Computer Networks MCQ Questions and Answers

26. The BRI is composed of ___.
a) two B channels
b) one H channel
c) one D channel
d) a and c
Answer: (d) BRI (Basic Rate Interface) is a type of ISDN (Integrated Services Digital Network) connection that is composed of two B channels and one D channel. The B channels carry user data or voice, while the D channel is used for signaling and control information.

27. IP Packet is a ___ and ___ based model.
a) connectionless, network
b) connection, network
c) connectionless, datagram
d) connection, datagram
Answer: (c) An IP (Internet Protocol) packet is a unit of data transmitted over an IP-based network. It is part of a connectionless network model, where each packet is treated independently and follows the datagram delivery model. IP packets are routed based on their destination IP addresses.

28. ___ are special-interest groups that quickly test, evaluate, and standardize new technologies.
a) Forums
b) Regulatory agencies
c) Standards organizations
d) All of the above
Answer: (a) Forums are special-interest groups or organizations that quickly test, evaluate, and standardize new technologies. They bring together industry experts, stakeholders, and interested parties to collaborate and develop standards or best practices for specific areas of technology.

29. When the angle of refraction is ___, the angle of incidence, the light beam moves from a denser to a less dense medium.
a) more than
b) less than
c) equal to
d) none of the above.
Answer: (a) When the angle of refraction is more than the angle of incidence, the light beam moves from a denser medium to a less dense medium. This phenomenon is known as refraction and occurs due to the change in the speed of light as it passes through different materials.

30. The current design practice for downlinks is to use a minimum elevation angle of about ___ degrees to ___ degrees depending on the frequency.
a) 45, 90
b) 40, 60
c) 10, 35
d) 5, 20
Answer: (d) The current design practice for downlinks, such as satellite communications, is to use a minimum elevation angle of about 5 degrees to 20 degrees, depending on the frequency. This angle ensures better signal reception and reduces interference from the Earth’s atmosphere.

31. The ALOHA network was created at the University of ___ in 1970 under the leadership of ___.
a) Hawaii, John Abramson
b) Texas, John Abramson
c) Texas, Norman Abramson
d) Hawaii, Norman Abramson
Answer: (d) The ALOHA network was one of the earliest computer networks and played a significant role in the development of packet-switched communication protocols.

32. The term used to describe the way in which computers are connected to the network.
a) Logic
b) Technology
c) Topology
d) All of the above
Answer: (c) The term used to describe the way in which computers are connected to the network is topology. It refers to the physical or logical arrangement of devices, links, and nodes in a network.

33. FDM stands for
a) Fixed division multiplexing
b) First division multiplexing
c) Frequency division multiplexing
d) None
Answer: (c) FDM stands for Frequency Division Multiplexing. It is a technique used in telecommunications where multiple signals are combined for transmission over a single communication channel by allocating different frequency ranges to each signal.

34. FDDI stands for
a) Fixed distributed data interface
b) First division data interface
c) Fiber distributed data interface
d) None
Answer: (c) FDDI stands for Fiber Distributed Data Interface. It is a standard for transmitting data on optical fiber cables at a rate of 100 Mbps. It is commonly used for connecting local area networks (LANs) and provides high bandwidth and fault tolerance.

35. The ___ layer is responsible for resolving access to the shared media or resources.
a) physical
b) MAC sublayer
c) Network
d) Transport
Answer: (b) The MAC sublayer is responsible for resolving access to the shared media or resources. MAC represents Media Access Control and the OSI model is where it operates, specifically at the data link layer. It manages the access to the physical transmission medium and handles issues like contention and collision avoidance.

36. Coding can be divided into
a) Block coding
b) Convolution coding
c) Both of the above
d) None of the above
Answer: (c) Coding can be divided into two types: Block coding and Convolution coding. Block coding is a method of coding where a fixed number of data bits is mapped into a fixed number of coded bits, while convolution coding is a technique that uses shift registers and feedback to encode data into a continuous stream of coded bits.

37. Fiber-optic communication system uses.
a Simplex transmission
b half-duplex
c full-duplex
d None of the above
Answer: (b) Fiber-optic communication systems use full-duplex transmission. Full-duplex means that data can be transmitted in both directions simultaneously. In fiber-optic communication, signals can be transmitted and received over the same fiber at the same time, allowing for bidirectional communication.

38. Complex routing strategies can be, and are, often used in systems such as ___, ___, or ___, which are sometimes used as underlying technologies to support IP networks.
a) MPLS, ATM, or Frame Relay
b) CTLNS, ATM, or Slot
c) ATM, PDTN, or Slot
d) LAN, ATM, or Frame Relay
Answer: (a) Complex routing strategies can be, and often are, used in systems such as MPLS (Multiprotocol Label Switching), ATM (Asynchronous Transfer Mode), or Frame Relay. These are network technologies that provide advanced routing and switching capabilities and are commonly used as underlying technologies to support IP networks.

39. The concept of connected computers sharing resources is called ___.
a) Internetworking
b) Intranetworking
c) Networking
d) None of the above
Answer: (c) Networking allows computers to communicate with each other & share resources like, printers, files, and internet connections.

40. VPN stands for
a) Virtual Private Network
b) Visual private network
c) Virtual public network
d) Visual public network
Answer: (a) VPN stands for Virtual Private Network. A network connection that is secure and private is set up over a public network, like the internet.

41. IMP stands for
a) Internal message passing
b) Interface message passing
c) Internal message parsing
d) Interface message parsing
Answer: (b) IMP stands for Interface Message Passing. IMP is a technique used for communication between different components or layers of a computer system, where messages are passed between interfaces to exchange information.

42. Process to process delivery of the entire message is done by
a) Physical layer
b) Transport layer
c) Session layer
d) Presentation layer
Answer: (b) Process-to-process delivery of entire message is done by the Transport layer. The Transport layer in the OSI model is responsible for reliable end-to-end delivery of data between applications running on different hosts. It ensures that the entire message is delivered without errors or loss.

43. Dialog controller role is played by
a) Session layer
b) Application layer
c) Transport layer
d) Network layer
Answer: (a) The Dialog controller role is played by the Session layer. In the OSI model, the Session layer is accountable for initiating, controlling, and concluding sessions between applications. It controls the communication dialog between the two applications, including session establishment, synchronization, and session termination.

44. Syntax and semantics of the information exchanged between two systems are done by
a) Session layer
b) Application layer
c) Transport layer
d) Presentation layer
Answer: (d) The syntax and semantics of the information exchanged between 2 systems are done by the Presentation layer. It ensures that the information exchanged between systems is in a format that can be understood by both parties.

45. SDU stands for
a) Service data unit
b) Service digital unit
c) Session data unit
d) Session data unit
Answer: (a) SDU stands for Service Data Unit. It refers to the unit of data that is exchanged between entities at the same layer in a network protocol stack. In other words, it is the data unit that is passed from one layer to another within the same network entity.

46. PDU stands for
a) Power data unit
b) Protocol digital unit
c) Presentation data unit
d) Protocol data unit
Answer: (d) PDU stands for Protocol Data Unit. It refers to the unit of data that is exchanged between different layers in a network protocol stack. Each layer adds its own header information to the PDU received from the layer above it, creating a new PDU for the next layer.

47. Transmission lines suffer from the major problem
a) Attenuation distortion
b) Delay distortion
c) Noise
d) All of the above
Answer: (d) Transmission lines suffer from the major problem of Attenuation distortion, Delay distortion, and Noise. Attenuation distortion refers to the loss of signal strength over distance, Delay distortion refers to the distortion of the signal due to variations in propagation delay, and Noise refers to unwanted interference that affects the quality of the transmitted signal.

48. If the value of a signal changes over a very short period, its frequency is ___
a) Low
b) High
c) Average
d) Zero
Ans: b
Answer: (b) If the value of a signal changes over a very short period, its frequency is High. Frequency is a measure of how rapidly a signal changes or oscillates. If the signal changes rapidly, it has a high frequency.

49. CRC stands for
a) Cyclic redundancy codes
b) Code redundancy cycle
c) Critical redundancy cycle
d) None of the above
Answer: (a) CRC stands for Cyclic Redundancy Codes. It is an error-detecting code used in digital networks and storage systems. CRC calculates a short fixed-size value, known as the checksum, based on the data being transmitted. This checksum is then compared at the receiving end to check if any errors occurred during transmission.

50. In ___ type of service, no connection is established beforehand or afterwards.
a) Acknowledged connectionless service
b) Unacknowledged connectionless service
c) Acknowledged connection-oriented service
d) Unacknowledged connection-oriented service
Answer: (b) In Unacknowledged Connectionless Service, no connection is established beforehand or afterwards. It is a type of communication service where data packets are sent without any acknowledgement or guarantee of delivery. This service is commonly used in situations where a reliable and established connection is not required, such as broadcasting or multicasting data.

Advanced Computer Networks MCQ sample papers with answers

Computer Graphics MCQ online test with answers

Conclusion Points

Understanding the fundamentals of computer networks is essential for anyone working in the IT field. With this MCQ questions and answers guide, we hope you understand better concepts such as protocols, layers, topologies, and the TCP/IP model.

As a result, we trust that you feel more confident in preparing for your upcoming exams or interviews. We recommend additional practice tests to ensure you’ve fully mastered the material.

Thanks for reading our articles; if you like the post on basic networking mcq questions and answers pdf, Computer Networks MCQ Questions with Answers pdf download, please share on social media.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top