Sunday 2 March 2014

COMPUTER NETWORK MCQS

1) Carrier is 
 A. One or more conductors that serve as a common connection for a related group of devices
 B. A continuous frequency capable of being modulated or impressed with a second signal
 C. The condition when two or more sections attempt to use the same channel at the same time
 D. A collection of interconnected functional units that provides a data communications service among stations attached to the network
Ans:- B

2) Which topology requires a central controller or hub? 
 A. Mesh
 B. Star
 C. Bus
 D. Ring
Ans:- B

3) Which of the following decides the role of a device on a network? 
 A. Line connection 
 B. Link connection
 C. Line discipline 
 D. Link decision
Ans:-C

4) Working of the WAH generally involves 
 A. Telephone lines
 B. Micro waves
 C. Satellites
 D. All of these
Ans:- D

5) A bridge can 
 A. Filter a frame
 B. Forward a frame
 C. Extend a LAN
 D. All of the above
Ans:- D

6) Which of the following access control methods is probabilistic? 
 A. Polling
 B. Contention
 C. Token passing
 D. Sliding window
Ans:- D

7) PURE ALOHA 
 A. Does not require global time synchronization 
 B. Does require global time synchronization 
 C. Both a and b
 D. None of these
Ans:- A

8) Which of following divides the high speeds signals into frequency bands?  
 A. T-switch
 B. Time division multiplexer
 C. Frequency division multiplexer
 D. Modem
Ans:-C

9) Which of the following type of ICMP messages need to be encapsulated into an IP datagram 
 A. Time executed
 B. Multicasting 
 C. Echo reply
 D. All of the above
Ans:-D

10) In ..........the change or lack of change in the level of the voltage determine the value of the bit 
 A. NRZ-I
 B. NRZ-L
 C. Both (a) and (b)
 D. None of above
Ans:-A

11) A network that requires human intervention to route signals is called a 
 A. Bus network
 B. Ring network
 C. Star network
 D. T switched network
Ans:-D

12) Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: 
 A. Network Server
 B. Virtual Private Network
 C. Network operating system
 D. OSI
Ans:-B

13) Protocol used to moni tor and control network devices operates at 
 A. Applicat ion layer
 B. Transport layer
 C. Network layer
 D. Data Link layer
Ans:-A

14) The secondary device in a multipoint configuration sends data in response to which of the following event? 
 A. ACK
 B. ENQ
 C. Poll
 D. Sel
Ans:-C

15) Quadrature Amplitude Modulation is combination of 
 A. ASK and FSK
 B. ASK and PSK
 C. PSK and FSK
 D. None of above
Ans:-B

16) Which of following is also called forward error correction? 
 A. Simplex
 B. Retransmission 
 C. Detection error coding
 D. Error correction coding
Ans:-A

17) Which is reserved address for private networks? 
 A. 150.0.0.0 to 150.255.255.255
 B. 128.0.0.0 to 191.255.255.255
 C. 192.168.0.0 to 192.168.255.255
 D. 202.40.55.0 to 202.40.55.255
Ans:-C

18) In communication satellite multiple repeaters are known as 
 A. Detector
 B. Modulator
 C. Stations
 D. Trasnponders
Ans:-D

19)In the session layer ,during data transfer , the data stream responsible for the control purpose is 
 A. Regular data
 B. Typed data
 C. Capability data
 D. Expedited data
Ans:-C 

20) Who strips the data frame from the token ring network? 
 A. Destination station
 B. The first station which wants to transmit next
 C. The sending station
 D. The station next to the destination station
Ans:- C

No comments:

Post a Comment