Computer Science - Networking MCQs Part 6

1. RS-449/442-A/423-A is

A.
a set of physical layer standards developed by EIA and intended to replace RS-232-C.
B.
a check bit appended to an array of binary digits to make the sum of the all the binary digits
C.
a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected
D.
the ratio of the number of data units in error to the total number of data units
E.
None of the above

 Answer Option A

2. Which of the following digits are known as the area code of the Network User Address (NUA)?

A.
5-7
B.
1-4
C.
8-12
D.
13-14
E.
None of the above

 Answer Option A

3. End-to-end connectivity is provided from host-to-host in:

A.
Network layer
B.
Session layer
C.
Data link layer
D.
Transport layer
E.
None of the above

 Answer Option D

4. A form of modulation In which the amplitude of a carrier wave is varied in accordance with some characteristic of the modulating signal, is known as

A.
Aloha
B.
Angle modulation
C.
Amplitude modulation
D.
modem
E.
None of the above

 Answer Option C

5. CSMA (Carrier Sense Multiple Access) is

A.
a method of determining which device has access to the transmission medium at any time
B.
a method access control technique for multiple-access transmission media.
C.
a very common bit-oriented data link protocol issued by ISO.
D.
network access standard for connecting stations to a circuit-switched network
E.
None of the above

 Answer Option B

6. Which of the following summation operation is performed on the bits to check an error-detecting code?

A. Codec
B. Coder-decoder
C. Checksum
D. Attenuation
E. None of the above

 Answer Option C

7. The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.

A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor

 Answer Option A

8. Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?

A. Linear bus
B. Modified star
C. Modified ring
D. Ring
E. Hybrid hub

 Answer Option D

9. A communications device that combines transmissions from several 1/ O devices into one line is a:

A. concentrator
B. modifier
C. multiplexer
D. full-duplex line
E. None of the above

 Answer Option C

10. The main difference between synchronous and asynchronous transmission is

A. the clocking is derived from the data in synchronous transmission
B. the clocking is mixed with the data in asynchronous transmission
C. the pulse height is different.
D. the bandwidth required is different
E. None of the above

 Answer Option A

11. ARP (Address Resolution Protocol) is

A. a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address
B. a TCP/IP high level protocol for transferring files from one machine to another
C. a protocol used to monitor computers
D. a protocol that handles error and control messages
E. None of the above

 Answer Option A

12. Which of the following uses network address translation?

A. Routers
B. Network adapter drivers
C. Hubs
D. Windows 95

 Answer Option B

13. The X.25 standard specifies a

A. technique for start-stop data
B. technique for dial access
C. DTE/DCE interface
D. data bit rate
E. None of the above

 Answer Option C

14. The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer.

A. Duplicate addresses
B. Duplicate pools
C. Duplicate subnets
D. Duplicate default gateways
E. None of the above

 Answer Option A

15. When a group of computers is connected together in a small area without the help of telephone lines, it is called

A. Remote communication network (RCN)
B. Local area network(LAN)
C. Wide area network (WAN)
D. Value added network (VAN)
E. None of the above

 Answer Option B

16. The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?

A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
E. Switched repeaters

 Answer Option B

17. A communication network which is used by large organizations over regional, national or global area is called

A. LAN
B. WAN
C. MAN
D. Intranet
E. None of the above

 Answer Option B

18. Information systems with common hardware, software, and network standards that provide easy access for end users and their networked computer systems. Select the best fit for answer:

A. TCP/IP
B. Protocol
C. Open Systems
D. Internetwork processor

 Answer Option C

19. Which of the following TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?

A. RARP
B. FTP
C. TFTP
D. TELNET
E. None of the above

 Answer Option C

20. Terminals are required for

A. realtime, batch processing, and timesharing
B. realtime, timesharing, and distributed processing
C. realtime, distributed processing, and manager inquiry
D. realtime, timesharing, and message switching
E. None of the above

 Answer Option D

21. Sending a file from your personal computer's primary memory or disk to another computer is called

A. uploading
B. downloading
C. logging on
D. hang on

 Answer Option A

22. Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called?

A. Telemeeting
B. Telemailing
C. Teleconferencing
D. Teletalking
E. None of the above

 Answer Option C

23. What frequency range is used for microwave communications, satellite and radar?

A. Low Frequency : 30 kHz to 300 kHz
B. Medium Frequency : 300 kHz to 3 MHz
C. Super High Frequency : 3000 MHz to 30000 MHz
D. Extremely High Frequency :30,000 MHz
E. None of the above

 Answer Option D

24. Which of the following statements is incorrect?

A. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission
B. Half-duplex line is a communication line in which data can move in two directions, but not at the same time.
C. Teleprocessing combines telecommunications and DP techniques in online activities.
D. Batch processing is the preferred processing mode for telecommunication operations
E. None of the above

 Answer Option D

25. If the ASCII character H is sent and the character I is received, what type of error is this?

A. single-bit
B. multiple-bit
C. burst
D. recoverable

 Answer Option A

26. A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. If Delta modulation is selected, then how many bits per second are actually sent?

A. 32 kbps
B. 8 kbps
C. 128 kbps
D. 64 kbps.

 Answer Option B

27. UDP is:

A. Not a part of the TCP/IP suite
B. Connection oriented and unreliable
C. Connection orientated and reliable
D. Connectionless and unreliable

 Answer Option D

28. The interactive transmission of data within a time sharing system may be best suited to

A. simplex lines
B. half-duplex lines
C. full-duplex lines
D. biflex-line
E. None of the above

 Answer Option B

29. What OSI layer handles logical address to logical name resolution?

A. Transport
B. Physical
C. Presentation
D. Data Link

 Answer Option A

30. The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

A. A logical address that identifies the workstation
B. A physical address that is randomly assigned each time the computer is started
C. A physical address that is assigned by the manufacturer
D. The logical domain address for the workstation
E. An alias for the computer name

 Answer Option C

31. Which of the following is an example of a client-server model?

A. TELNET
B. FTP
C. DNS
D. All of the above
E. None of the above

 Answer Option D

32. In CRC there is no error if the remainder at the receiver is _____.

A. the quotient at the sender
B. nonzero
C. zero
D. equal to the remainder at the sender
E. None of the above.

 Answer Option A

33. A WATS arrangement

A. is always less expensive than flat-rate service
B. is less expensive than flat-rate service only when the number of calls is large and the duration of each is short
C. is less expensive than flat-rate service only when the number of calls is small and the duration of each is long
D. is never less expensive than flat-rate service
E. None of the above

 Answer Option B

34. A T-switch is used to

A. control how messages are passed between computers
B. echo every character that is received
C. transmit characters one at a time
D. rearrange the connections between computing equipment
E. None of the above

 Answer Option D

35. A global network of millions of business, government, educational, and research networks; computer systems; database; and end users. Select the best fit for answer:

A. Internet works
B. The Internet
C. Internet revolution
D. Internet technologies
E. None of the above

 Answer Option B

36. Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?

A. Star
B. Right
C. Token-Ring
D. Ethernet
E. Bus

 Answer Option E

37. The CCITT Recommendation X.25 specifies three layers of communications:

A. application, presentation and session
B. Session, transport and network
C. physical datalink and network
D. datalink, network and transport

 Answer Option C

38. Which of the following technique is used for allocating capacity on a satellite channel using fixed-assignment FDM?

A. Amplitude modulation
B. Frequency-division multiple access
C. Frequency modulation
D. Frequency-shift keying
E. None of the above

 Answer Option B

39. The amount of uncertainty in a system of symbol is called

A. Bandwidth
B. Entropy
C. loss
D. Quantum
E. None of the above

 Answer Option B

40. Which of the following allows a simple email service and is responsible for moving messages from one mail server to another?

A. IMAP
B. DHCP
C. SMTP
D. FTP
E. POP3

 Answer Option C

41. What does 192 translate to in binary?

A. 11000000
B. 00111110
C. 00001111
D. 00000011
E. None of the above

 Answer Option A

42. An information utility can offer a user

A. instant bonds and stock quotations
B. news stories from wire services
C. complete airline schedules for all domestic flights
D. All of the above
E. None of the above

 Answer Option D

43. An international standard, multilevel set of protocols to promote compatibility among telecommunications networks. Select the best fit for answer:

A. Network Server
B. Virtual Private Network
C. Network operating system
D. OSI

 Answer Option D

44. Many large organizations with their offices in different countries of the world connect their computers through telecommunication satellites and telephone lines. Such a communication network is called

A. LAN
B. WAN
C. ECONET
D. EITHERNET
E. None of the above

 Answer Option B

45. A network which is used for sharing data, software and hardware among several users owning microcomputers is called

A. WAN
B. MAN
C. LAN
D. VAN
E. None of the above

 Answer Option C

46. In geosynchronous orbit, satellite

A. remains in a fixed position so that as earth rotates, it can fully cover the earth
B. remains in a fixed position related to points on earth
C. moves faster than the earth's rotation so that it can cover larger portion of earth.
D. moves simultaneously
E. None of the above

 Answer Option A

47. A proposed network infrastructure of interconnected local, regional, and global networks that would support universal interactive multimedia communications. Select the best fit for answer:

A. Internetworked enterprise
B. Information super highway
C. Business applications of telecommunications
D. Client/Server networks

 Answer Option B

48. What does 240 translate to in binary?

A. 11110000
B. 00011110
C. 00001111
D. 11100000
E. None of the above

 Answer Option A

49. You are working with a network that has the network ID 10.9.0.0 and contains 73 networks. In the next year, you will be adding an additional 27 branch offices to your company. For simplified management, you want to keep the most possible hosts per subnet. Which subnet mask should you management, you want to keep the most possible hosts per subnet. Which subnet mask should you use?

A. 255.224.0.0
B. 255.240.0.0
C. 255.248.0.0
D. 255.252.0.0
E. 255.254.0.0

 Answer Option E

50. A group of 2m - 1 routers are interconnected in a centralized binary tree, with router at each tree node. Router I communicate with router J by sending a message to the root of the tree. The root then sends the message back down to J. Then find the mean router-router path length.

A. 2 (m - 2)
B. 2 (2m - 1)
C. m - 1
D. (2m - l)/mJ

 Answer Option A

Comments

Most Popular

Remove Unicode Zero Width Space PHP

PhpStorm, return value is expected to be 'A', 'object' returned

Laravel file upload returns forbidden 403, file permission is 700 not 755