0% found this document useful (0 votes)
19 views3 pages

Basics 2

Uploaded by

balakumar.mca07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views3 pages

Basics 2

Uploaded by

balakumar.mca07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Basics – 2

1. When collection of various computers seems a single coherent system to its client,
then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system

Answer: b
Explanation: A Computer network is defined as a collection of interconnected computers
which uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is
that the whole collection of computers appears to its users as a single coherent system.
Example:- World wide web
2. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another
device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive

Answer: a
Explanation: A computer network, or data network, is a digital telecommunications
network which allows nodes to share resources. In computer networks, computing
devices exchange data with each other using connections between nodes. The nodes
have certain processes which enable them to share a specific type of data using a
distinct protocol.
3. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network

Answer: d
Explanation: An overlay network is a computer network that is built on top of another
network. Some examples of an overlay network are Virtual Private Networks (VPN) and
Peer-to-Peer Networks (P2P).
4. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending
data or receiving data or even routing the data to its destination. Routers, Computers
and Smartphones are some examples of network nodes.
5. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network

Answer: a
Explanation: In a broadcast network, information is sent to all stations in a network
whereas in a multicast network the data or information is sent to a group of stations in
the network. In unicast network, information is sent to only one specific station. The
broadcast address of the network is the last assigned address of the network.
6. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network

Answer: a
Explanation: Bluetooth is a wireless technology used to create a wireless personal area
network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz
frequency band for transmission.
7. A __________ is a device that forwards packets between networks by processing the
routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub

Answer: c
Explanation: A router is a networking device that forwards data packets between
computer networks. Routers perform the traffic directing functions on the Internet. They
make use of routing protocols like RIP to find the cheapest path to the destination.
8. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system

Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently
that are employed for the implementation of network protocol suite. Each layer in the
network model has to use one specific protocol from the protocol stack.
9. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure

Answer: a
Explanation: Network congestion occurs when traffic in the network is more than the
network could handle. To avoid network congestion, the network management uses
various open-loop and closed-loop congestion control techniques.
10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network

Answer: b
Explanation: A virtual private network extends a private network across a public network,
and enables users to send and receive data across shared or public networks as if their
computing devices were directly connected to the private network.VPN provides
enhanced security and online anonymity to users on the internet. It is also used to
unblock websites which are unavailable in certain regions.

You might also like