Computer Network Mcq
Computer Network Mcq
(a) a process in one device is able to exchange information with a process in another device
(b) a process is running on both devices
(c) the processes running on different devices are of the same type
(d) none of these
26. When a signal from one wire bleeds into another and corrupts the signal, it is called:
(a) noise
(b) white noise
(c) cross talk
(d) attenuation
27. UTP and STP are examples of which type of cables?
(a) Coaxial cable
(b) twisted pair
(c) optical fibre
(d) plain copper
28. Thinnet and thicknet are examples of which type of cables?
(a) Coaxial cable
(b) twisted pair
(c) optical fibre
(d) plain copper
29. Single node and multinode are examples of which type of cables?
(a) Coaxial cable
(b) twisted pair
(c) optical fibre
(d) plain copper
30. Which of the following communication media offers secure communication?
(a) Radio waves
(b) Infrared
(c) Laser
(d) none of these
31. Which of the following is a medium for unguided transmission?
(a) coaxial cable
(b) optical fibre
(c) microwave
(d) twisted pair cable
32. Which of the following transmission media suffers more from transmission impairment?
(a) coaxial cable
(b) twisted pair cable
(c) optical fibre cable
(d) Infrared
33. Transmission media can be ____ or ____ media.
(a) twisted pair, coaxial cable
(b) optical fibre, coaxial cable
(c) guided, unguided
(d) closed, open
34. Which of the following communication media ensures the minimum impairment in transmission?
(a) coaxial cable
(b) optical fibre
(c) twisted pair
(d) radio waves
35. What is attenuation?
(a) cable disturbance
(b) cable shortage
(c) loss of signal strength
(d) unwanted signals with the transmission
36. What is noise?
(a) cable disturbance
(b) cable shortage
(c) loss of signal strength
(d) unwanted signals with the transmission
37. What is used to regenerate a digital signal?
(a) amplifier
(b) booster
(c) repeater
(d) router
38. What is the maximum length of twisted pair cable before a signal booster is needed?
(a) 25 metres
(b) 100 metres
(c) 500 feet
(d) 1000 feet
39. The 10baseT is a type of:
(a) twisted pair cable
(b) coaxial cable
(c) repeater
(d) LAN
40. The CAT5 is a type of:
(a) twisted pair cable
(b) coaxial cable
(c) repeater
(d) LAN
41. Ethernet-based network is a type of:
(a) twisted pair cable
(b) coaxial cable
(c) repeater
(d) LAN
42. What is the maximum length of thinnet cable before a signal booster is needed?
(a) 185 metres
(b) 500 metres
(c) 100 metres
(d) 1000 feet
43. What is the maximum length of thicknet Ethernet cable before a signal booster is needed?
(a) 185 metres
(b) 500 metres
(c) 100 metres
(d) 1000 feet
44. Which of the following communication media is immune to outside interference and crosstalk?
(a) Thinnet
(b) Coaxial cable
(c) Fibre optic
(d) Twisted pair
45. What is the size of a MAC address?
(a) 16 bits
(b) 32 bits
(c) 48 bits
(d) 64 bits
46. What factors should be considered when selecting the appropriate cable for connecting a PC to a
network? (Choose two)
(a) type of system bus
(b) motherboard model
(c) distance of cable run
(d) speed of transmission
(e) computer manufacturer
47. What are two advantages of using a Twisted pair cable, such as the UTP cable, in a networking
environment?
(a) is less expensive than fiber
(b) is easier to install than coaxial
48. Which cable connectors are used to connect a cable from a router's console port to a PC?
(a) RJ-11
(b) RJ-12
(c) RJ-45
(d) none
49. What are two advantages of using fiber-optic cabling instead of UTP?
(a) lower cost
(b) easier to install
(c) allows longer distances
(d) less affected by external signals
(e) easier to terminate the cable ends
50. Ethernet-based networks use which topology?
(a) Bus
(b) Star
(c) Tree
(d) Mesh
51. If all the devices of a network are connected via a central hub, then it is which topology?
(a) Bus
(b) Star
(c) Tree
(d) Mesh
52. In a _ topology, if there are n devices in a network, each device has n - 1 ports for cables.
(a) Star
(b) Bus
(c) Tree
(d) Mesh
53. Which topology combines the characteristics of linear bus and star topologies?
(a) hybrid
(b) mesh
(c) tree
(d) star
54. Star topology uses a central connecting device, which can be a:
(a) hub
(b) switch
(c) both a and b
(d) none of these
55. Which address is assigned to network cards by the manufacturer?
(a) IP
(b) MAC
(c) unique
(d) domain
56. Which network topology requires a central controller or hub?
(a) Star
(b) Bus
(c) Mesh
(d) Tree
57. Which topology requires a multipoint connection on a single cable?
(a) Star
(b) Bus
(c) Mesh
(d) Tree
58. Which of the following topologies contains a backbone cable running through the whole length of
the network?
(a) Star
(b) Bus
(c) Mesh
(d) Tree
59. Which of the following devices can be used at the center of a star topology?
(a) Router
(b) Repeater
(c) Modem
(d) Hub
60. If a computer connected to a star topology fails, the entire network will:
(a) also fail
(b) work unaffectedly
(c) only server will work
(d) none of these
61. A combination of bus and star topologies is called a _ topology.
(a) Combination
(b) Hybrid
(c) Mesh
(d) Tree
62. The Internet is an example of which topology?
(a) Star
(b) Bus
(c) Mesh
(d) Hybrid
63. A device that forwards data packets from one network to another is called a:
(a) Bridge
(b) Router
(c) Hub
(d) Gateway
64. A hub is a:
(a) Broadcast device
(b) Unicast device
(c) Multicast device
(d) None of the above
65. A switch is a:
(a) Broadcast device
(b) Unicast device
(c) Multicast device
(d) None of the above
66. The device that can operate in place of a hub is a:
(a) Switch
(b) Bridge
(c) Router
(d) Gateway
67. A repeater takes a weak and corrupted signal and _ it.
(a) Amplifies
(b) Regenerates
(c) Resembles
(d) Reroutes
68. A hub is a _ device while a switch is a _ device.
(a) Unicast, multicast
(b) Multicast, unicast
(c) Broadcast, unicast
(d) Unicast, broadcast
69. A modem is a device or card that converts the _ produced by a computer so that it can be transmitted
over telephone cables.
(a) Data, signal
(b) Analog signal, digital signal
(c) Digital signal, analog signal
(d) Signal, data
70. Which of the following is not a network connectivity device?
(a) Hub
(b) Switch
(c) Router
(d) Graphic card
71. Data is converted into a form so it can travel over telephone lines using this device.
(a) Modem
(b) Hub
(c) Switch
(d) Router
72. The network device that regenerates and retransmits the whole signal is:
(a) Modem
(b) Hub
(c) Repeater
(d) Bridge
73. The network device which connects networks of similar types (same protocols) is:
(a) Hub
(b) Router
(c) Bridge
(d) Gateway
74. The network device which connects dissimilar networks (different protocols) is:
(a) Hub
(b) Router
(c) Bridge
(d) Gateway
75. The network device that sends data over optimizing paths through connected hops is:
(a) Hub
(b) Router
(c) Bridge
(d) Gateway
76. FTP stands for:
(a) File Transfer Policy
(b) File Transfer Protocol
(c) File Transmission Protocol
(d) File Transmission Policy
77. The IP (Internet Protocol) of TCP/IP transmits packets over the Internet using _ switching.
(a) Circuit
(b) Message
(c) Packet
(d) All of these
78. The Internet e-mail system is based on:
(a) FIP
(b) SMTP
(c) POP
(d) (b) and (c)
(e) (a) and (c)
79. The next generation IP addressing system to succeed IPv4 is:
(a) IPv4.1
(b) IPv5
(c) IPv6
(d) IPv5.1
80. What is the size of an IPv4 address?
(a) 32 bits
(b) 64 bits
(c) 128 bits
(d) 32 bytes
81. What is the size of an IPv6 address?
(a) 32 bits
(b) 64 bits
(c) 128 bits
(d) 32 bytes
82. The general form of the SMTP destination address is:
(a) User_domain@gateway
(b) User@hostname
(c) user@domainname
(d) all of these
83. Which of the following fields represents the sender of the message in an electronic mail?
(a) To
(b) From
(c) Cc
(d) Bcc
84. Which of the following fields represents the receiver of the message in an electronic mail?
(a) To
(b) From
(c) Cc
(d) Bcc
85. Which of the following fields represents the co-receiver of the sent mail in an electronic mail?
(a) To
(b) From
(c) Cc
(d) Bcc
86. In electronic mail, which of the following fields will ensure that the receiver will not see the other
email addresses specified along with it in this field?
(a) To
(b) From
(c) Cc
(d) Bcc
87. Which protocol is responsible for transferring data over the Internet?
(a) FTP
(b) SMTP
(c) TCP/IP
(d) POP
88. Which of the following protocols ensures safe transmission of data?
(a) FTP
(b) GDP
(c) HTTP
(d) HTTPS
89. Which of the following can be software?
(a) Router
(b) Firewalls
(c) Gateway
(d) Modems
90. Which of the following is/are email protocols?
(a) TCP
(b) IP
(c) SMTP
(d) POP
91. Which of the following is a client-side scripting language?
(a) Perl
(b) ASP
(c) VBScript
(d) JSP
92. Which of the following is a server-side scripting language?
(a) VBScript
(b) JavaScript
(c) JSP
(d) PHP
93. Which of the following is a type of program that either pretends to have, or is described as having, a
set of useful or desirable features but actually contains damaging code?
(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
94. Which of the following is the type of software that has self-replicating software that causes damage
to files and systems?
(a) Viruses
(b) Trojan horses
(c) Spam
(d) Worms
95. Which of the following is a program capable of continually propagating with little or no user
intervention?
(a) Virus
(b) Trojan horses
(c) Adware
(d) Worms
96. Which of the following is a software that, once installed on your computer, tracks your internet
browsing habits and sends you popups containing advertisements related to the sites and topics
you've visited?
(a) Spyware
(b) Adware
(c) Malware
(d) All of these
97. What is the software called that's designed to exploit a computer user and is a broad term covering
computer viruses, worms, Trojan, adware, etc.?
(a) Spyware
(b) Adware
(c) Malware
(d) All of these
98. What is the software called which, when downloaded on a computer, scans your hard drive for
personal information and your internet browsing habits?
(a) Spyware
(b) Adware
(c) Malware
(d) All of these
99. What is the most common way people's computers get infected by a virus?
(a) Receive a fax
(b) Install new hardware
(c) Download email attachments
(d) Play a video game
**********************