Computer Science - Networking MCQs Part 5

1. In a synchronous modem, the receive equalizer is known as

A.
adaptive equalizer
B.
impairment equalizer
C.
statistical equalizer
D.
compromise equalizer
E.
None of the above

 Answer Option A

2. Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so?

A.
Server-based
B.
Token-Ring
C.
Ethernet
D.
Star
E.
Peer-to-peer

 Answer Option A

3. Now-a-days computers all over the world can talk to each other. Which is one of the special accessories essential for this purpose?

A.
Keyboard
B.
Modem
C.
Scanner
D.
Fax
E.
None of the above

 Answer Option B

4. To make possible the efficient on-line servicing of many teleprocessing system users on large computer systems, designers are developing

A.
communication systems
B.
multiprogramming systems
C.
virtual storage systems
D.
All of the above
E.
None of the above

 Answer Option D

5. Which of the following best describes the scopes on each DHCP server, in the absence of configuration problems with DHCP addresses, if you use multiple DHCP servers in your environment?

A.
Unique to that subnet only
B.
For different subnets
C.
For no more than two subnets
D.
For no subnets
E.
None of the above

 Answer Option B

6. The main difference between TCP and UDP is

A. UDP is connection oriented where as TCP is datagram service
B. TCP is an Internet protocol where as UDP is an ATM protocol
C. UDP is a datagram where as TCP is a connection oriented service
D. All of the above

 Answer Option C

7. What operates in the Data Link and the Network layer?

A. NIC
B. Bridge
C. Brouter
D. Router
E. None of the above

 Answer Option C

8. What is the name of the computer based EMMS that provides a common forum where users can check in at their convenience, post messages, actively exchange ideas and participate in ongoing discussions?

A. E-mail
B. Bulletin board system (BBS)
C. Teleconferencing
D. Videoconferencing
E. None of the above

 Answer Option B

9. Which of the following statement is incorrect?

A. The CCITT Recommendation X.25 specifies three layers of communication: physical, link and network.
B. The second layer of communication is the data-link layer
C. Errors in the physical layer can be detected by the data link layer
D. The fourth layer, in reference to the OSI model, is the session layer
E. None of the above

 Answer Option D

10. Devices on one network can communicate with devices on another network via a

A. file server
B. utility server
C. printer server
D. gateway
E. None of the above

 Answer Option D

11. After coding a document into a digital signal, it can be sent by telephone, telex or satellite to the receiver where the signal is decoded and an exact copy of the original document is made. What is it called?

A. Telex
B. Word processor
C. Facsimile
D. Electronic mail
E. None of the above

 Answer Option C

12. Which file transfer protocol uses UDP?

A. NFS
B. TELNET
C. TFTP
D. FTP
E. None of the above

 Answer Option C

13. You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use?

A. 255.255.255.0
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252

 Answer Option B

14. A network designer wants to connect 5 routers as point-to-point simplex line. Then the total number of lines required would be

A. 5
B. 10
C. 20
D. 32
E. None of the above

 Answer Option B

15. Which of the following medium access control technique is used for bus/tree?

A. token ring
B. token bus
C. CSMA
D. MAC
E. None of the above

 Answer Option B

16. A distributed data processing configuration in which all activities must pass through a centrally located computer is called a:

A. ring network
B. spider network
C. hierarchical network
D. data control network
E. None of the above

 Answer Option B

17. The size or magnitude of a voltage or current waveform is

A. Amplitude
B. Aloha
C. Angle Modulation
D. Attenuation
E. None of the above

 Answer Option A

18. Which of the following network access standard is used for connecting stations to a circuit-switched network?

A. X.3
B. X.21
C. X.25
D. X.75
E. None of the above

 Answer Option B

19. Which of the following is not a transmission medium?

A. telephone lines
B. coaxial cable
C. modem
D. microwave systems
E. satellite systems

 Answer Option C

20. Which of the following statement is incorrect?

A. Gateways are assumed to know correct routes; hosts begin with minimal routing information and learn new routes from gateways.
B. Layered protocols are designed so that layer n at the destination receives exactly the same object sent by layer n at the source.
C. Application programs as well as all protocol software from the Internet layer upward use only IP addresses; the network interface layer handles physical addresses.
D. All of the above
E. None of the above

 Answer Option D

21. A batch processing terminal would not include a

A. CPU
B. card reader
C. card punch
D. line printer
E. None of the above

 Answer Option A

22. Packet Switch Stream (PSS) was introduced in

A. the US in 1961 (&) the UK in 1981
B. the UK in 1980
C. the US in 1961
D. None of the above

 Answer Option B

23. The physical layer of a network

A. defines the electrical characteristics of signals passed between the computer and communication devices
B. controls error detection and correction
C. constructs packets of data and sends them across the network
D. All of the above
E. None of the above

 Answer Option A

24. Which of the following allows devices on one network to communicate with devices on another network?

A. multiplexer
B. gateway
C. t-switch
D. modern
E. None of the above

 Answer Option B

25. An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as

A. Cyclic redundancy check
B. Checksum
C. Error detecting code
D. Error rate
E. None of the above

 Answer Option A

26. Bulletin board system

A. is a public access message system
B. is a modem capable of accepting commands
C. converts analog signals to digital signals
D. converts digital signals to analog signals
E. None of the above

 Answer Option A

27. In OSI model, which of the following layer provides error-free delivery of data?

A. Data link
B. Network
C. transport
D. Session
E. None of the above

 Answer Option C

28. Error detection at the data link level is achieved by?

A. Bit stuffing
B. Hamming codes
C. Cyclic Redundancy codes
D. Equalization
E. None of the above

 Answer Option C

29. The area of coverage of a satellite radio beam is known as

A. Footprint
B. Circular polarization
C. Beam width
D. Identity
E. None of the above

 Answer Option A

30. Which of the following data transmission media has the largest terrestrial range without the use of repeaters or other devices?

A. Hardwiring
B. Microwave
C. Satellite
D. Laser
E. None of the above

 Answer Option C

31. What is the minimum number of wires needed to send data over a serial communication link layer?

A. 1
B. 2
C. 4
D. 6
E. none of the above

 Answer Option B

32. The _____ layer is the layer closest to the transmission medium.

A. transport
B. network
C. data link
D. physical
E. None of the above

 Answer Option D

33. What is the name of the device that connects two computers by means of a telephone line?

A. Tape
B. modem
C. bus
D. cable
E. None of the above

 Answer Option B

34. What is the main difference between DDCMP and SDLG?

A. DDCMP does not need special hardware to final the beginning of a message.
B. DDCMP has a message header
C. SDLC has a IP address
D. SDLC does not use CRC
E. None of the above

 Answer Option A

35. On a class B network, how many subnets are available with a subnet mask of 248?

A. 2
B. 6
C. 30
D. 62
E. 126

 Answer Option C

36. Ethernet networks can be cabled in a number of topologies, depending on what works best in each environment. As more nodes are added, the efficiency of Ethernet decreases. Select the best answer as to why Ethernet becomes less efficient as size increases.

A. Network collisions occur
B. Repeaters cannot increase the signal strength sufficiently
C. Cable terminators do not reflect the signal properly
D. Cable terminators do not absorb the signal properly
E. "Line echo" occurs due to the impedance of the cable

 Answer Option A

37. In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables.

A. ring
B. bus
C. star
D. mesh
E. None of the above

 Answer Option D

38. Typewriter terminals can print computer-generated data at a rate of

A. 10 characters per second
B. 120 characters per second
C. 120 characters per minute
D. 1200 characters per minute
E. None of the above

 Answer Option B

39. To avoid transmission errors, a check figure is calculated by the

A. transmitting computer
B. receiving computer
C. both (a) and (b)
D. Start and stop bit
E. None of the above

 Answer Option C

40. What is the first octet range for a class A IP address?

A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
E. 128 - 191

 Answer Option A

41. Which of the following is not a standard synchronous communication protocol?

A. SDLC
B. SMTP
C. SLIP
D. PAS
E. None of the above

 Answer Option D

42. The network layer, in reference to the OSI model, provide

A. data link procedures that provide for the exchange of data via frames that can be sent and received
B. the interface between the X.25 network and packet mode device
C. the virtual circuit interface to packet-switched service
D. All of the above
E. None of the above

 Answer Option C

43. In OSI network architecture, the routing is performed by

A. network layer
B. data link layer
C. transport layer
D. session layer
E. None of the above

 Answer Option A

44. Which of the following communications lines is best suited to interactive processing applications?

A. narrowband channels
B. simplex lines
C. full-duplex lines
D. mixed band channels
E. None of the above

 Answer Option C

45. What is the first octet range for a class B IP address?

A. 128 - 255
B. 1 - 127
C. 192 - 223
D. 128 - 191
E. 127 - 191

 Answer Option D

46. The 32-bit internet address 10000000 00001010 00000010 00011110 will be written in dotted decimal notation as

A. 148.20.2.30
B. 164.100.9.61
C. 210.20.2.64
D. 128.10.2.30
E. None of the above

 Answer Option D

47. Which of the following items is not used in Local Area Networks (LANs)?

A. Computer
B. Modem
C. Printer
D. Cable
E. None of the above

 Answer Option B

48. Error detection at a data link level is achieved by

A. bit stuffing
B. cyclic redundancy codes
C. Hamming codes
D. equalization
E. None of the above

 Answer Option B

49. RS-232-G

A. is an interface between two data circuit terminating equipment as examplified by a local and remote modem
B. is an interface standard between Data terminal Equipment and Data Circuit Terminating Equipment
C. specifies only the mechanical characteristics of an interface by providing a 25-pin connector
D. requires only 7 pin out of 25 in order to transmit digital data over public telephone lines
E. None of the above

 Answer Option B

50. A subdivision of main storage created by operational software is referred to as a:

A. compartment
B. time-shared program
C. divided core
D. partition
E. None of the above

 Answer Option D

Comments

Most Popular

PhpStorm, return value is expected to be 'A', 'object' returned

Remove Unicode Zero Width Space PHP

Laravel file upload returns forbidden 403, file permission is 700 not 755