adplus-dvertising

MCQ in Computer Network and Networking Part 20 | ECE Board Exam

(Last Updated On: January 7, 2023)MCQ in Computer Network and Networking Part 20 | ECE Board Exam

This is the Multiple Choice Questions Part 20 of the Series on Computer Network and Networking as one of the Communication Engineering (EST) and Electronics Engineering topics. In Preparation for the ECE Board Exam make sure to expose yourself and familiarize yourself with each and every question compiled here taken from various sources including but not limited to past Board Exam Questions in Communication Engineering and Electronics Engineering field, Communications Books, Electronics Books, Journals and other Communications and Electronics References.

Continue Practice Exam Test Questions Part 20 of the Series

MCQ in Computer Network and Networking Part 19 | ECE Board Exam

Choose the letter of the best answer in each question.

951. The combination of an IP address and a port number is known as ___________.

A. network number

B. socket address

C. subnet mask number

D. MAC address

View Answer:

Answer: Option B

Explanation:

952. The Internet Control Message Protocol (ICMP)

A. allows gateways to send error a control messages to other gateways or hosts

B. provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another

C. reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem

D. All of the above

View Answer:

Answer: Option D

Explanation:

953. Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.

A. Modem

B. Cable

C. Hub

D. Router

View Answer:

Answer: Option D

Explanation:

954. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTP

B. SNMP

C. SMTP

D. RPC

View Answer:

Answer: Option C

Explanation:

955. Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hub

B. bridge

C. gateway

D. repeater

View Answer:

Answer: Option C

Explanation:

956. _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code

B. CRC

C. VRC

D. None of the above

View Answer:

Answer: Option B

Explanation:

957. The PSTN is an example of a ………………… network.

A. packet switched

B. circuit switched

C. message switched

D. None of these

View Answer:

Answer: Option B

Explanation:

958. A subset of a network that includes all the routers but contains no loops is called:

A. spanning tree

B. spider structure

C. spider tree

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

959. An endpoint of an inter-process communication flow across a computer network is called:

A. socket

B. pipe

C. port

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

960. In an Ethernet local area network, which one of the following statements is TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.

B. The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.

C. A station continues to transmit the packet even after the collision is detected.

D. The exponential back off mechanism reduces the probability of collision on retransmissions

View Answer:

Answer: Option D

Explanation:

961. A small network making up the Internet and also having a small number of computers within it is called

A. Host

B. Address

C. Subdomain

D. None of the above

View Answer:

Answer: Option C

Explanation:

962. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

A. 1 kbps

B. 1.25 kbps

C. 2 kbps

D. 10 kbps

View Answer:

Answer: Option D

Explanation:

963. In CRC there is no error if the remainder at the receiver is _____.

A. equal to the remainder at the sender

B. zero

C. nonzero

D. the quotient at the sender

View Answer:

Answer: Option B

Explanation:

964. A modulator converts a _____ signal to a(n) _____ signal.

A. FSK; PSK

B. PSK; FSK

C. analog; digital

D. digital; analog

View Answer:

Answer: Option C

Explanation:

965. ASK, PSK, FSK, and QAM are examples of _____ encoding.

A. digital-to-digital

B. digital-to-analog

C. analog-to-analog

D. analog-to-digital

View Answer:

Answer: Option B

Explanation:

966. With an IP address of 201.142.23.12, what is your default subnet mask?

A. 0.0.0.0

B. 255.0.0.0

C. 255.255.0.0

D. 255.255.255.0

View Answer:

Answer: Option D

Explanation:

967. DSL stands for ________.

A. data subscriber lines

B. dual subscriber lines

C. delay subscriber lines

D. digital subscriber lines

View Answer:

Answer: Option D

Explanation:

968. The 802.5 standard implements a way for preventing collisions on the network. How are collisions prevented when using this standard?

A. CSMA/CD

B. Token passing

C. Collision detection

D. Time sharing

View Answer:

Answer: Option B

Explanation:

969. One of the header fields in an IP datagram is the Time to Live (TTL) field. Which of the following statements best explains the need for this field?

A. It can be used to prioritize packets

B. It can be used to reduce delays

C. It can be used to optimize throughput

D. It can be used to prevent packet looping

View Answer:

Answer: Option D

Explanation:

970. Which of the following system calls results in the sending of SYN packets?

A. socket

B. bind

C. listen

D. connect

View Answer:

Answer: Option D

Explanation:

971. What is the maximum size of data that the application layer can pass on to the TCP layer below?

A. Any size

B. 2^16 bytes-size of TCP header

C. 2^16 bytes

D. 1500 bytes

View Answer:

Answer: Option A

Explanation:

972. Station A needs to send a message consisting of 9 packets to Station B using a sliding window (window size 3) and go-back-n error control strategy. All packets are ready and immediately available for transmission. If every 5th packet that A transmits gets lost (but no acks from B ever get lost), then what is the number of packets that A will transmit for sending the message to B?

A. 12

B. 14

C. 16

D. 18

View Answer:

Answer: Option C

Explanation:

973. Which one of the following statements is FALSE?

A. Packet switching leads to better utilization of bandwidth resources than circuit switching.

B. Packet switching results in less variation in delay than circuit switching.

C. Packet switching requires more per packet processing than circuit switching

D. Packet switching can lead to reordering unlike in circuit switching

View Answer:

Answer: Option B

Explanation:

974. In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ________.

A. 2 bytes

B. 1 bytes

C. 4 bytes

D. 5 bytes

View Answer:

Answer: Option D

Explanation:

975. In Ethernet CSMA/CD, the special bit sequence transmitted by media access management to handle collision is called

A. Preamble

B. Post amble

C. Jam

D. None of the above

View Answer:

Answer: Option C

Explanation:

976. How many digits of the DNIC (Data Network Identification Code) identify the country?

A. First three

B. First four

C. First five

D. First six

View Answer:

Answer: Option A

Explanation:

977. Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another?

A. FTP

B. SNMP

C. SMTP

D. RPC

View Answer:

Answer: Option C

Explanation:

978. Which of the following device is used to connect two systems, especially if the systems use different protocols?

A. hub

B. bridge

C. gateway

D. repeater

View Answer:

Answer: Option C

Explanation:

979. _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code

B. CRC

C. VRC

D. None of the above

View Answer:

Answer: Option B

Explanation:

980. If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is:

A. 5

B. 10

C. 2

D. 6

View Answer:

Answer: Option D

Explanation:

981. In an Ethernet local area network, which one of the following statements is TRUE?

A. A station stops to sense the channel once it starts transmitting a frame.

B. The purpose of the jamming signal is to pad the frames that are smaller than the minimum frame size.

C. A station continues to transmit the packet even after the collision is detected.

D. The exponential back off mechanism reduces the probability of collision on retransmission

View Answer:

Answer: Option A

Explanation:

982. Which of the following to keep track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet.

A. Address Resolution Protocol (ARP)

B. Internet Protocol (IP)

C. Hypertext transfer Protocol (HTTP)

D. Tr

View Answer:

Answer: Option C

Explanation:

983. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is __________.

A. 1 kbps

B. 1.25 kbps

C. 2 kbps

D. 10 kbps

View Answer:

Answer: Option D

Explanation:

984. Sending a file from your personal computer’s primary memory or disk to another computer is called

A. uploading

B. downloading

C. logging on

D. hangs on

View Answer:

Answer: Option A

Explanation:

985. Consider different activities related to email.

m1:Send an email from a mail client to mail server

m2:Download an email from mailbox server to a mail client

m3:Checking email in a web browser

Which is the applicable level protocol user in each activity?

A. m1:HTTP, m2:SMTP, m3:POP

B. m1:SMTP, m2:FTP, m3:HTTP

C. m1:SMTP, m2:POP, m3:HTTP

D. m1:POP, m2:SMTP, m3:IMAP

View Answer:

Answer: Option C

Explanation:

986. In the slow start phase of the TCP congestion control algorithm, the size of the congestion window

A. does not increase

B. increases linearly

C. increases quadratically

D. increases exponentially

View Answer:

Answer: Option D

Explanation:

987. Match the following:

(P) SMTP (1) Application layer

(Q) BGP (2) Transport layer

(R) TCP (3) Data link layer

(S) PPP (4) Network layer

(5) Physical layer

A. P – 2 Q – 1 R – 3 S – 5

B. P – 1 Q – 4 R – 2 S – 3

C. P – 1 Q – 4 R – 2 S – 5

D. P – 2 Q – 4 R – 1 S – 3

View Answer:

Answer: Option B

Explanation:

988. In serial data transmission, every byte of data is padded with a ‘0’ in the beginning and one or two ‘1’ s at the end of byte because

A. Receiver is to be synchronized for byte reception

B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits

C. Padded bits are useful in parity computation

D. None of these

View Answer:

Answer: Option A

Explanation:

989. What will be the efficiency of a Stop and Wait protocol, if the transmission time for a frame is 20ns and the propagation time is 30ns?

A. 20%

B. 25%

C. 40%

D. 66%

View Answer:

Answer: Option B

Explanation:

990. Which of the situations might not require multiple routing protocols in a network?

A. when a new layer 2-only switch is added to the network

B. when you are migrating from one routing protocol to another

C. when you are using routers from multiple vendors

D. when there are host-based routers from multiple vendors

View Answer:

Answer: Option A

Explanation:

991. The number of layers in ISO OSI reference model is __________

A. 4

B. 5

C. 6

D. 7

View Answer:

Answer: Option D

Explanation:

992. can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits.

A. Hamming Code

B. CRC

C. VRC

D. None of the above

View Answer:

Answer: Option B

Explanation:

993. Firewalls are often configured to block

A. udp traffic

B. tcp traffic

C. both of the mentioned

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

994. A proxy firewall filters at _________

A. physical layer

B. data link layer

C. network layer

D. application layer

View Answer:

Answer: Option D

Explanation:

995. Size of TCP segment header ranges between ___________

A. 16 and 32 bytes

B. 16 and 32 bits

C. 20 and 60 bytes

D. 20 and 60 bits

View Answer:

Answer: Option C

Explanation:

996. In this topology there is a central controller or hub

A. star

B. mesh

C. ring

D. bus

View Answer:

Answer: Option A

Explanation:

997. In 10base2, 10base5, what do 2 and 5 stand for?

A. Speed in Mbps

B. Number of segments

C. Length of segment

D. Size of segment

View Answer:

Answer: Option B

Explanation:

998. The process of keeping addresses in memory for future use is called

A. Routing

B. Resolving

C. Caching

D. None of the above

View Answer:

Answer: Option C

Explanation:

999. Which layer links the network support layers and user support layers

A. session layer

B. data link layer

C. transport layer

D. network layer

View Answer:

Answer: Option C

Explanation:

1000. If a server has no clue about where to find the address for a hostname, then _______

A. server asks to the root server

B. server asks to its adjacent server

C. request is not processed

D. none of the mentioned

View Answer:

Answer: Option A

Explanation:

MCQ in Computer Fundamentals Series

Complete List of MCQ in Communications Engineering per topic

Complete List of MCQ in Electronics Engineering per topic

Please do Subscribe on YouTube!

P inoyBIX educates thousands of reviewers and students a day in preparation for their board examinations. Also provides professionals with materials for their lectures and practice exams. Help me go forward with the same spirit.

“Will you subscribe today via YOUTUBE?”

Subscribe

What You Also Get: FREE ACCESS & DOWNLOAD via GDRIVE

TIRED OF ADS?

  • Become Premium Member and experienced fewer ads to ads-free browsing.
  • Full Content Access Exclusive to Premium members
  • Access to PINOYBIX FREEBIES folder
  • Download Reviewers and Learning Materials Free
  • Download Content: You can see download/print button at the bottom of each post.

PINOYBIX FREEBIES FOR PREMIUM MEMBERSHIP:

  • CIVIL ENGINEERING REVIEWER
  • CIVIL SERVICE EXAM REVIEWER
  • CRIMINOLOGY REVIEWER
  • ELECTRONICS ENGINEERING REVIEWER (ECE/ECT)
  • ELECTRICAL ENGINEERING & RME REVIEWER
  • FIRE OFFICER EXAMINATION REVIEWER
  • LET REVIEWER
  • MASTER PLUMBER REVIEWER
  • MECHANICAL ENGINEERING REVIEWER
  • NAPOLCOM REVIEWER
  • Additional upload reviewers and learning materials are also FREE

FOR A LIMITED TIME

If you subscribe for PREMIUM today!

You will receive an additional 1 month of Premium Membership FREE.

For Bronze Membership an additional 2 months of Premium Membership FREE.

For Silver Membership an additional 3 months of Premium Membership FREE.

For Gold Membership an additional 5 months of Premium Membership FREE.

Join the PinoyBIX community.

This offer has expired!

Add Comment

PinoyBIX Engineering. © 2014-2023 All Rights Reserved | How to Donate? | Follow me on Blogarama DMCA.com Protection Status
error: Alert: Content selection is disabled!! (Subscribe to Enable)