Professional Documents
Culture Documents
Computer Network
Computer Network
[C.1]
MCQ
COMPUTER NETWORK
Q.1. Computer Network is
(1) Collection of hardware
components and computers
(2) Interconnected by communication
channels
(3) Sharing of resources and information
A l l of the Above
Ans. (4) All of the Above
Q.2. Protocols are?
(1Agreements on how communication components and
DTE's are to communicate
(2) Logical communication channels for
(3)
transferring data
Physical communication channels sued for
transferring data
(4) None of above
Ans. (1) Agreements on bow communication components and
DTE's are to communicate
Q.3. Two devices are in network if
a process in one device is able to exchange
information with a process in another device
(2) a process is running on both devices
(3) PIDs of the processes running of different devices are
same
Model?
tor BCA Computer Notwork
c2 Layer)
(Physical
(1) Layer 1
(Network
Layver)
(2) to separate LANs C.31
Layer 3 Layer) (3) to contrl Network
(8) Layer 4
(Transport
Layer) (4) All of th above Speed
(Application
Layer 7 Layer)
Ans. (1) to conn t LANs
(4) (Network
Layer 3
Ans. (2)
layers does
OSI Reference Model has? 9.13.What is the meaning of Bandwidth in
Q.6. How many Y Transmission Network?
capacity a communication
Connected Computers inof the
(2) 5
(1) 4 (2) channels
(3) 6 (47
(3) Class of IP used in Network
Ans. (4) 7 (4) None
Network
of Above
of the OSI modelo Ans.(1) Transmission
works in which layer capacity of a communication channels
Q.7. Bridge Transport layer
Application layer (2)
(1) D a t a link layer Q.14.The structure or format of data is called
(3) Network layer
Data link layer
(1)Syntax (2) Semantics ..
Q.22.In TCP IP Model, when data is sent from device Atto (3) data link layer (4) transport layer
Ans. (2) physical layer
layer
device B, the 5th layer to
receive data at B 14) physical
*******
Q.29.Which of this is not
constituent of residential a
Application layer (2) Transport layer telephone line?
(4) Session layer (1) A high-speed downstream
(3) Link layer channel
Ans. (1) Application layer (2) A medium-speed downstream
channel
(3) A low-speed downstream channel
Q.23.In the OSI model, as a data packet moves from the (4) An ultra-high speed downstream
Ans. (3) A low-speed channel
lowerto the upper layers, headers a r e . downstream channel
(1) Added ( 2 Removed
Q.30.DSL telcos provide which of the
(3) Rearranged (4) Randomized (1) Wired phone access following services?
Ans.(2) Removed (2) ISP
Q.24.Which of the following statements can be associated (3) Wired phone access and ISP
with OSI model? (4) Network routing and ISP
Ans. (3) Wired phone access and ISP
(1) A structured way to discuss and easier update system
components 9.31.The
Q.31.The function of DSLAM is to
(2) One layer may duplicate lower layer functionality (1) Convert analog signals into..
. ****
(2)
(3 Functionality at one layer no way requires (2) Convert digital signals into digital signals
(3) Amplify digital signals analog signals
information from another layer
(4) It is an (4) De-amplify digital signals
application specific network model
Ans.(3) Functionality Ans.(1)
s. (1) Convert analog signals into
at one digital signals
information from another layer way requires
no
Q.48. signal to a
different c a r r i e r :
(2) guaranteed constant rate
each
(1) FDM
(2) TDM (3) reliability
TDM (4) PDM (4) store and forward
Both FDM&
(3)
Ans. (1) FDM a.(2) guaranteed constant rate
Q49.A local telephone network 1s an
example of 0.55.In..... . Systems, resources
. network. demand. are allocated on
(1) Packet switched (2) Circuit switched (1) packet switching
(4) Line switched (3) line switching
(2) circuit switching
(31 Bit switched
(4) frequency switching
Ans. (2) Circuit switched ns.(1) packet switching
Q.50.Most packet switches use
this principle 56.Which of the
following is not
(1) Stop and wait (2) Store and forward service? an
application layer
(3) Store and wait (4) Stop and forward (1) Network virtual terminal
Ans. (2) Store and forward (2) File transfer, access, and
(3) Mail service management
Q.51.1f there are N routers from source to destination. (4) Error control
the total end to end delay in sending packet (4)
Mmher of bits in the packet R-> transmission P(L> s. Error control
rate) 57.Which of the
is equal to...
Link layer header?
following would be found in a Data
(1) N (2) (N*L)/R
(3) (2N*L)/R (4) L/R
(1) The packet's fragmentation offset
Ans. (2) (N*L)/R (2) The source's logical address
(3) The packet's
sequence number
Q.52.What are the Methods to move
data through (4) The source's physical address
network of links and switches? aas. 4)
Ans.(4) The source's physical address
(1) Packet s tching and Line
(2) ireuit switching and Line
switching 58.What is a primar function of the
switching information trailer
3) added by the data link
sw ching and bit switching encapsulation? layer
(4) Picket switching
Ans. (4) and Circuit switching
Packet switching and Circuit
(1)
Supports error detectiun
switching (2)
Ensures ordered arrival of data
Q53.The required resources for
(3)
Identifies the devices on the local network
communication
reserved for the durationbetween (4)
end systems are (4)
Provides delivery to correct destination
session between end of the ms. (1)
systems in
Supports error detection
(1) Packet switching . . . . . . . . method.
(3) Line switching (2) Circuit switching 59Error detection at the data link layer is achieved
Ans.(2) Circuit switching 4) Frequency switching by?
(1) Bit stuffing
(2) Cyclic redundancy codes
PH MCO computer Network
C.10
for BCA
.11
(3)
Hamming codes
(1) logical link control sublayer
(2) media access control
(4) Equalization
sublayer
Bit stuffing (3) network interface control
Ans. (1)
bit is?
sublayer
mark parity,
each parity (4) none of the mentioned
Q.60.Under
Alternated
between 0 and 1 Ans. (2) media access control sublayer
(1)
(2) Always set
to 0
o.67.Header of a frame generally contains
(3) Always set to 1 (1) synchronization bytes
Not used (2) addresses
(4)
Always set to 1 (3) frame identifier
Ans. (3)
devices is a PC (4) all of the mentioned
following com
Q.61.Which of the network?Onent Ans.(4) all of the mentioned
the computer to the
that connects
(1) Bridge Q.68.Automatic repeat request error management
(2) NIC (Network Interface Card) mechanism is provided by
(3) DNS Server (1) logical link control sublayer
(4) Gateway (2) media access control sublayer
Q.75.What does MAC stands for? Q.82.In cyclic redundancy checking, what is the CRC?
(1) (1) The divisor The guotient
(2)
Memory access control
Media access control (3) The dividend The femainder he femainder
(3) Ans. (4) The remainder
Memory access communication
(4) None Q.83.In cyclic redundancy checking, the divisor is . . .
(1) checksum bit (2) error bit detection. sender to send the data again.
(3) parity bit (4) both a and (1) backward (2) retransmission
c
Ans. (4) both a and e (3) forward 4) none of the above
retransmission
Ans. (2)
[C.14] Ke mco Compurer
Network rk
[C.15]
Q.87.We can divide coding schemes into for BCA
two bro0a 9 4 . T o g u a
rantee correction of up to 5
r a n t e
errors in all
categories: .. and..coding. the minimum Hamming
(1) block; linear (2) linear; nonlinear 0ad cases,
distance in a block
must be .....
(3) block; convolution (4) none of the code
above (2) 6
Ans. (3) block; convolution (1) b
11 (4) 12
Q.88.Ir modulo-2 arithmetic, (3)
results. give the same Ans. (3) 11
(1) addition and multiplication linear block code, the of any two valid
95.In a
(2) addition and division odewords creates another valid codeword.
C
(3) addition and subtraction (1) XORing (2) ORing
(4) none of the above
(3) ANDing (4) none of the above
Ans. (3) addition and subtraction Ans.(1)XORing
Ans. (3) block; (4) none of the above one extra property. If a codeword is rotated, the
datawords result is another codeword.
Q.91.We add r
redundant bits to each block (1) Non-linear (2) Convolution
length n = k +r. The to make the
(3) Cyclic (4) none of the above
*******
resulting n-bit blocks are called Ans. (3) Cyclie
(1)datawords
(3) (2) blockwords of errors isS more difficult than
codewords (4) none of the Q.98.The
Ans. (3) codewords above the...
correction; detection (2) detection; correction
Q.92.The ... (1) creation; detection
between creation; correction (4)
differences between two words is the (3)
number o Ans. (1) correction; detection
(1)
(3)
Hamming code corresponding
(2)
bits. we u s e only the integers in
Ans. (2)
Hamming rule (4) Hamming distance Q.99.In modulo-11 arithmetic,
inclusive.
(2) 1 to 11
Q.93.To guarantee the (1) 1 to 10
(4) none of the above
cases, the minimumdetection of up (3) 0 to 10
to 5
code must be Hamming distance errors in a Ans. (3) 0 to 10
(1) 5
........
in a blocs arithmetic, w e use only . . . .
Q.101.Adding 1 and 1 in
modulo-2 KPH MCO Automatic repeat request
*****°*
arithmetic resul.for Bca (2) C.17]
(1) 1 (2) 8) Automatic retransmission
(3) 0
Ans. (3) 0
(4)
2
none of the above results im 4) Acknowledge repeat requestrequest
Ans. (2) Automatic repeat request
Q.102.In block coding, if k =
2 and o109.For Stop-and-Wait ARQ, for 10
invalid codewords. n =
3, we data packets
(1) 8 (2) 4 have
. . .
none of the
deword (2) High-level data link control
(8) Half-duplex digital link
Ans. (3)0 above (4) Host double-level circuitcombination
Q.104.The Hamming Ans. (2) High-level data link control
distance between
(1) 2
******
100 and
001
Q.111.Data link control deals with
the design
(2) is procedures for ... and
(3) 1 (4) (1) node-to-node
communication.
Ans. (1) 2 none of the
above (2) host-to-host
(3) process-to-process 4) none of the above
Q.105.In block coding, if Ans.(1) node-to-node
distance between two n =
5, the Q.112.In îraming, we need a delimiter
(1) 2
(3) 5 (2) 3 codewordsmaximum
is ... Hamming
ee****
define the boundary of two frames. (flag) to
alled
g.147.DHCCP
ethernet address.
a 32-bit IP address to a
48-0 (2)
Process-to-process
(2) It isused to Transport layer protocol
(3)
IP address. map 48-bit ethernet address
a
to a
32-0it (4) Unreliable
Unreliable
Ans.(4)
IC.24) KPH MCO o u t e rN o t w o r k
IC.25)
Q.164.In TCP, sending and receiving data for Br being transferred in each connection
is done ytes
of data
* * * * * *
Sequence of characters
(2) Fixed number
1000 bytes.
00 bytes. The first byte
The firs transferring
O is numbered file of
file
10001. aWhat ofis a 9.186.The server program tells
tells its TCP that
its TCP that it
it is ready to
the is called
sequence nunmber of the This process
sent in
only one segment? segment if all data l5 accept a
connection.
(2) Active close
(1) 10000 (1) Active open
(4) Passive open
(3) 12001 (2) 10001 Passive close
Ans.(1
C.26 KPH MCO Gomputer Network
wishes to connect to an
for BCA (4) Both
Q.187.A client that oper serv Sequence & .27
Acknowledgment Acknowledgment
needs to be connected
tells its TCP that it (2)
ns. () Acknow
s e r v e r . The process is called
ed to er 'Ans.
number number
particular
(2) Active close
that a
193.Which of the
(1)
(3)
Active open
Passive close (4) Passive open
UDP? following is false with
(1) Connection-oriented respect to
Ans. (1) Active open
(2) Unreliable
Q.188.In Three-Way Handshaking process, the (3) Transport layer
where both the TCP's issue an
active situation (4) Low overhead protocol
open is Ans. (1) Connection-oriented
(1) Mutual open (2) Mutual Close
(3) Simultaneous open (4) Simultaneous close .194.Return
(1)
value of
the UDP port
Ans. (3) Simultaneous open (2) String of characters
of String "Chargen" is ****
= UDP
(2) UDP length IP header's length
= IP length + Ans. (3) Router
UDP length
(3) UDP length + UDP header's length
UDP length
=
Q.208.Closed-Loop control mechanisms try to...
(4) IP length IP header's
-
length
Ans. (1) UDP length
=
(1) Remove after congestion occurs
used to d e t e c t e r r o r s over tha (2) Remove after sometime
Q.202.The ..field is
. .
of congestion control are receiving data from the immediate upstream node o r
Q.203.Two broad categories nodes is called as...
Open-loop and Closed-loop
(1) (1) Admission policy (2) Backpressure
Open-control and Closed-control
(2) (3) Forward signaling (4) Backward signaling
control
(3) Active control and Passive Ans. (2) Backpressure
(4) Active loop and Passive loop be
Q.210.Backpressure technique can applied only to
Ans. (1) Open-loop and Closed-loop
(4) Frame
increases
a threshold.
additively
Ans.(2) Message
(2)
(1) exponentially
(4) suddenly .220.Which one of the following is an architecture
(3) multiplicatively
new
(2) Process to process
(3) Both End to end and Process to process
(1) Message-oriented transport layer protocol (4) None of the mentioned
(2) Connectionless protocol
Ans. (1) End to end
(3) Connection oriented protocol
(4) Stream oriented protocol1 Q.223.E-mail is ...
Ans. (1) Message-oriented transport layer protocol (1) Loss-tolerant application
Q.217.Flow control in SCTP is similar (2) Bandwidth-sensitive application
to that in
(1) TCP (2) UDP (3) Elastic application
(3) SMTTP (4) None of the mentioned
(4) IP
Ans. (1) TCP Ans. (3) Elastic application
Q.218.Which is not application
a 9.224.Which of the following is an
application layer
(1) HTTP layer protocol1? service?
(2) SMTP
(3) FTP (1) Network virtual terminal
(4) TCP
Ans.(4) TCP (2) File transfer, access, and
management
Mail service
9.219.The packet (3)
of information er (4) All of the mentioned
at the
is called . . . .
application 1ay Ans. (4) All of the mentioned
C.32 KPH MCO for
message to the correct ann
BCA
rrect application Computer Network
Q.226.To deliver a
program running
be consulted.
on a host, the
.
address must
add.
Q.232.Which
mail to
one of the
following
receiver server? protocol delivers/stores
IC.33]
(1) IP (2) MAC
(1) simple mail
(2) post office transfer protocol
(3) Port (4) None of the mentioned
Ans. (3) Port (3) internet mail
protocol
access
.227.Transport services available to applications in (4)
hypertext protocol
or another form . one Ans.(1) simple mailtransfer protocol
transfer protocol
(1) Reliable data transfer Q.234.Which one of the
(2) Timing protocol for following is an internet standard
(3) Security (1) dynamic managing
host
devices on IP network?
(4) All of the mentioned (2) simple networkconfiguration protocol
Ans. (4) All of the mentioned
(8) internet management protocol
message
Q.228.Electronic mail uses which (4) media gateway access protocol
Application la- Ans. (2) simple protocol
protocol? layer network management
(1) SMTP protocol
(3) FTP
(2) HTTTP Q.235.Which one of the
following is not
(4) SIP layer protocol?
Ans. (1) SMTP
an
,application
(1) media gateway
(2) protocol
Q.229.The translates internet domain and dynamic host
configuration
reservation protocolprotocol
.........
(1) 4 (2)
(3) 5 (4) 7 Q.246.The ....... method
Ans. (3) 5 field, leaves entity when used in the
body method
(1) POST empty.
Q.240.The default connection type used by HTTp (2) SEND
(3) GET (4) PUT
Ans. (3) GET
* * *
(1) Persistent
(2) Non-persistent Q.247.The HTTP response
message
(3) Can be either persistent non-persistent requested object when..... methodleaves
or out
depending the
on connection request (1) GET is used
(2) POST
(4) None of the mentioned (3) HEAD
Ans. (1) Persistent Ans. (3) HEAD (4) PUT
Q.292.Cryptanalysis
à ery ptogTaplr Sthan
(1) shielded twisted pair cable
insecurity' in
(1) to find some (2) shielded twisted pair connectors
to the speed
(2) increase
data
(3) shielded transport pair cable
(3) to encrypt the
c1phers
(4) shielded transport pair connectors
(4) to make new
Ans. (1) shielded twisted pair cable
Ans.(1) totind some nseenrity in a cryptographic scheme
Q.293.Cryptographir hash
function 1akes an arbitrary .300.Which of the following cable are come into guided
nedia?
block of data and returns .
(1) iixei size t . sri (1) coaxial cable (2) twisted pair cable
(2) va!iable 1 b1! sLig (3) fiber optic cable (4) all of the above
(3) both ixe d size bit string and variable size bit string Ans.(4) all of the above
4) varnabie sized byte string
Q.301.Which of the following cable doesn't come into
Ans.() tixed siz it strng
guided media?
.294.Guided media is also known as (1) coaxial cable (2) twisted pair cable
(1) Bound Media (2 Guded Media (3) fiber optic cable (4) microwave
(3) ngujded Media (4) None of the Abuve Ans. (4) microwave
Ans.(1) Bound Media
Q.302.Which of the following waves come into unguided
Q.295.How many forms in twisted pair cable? media?
(1) 2 (2) 4 (1) Microwave (2) Infraredwave
(3)3 (4) none (3) Radio Wave (4) All of the above
Ans. (1)2 Ans.(4) All of the above
Q.296.UTP stands for... Q.303.Which of the following waves do not come into
(1) Unshielded tr: nsport pair cable unguided media?
(2) Unshielded tv isted (1) Microwave
pair cable (2) Infraredwave
(3) Unshielded. ansmission
pair cable (3) Radiowave (4) Laser
(4) Unshielded twisted
Ans. (2) Unshielded pair control Ans.(4) Laser
twisted pair cable
Q.304.What is the frequency range of the coaxial cable?
Q.297.What is the frequeney
(0) 100iz range of UTP cable? (1) 100KHz to 500MHz
5MHz
to
(2) 100MHz to (2) 100MHz to 500MHz
5MHz
(3) 100Hz to oHz (3) 1000KHz to 500MHz
(4) 1000Hz. to 5MHz (4) 10MHz to 50MHz
Ans. (1) 100H2 to 5MHz Ans.(1) 100KHz to 500MH
KPH MCQ for BCA computerNetwork
C.44
of coaxial
cable ? Explanation LCP stands for Link [C.45)
Q.305.How m a n y
types
NCP stands for Network Control Protocol
(1)2
(2) 3
the PPP Control Protocol. LCP and and
(4) 5
are
protocols which provide interface for NCP
(3) the capabilities of the connection/link on the handling
Ans.(1) network.
following a r e
coaxial cable layers Q.313.The PPP protocol
Q.306.Which of the (1) Is designed for
thinnet (2) thicknet simple links which transport
(1) packets
(4) A and B both between two peers
(3) copper
(2) 1s
A and B both one of the protocols
for making an Internet
Ans. (4)
meterS. connection phone line
over a
Q.307.Thicknet can carry signal for (3) Is designed for
500m
(2) 1000m simple links which transport packets
(1) 200m
between two peers and making an Internet
(3) 100m (4) connection
500m
phone line
over a
Ans.(1) (4) Is used for sharing bandwidth
Q.308.How many connectors
used for coaxial cable ? Ans.(3) Is designed for
simple links which transport packets
(1) 3 (2) 5 between two peers and making an Internet
(3) 4 (4) 2 connection phone line
over a
protocols.
(1) True (2) False
Ans. (2) False
Q.316.Information bearing channels in ISDN are called