objective questions and answers on computer network pdf

Objective Questions And Answers On Computer Network Pdf

File Name: objective questions and answers on computer network .zip
Size: 21702Kb
Published: 27.11.2020

Computer networks is one of the most important chapter for any candidate pursuing career in information technology field. Having solid background information and a good practice with quality MCQ questions enables you to score highest in any competitive examination. Don't forget to download the PDF file so that you can practice while you're offline.

Meyil Matbaa

If a datagram router goes down then ………….. A all packets will suffer B only those packets which are queued in the router at that time will suffer C only those packets which are not queued in the router at that time will suffer D no packets will suffer Answer: B. In datagram subnet new route is chosen ………………… A for every packet sent B for all the packet sent C only for the first packet D for the packet which is not transmitted Answer: A.

The PSTN is an example of a ………………… network. Each packet is routed independently in ………………. For a connection oriented service, we need a …………… A virtual circuit subnet B short circuit subnet C datagram subnet D wireless subnet Answer: C. Which type of switching uses the entire capacity of a dedicated link? A circuit switching B datagram packet switching C virtual circuit packet switching D message switching Answer: D. In …………… circuit switching, delivery of data is delayed because data must be stored and retrieved from RAM.

In ……………. A circuit switching B message switching C virtual approach to packet switching D datagram approach to packet switching Answer: D. In ………………, each packet of a message follows the same path from sender to receiver. A circuit switching B message switching C virtual approach to packet switching D datagram approach to packet switching Answer: A. A permanent virtual circuit involves …………….. The set of optimal routes from all sources to a given destination from a tree rooted to the destination is known as ……………..

Adaptive routing algorithms get their information from …………. A only from local environment B only from adjacent routers C from locally, adjacent, external routers D only from external routers Answer: C.

If the route from I to J is computed in advance, off line, and downloaded to the routers when the network is booted is called as ………………. In Hierarchical routing for N router subnet, the optimal number of levels is ………….. The router algorithm takes the decision to changes the route when …………….. If route from router I to router J is computed on line based on the current statistics, then it is called as ………………..

If the subnet uses virtual circuits internally, routing decisions are made only when a new virtual circuit is being setup. This is called as…………….. If router J is on the optimal path from router I to router K, then the optimal path from J to K also falls along the same route is known as ………………..

In Hierarchical routing, the routers are divided into what is called as …………….. The regions in Hierarchical routing are grouped in to …………….. If a router sends every incoming packet out only on those lines that are going approximately in the right direction is known as …………….. In shortest path routing algorithm, the path length is measured based on …………….. Flooding always choose the ……………….. In military applications where large number of routers may be blown to bits at any instant, we use ……………….

In distributed applications, it is sometimes necessary to update all the databases concurrently, we use ………………….. In multicast routing with spanning tree method, a network with n groups, each with an average of m members, for each group we require ……………….. A n pruned spanning trees must be stored for a total of mn trees B m pruned spanning trees must be stored for a total of m trees C n pruned spanning trees must be stored for a total of n trees D m pruned spanning trees must be stored for a total of mn trees Answer: D.

A well -defined groups that are numerically large in size but small compared to the network as a whole are used in ………………….. The processes that keep track of hosts whose home is in the area, but who currently visiting another area is …………….. In ………………. Sending a packet to all destinations simultaneously is called ………………. In Broadcast routing, if the router does not know anything all about spanning tree, ……………….

The method of Broadcast routing in which each packet contains either a list of destinations or a bit map indicating the desired destinations is ………………. Sending a message to a well defined group that are numerically large in size but small compared to the network as a whole is called ………………. Count-to-Infinity problem occurs in ………………… A distance vector routing B short path first C link state routing D hierarchical routing Answer: A.

In distance vector routing algorithm, each router maintains a separate routing table with the following entries. A preferred input line , estimated time B preferred input line, estimated distance C preferred output line, estimated time D preferred output line, router Answer: C. Link state packets are built in ……………….. In which routing method do all the routers have a common database? In distance vector routing algorithm, the routing tables are updated ………………… A by exchanging information with the neighbours B automatically C using the backup database D by the server Answer: A.

Which of the following routing algorithm takes into account the current network load. In distance vector routing the delay metric is ………………. Military vehicles on a battlefield with no existing infrastructure will deploy …………… network.

The network in which all the nodes are symmetric and there is no central control or hierarchy is …………….. What is the type of network in which the topology change from time to time?

The processes that keep track of all mobile hosts visiting the area is …………….. The hosts which are basically stationary hosts who move from one fixed site to another from time to time but use the network only when they are physically connected to it are called ……………. What is the type of network in which the routers themselves are mobile?

Why probe packets are transmitted in the network? A to know about the capacity of the channel B to count the number of host in the network C to know about efficiency of the routing algorithm D to know about the congestion Answer: D. If the source deduces the existence of congestion by making local observations, such as the time needed for acknowledgements to come back is called as ……………..

Packet discard policy is implemented in …………….. The solution to decrease the load on the network when congestion occurs is …………….. A splitting the traffic over multiple routes B increasing the transmission power C usage of spare routers D denying service to the users Answer: D.

While booting the system the IP address is ……………. In open loop congestion control techniques, the decisions are based on the …………… A without regard to the current state of the network B with regard to the current state of the network C with regard to the choice of the host D without regard to the choice of the host Answer: A.

In closed loop congestion control techniques, the decisions are based on the …………….. A concept of a feedback loop B concept of a forward loop C concept of current state of network D None of these Answer: A. When too many packets are present in the subnet, and performance degrades then it leads to ………………..

What is it goal of congestion control? A making sure that subnet is not able to carry the offered traffic B making sure that subnet will allow more than the offered packets C making sure that subnet is able to carry the offered traffic D making sure that subnet will not allow any traffic Answer: C. The service of open loop congestion control technique is ………………….. A monitor the system to detect when and where congestion occurs B when to accept new traffic C pass the information to places where action can be taken D adjusting the system to correct the problem Answer: B.

In …………… case higher bandwidth can be achieved. A connectionless networks B connection oriented networks C virtual circuit networks D optical networks Answer: A. Time out determination policy is used in …………………. In transport layer, End to End delivery is the movement of data from ………………. A one station to the next station B one network to the other network C source to destination D one router to another router Answer: C.

The service of closed loop congestion control technique is ……………… A when to accept new traffic B when to discard the packets C monitor the system to detect when and where congestion occurs D which packets to discard Answer: C. The solution to increase the capacity when congestion occurs is ………………… A denying service to the users B degrading the service to the users C splitting traffic over multiple routes D rescheduled the demands of the users Answer: C.

When routers are being inundated by packets that they cannot handle, they just throw them away is known as ………………. Upon receipt of a bad segment, UDP …………..

When the source host receives the choke packet, then the source ……………… A reduces the capacity of the line B reduces the line utilization factor C reduces the traffic generation D rate reduces the threshold value Answer: C. If the buffer fills and a packet segment is dropped, then dropping all the rest of the segments from that packet, since they will be useless anyway is called ………………..

Flow control policy is implemented in …………………. For applications such as audio and video streaming, the variation in the packet arrival times is called ……………..

Which of the following is required to communicate between two computers? A communications software B protocol C communication hardware D all of above including access to transmission medium Answer: D. Terminals are required for …………….. The first collision free protocol is ………………. LANs can be connected by a device called …………….. In ………………..

In ………………… each packet of a message need not follow the same path From sender to receiver. A Circuit switching B message switching C a virtual approach to packet switching D The datagram approach to packet switching Answer: D. The address field of a frame in HDLC protocol contains the address of the ……………… station. The DNS name space is divided into non overlapping …………………. Source routing bridges in the same LANs must have …………… bridge Number. Repeater function in the ………………….

A repeater takes a weakened or corrupted signal and …………… it. The PSTN is an example of …………….. In a time division switch, a ……………… governs the destination of a packet stored in RAM. How many cross points are needed in a single stage switch with 40 inputs and 50 outputs. The ……………..

[MCQ] Computer Network – GK objective question answers [PDF]

By Arshad Iqbal. Computer networks quick study guide includes terminology definitions in self-teaching guide from computer science textbooks on chapters:. Multiple choice questions on computer networking quiz answers PDF covers MCQ questions on topics: Networking basics, what is network, network topology, star topology, protocols and standards, switching in networks, and what is internet. Multiple choice questions on network security quiz answers PDF covers MCQ questions on topics: Message authentication, message confidentiality, message integrity, analysis of algorithms, and SNMP protocol. MCQ 3: The term that refers to the phase continues through the boundary of two signal elements is. MCQ The projection of the point on the X axis defines the peak amplitude of the. MCQ Digital information in which the carrier signal is modified by one or more of its characteristics is called.

If a datagram router goes down then ………….. A all packets will suffer B only those packets which are queued in the router at that time will suffer C only those packets which are not queued in the router at that time will suffer D no packets will suffer Answer: B. In datagram subnet new route is chosen ………………… A for every packet sent B for all the packet sent C only for the first packet D for the packet which is not transmitted Answer: A. The PSTN is an example of a ………………… network. Each packet is routed independently in ………………. For a connection oriented service, we need a …………… A virtual circuit subnet B short circuit subnet C datagram subnet D wireless subnet Answer: C.


Here we present Computer Networks MCQ Questions and their correct answers. Please download the PDF file to prepare while you're offline.


Computer Networks Objective Questions and Answers Pdf - 1

In this Computer Networks Questions and Answers section you can learn and practice Computer Networks Questions and Answers to improve your skills in order to face technical inerview conducted by organisations. By Practicing these interview questions, you can easily crack any Exams interview. Fully solved examples with detailed answer description. You no need to worry, we have given lots of Computer Networks Questions and Answers and also we have provided lots of FAQ's to quickly answer the questions in the Competitive Exams interview.

300+ TOP COMPUTER NETWORKS Multiple Choice Questions and Answers

Which organization has authority over interstate and international commerce in the communications field? Which one of the following computer network is built on the top of another network? When collection of various computers seems a single coherent system to its client, then it is called. Which one of the following extends a private network across public networks? In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are. Students can learn and improve on their skillset for using Basic Computer - Networks Questions and Answers effectively and can also prepare for competitive examinations like They are explained in elaborated manner to get clear subject knowledge.

Explanation: The RSC is a standard interface for serial data transmission that defines the protocol and physical interface for transmitting serial data fairly easily between associated appliances and computers. Explanation: The star topology is the best network topology for large businesses because it is simple to control and coordinate from the central computer. Explanation: Double duplex is not a legitimate channel for transmission in computer network. Explanation: The parity bit is also known as the check bit, and has a value of 0 or 1.

To browse Academia. Skip to main content. By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy. Log In Sign Up. Download Free PDF. Computer Networking MCQs.


Computer networks MCQ multiple choice questions, objective type quiz, online test questions and answers for Gate, UGC NET, Bank Po, Bank SO, Clerical.


Post navigation

If you wanted to deny all Telnet connections to only network No IP traffic will be allowed out E0. You discover that you are not able to execute the commandshow running-configuration. Ans: A, One access list may be configured, per direction, for each layer 3 protocol configured on an interface.

Computer Network MCQ

Он в ловушке. Дэвид Беккер умрет. Халохот поднимался вверх с пистолетом в руке, прижимаясь вплотную к стене на тот случай, если Беккер попытается напасть на него сверху.

1 comments

Darren J.

Tenses of verbs in english grammar pdf hayek the road to serfdom pdf

REPLY

Leave a comment

it’s easy to post a comment

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>