Computer Network Multiple Choice Questions and Answers pdf – The article contains collections of multiple choice questions which is suitable for Bsc IT, BscCSIT, BIT, Computer Engineering, IT Officer, Computer Operator, BCA etc.
Computer Network Multiple Choice Questions and Answers pdf
1. Multiplexer means
a. One into many
b. Many into one —
c. Many into many
d. All of these
e. None of these
2. Repeater function in the layer _______________
a. Physical —
b. Data link
c. Network
d. Both a and b
e. None of these
3. OSI Model consists of _________________ layers.
a. Three
b. Seven —
c. Five
d. Eight
e. Twelve
4. Which data communication method is used to transmit the data over a serial communication link?
a. Simplex
b. Full Duplex —
c. Half Duplex
d. Both a and b
e. Both b and c
5. Encryption and Decryption are functions of the ___________________ layer.
a. Transport
b. Session
c. Application
d. Physical
e. Presentation —
6. Which of the following is not a connecting device?
a. Bridge
b. Trans Receiver —
c. Router
d. Repeater
e. None
7. HTTP refers to
a. Hide Text Typing Program
b. Hyperlink Text Testing Protocol
c. Hyper Text Transmission Program
d. Hyper Text Transfer Protocol —
e. Hyperlink Text Transfer Protocol
8. Open standards refer to
a. Standards not owned by any company. —
b. Standards used by all countries.
c. Standards that are free to all parties.
d. Software standards for particular organization.
e. Software programs running on different types of operating system.
9. FTP stands for
a. File Transmission Protocol
b. File Transfer Protocol –
c. First Transfer Protocol
d. File Transmission Process
e. Folder Transfer Program
10. TCP stands for
a. Transmission Control Protocol —
b. Transfer Connection Program
c. Transaction Computing Process
d. Transmission Computing and Printing
e. Transmission Controlling Protocol
11. IP Stands for
a. Internet Protocol —
b. International Program
c. International Procedures
d. Internet Performance
e. Internet Program
12. The addresses changes temporarily as the application connect to the internet ______________.
a. Static IP Address
b. Dynamic IP Address —
c. Unique IP Address
d. Derived IP Address
e. New IP Address
13. URL Stands for
a. Universal Resource Location
b. Uniform Resource Locator —
c. Unique Resources Locator
d. Unique Representation Location
e. United Resource Locator
14. ____________ allows the use of an internet connection for making phone calls.
a. VOIP —
b. DSL
c. FTP
d. TCP/IP
e. URL
15. The scrambling of code known as __________________
a. Password proofing
b. Deception
c. Scrambling
d. Encryption —
e. Decryption
16. The formal set of rules through which computers communicate are called
a. Protocols —
b. Patterns
c. Algorithms
d. Standards
e. Controller
17. A _______________ is a computer connected to two networks.
a. Bridgeway
b. Server
c. Link
d. Gateway —
e. Modem
18. Loopback address is _____________
a. 127.0.0.1 —
b. 127.1.1.0
c. 127.1.0.1
d. 127.1.1.1
e. 127.0.0.0
19. 190.255.254.254 falls under which class of lan
a. A
b. B —
c. C
d. D
e. E
20. How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host?
a. 16 Bits
b. 32 Bits —
c. 64 Bits
d. 48 Bits
e. None of the above
21. Error detection and control is the function of which layer in OSI Model?
a. Physical Layer
b. Data Link Layer —
c. Application Layer
d. Transport Layer
e. Network Layer
22. End-to-End connection is provided from host-to-host in:
a. Transport Layer –
b. Data Link Layer
c. Session Layer
d. Presentation Layer
e. Application Layer
23. To deliver message to the correct application program running on a host, the ____________ address must be consulted.
a. Physical
b. IP
c. Port —
d. DNS
e. Local
24. Packets are related to which layer?
a. Physical Layer
b. Network Layer —
c. Data Link Layer
d. Presentation Layer
e. None of the above
25. Another name for VPN is
a. Tunnel —
b. Pipeline
c. Switch
d. Bypass
e. One-Time Password
26. Hardware and software placed between an organization’s internal network and an external network to prevent outsiders from invading private networks best describes:
a. Intruder Detection System
b. Cyber Checkpoint
c. Firewall –
d. Electronic Barrier
e. Cyberwall
27. Bridge operate at _________ of OSI Model.
a. Data Link —
b. Network
c. Transport
d. Physical
e. Application
28. This is a standard for a security that is located at the network communications, as opposed to the application layer.
a. SSL
b. TCP
c. URL
d. HTTP
e. IPSec –
29. A communications medium where data are transformed into pulses of light would be a(n):
a. Twisted Pair Cable
b. Satellite
c. Coaxial Cable
d. Optical Fiber —
e. Both a and c
30. A network covering a large Geographic area is usually referred to as
a. Huge Area Network
b. Wide Area Network —
c. Metropolitan Area Network
d. Local Area Network
e. Intranet
31. Frame Relay
a. Does not use error correction routines. —
b. Is used by facsimile machines.
c. Uses error correction routines.
d. Does not work well on the internet.
e. None of the above.
32. Every Host computer on the internet has a(n)
a. Similar IP Address
b. Unique 10-Digit Number
c. Unique IP Address —
d. Common Name and Number
e. Unique 15-Digit Number
33. Which of the following can help to detect transmission errors by opening specially calculated bits into the each segment of data?
a. Parity Check
b. Redundancy Check —
c. Integrity Check
34. What is the technical name of wireless network?
a. SSID —
b. SSO
c. WPAD
d. BSSID
e. WPA
35. If you are connected to the internal network, what should you check if you cannot connect to with servers on the internet?
a. Administrative Rights
b. NTFS Permission
c. Browser Settings
d. Proxy Setting —
e. UAC
36. Which OSI layer define the standards for cabling and connectors?
a. Layer 5, 6, 7
b. 2
c. 1 —
d. 3
37. Which of the following provide Network Redundancy in Local Network environment?
a. Shadowing
b. Mirroring
c. Mirroring and Shadowing
d. Duplexing
e. Dual Backbone —
38. On point-to-point network OSPF hello packets are addressed to which address:
a. 127.0.0.1
b. 127.16.0.1
c. 224.0.0.5 —
d. 192.168.0.5
e. 224.255.255.255
39. CIDR, a method of allocating IP address stands for?
a. Classless Inter-Domain Routing —
b. Classful IP Address
40. A Byte consists of
a. 8 Bits —
b. 10 Bits
c. 12 Bits
d. 24 Bits
e. 36 Bits
You May Like
- Add Messenger Chatbox in your website
- How to make auto reply in Facebook page
- What is client server computer?
- What is DNS record?