Computer Network Multiple Choice Questions and Answers pdf

0
106

Computer Network Multiple Choice Questions and Answers pdf – The article contains collections of multiple choice questions which is suitable for Bsc IT, BscCSIT, BIT, Computer Engineering, IT Officer, Computer Operator, BCA etc.

Computer Network Multiple Choice Questions and Answers pdf

Computer Network Multiple Choice Questions and Answers pdf

Table of Contents

1.  Multiplexer means

a.   One into many

b.  Many into one —

c.   Many into many

d.  All of these

e.   None of these

2.  Repeater function in the layer _______________

a.   Physical —

b.  Data link

c.   Network

d.   Both a and b

e.  None of these

3.  OSI Model consists of _________________ layers.

a.   Three

b.  Seven —

c.   Five

d.  Eight

e.   Twelve

4.  Which data communication method is used to transmit the data over a serial communication link?

a.   Simplex

b.  Full Duplex —

c.   Half Duplex

d.  Both a and b

e.   Both b and c  

5.  Encryption and Decryption are functions of the ­­­­­­­­­­­­­___________________ layer.

a.   Transport

b.  Session

c.   Application

d.  Physical

e.   Presentation —

6.  Which of the following is not a connecting device?

a.   Bridge

b.  Trans Receiver —

c.   Router

d.  Repeater

e.   None

7.  HTTP refers to

a.   Hide Text Typing Program

b.  Hyperlink Text Testing Protocol

c.   Hyper Text Transmission Program

d.  Hyper Text Transfer Protocol —

e.   Hyperlink Text Transfer Protocol

8.  Open standards refer to

a.   Standards not owned by any company. —

b.  Standards used by all countries.

c.   Standards that are free to all parties.

d.  Software standards for particular organization.

e.   Software programs running on different types of operating system.

9.  FTP stands for

a.   File Transmission Protocol

b.  File Transfer Protocol –

c.   First Transfer Protocol

d.  File Transmission Process

e.   Folder Transfer Program

10.  TCP stands for

a.   Transmission Control Protocol —

b.  Transfer Connection Program

c.   Transaction Computing Process

d.  Transmission Computing and Printing

e.   Transmission Controlling Protocol

11.  IP Stands for

a.   Internet Protocol —

b.  International Program

c.   International Procedures

d.  Internet Performance

e.   Internet Program

12.  The addresses changes temporarily as the application connect to the internet ______________.

a.   Static IP Address

b.  Dynamic IP Address —

c.   Unique IP Address

d.  Derived IP Address

e.   New IP Address

13.  URL Stands for

a.   Universal Resource Location

b.  Uniform Resource Locator —

c.   Unique Resources Locator

d.  Unique Representation Location

e.   United Resource Locator

14.  ____________ allows the use of an internet connection for making phone calls.

a.   VOIP —

b.  DSL

c.   FTP

d.  TCP/IP

e.   URL

15.  The scrambling of code known as __________________

a.   Password proofing

b.  Deception

c.   Scrambling

d.  Encryption —

e.   Decryption

16.  The formal set of rules through which computers communicate are called

a.   Protocols —

b.  Patterns

c.   Algorithms

d.  Standards

e.   Controller

17.  A _______________ is a computer connected to two networks.

a.   Bridgeway

b.  Server

c.   Link

d.  Gateway —

e.   Modem

18.  Loopback address is _____________

a.   127.0.0.1 —

b.  127.1.1.0

c.   127.1.0.1

d.  127.1.1.1

e.   127.0.0.0

19.  190.255.254.254 falls under which class of lan

a.   A

b.  B —

c.   C

d.  D

e.   E

20.  How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host?

a.   16 Bits

b.  32 Bits —

c.   64 Bits

d.  48 Bits

e.   None of the above

21.  Error detection and control is the function of which layer in OSI Model?

a.   Physical Layer

b.  Data Link Layer —

c.   Application Layer

d.  Transport Layer

e.   Network Layer

22.  End-to-End connection is provided from host-to-host in:

a.   Transport Layer –

b.  Data Link Layer

c.   Session Layer

d.  Presentation Layer

e.   Application Layer

23.  To deliver message to the correct application program running on a host, the ____________ address must be consulted.

a.   Physical

b.  IP

c.   Port —

d.  DNS

e.   Local

24.  Packets are related to which layer?

a.   Physical Layer

b.  Network Layer —

c.   Data Link Layer

d.  Presentation Layer

e.   None of the above

25.  Another name for VPN is

a.   Tunnel —

b.  Pipeline

c.   Switch

d.  Bypass

e.   One-Time Password

26.  Hardware and software placed between an organization’s internal network and an external network to prevent outsiders from invading private networks best describes:

a.   Intruder Detection System

b.  Cyber Checkpoint

c.   Firewall –

d.  Electronic Barrier

e.   Cyberwall

27.  Bridge operate at _________ of OSI Model.

a.   Data Link —

b.  Network

c.   Transport

d.  Physical

e.   Application

28.  This is a standard for a security that is located at the network communications, as opposed to the application layer.

a.   SSL

b.  TCP

c.   URL

d.  HTTP

e.   IPSec –

29.  A communications medium where data are transformed into pulses of light would be a(n):

a.   Twisted Pair Cable

b.  Satellite

c.   Coaxial Cable

d.  Optical Fiber —

e.   Both a and c

30.  A network covering a large Geographic area is usually referred to as

a.   Huge Area Network

b.  Wide Area Network —

c.   Metropolitan Area Network

d.  Local Area Network

e.   Intranet

31.  Frame Relay

a.   Does not use error correction routines. —

b.  Is used by facsimile machines.

c.   Uses error correction routines.

d.  Does not work well on the internet.

e.   None of the above.

32.  Every Host computer on the internet has a(n)

a.   Similar IP Address

b.  Unique 10-Digit Number

c.   Unique IP Address —

d.  Common Name and Number

e.   Unique 15-Digit Number

33.  Which of the following can help to detect transmission errors by opening specially calculated bits into the each segment of data?

a.   Parity Check

b.  Redundancy Check —

c.   Integrity Check

34.  What is the technical name of wireless network?

a.   SSID —

b.  SSO

c.   WPAD

d.  BSSID

e.   WPA

35.  If you are connected to the internal network, what should you check if you cannot connect to with servers on the internet?

a.   Administrative Rights

b.  NTFS Permission

c.   Browser Settings

d.  Proxy Setting —

e.   UAC

36.  Which OSI layer define the standards for cabling and connectors?

a.   Layer 5, 6, 7

b.  2

c.   1 —

d.  3

37.  Which of the following provide Network Redundancy in Local Network environment?

a.   Shadowing

b.  Mirroring

c.   Mirroring and Shadowing

d.  Duplexing

e.   Dual Backbone —

38.  On point-to-point network OSPF hello packets are addressed to which address:

a.   127.0.0.1

b.  127.16.0.1

c.   224.0.0.5 —

d.  192.168.0.5

e.   224.255.255.255

39.  CIDR, a method of allocating IP address stands for?

a.   Classless Inter-Domain Routing —

b.  Classful IP Address

40.  A Byte consists of

a.   8 Bits —

b.  10 Bits

c.   12 Bits

d.  24 Bits

e.   36 Bits

You May Like

LEAVE A REPLY

Please enter your comment!
Please enter your name here