Download as pdf
Download as pdf
You are on page 1of 12
Computer Networks Questions ee S ere ae: Rae lta) Cae aR coca Start Complete Exam Preparation ca Pr eOT faced maa Diener Coreen poems Download App MCQ Question 1 View this Question Online > Which among the following network topologies has the highest transmission speed? A) LAN B) WAN C) MAN D) Both LAN and WAN have equal transmission speeds. Answer (Detailed Solution Below) Option 1: Computer Networks MCQ Question 1 Detailed Solution Option 1 is the correct Bnswer: Local Area Network (LAN) has the highest transmission speed. Network ype Features + The coverage area may be limited to a room or a building or a group of buildings. + For eg.: Devices at your home Local Area or office connected to each Network other or with @ common (LAN) router. + Connections can be established either through Ethernet cables ot radio waves. + It interconnects the computers/users located ina . bigger geographical area as Nessa compared to 4 LAN. + For eg.: A chain of emergency (MAN) . tesponse teams across a big city. + It covers the largest area as Wide Area compared to LAN and MAN. It Network can cover the whole country. (WAN) + The Internet is the best example of WAN Ld India’s #1 Learning Platform Start Complete Exam Preparation Reece poets Es rea eees Download App MCQ Question 2 View this Question Online > IPv6 addresses have a size of: 1. 64 bits 2. 128 bits 3. 256 bits 4. 512bits Answer (Detailed Solution Below) Option 2: 128 bits Computer Networks MCQ Question 2 Detailed Solution ‘The correct answer is option 2 i.e 128 bits. * AnIPV6 address has a size of 128 bits. ~ Internet Protocol version 6 (IPv6) is the most recent version of the Intemet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. + IPV6 was developed by the Internet Engineering Task Force (IETF) to deal with the long- anticipated problem of |Pv4 address exhaustion. + IPv6 is intended to replace IPv4. + 1 Bytes is equal to 8 bit IPv6 Base Header — 4Byte payload length (16) limit — 4 Byte (8) | 8) ‘source IP address (128) —16Byte destination IP address (128) —>16Byte & & Geers ane Rae oita) PS Ela Orel Mee Ll) eee Me oo Coreen Exerie2? cal POT Practice Le) App MCQ Question 3 View this Question Online > A program that provides software interface to hardware devices is called 1. System Software 2. Application Software 3. Device Drivers 4. Allof the Above Answer (Detailed Solution Below) Option 3 : Device Drivers Computer Networks MCQ Question 3 Detailed Solution In computing, a device driver (commonly referred to simply as a driver) is a computer program that operates or controls a particular type of device that is attached to a computer. A driver provides a software interface to hardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details of the hardware being used. Deane Roe) PS Ela Orel Mee Ll) PROT feed erat) CO caer Coreen Exons Download App MCQ Question 4 What is the full form of 'LAN'? 1. Line Area Network 2. Linear Area Network 3. Local Area Network 4, Land Area Network Answer (Detailed Solution Below) Option 3: Local Area Network Re aR cess View this Question Online > Computer Networks MCQ Question 4 Detailed Solution The correct answer is Local Area Network (LAN): # \mportant Points + itis a computer network within a small geographical erea. + ALANis composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN Deane Roe) PS Ela Orel Mee Ll) PROT feed erat) CO caer Coreen Exons Download App MCQ Question 5 Acomputer virus is a 1. Hardware 2. Software 3. Bacteria 4. Freeware Answer (Detailed Solution Below) Option 2: Software Re aR cess View this Question Online > Computer Networks MCQ Question 5 Detailed Solution The correct answer is Software. + Acomputer virus is a malicious software that, when executed replicates itself by modifying other ‘computer programs. + The full form of VIRUS is Vital Information Resources Under Seize because they replicate and multiply and use up computer memory processing power with fake repetitive commands. It causes the system to become slow and keeps hanging. & & Geers ane Rae oita) PS Ela Orel Mee Ll) eee cal POT Practice Le) Me oo Coreen Exerie2? App MCQ Question 6 View this Question Online > What is a Modem? 1. Transistor 2. Vacuum tube 3. Modulating and d \odulating device 4. None of these Answer (Detailed Solution Below) Option 3 : Modulating and demodulating device Computer Networks MCQ Question 6 Detailed Solution Amodem (modulator-demodulator) is a network hardware device that modulates one or more carrier wave signals to encode digital information for transmission and demodulates signals to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. & & Geers ane Rae oita) PS Ela Orel Mee Ll) Re aR cess cal POT Practice erate) CO caer Coreen Exerie2? App MCQ Question 7 View this Question Online > Which of the following statements is true for network hub? 1. Ahub connects different stations in a private network. 2. it sends data packets to the intended recipient 3. It contains two ports: one for input and other for output. 4, Itworks atthe network layer. Answer (Detailed Solution Below) Option 1 : Ahub connects different stations in a private network. Computer Networks MCQ Question 7 Detailed Solution Anetwork hub is hardware device for connecting multigle devices together and making them act as a single private network segment. Ithas multiple input/output ((/0) ports, in which a signal introduced at the input of eny port appears at the output of every port except the original incoming. A hub works at the physical layer (layer 1) of the OSI model. Pg Deane Roe) PS Ela Orel Mee Ll) Re aR cess PROT feed Nas CO caer Coreen Exons Download App MCQ Question 8 View this Question Online > Who is known by the name of crackers in the context of computer security? 1. Black Hat Hackers 2. White Hat Hackers 3. Elite Hackers 4. Script Kiddie Answer (Detailed Solution Below) Option 1 : Black Hat Hackers Computer Networks MCQ Question 8 Detailed Solution The correct answer is Black Hat Hackers. ©; Additional Information + A Black Hat Hacker or Cracker is 2 hacker who attempts to access a computer without authorization for malicious purpose + A White Hat Hacker or Hacker is a person who used his skill to find loopholes and vulnerabilities of a system and patch those vulnerabilities and enhance robustness and security. + Elite hackers are called to the most skilled hackers. + Script kiddies are unskilled persons Who uses other's programs, scripts to attack any system or computer network. 5a & Geers ane Rae oita) PS Ela Orel Mee Ll) Re aR cess PROT feed Nas CO caer Coreen Exons MCQ Question 9 View this Question Online > The length of IPv6is 1. 64 bits 2. 12 bits 3. 128bits 4, 32 bits Answer (Detailed Solution Below) Option 3: 128 bits Computer Networks MCQ Question 9 Detailed Solution ‘The correct answer is 128 bits. © Key Points + The length of IPV6 is 128 bits. + Internet Protocol version 6 (iPv6) is the latest IP revision, developed as a successor to IPv4 * IPV6 provides a much larger address pool so that many more devices can be connected to the Internet. + Italso improves addressing and routing of network traffic. + The IPv6 anatomy graphic below represents just one possible configuration of an IPv6 address, although there are many different possibilities. 2001:0DB8:4545:0003:0200:F8FF:FE21:67CF et ROUTINGPREFIX SUBNET ID INTERFACE 1D v6 Anatomy ©; Additional Information + Abitis a binary digit, the smallest increment of data on a computer. A bit can hold only one of two values: Oor 1. + Bits are usually essembled into a group of eight to form a byte. 1 byte = 8 bits 1 kilobyte = 1024 bytes 4 megabyte = 1024 kilobyte 1 gigabyte = 1024 megabyte 1 terabyte = 1024 gigabyte & PS eee een Start Complete Exam Preparation PROT eae (= esa DC iene Coteau Download App exotic MCQ Question 0 View this Question Online > The domain name int in the Domain Name System (DNS) is used in 1. commercial 2. educational institutions » . international organizations 4, the U.S. armed forces Answer (Detailed Solution Below) Option 3 : intermational organizations Computer Networks MCQ Question 10 Detailed Solution The correct answer is international organizations. * The domain name fnt in the Domain Name System (DNS) is used in international organizations. ©; Additional Information Domains Area com commercial edu educational institutions int international organizations mil the U.S. armed forces

You might also like