b
63. Fiber optics posses following properties
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
Answer: d
64. Radio channels are attractive medium because
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
Answer: d
65. Geostationary satellites
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
Answer: a
66. The sharing of a medium and its link by two or more devices is called _______
a) Fully duplexing
b) Multiplexing
c) Both a and b
d) None of the mentioned
Answer: b
67. Multiplexing is used in _______
a) Packet switching
b) Circuit switching
c) Data switching
d) None of the mentioned
Answer: b
68. Which multiplexing technique transmits digital signals?
a) FDM
b) TDM
c) WDM
d) None of the mentioned
Answer: b
69. If there are n signal sources of same data rate than TDM link has _______ slots
a) n
b) n/2
c) n*2
d) 2^n
Answer: a
70. Multiplexing can provide
a) Efficiency
b) Privacy
c) Anti jamming
d) Both a and b
Answer: d
71. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the
transmission rates of the signal sources.
a) Greater than
b) Lesser than
c) Equal to
d) Equal to or greater than
Answer: a
72. Multiplexing technique that shifts each signal to a different carrier frequency
a) FDM
b) TDM
c) Either a or b
d) Both a and b
Answer: a
73. Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned
Answer: a
74. In this topology there is a central controller or hub
a) Star
b) Mesh
c) Ring
d) Bus
Answer: a
75. This topology requires multipoint connection
a) Star
b) Mesh
c) Ring
d) Bus
Answer: d
76. Data communication system spanning states, countries, or the whole world is
a) LAN
b) WAN
c) MAN
d) None of the mentioned
Answer: b
77. Data communication system within a building or campus is
a) LAN
b) WAN
c) MAN
d) None of the mentioned
Answer: a
78. Expand WAN
a) World area network
b) Wide area network
c) Web area network
d) None of the mentioned
Answer: b
79. A local telephone network is an example of a _______ network
a) Packet switched
b) Circuit switched
c) both of the mentioned
d) none of the mentioned
Answer: a
80. Most packet switches use this principle
a) Stop and wait
b) Store and forward
c) Both of the mentioned
d) None of the mentioned
Answer: b
81. Method(s) to move data through a network of links and switches
a) Packet switching
b) Circuit switching
c) Line switching
d) Both a and b
Answer: d
82. The resources needed for communication between end systems are reserved for the
duration of session between end systems in ________
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
Answer: b
83. As the resources are reserved between two communicating end systems in circuit
switching, this is achieved
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
Answer: b
84. In _________ resources are allocated on demand.
a) packet switching
b) circuit switching
c) line switching
d) frequency switching
Answer: a
85. Which of the following is not applicable for IP?
a) Error reporting
b) Handle addressing conventions
c) Datagram format
d) Packet handling conventions
Answer: a
86. Which of the following field in IPv4 datagram is not related to fragmentation?
a) Flags
b) Offset
c) TOS
d) Identifier
Answer: c.
87. Which of these is not applicable for IP protocol?
a) is connectionless
b) offer reliable service
c) offer unreliable service
d) None of the mentioned
Answer: b
88. The size of IP address in IPv6 is
a) 4bytes
b) 128bits
c) 8bytes
d) 100bits
Answer: b
89. The header length of an IPv6 datagram is _____.
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Answer: d
90. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast-switching
c) ToS field
d) Option field
Answer: c
91. IPv6 does not use ______ type of address
a) Broadcast
b) Multicast
c) Any cast
d) None of the mentioned
Answer: a
92. These are the features present in IPv4 but not in IPv6.
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
Answer: d
93. The ____ field determines the lifetime of IPv6 datagram
a) Hop limit
b) TTL
c) Next header
d) None of the mentioned
Answer: a
94. Dual-stack approach refers to
a) Implementing Ipv4 with 2 stacks
b) Implementing Ipv6 with 2 stacks
c) Node has both IPv4 and IPv6 support
d) None of the mentioned
Answer: c
95. Three or more devices share a link in ________ connection
a) Unipoint
b) Multipoint
c) Point to point
d) None of the mentioned
Answer: b
96. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for
electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
Answer: a
97. Which one of the following protocol is used to receive mail messages?
a) SMTP
b) post office protocol
c) internet message access protocol
d) all of the mentioned
Answer:d
98. An email client needs to know the ____ of its initial SMTP server.
a) IP address
b) MAC address
c) URL
d) none of the mentioned
Answer: a
99. A SMTP session may include
a) zero SMTP transaction
b) one SMTP transaction
c) more than one SMTP transaction
d) all of the mentioned
Answer:d
100. SMTP defines
a) message transport
b) message encryption
c) message content
d) none of the mentioned
Answer: a
101. SMTP is used to deliver messages to
a) user’s terminal
b) user’s mailbox
c) both (a) and (b)
d) none of the mentioned
Answer:c
102. How many digits of the DNIC (Data Network Identification Code) identify the country?
a) first three
b) first four
c) first five
d) first six
Answer: a
103. Which of the following is used for modulation and demodulation?
a) Modem
b) Protocols
c) Gateway
d) None of the above
Answer: a
104. Which of the following is not a disadvantage of wireless LAN?
a) Slower data transmission
b) higher error rate
c) interference of transmissions from different computers
d) All of the above
Answer: d
105. The Internet Control Message Protocol (ICMP)
a) allows gateways to send error a control messages to other gateways or hosts
b) provides communication between the Internet Protocol Software on one machine and
the Internet Protocol Software on another
c) reports error conditions to the original source, the source must relate errors to
individual application programs and take action to correct the problem
d) All of the above
Answer: d
106. The term 'duplex' refers to the ability of the data receiving stations to echo back a
confirming message to the sender. In full duplex data transmission, both the sender and the
receiver
a) cannot talk at once
b) can receive and send data simultaneously
c) can send or receive data one at a time
d) can do one way data transmission only
Answer: b
107. Which of the following TCP/IP protocol is used for transferring electronic mail
messages from one machine to another?
a) FTP
b) SNMP
c) SMTP
d) RPC
Answer: c
108. A distributed network configuration in which all data/information pass through a
central computer is
a) bus network
b) star network
c) ring network
d) None of the above
Answer: b
109. ICMP (Internet Control Message Protocol) is
a) a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level
physical hardware address
b) a TCP/IP high level protocol for transferring files from one machine to another
c) a protocol used to monitor computers
d) a protocol that handles error and control messages
Answer: d
110. The slowest transmission speeds are those of
a) twisted-pair wire
b) coaxial cable
c) fiber-optic cable
d) microwaves
Answer: a
111. Carrier is
a) One or more conductors that serve as a common connection for a related group of
devices
b) a continuous frequency capable of being modulated or impressed with a second
signal
c) the condition when two or more sections attempt to use the same channel at the same
time
d) None of the above
Answer: b
112. In CRC there is no error if the remainder at the receiver is _____.
a) equal to the remainder at the sender
b) zero
c) nonzero
d) the quotient at the sender
Answer: b
113. Usually, it takes 10-bits to represent one character. How many characters can be
transmitted at a speed of 1200 BPS?
a) 10
b) 12
c) 120
d) 1200
Answer: c
114. To connect a computer with a device in the same room, you might be likely to use
a) a coaxial cable
b) a dedicated line
c) a ground station
d) All of the above
Answer: a
115. Which of the following is required to communicate between two computers?
a) communications software and hardware
b) protocol
c) access to transmission medium
d) All of the above
Answer: e
116. The geostationary satellite used for communication systems
a) rotates with the earth
b) remains stationary relative to the earth
c) is positioned over equator
d) All of the above
Answer: d
117. The distance a simple signal can travel in one period is called …………
a) Wavelength
b) propagation speed
c) Frequency
d) both a and b
Answer: a
118. A noise where foreign signal enters the path of the transmitted signal is called ……
a) Impulse
b) Inter modulation
c) cross talk
d) both b and c
Answer: Option A
119. With Slotted Aloha, a …………. sends out small clock tick packets to the outlying
stations
a) distributed clock
b) synchronized clock
c) centralized clock
d) Digital clock
Answer: Option A
120. If there is only one station with a packet to send, this guarantees that there will
………….. For that packet.
a) never be a collision
b) be a collision
c) be an improvement
d) direction
Answer: Option A
121.
126.The _______ layer provides a well defined service interface to the network layer,
determining how the bits of the physical layer are grouped into frames
a) Data Link
b) Physical
c) Network
d) Session
Answer: Option A
127.
122. ________ is the process in which the receiver tries to guess the message by using
redundant bits
a) Connection-Oriented Service
b) Forward error correction
c) both a and b
d) Confirm
Answer: Option B
123. Data Link Control Protocol (HDLC) is implemented at the ………
a) Data link layer
b) Network layer
c) transport layer
d) Physical layer
Answer: a
124.
125. The Internet addresses are ______ bits in length in IPV4 addressing scheme
a) 16
b) 64
c) 32
d) 48
Answer: c
126. Coding schemes can be divided into two broad categories…………
a) character coding, integer coding
b) hamming coding and block coding
c) Hamming coding and convolution coding
d) Block Coding and Convolution Coding.
Answer: d
127.
128. Each IP address can identify the ………... or ………... of IP packets.
a) source, destination
b) length, size
c) source, length
d) Size , destination
Answer: a
129.
130. In process to process delivery, an application process is assigned a ………….., which is
likely to be …………….each time that process is started
a) process identifier number , different
b) process identifier number, same
c) Source, mixed
d) Source, similar
Answer: a
131. The Post Office Protocol is an ………... protocol with both client (sender/receiver) and
…………...functions
a) electronic mail, server (storage)
b) three layer , server
c) UDP, transfer
d) TCP, server
Answer : a
132. PGP is one of the protocols used to provide security at the ……….. It is designed to
create authenticated and confidential ……….
a) application layer, e-mails.
b) Network layer, packets
c) application layer, packets
d) network layer , e-mails
Answer : a
133. ATM (Asynchronous Transfer Mode) is fundamentally a....... technology?
a) Circuit switching
b) Packet switching
c) Narrow band
d) None of these
Answer : b
134. When displaying a web page, the application layer uses the
a) HTTP protocol
b) FTP protocol
c) SMTP protocol
d) none of the mentioned
Answer: a
135. Which of the following is a variation of FDM?
a) Time Division Multiplexing(TDM)
b) Pulse Code Multiplexing(PCM)
c) Wavelength Division Multiplexing(WDM)
d) None of these
Answer:c
136. Which of the following does not allow multiple uses or devices to share one
communication line?
a) Doubleplexer
b) Multiplexer
c) Serial to parallel converter
d) None of these
Answer:b
137. Which of the following is an advantage to using fiber optics data transmission?
a) port
b) physical
c) IP
d) None
Answer : a
149. Which layer functions as liaison between user support layers and network support
layers ?
a) network layer
b) physical layer
c) transport layer
d) session layer
Answer : c
150. Radio communication frequencies ranges from?
a) 3 KHz to 300 KHz
b) 3 KHz to 300 GHz
c) 300 KHz to 3 GHz
d) 3 KHz to 3,000 GHz
Answer : b
151. The frequency ranges from 300 KHz to 3 MHz is used for ?
a) AM radio transmission
b) TV transmission
c) FM radio transmission
d) Microwave communication, satellite and radar
Answer : a
152. Which of the following is a function of e-mail system ?
a) Composition
b) Transfer
c) Reporting
d) All of above
Answer : d