Tuesday, 4 March 2014

COMPUTER NETWORK MCQS

1) AM and FM are examples of............ conversions. 
 A. Digital to digital
 B. Digital to analog
 C. Analog to analog
 D. Analog to digital
 Ans:- C

2) Error rate is 
 A. An error-detecting code based on a summation operation performed on the bits to be checked.
 B. A check bit appended to an array of binary digits to make the sum of all the binary digits.
 C. a code in which each expression conforms to Specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and thus the presence of the errors is detected
 D. The ratio of the number of data units in error to the total number of data units
Ans:- D

3) Which of the following device is used to connect two systems, especially if the systems use different protocols? 
 A. Hub
 B. Bridge
 C. Gateway
 D. Repeater
Ans:-C

4) What is the default subnet mask for a class C network? 
 A. 255.255.0.0
 B. 255.255.255.0
 C. 127.0.0.1
 D. 255.0.0.0
Ans:-B

5) The constellation diagram of BPSK has.......dots 
 A. 2
 B. 1
 C. 0
 D. None of above
Ans:-A 

6) You have a class A network address 10.0.0.0 with 40 subnets, but are required to add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should you assign? 
 A. 255.254.0.0
 B. 255.240.0.0
 C. 255.248.0.0
 D. 255.252.0.0
Ans:-A

7)  A bridge has access to which address of a station on the same network? 
 A. Physical 
 B. Network
 C. Service access point
 D. All of these
Ans:-A

8) The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to 
 A. 0.003
 B. 0.009
 C. 0.991
 D. 0.999
Ans:-B

9) Which of type of error detection uses binary division? 
 A. Parity check
 B. Longitudinal Redundancy Checking
 C. Checksum Checking
 D. Cyclic Redundancy Checking
Ans:-D

10) Gateways can function all way upto 
 A. Transport layer
 B. Session layer
 C. Presentation layer
 D. Application layer
Ans:-D

11) The receiver equalizer reduces delay distortions using  
 A. Tapped Delay lines
 B. Gearshift
 C. Desrambler
 D. Difference enging
Ans:-B

12) How many carrier frequencies are used in QPSK? 
 A. 2
 B. 1
 C. 0
 D. None of above
Ans:-A

13) Adaptive or dynamic directory used in packet routing changes 
 A. Within each user session
 B. With each user session
 C. At system generation time only
 D. None of these
Ans:-A

14) CRC can detect all bursts of upto m errors,if generator polynomial G(x) is of degree 
 A. One 
 B. m-1
 C. m
 D. m+1
Ans:-C

15) Er ror detect ing method that can detect more errors wi thout increasing additional information in each packet is 
 A. Checksum
 B. Even parity mechanism
 C. CRC
 D. Odd parity mechanism
Ans:-C

16) DNS is used to locate the 
 A. MAC address of URL
 B. IP address of URL
 C. Root domain of URL 
 D. Domain name of a URL
Ans:-B

17) Which of the following does not allow multiple users or devices to share one communications line? 
 A. Doubleplexer
 B. Multipplexer
 C. Concentrator
 D. Controller
Ans:-A

18) What is the default maximum packet size for 16MB token ring network? 
 A. 576 bytes
 B. 1101 bytes
 C. 2202 bytes
 D. 4202 bytes
Ans:-D

19)Which model shows how the network functions of a computer ought to be organized? 
 A. ITU-T
 B. OSI
 C. ISO
 D. ANSI
Ans:-B 

20) How many bit field defines the address as a provider-based address in IPv6 
 A. 4
 B. 5
 C. 3
 D. 2
Ans:-C

No comments:

Post a Comment