0% found this document useful (0 votes)
13 views10 pages

Computer Network Mcq

The document contains a series of multiple-choice questions related to computer networks, covering topics such as network types, devices, transmission media, and protocols. It includes questions about definitions, characteristics, and functionalities of various networking components. The questions are designed to assess knowledge on computer networking fundamentals and concepts.

Uploaded by

www.karansahu38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views10 pages

Computer Network Mcq

The document contains a series of multiple-choice questions related to computer networks, covering topics such as network types, devices, transmission media, and protocols. It includes questions about definitions, characteristics, and functionalities of various networking components. The questions are designed to assess knowledge on computer networking fundamentals and concepts.

Uploaded by

www.karansahu38
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

UNIT-2-COMPUTER NETWORK

Multiple Choice Questions (1 Mark Each)

1. Two devices are in a network if:

(a) a process in one device is able to exchange information with a process in another device
(b) a process is running on both devices
(c) the processes running on different devices are of the same type
(d) none of these

2. What is a standalone computer?


o (a) A computer that is not connected to a network
o (b) A computer that is being used as a server
o (c) A computer that does not have any peripherals attached to it
o (d) A computer that is used by only one person
3. The central computer which is more powerful than other computers in the network is called:
(a) Client
(b) Server
(c) Hub
(d) Switch
4. Which of the following is not required for a computer network?
(a) host
(b) server
(c) communication channel
(d) plotter
5. A ____ is a computer attached to a network and seeks to share the resources of the network.
(a) NIC
(b) host
(c) server
(d) node
6. A ____ is a specialized computer on a network responsible for making networking tasks happen.
(a) NIC
(b) host
(c) server
(d) node
7. A ____ is a network card attached to a host to establish network connections.
(a) NIC
(b) host
(c) server
(d) node
8. Which of these components is internal to a computer and is required to connect the computer to a
network?
(a) Wireless Access Point
(b) Network Interface Card
(c) Switch
(d) Hub
9. NIC stands for:
(a) Network Information Centre
(b) Network Integration Card
(c) Network Interface Card
(d) Network Integration Centre
10. A network in which every computer is capable of playing the role of a client, a server, or both at the
same time is called:
(a) peer-to-peer network
(b) local area network
(c) dedicated server network
(d) wide area network
11. In a peer-to-peer network, each computer in a network is referred to as:
(a) server
(b) client
(c) peer
(d) sender
12. In a ____ network, a client can also act as a server if needed.
(a) peer-to-peer network
(b) client-server
(c) WAN
(d) PAN
13. In a ____ network, a client cannot act as a server; instead, there are dedicated servers.
(a) peer-to-peer network
(b) client-server
(c) WAN
(d) PAN
14. A client/server network is also called a ____ network.
(a) peer-to-peer network
(b) Master-Slave
(c) Dedicated
(d) Non-dedicated
15. The first computer network was:
(a) NSFNet
(b) FirstNet
(c) ARPANet
(d) Internet
16. Which of the following networks spreads over a small geographical area of up to 1 km?
(a) LAN
(b) WAN
(c) MAN
(d) PAN
17. Which of the following networks connects devices such as printers and cameras around a computer,
laptop, or mobile?
(a) LAN
(b) WAN
(c) MAN
(d) PAN
18. A computer network created by connecting the computers in your school’s computer lab is an
example of:
(a) LAN
(b) MAN
(c) WAN
(d) PAN
19. Your school has four branches spread across the city. A computer network created by connecting the
computers in the computer labs of all the school branches is an example of:
(a) LAN
(b) MAN
(c) WAN
(d) PAN
20. Which of the following is not a guided communication medium?
(a) twisted pair cable
(b) Microwave
(c) coaxial cable
(d) optical fibre
21. Which of the following is not an unguided communication medium?
(a) Infrared
(b) Microwave
(c) Optical fibre
(d) Radio waves
22. The worldwide Internet is an example of:
(a) LAN
(b) MAN
(c) WAN
(d) all of these
23. Which transmission media is capable of having a much higher bandwidth capacity?
(a) Coaxial
(b) Twisted pair cable
(c) Untwisted cable
(d) Fibre optic
24. Which type of transmission media is the least expensive to manufacture?
(a) Coaxial
(b) Twisted pair cable
(c) CAT cable
(d) Fibre optic
25. Which of the following is the fastest media of data transfer?
(a) Co-axial Cable
(b) Untwisted Wire
(c) Telephone Lines
(d) Fibre Optic

26. When a signal from one wire bleeds into another and corrupts the signal, it is called:
(a) noise
(b) white noise
(c) cross talk
(d) attenuation
27. UTP and STP are examples of which type of cables?
(a) Coaxial cable
(b) twisted pair
(c) optical fibre
(d) plain copper
28. Thinnet and thicknet are examples of which type of cables?
(a) Coaxial cable
(b) twisted pair
(c) optical fibre
(d) plain copper
29. Single node and multinode are examples of which type of cables?
(a) Coaxial cable
(b) twisted pair
(c) optical fibre
(d) plain copper
30. Which of the following communication media offers secure communication?
(a) Radio waves
(b) Infrared
(c) Laser
(d) none of these
31. Which of the following is a medium for unguided transmission?
(a) coaxial cable
(b) optical fibre
(c) microwave
(d) twisted pair cable
32. Which of the following transmission media suffers more from transmission impairment?
(a) coaxial cable
(b) twisted pair cable
(c) optical fibre cable
(d) Infrared
33. Transmission media can be ____ or ____ media.
(a) twisted pair, coaxial cable
(b) optical fibre, coaxial cable
(c) guided, unguided
(d) closed, open
34. Which of the following communication media ensures the minimum impairment in transmission?
(a) coaxial cable
(b) optical fibre
(c) twisted pair
(d) radio waves
35. What is attenuation?
(a) cable disturbance
(b) cable shortage
(c) loss of signal strength
(d) unwanted signals with the transmission
36. What is noise?
(a) cable disturbance
(b) cable shortage
(c) loss of signal strength
(d) unwanted signals with the transmission
37. What is used to regenerate a digital signal?
(a) amplifier
(b) booster
(c) repeater
(d) router
38. What is the maximum length of twisted pair cable before a signal booster is needed?
(a) 25 metres
(b) 100 metres
(c) 500 feet
(d) 1000 feet
39. The 10baseT is a type of:
(a) twisted pair cable
(b) coaxial cable
(c) repeater
(d) LAN
40. The CAT5 is a type of:
(a) twisted pair cable
(b) coaxial cable
(c) repeater
(d) LAN
41. Ethernet-based network is a type of:
(a) twisted pair cable
(b) coaxial cable
(c) repeater
(d) LAN
42. What is the maximum length of thinnet cable before a signal booster is needed?
(a) 185 metres
(b) 500 metres
(c) 100 metres
(d) 1000 feet
43. What is the maximum length of thicknet Ethernet cable before a signal booster is needed?
(a) 185 metres
(b) 500 metres
(c) 100 metres
(d) 1000 feet
44. Which of the following communication media is immune to outside interference and crosstalk?
(a) Thinnet
(b) Coaxial cable
(c) Fibre optic
(d) Twisted pair
45. What is the size of a MAC address?
(a) 16 bits
(b) 32 bits
(c) 48 bits
(d) 64 bits
46. What factors should be considered when selecting the appropriate cable for connecting a PC to a
network? (Choose two)
(a) type of system bus
(b) motherboard model
(c) distance of cable run
(d) speed of transmission
(e) computer manufacturer
47. What are two advantages of using a Twisted pair cable, such as the UTP cable, in a networking
environment?
(a) is less expensive than fiber
(b) is easier to install than coaxial
48. Which cable connectors are used to connect a cable from a router's console port to a PC?
(a) RJ-11
(b) RJ-12
(c) RJ-45
(d) none
49. What are two advantages of using fiber-optic cabling instead of UTP?
(a) lower cost
(b) easier to install
(c) allows longer distances
(d) less affected by external signals
(e) easier to terminate the cable ends
50. Ethernet-based networks use which topology?
(a) Bus
(b) Star
(c) Tree
(d) Mesh
51. If all the devices of a network are connected via a central hub, then it is which topology?
(a) Bus
(b) Star
(c) Tree
(d) Mesh
52. In a _ topology, if there are n devices in a network, each device has n - 1 ports for cables.
(a) Star
(b) Bus
(c) Tree
(d) Mesh
53. Which topology combines the characteristics of linear bus and star topologies?
(a) hybrid
(b) mesh
(c) tree
(d) star
54. Star topology uses a central connecting device, which can be a:
(a) hub
(b) switch
(c) both a and b
(d) none of these
55. Which address is assigned to network cards by the manufacturer?
(a) IP
(b) MAC
(c) unique
(d) domain
56. Which network topology requires a central controller or hub?
(a) Star
(b) Bus
(c) Mesh
(d) Tree
57. Which topology requires a multipoint connection on a single cable?
(a) Star
(b) Bus
(c) Mesh
(d) Tree
58. Which of the following topologies contains a backbone cable running through the whole length of
the network?
(a) Star
(b) Bus
(c) Mesh
(d) Tree
59. Which of the following devices can be used at the center of a star topology?
(a) Router
(b) Repeater
(c) Modem
(d) Hub
60. If a computer connected to a star topology fails, the entire network will:
(a) also fail
(b) work unaffectedly
(c) only server will work
(d) none of these
61. A combination of bus and star topologies is called a _ topology.
(a) Combination
(b) Hybrid
(c) Mesh
(d) Tree
62. The Internet is an example of which topology?
(a) Star
(b) Bus
(c) Mesh
(d) Hybrid
63. A device that forwards data packets from one network to another is called a:
(a) Bridge
(b) Router
(c) Hub
(d) Gateway
64. A hub is a:
(a) Broadcast device
(b) Unicast device
(c) Multicast device
(d) None of the above
65. A switch is a:
(a) Broadcast device
(b) Unicast device
(c) Multicast device
(d) None of the above
66. The device that can operate in place of a hub is a:
(a) Switch
(b) Bridge
(c) Router
(d) Gateway
67. A repeater takes a weak and corrupted signal and _ it.
(a) Amplifies
(b) Regenerates
(c) Resembles
(d) Reroutes
68. A hub is a _ device while a switch is a _ device.
(a) Unicast, multicast
(b) Multicast, unicast
(c) Broadcast, unicast
(d) Unicast, broadcast
69. A modem is a device or card that converts the _ produced by a computer so that it can be transmitted
over telephone cables.
(a) Data, signal
(b) Analog signal, digital signal
(c) Digital signal, analog signal
(d) Signal, data
70. Which of the following is not a network connectivity device?
(a) Hub
(b) Switch
(c) Router
(d) Graphic card
71. Data is converted into a form so it can travel over telephone lines using this device.
(a) Modem
(b) Hub
(c) Switch
(d) Router
72. The network device that regenerates and retransmits the whole signal is:
(a) Modem
(b) Hub
(c) Repeater
(d) Bridge
73. The network device which connects networks of similar types (same protocols) is:
(a) Hub
(b) Router
(c) Bridge
(d) Gateway
74. The network device which connects dissimilar networks (different protocols) is:
(a) Hub
(b) Router
(c) Bridge
(d) Gateway
75. The network device that sends data over optimizing paths through connected hops is:
(a) Hub
(b) Router
(c) Bridge
(d) Gateway
76. FTP stands for:
(a) File Transfer Policy
(b) File Transfer Protocol
(c) File Transmission Protocol
(d) File Transmission Policy
77. The IP (Internet Protocol) of TCP/IP transmits packets over the Internet using _ switching.
(a) Circuit
(b) Message
(c) Packet
(d) All of these
78. The Internet e-mail system is based on:
(a) FIP
(b) SMTP
(c) POP
(d) (b) and (c)
(e) (a) and (c)
79. The next generation IP addressing system to succeed IPv4 is:
(a) IPv4.1
(b) IPv5
(c) IPv6
(d) IPv5.1
80. What is the size of an IPv4 address?
(a) 32 bits
(b) 64 bits
(c) 128 bits
(d) 32 bytes
81. What is the size of an IPv6 address?
(a) 32 bits
(b) 64 bits
(c) 128 bits
(d) 32 bytes
82. The general form of the SMTP destination address is:
(a) User_domain@gateway
(b) User@hostname
(c) user@domainname
(d) all of these
83. Which of the following fields represents the sender of the message in an electronic mail?
(a) To
(b) From
(c) Cc
(d) Bcc
84. Which of the following fields represents the receiver of the message in an electronic mail?
(a) To
(b) From
(c) Cc
(d) Bcc
85. Which of the following fields represents the co-receiver of the sent mail in an electronic mail?
(a) To
(b) From
(c) Cc
(d) Bcc
86. In electronic mail, which of the following fields will ensure that the receiver will not see the other
email addresses specified along with it in this field?
(a) To
(b) From
(c) Cc
(d) Bcc
87. Which protocol is responsible for transferring data over the Internet?
(a) FTP
(b) SMTP
(c) TCP/IP
(d) POP
88. Which of the following protocols ensures safe transmission of data?
(a) FTP
(b) GDP
(c) HTTP
(d) HTTPS
89. Which of the following can be software?
(a) Router
(b) Firewalls
(c) Gateway
(d) Modems
90. Which of the following is/are email protocols?
(a) TCP
(b) IP
(c) SMTP
(d) POP
91. Which of the following is a client-side scripting language?
(a) Perl
(b) ASP
(c) VBScript
(d) JSP
92. Which of the following is a server-side scripting language?
(a) VBScript
(b) JavaScript
(c) JSP
(d) PHP
93. Which of the following is a type of program that either pretends to have, or is described as having, a
set of useful or desirable features but actually contains damaging code?
(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
94. Which of the following is the type of software that has self-replicating software that causes damage
to files and systems?
(a) Viruses
(b) Trojan horses
(c) Spam
(d) Worms
95. Which of the following is a program capable of continually propagating with little or no user
intervention?
(a) Virus
(b) Trojan horses
(c) Adware
(d) Worms
96. Which of the following is a software that, once installed on your computer, tracks your internet
browsing habits and sends you popups containing advertisements related to the sites and topics
you've visited?
(a) Spyware
(b) Adware
(c) Malware
(d) All of these
97. What is the software called that's designed to exploit a computer user and is a broad term covering
computer viruses, worms, Trojan, adware, etc.?
(a) Spyware
(b) Adware
(c) Malware
(d) All of these
98. What is the software called which, when downloaded on a computer, scans your hard drive for
personal information and your internet browsing habits?
(a) Spyware
(b) Adware
(c) Malware
(d) All of these
99. What is the most common way people's computers get infected by a virus?
(a) Receive a fax
(b) Install new hardware
(c) Download email attachments
(d) Play a video game

100.What purpose does anti-virus software serve?


(a) It deletes every file that it suspects is infected.
(b) It stops people gaining unauthorized access to your computer via the Internet.
(c) It inspects computer files and email attachments for viruses and removes or quarantines any that it
finds infected.
(d) All of these

101. What law makes it illegal to knowingly spread a computer virus?


(a) IT Act
(b) Computer Misuse Act
(c) Cyber Act
(d) Cyber Misuse Act
102.A system designed to protect unauthorized access to or from a private network is called:
(a) Password
(b) Firewall
(c) Access wall
(d) Network security
103. Hacking with malicious intent is called:
(a) Virus
(b) Breaking in
(c) Cracking
(d) Mal-hacking
104.Which of the following is not an example of an e-wallet?
(a) PayTM
(b) Google Pay
(c) PhonePe
(d) PayPal

**********************

You might also like