Computer Networks MCQ Set 1
1. Which of this is not a guided media ?
a) Fiber optical cable
b) Coaxial cable
c) Wireless LAN
d) Copper wire
Answer
Answer: c [Reason:] Wireless LAN is unguided media.
2. UTP is commonly used in
a) DSL
b) FTTP
c) HTTP
d) None of the mentioned
Answer
Answer: a [Reason:] Unshielded twisted pair(UTP) is commonly used in home access.
3. Coaxial cable consists of _______ concentric copper conductors.
a) 1
b) 2
c) 3
d) 4
Answer
Answer: b [Reason:] None.
4. Fiber optics posses following properties
a) Immune electromagnetic interference
b) Very less signal attenuation
c) Very hard to tap
d) All of the mentioned
Answer
Answer: d [Reason:] None.
5. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps),
a) n*39.8
b) n*51.8
c) 2n*51.8
d) None of the mentioned
Answer
Answer: b [Reason:] None.
6. Terrestrial radio channels are broadly classifed into _____ groups.
a) 2
b) 3
c) 4
d) 1
Answer
Answer: b [Reason:] The three types are those that operate over very short distance, those that operate in local areas, those that operate in the wide area.
7. Radio channels are attractive medium because
a) Can penetrate walls
b) Connectivity can be given to mobile user
c) Can carry signals for long distance
d) All of the mentioned
Answer
Answer: d [Reason:] None.
8. Geostationary satellites
a) Are placed at a fixed point above the earth
b) Rotate the earth about a fixed axis
c) Rotate the earth about a varying axis
d) All of the mentioned
Answer
Answer: a [Reason:] They are placed in orbit at 36,000km above Earth’s surface.
Computer Networks MCQ Set 2
1. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) None of the mentioned
Answer
Answer: b [Reason:] None.
2. If you have to send multimedia data over SMTP it has to be encoded into
a) Binary
b) Signal
c) ASCII
d) None of the mentioned
Answer
Answer: c [Reason:] None.
3. Expansion of SMTP is
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
Answer
Answer: a [Reason:] None.
4. In SMTP, the command to write recievers mail adress is written with this command
a) SEND TO
b) RCPT TO
c) MAIL TO
d) None of the mentioned
Answer
Answer: b [Reason:] None.
5. The underlying Transport layer protocol used by SMTP is
a) TCP
b) UDP
c) Either a or b
d) None of the mentioned
Answer
Answer: a [Reason:] None.
6. Choose the statement which is wrong incase of SMTP
a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) None of the mentioned
Answer
Answer: b [Reason:] The sending mail server pushes the mail to receiving mail server hence it is push protocol.
7. Internet mail places each object in
a) Separate messages for each object
b) One message
c) Varies with number of objects
d) None of the mentioned
Answer
Answer: b [Reason:] None.
8. Typically the TCP port used by SMTP is
a) 25
b) 35
c) 50
d) 15
Answer
Answer: a [Reason:] None.
9. A session may include
a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions cant be determined
Answer
Answer: a [Reason:] None.
10. Example of user agents for e-mail
a) Microsoft Outlook
b) Apple Mail
c) None of the above
d) All of the mentioned
Answer
Answer: a [Reason:] None.
11. When the sender and the receiver of an email are on different systems, we need only _________
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and two pairs of MTAs
Answer
Answer: d [Reason:] None.
12. User agent does not support this
a) Composing messages
b) Reading messages
c) Replying messages
d) All of the mentioned
Answer
Answer: d [Reason:] None.
Computer Networks MCQ Set 3
1. The protocol used by Telnet application is
a) Telnet
b) FTP
c) HTTP
d) None of the mentioned
Answer
Answer: a [Reason:] None.
2. In “character at a time” mode
a) Character processing is done on the local system under the control of the remote system
b) Most text typed is immediately sent to the remote host for processing
c) All text is echoed locally, only completed lines are sent to the remote host
d) None of the mentioned
Answer
Answer: b [Reason:] None.
3. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) None of the mentioned
Answer
Answer: a [Reason:] None.
4. The correct syntax to be written in the web browser to Telnet to www.distpub.com is
a) telnet//www.distpub.com
b) telnet:www.distpub.com
c) telnet://www.distpub.com
d) telnet www.distpub.com
Answer
Answer: c [Reason:] None.
5. Telnet is a
a) Television on net
b) Network of Telephones
c) Remote Login
d) Teleshopping site
Answer
Answer: c [Reason:] None.
6. Which one of the following is not correct?
a) telnet is a general purpose client-server program
b) telnet lets user access an application on a remote computer
c) telnet can also be used for file transfer
d) none of the mentioned
Answer
Answer: c [Reason:] None.
7. Which operating mode of telnet is full duplex?
a) default mode
b) server mode
c) line mode
d) none of the mentioned
Answer
Answer: c [Reason:] None.
8. If we want that a character be interpreted by the client instead of server
a) escape character has to be used
b) control functions has to be disabled
c) it is not possible
d) none of the mentioned
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 4
1. In memory-mapped I/O ____________
a) The I/O devices and the memory share the same address space
b) The I/O devices have a seperate address space
c) The memory and I/O devices have an associated address space
d) A part of the memory is specifically set aside for the I/O operation
Answer
Answer: a [Reason:] Its the different modes of accessing the i/o devices.
2. The usual BUS structure used to connect the I/O devices is
a) Star BUS structure
b) Multiple BUS structure
c) Single BUS structure
d) Node to Node BUS structure
Answer
Answer: c [Reason:] BUS is a collection of address,control and data lines used to connect the various devices of the computer.
3. In intel’s IA-32 architecture there is a seperate 16 bit address space for the I/O devices?
a) False
b) True
Answer
Answer: b [Reason:] This type of accessing is called as I/O mapped devices.
4. The advantage of I/O mapped devices to memory mapped is
a) The former offers faster transfer of data
b) The devices connected using I/O mapping have a bigger buffer space
c) The devices have to deal with fewer address lines
d) No advantage as such
Answer
Answer: c [Reason:] Since the I/O mapped devices have a seperate address space the address lines are limited by amount of the space allocated.
5. The system is notified of a read or write operation by
a) Appending an extra bit of the address
b) Enabling the read or write bits of the devices
c) Raising an appropriate interrupt signal
d) Sending a special signal along the BUS
Answer
Answer: d [Reason:] It is necessary for the processor to send a signal intimating the request as either read or write.
6. To overcome the lag in the operating speeds of the I/O device and the processor we use
a) BUffer spaces
b) Status flags
c) Interrupt signals
d) Exceptions
Answer
Answer: b [Reason:] The processor operating is much faster than that of the I/O devices , so by using the status flags the processor need not wait till the I/O operation is done. It can continue with its work until the status flag is set.
7. The method of accessing the I/O devices by repeatedly checking the status flags is
a) Program-controlled I/O
b) Memory-mapped I/O
c) I/O mapped
d) None of the mentioned
Answer
Answer: a [Reason:] In this method the processor constantly checks the status flags , and when it finds that the flag is set it performs the appropriate operation.
8. The method of synchronising the processor with the I/O device in which the device sends a signal when it is ready is
a) Exceptions
b) Signal handling
c) Interrupts
d) DMA
Answer
Answer: c [Reason:] This is a method of accessing the I/O devices which gives the complete power to the devices, enabling them to intimate the processor when they’re ready for transfer.
9. The method which offers higher speeds of I/O transfers is
a) Interrupts
b) Memory mapping
c) Program-controlled I/O
d) DMA
Answer
Answer: d [Reason:] In DMA the I/O devices are directly allowed to interact with the memory with out the intervention of the processor and the transfres take place in the form of blocks increasing the speed of operaion.
10. The process where in the processor constantly checks the status flags is called as
a) Polling
b) Inspection
c) Reviewing
d) Echoing
Answer
Answer: a [Reason:] None.
Computer Networks MCQ Set 5
1. For converting virtual address into physical address, the programs are divided into _____
a) Pages
b) Frames
c) Segments
d) Blocks
Answer
Answer: a [Reason:] On the physical memory side the memory is divided into pages.
2. The memory allocated to each page are contiguous.
a) True
b) False
Answer
Answer: a [Reason:] Each page might be allocated memory deferentially but memory for one page will be continuous.
3. The pages size shouldn’t be too small, as this would lead to
a) Transfer errors
b) Increase in operation time
c) Increase in access time
d) Decrease in performance
Answer
Answer: c [Reason:] The access time of the magnetic disk is much longer than the access time of the memory.
4. The cache bridges the speed gap between ______ and _____
a) RAM and ROM
b) RAM and Secondary memory
c) Processor and RAM
d) None of the mentioned
Answer
Answer: c [Reason:] The Cache is a hardware implementation to reduce the access time for processor operations.
5. The virtual memory bridges the size and speed gap between ______ and _____
a) RAM and ROM
b) RAM and Secondary memory
c) Processor and RAM
d) None of the mentioned
Answer
Answer: b [Reason:] The virtual memory basically works as an extension of the RAM.
6. The higher order bits of the virtual address generated by the processor forms the _______
a) Table number
b) Frame number
c) List number
d) Page number
Answer
Answer: d [Reason:] The higher order bits indicate the page number which points to one particular entry in the page table.
7. The page length shouldn’t be too long because
a) It reduces the program efficiency
b) It increases the access time
c) It leads to wastage of memory
d) None of the mentioned
Answer
Answer: c [Reason:] If the size is more than the required size then the extra space gets wasted.
8. The lower order bits of the virtual address forms the _____
a) Page number
b) Frame number
c) Block number
d) Offset
Answer
Answer: d [Reason:] This gives the offset within the page table.
9. The area in the main memory that can hold one page is called as ______
a) Page entry
b) Page frame
c) Frame
d) Block
Answer
Answer: b [Reason:] None.
10. The starting address of the page table is stored in ______
a) TLB
b) R0
c) Page table base register
d) None of the mentioned
Answer
Answer: c [Reason:] The register is used to hold the address which is used to access the table.