0% found this document useful (0 votes)
12 views

Unit 1

NICE

Uploaded by

Jaya Raja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Unit 1

NICE

Uploaded by

Jaya Raja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 6

TRICHY ENGINEERING COLLEGE

(A Unit of SS Group of Institutions)


Approved by AICTE & Affiliated to Anna University, Chennai
An ISO 9001:2015 Certified Institution
Sivagnanam Nagar, Trichy-Chennai NH, Konalai, Trichy - 621 105.

UNIT I
COMPUTER NETWORKS
1. What is a computer network?
a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can communicate and
share resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components

Answer: b
Explanation: A computer network refers to a collection of computers and devices
linked together to share information, resources, and services. This interconnection
enables communication, data sharing, and collaboration among the devices within
the network.
2. What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
d) A single network
View Answer
Answer: c
Explanation: The internet is a global network formed by connecting wide area networks
(WANs), enabling worldwide communication and data sharing.

3. Which of the following is an example of Bluetooth?


a) wide area network
b) virtual private network
c) local area network
d) personal area network

Answer: d
Explanation: Bluetooth is a wireless technology used to create a wireless personal area
network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency
band for transmission.

4. Which of the following computer networks is built on the top of another network?
a) overlay network
b) prime network
c) prior network
d) chief network
View Answer
Answer: a
Explanation: An overlay network is a computer network that is built on top of another
network. Some examples of an overlay network are Virtual Private Networks (VPN) and
Peer-to-Peer Networks (P2P).
TRICHY ENGINEERING COLLEGE
(A Unit of SS Group of Institutions)
Approved by AICTE & Affiliated to Anna University, Chennai
An ISO 9001:2015 Certified Institution
Sivagnanam Nagar, Trichy-Chennai NH, Konalai, Trichy - 621 105.

5. What is the full form of OSI?


a) optical service implementation
b) open service Internet
c) open system interconnection
d) operating system interface
View Answer
Answer: c
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides
a structured plan on how applications communicate over a network, which also helps us to
have a structured plan for troubleshooting. It is recognized by the ISO as the generalized
model for computer network i.e. it can be modified to design any kind of computer network.

6. When a collection of various computers appears as a single coherent system to its


clients, what is this called?
a) mail system
b) networking system
c) computer network
d) distributed system
View Answer
Answer: d
Explanation: A Computer network is defined as a collection of interconnected computers
which uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is that
the whole collection of computers appears to its users as a single coherent system.
Example:- World wide web

7. How many layers are there in the ISO OSI reference model?
a) 7
b) 5
c) 4
d) 6
Answer: a
Explanation: The seven layers in ISO OSI reference model is Application, Presentation,
Session, Transport, Network, Data link and Physical layer. OSI stands for Open System
Interconnect and it is a generalized model.
8. What are nodes in a computer network?
a) the computer that routes the data
b) the computer that terminates the data
c) the computer that originates the data
d) all of the mentioned
View Answer
TRICHY ENGINEERING COLLEGE
(A Unit of SS Group of Institutions)
Approved by AICTE & Affiliated to Anna University, Chennai
An ISO 9001:2015 Certified Institution
Sivagnanam Nagar, Trichy-Chennai NH, Konalai, Trichy - 621 105.

Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data
or receiving data or even routing the data to its destination. Routers, Computers and
Smartphones are some examples of network nodes.

9. Which one of the following is not a function of network layer?


a) congestion control
b) error control
c) routing
d) inter-networking

Answer: b
Explanation: In the OSI model, network layer is the third layer and it provides data routing
paths for network communications. Error control is a function of the data link layer and the
transport layer.
10. How is a single channel shared by multiple signals in a computer network?
a) multiplexing
b) phase modulation
c) analog modulation
d) digital modulation
View Answer
Answer: a
Explanation: In communication and computer networks, the main goal is to share a scarce
resource. This is done by multiplexing, where multiple analog or digital signals are
combined into one signal over a shared medium. The multiple kinds of signals are
designated by the transport layer which is the layer present on a higher level than the
physical layer.

11. Which of the following devices forwards packets between networks by processing the
routing information included in the packet?
a) firewall
b) bridge
c) hub
d) router
View Answer
Answer: d
Explanation: A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. They make use of
routing protocols like RIP to find the cheapest path to the destination.

12. What is the term for an endpoint of an inter-process communication flow across a
computer network?
a) port
b) machine
c) socket
TRICHY ENGINEERING COLLEGE
(A Unit of SS Group of Institutions)
Approved by AICTE & Affiliated to Anna University, Chennai
An ISO 9001:2015 Certified Institution
Sivagnanam Nagar, Trichy-Chennai NH, Konalai, Trichy - 621 105.

d) pipe
View Answer
Answer: c
Explanation: Socket is one end point in a two way communication link in the network. TCP
layer can identify the application that data is destined to be sent by using the port number
that is bound to socket.

13. How do two devices become part of a network?


a) PIDs of the processes running of different devices are same
b) a process in one device is able to exchange information with a process in another device
c) a process is active and another is inactive
d) a process is running on both devices
Answer: b
Explanation: A computer network, or data network, is a digital telecommunications
network which allows nodes to share resources. In computer networks, computing
devices exchange data with each other using connections between nodes. The
nodes have certain processes which enable them to share a specific type of data
using a distinct protocol.

14. Which layer does the data link layer take packets from and encapsulate them into
frames for transmission?
a) transport layer
b) application layer
c) network layer
d) physical layer
View Answer
Answer: c
Explanation: In computer networks, the data from application layer is sent to transport
layer and is converted to segments. These segments are then transferred to the network
layer and these are called packets. These packets are then sent to data link layer where
they are encapsulated into frames. These frames are then transferred to physical layer
where the frames are converted to bits. Error control and flow control data is inserted in
the frames at the data link layer.

15. Which of this is not a network edge device?


a) Switch
b) PC
c) Smartphones
d) Servers
View Answer
Answer: a
Explanation: Network edge devices refer to host systems, which can host applications like
web browser. A switch can’t operate as a host, but as a central device which can be used to
manage network communication.
TRICHY ENGINEERING COLLEGE
(A Unit of SS Group of Institutions)
Approved by AICTE & Affiliated to Anna University, Chennai
An ISO 9001:2015 Certified Institution
Sivagnanam Nagar, Trichy-Chennai NH, Konalai, Trichy - 621 105.

16. Which type of network shares the communication channel among all the machines?
a) anycast network
b) multicast network
c) unicast network
d) broadcast network
View Answer
Answer: d
Explanation: In a broadcast network, information is sent to all stations in a network whereas
in a multicast network the data or information is sent to a group of stations in the network. In
unicast network, information is sent to only one specific station. The broadcast address of
the network is the last assigned address of the network.

17. Which topology requires a multipoint connection?


a) Ring
b) Bus
c) Star
d) Mesh
View Answer
Answer: b
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data
passes through all other nodes in the network through the cable. It is really simple to install
but it’s not secure enough to be used in most of the computer network applications.

18. Which of the following maintains the Domain Name System?


a) a single server
b) a single computer
c) distributed database system
d) none of the mentioned
View Answer
Answer: c
Explanation: A domain name system is maintained by a distributed database system. It is a
collection of multiple, logically interrelated databases distributed over a computer network.

19. When discussing IDS/IPS, what is a signature?


a) It refers to “normal,” baseline network behavior
b) It is used to authorize the users on a network
c) An electronic signature used to authenticate the identity of a user on the network
d) Attack-definition file
Answer: d
Explanation: IDSes work in a manner similar to modern antivirus technology. They are
constantly updated with attack-definition files (signatures) that describe each type of known
malicious activity. Nemean is a popular signature generation method for conventional
computer networks.
TRICHY ENGINEERING COLLEGE
(A Unit of SS Group of Institutions)
Approved by AICTE & Affiliated to Anna University, Chennai
An ISO 9001:2015 Certified Institution
Sivagnanam Nagar, Trichy-Chennai NH, Konalai, Trichy - 621 105.

20. Which of the following are Gigabit Ethernets?


a) 1000 BASE-LX
b) 1000 BASE-CX
c) 1000 BASE-SX
d) All of the mentioned
View Answer
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing
various technologies for transmitting Ethernet frames at a rate of a gigabit per second
(1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into
use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a
result of being considerably faster.

You might also like