Skip to main content

Objective Question of Computer Networking

 

1.   Choose the correct meaning of the Greek word ‘tele’ in

      context of telecommunication.

A.  Near

B.  Far

C.  Never

D.  Always

 

2.   Find the correct term used for the standards that have

      been legislated by an officially recognized body.  

A.  De jure

B.  De facto

C.  User standards

D.  Channel standards

 

3.   Which agency developed standards for physical

      connection interfaces and electronic signaling

      specifications?    

A.   ISO

B.   ITU

C.   ANSI

D.   EIA

 

4.    Find full form of ANSI.

A.   American Network Signal Institute

B.   American National Signal Institute

C.   American National Standards Institute

D.   American Network Standards Institute

 

5.   Select the correct option to complete the following

      statement.

      The __________ defines the characteristics of the

      interface between the devices and the transmission

      medium.

A.   Transport layer

B.   Physical layer

C.   Session layer

D.   Presentation

 

6.    Find the correct option for the following statement.

       The completion of one full pattern by analog signal

        wave is called a __________.

A.    phase

B.    time

C.    cycle

D.    range

 

7.    Which of the following is a guided media?

A.   STP cable

B.   Wi-Fi

C.   Bluetooth

D.   Geostationary Satellite

 

8.    Which of the following is not a transmission

        impairment?

A.    Attenuation

B.    Propagation

C.    Distortion

D.    Noise

 

9.    Find the correct option to complete the following

       statement.

       ________ means that the signal changes its form or

       shape.

A.    Propagation

B.     Noise

C.    Attenuation

D.    Distortion

 

 

10.   Find the correct option to complete the following

        statement.

        _________ refers to the speed of bit transmission in a

        channel or link.

A.   Bandwidth in Hertz

B.   Bandwidth in Watts

C.   Bandwidth in bits per second

D.   Both A and C

 

11.   Find the correct technique that allows the

simultaneous transmission of multiple signals across a

single data link.

A.    Demultiplexing

B.    Multiplexing

C.    duplexing

D.    miniplexing

 

12.   Which of the following technology was/were adopted

        by telephone companies initially?

A.    Circuit switching

B.    Message Switching

C.    Packet Switching

D.    Both B and C

 

 

13.   Which of the following switching technique(s) talk

        About datagram network?

A.    Circuit switching

B.    Message Switching

C.    Packet Switching

D.    Both A and B

14.   Which of the following is a bit oriented protocol used

        at data link layer?

A.    HDLC

B.    BSC

C.    ICMP

D.    POP

 

15.   Which of the following is a character oriented protocol

        used at data link layer?

A.    HDLC

B.    BSC

C.    ICMP

D.    POP

 

16.   Which of the following is created at network layer?

A.    Segments

B.    Frames

C.    Packets

D.    Message

 

17.   Find the layer of OSI model at which repeaters work.    

A.    Network

B.    Transport

C.    Session

D.    Physical

 

18.   Find the device used to regenerate a signal.

A.    Repeater

B.    Router

C.    Amplifier

D.    Gateways

 

 

19.   Find the device that is used to decide the path for the

        packet it receives.  

A.    Repeater

B.    Router

C.    Amplifier

D.    Hubs

 

20.   Find the correct option to complete the following

        statement.

        When a simple or learning bridge connects more than

        two network segments it is called a _______  bridge.

A.    multiple

B.    multi-port

C.    uni-port

D.    twin-port

 

21.   Which of the following is an Application layer

        protocol?

A.    FTP

B.    ICMP

C.    BGP

D.    ARP

 

22.   Which of the following is not an Application layer

        protocol?

A.    FTP

B.    SMTP

C.    Telnet

D.    IGMP

23.   Which of the following layer is responsible for

         encryption of the message?

A.    Physical    

B.    Presentation

C.    Session

D.    Network

 

24.   Find the correct abbreviation of DNS.    

A.    Dynamic Name System

B.    Dynamic Network System

C.    Domain Name System

D.    Domain Network System

 

25.   Find the correct abbreviation of HTTP.     

A.    Hypertext Transfer Protocol

B.    Hypertest Transfer Protocol

C.    Highertext Transfer Protocol

D.    Highertest Transfer Protocol

 

          

 

26.   Indicate the correct option to complete the following

        statement.

        An unauthorized user is a network’s_______ issue.

A.    Performance

B.    Reliability

C.    Security

D.    Delivery

 

27.   Indicate the topology in which nodes are connected to

        the main cable by drop lines and taps.

A.    Star

B.    Bus

C.    Mesh

D.    Root

 

28.   Indicate the network system used to connect systems

        located in different countries.

A.    LAN

B.    MAN

C.    PAN

D.    WAN

 

29.   Indicate the correct option to complete the following

        statement in context of protocol.

        ___________ refers to the meaning of each section of

        bits.

A.    Semantics

B.    Syntax

C.    Timing

D.    Medium

 

30.   Indicate the correct option to complete the following

        statement.

        A ________ defines what is communicated, how it is

        communicated, and when it is communicated.

A.    Channel  

B.    Protocol

C.    Connection

D.    Topology

 

31.   Indicate the correct option to complete the following

        statement.

        ____________ signals can have an infinite number of

        values in a range.

A.    Discrete

B.    Digital

C.    Analog

D.    Semi-discrete

 

32.   Indicate the transmission media which transmits

        signals with highest speed to long distance.

A.    STP cable

B.    UTP cable

C.    Coaxial cable

D.    Fibre Optic cable   

 

33.   Indicate the correct option to complete the following

        statement.

        The ________ capacity gives us the upper limit; the

        ________ formula tells us how many signal levels we

        need.

A.    Shannon, Nyquist

B.    Nyquist, Shannon

C.    Nyquist, William

D.    William, Shannon

 

34.   Indicate the correct option to complete the following

        statement.

        The concept of ____________ is used to transmit the

         signal through fiber optic cable.

A.    total internal reflection

B.    total external reflection

C.    partial internal reflection

D.    partial external reflection

 

35.   Indicate the correct option to complete the following

        statement.

        The propagation time of a signal is calculated by

        dividing the _________ by the __________.

A.    propagation speed, distance

B.    distance, propagation speed

C.    time, distance

D.    time, speed

 

36.   Indicate the multiplexing technique(s) used with digital

        signals.

A.    Frequency division multiplexing

B.    Wavelength division multiplexing

C.    Time division multiplexing

D.    All of the above

 

37.   Indicate the multiplexing technique(s) in which signal

        propagates in the form of light.

A.    Frequency division multiplexing

B.    Wavelength division multiplexing

C.    Time division multiplexing

D.    All of the above

 

38.   Indicate the option which is not a work of LCP under

        Point-to-Point protocol.

A.    Link establishment

B.    Link configuration

C.    Link testing

D.    User Authentication

 

39.   Indicate the authentication protocol used in Point-to-

        Point protocol.

A.    NCP

B.    PAP

C.    POP

D.    ICMP

 

40.   Indicate the number of phases in circuit switching.

A.    1

B.    2

C.    3

D.    4

 

41.   Indicate the correct option to complete the following

        statement.

        A repeaters is a device that cannot connect LAN of

        _______ .

A.    same protocol

B.    different protocols

C.    protocols of data link layer

D.    protocols of presentation layer

 

42.  Indicate the correct option to complete the following

        statement.

       The table of the ________ normally contains addresses

        belonging to multiple protocols.

A.    single router

B.    multiple router

C.    multiprotocol router

D.    binary router

 

43.   Indicate the correct option to completer the following

        statement.

        In an open loop_______ polices are applied to prevent

        overcrowding of packets before it happens.

A.    Congestion control

B.    Transportation

C.    Routing

D.    Framing

 

44.   Indicate from the following that creates its table to

        send a frame to  different LANs.

A.    Switch

B.    Hub

C.    Repeater

D.    Learning Bridge

 

45.   Indicate the example of three layer switch .

A.   Hub

B.   Router

C.   Repeater

D.   Bridge

 

46.   Indicate the layer to which data is sent by Transport

        layer after receiving from different applications and

        compiling.

A.    Session layer

B.    Presentation layer

C.    Data link layer

D.    Network layer

 

47.   Indicate the correct option to complete the following

        statement.

        The transport layer ensures ________ reliable data

        transmission.

A.    end-to-end

B.    hop-to-hop

C.    hop-to-end

D.    end-to-hop

 

48.   Indicate the correct option which is used at transport

        layer to access a service.

A.    Channel

B.    Port

C.    Subnet

D.    Protocol

 

49.   Indicate the correct option to complete the following

        statement.

        The session layer allows ___ systems to enter into a

        dialog.    

A.    two

B.    three

C.    four

D.    five

 

50.   Indicate the correct option to complete the following

        statement.

        The session layer _____ and _____the interaction

        between communication network.

A.    Frames and packets

B.    data and information

C.    maintains and synchronize

D.    packets and segments

 

 

 

51.   Identify the work of Session layer.

A.    Translation

B.    Encryption

C.    Dialog Control

D.    Compression

 

52.   Select the correct option to complete the following

        statement:

        A television broadcast is a good example of _______

        transmission.

A.    Automatic

B.    Half-duplex

C.    Full-duplex

D.    Simplex

 

53.   Identify the protocol used at Data Link layer.

A.    SMTP

B.    HDLC

C.    FTP

D.    POP

 

54.  Identify the odd one in context of works accomplished

        by Transport layer.

A.    Logical Addressing

B.    Segmentation and reassembly

C.    Error Control

D.    Flow Control

 

55.Identify the correct network, if I connect my cell phone

       to my head phone. 

A.    LAN

B.    WAN

C.    PAN

D.    MAN

 

56.   Identify an example of unguided media.

A.    UTP

B.    STP

C.    Wi-Fi

D.    Copper cable

 

57.   Calculate the value of SNR and SNR dB for noiseless

        channel and choose the correct option.

A.    ∞, ∞

B.    0, 0

C.    ∞, 0

D.    0, ∞

 

58.   Calculate gain of power in dB and choose the correct

        option, if a signal travels through an amplifier and its

        power is increased 10 times.

A.    1dB

B.    0.1dB

C.    100dB

D.    10dB

 

59.   Calculate SNR and choose the correct option, if the

        power of a signal is 10 mW and the power of the noise

        is 1 µW.

A.    1000

B.    10000

C.    100

D.    100000

 

60.   Calculate Capacity of the channel and choose the

        correct option, if signal-to-noise ratio is zero.   

A.    0   

B.    1

C.    10

D.   

 

Comments

Popular posts from this blog

Memory Hierarchy

Memory Hierarchy A memory unit is an essential component in any digital computer since it is needed for storing programs and data. Typically, a memory unit can be classified into two categories: The memory unit that establishes direct communication with the CPU is called  Main Memory . The main memory is often referred to as RAM (Random Access Memory). The memory units that provide backup storage are called  Auxiliary Memory . For instance, magnetic disks and magnetic tapes are the most commonly used auxiliary memories. Apart from the basic classifications of a memory unit, the memory hierarchy consists all of the storage devices available in a computer system ranging from the slow but high-capacity auxiliary memory to relatively faster main memory. The following image illustrates the components in a typical memory hierarchy. Auxiliary Memory Auxiliary memory is known as the lowest-cost, highest-capacity and slowest-access storage in a computer system....

CLASS-11 (Python Programming Language)

  Python Programming Language Python is a high-leve l, general-purpose and a very popular programming language. Python programming language (latest Python 3) is being used in web development, Machine Learning applications, along with all cutting edge technology in Software Industry. Python Programming Language is very well suited for Beginners, also for experienced programmers with other programming languages like C++ and Java. Below are some facts about Python Programming Language: Python is currently the most widely used multi-purpose, high-level programming language. Python allows programming in Object-Oriented and Procedural paradigms. Python programs generally are smaller than other programming languages like Java. Programmers have to type relatively less and indentation requirement of the language, makes them readable all the time. Python language is being used by almost all tech-giant companies like – Google, Amazon, Facebook, Instagram, Dropbox, Uber… etc. The biggest stren...