Top 75 Computer Networks Questions and Answers pdf Notes for the preparation of MCA, BCA, IT competitive exams.
In today’s fast-paced digital world, computer networks play a crucial role in connecting devices and facilitating seamless communication. Whether you’re an aspiring network engineer or simply curious about how these intricate systems work, having access to a comprehensive set of questions and answers is essential.
Look no further! In this article, we have compiled the top 75 computer networks questions and answers pdf notes that will provide you with a deep understanding of the subject matter. So, get ready to expand your knowledge and dive into the world of computer networking like never before!
Top 75 Computer Networks Questions and Answers
1. A group of computers and other devices connected together is called a network, and the concept of connected computers sharing resources is called ___.
2. A simple cabling method, known as the ___ Topology, allows about 30 computers on a maximum cable length of about 600 feet.
3. ___ is a set of connecting links between LANs.
4. A ___ line considered as a fast WAN link, transmits at 1.5 Mbps, or 1 million bits per second.
5. The ___ elements are specialized computers to connect two or more transmission lines.
6. In ___, the network contains numerous cables or leased telephone line, each one connecting a pair of IMPs.
Ans. Point-to-Point channels
7. The entities comprising the corresponding layers on different machines are called ___ processes
8. The period of a signal is 100 ms. What is its frequency in Kilohertz?
a) 10-2 KHz
b) 10-4 KHz
c) 102 KHz
d) 104 KHz
9. If the value of a signal changes over a very short span of time, its frequency is ___
10. The term ___ describes the position of the waveform relative to time 0.
c) Phase Shift
d) Time Period
11. The wavelength of red light whose frequency is 4 x 1014 m is ___
12. If a periodic signal is decomposed into five sine waves with frequencies 100, 300, 500, 700, and 900 Hz, what is its bandwidth?
Ans. B = 800 Hz
13. Consider an extremely noisy channel in which the value of the signal to noise ratio is almost zero. i.e. the noise is so strong that the signal is faint. Calculate the capacity C of this channel.
Ans. c (C = B log2(1+SNR) = B log2 (1 + 0) = B log21 = B x 0 = 0)
14. The Data Link Layer of the ISO OSI model is divided into ___ sublayers
15. The ___ layer is responsible for resolving access to shared media or resources.
b) MAC sublayer
16. A WAN typically spans a set of countries that have data rates less than ___ Mbps
17. The ___ model consists of N users or independent stations.
18. The Aloha protocol is an OSI ___ protocol for LAN networks with broadcast topology
Ans. layer 2
19. In the ___ method, each contention period consists of exactly N slots
Ans. A Bit Map Protocol
20. The ___ layer provides a well-defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames,
a) Data Link
21. In the ___ type of service, no connection is established beforehand or afterwards.
Ans. Unacknowledged Connectionless Service
22. In ___ type of service, each frame sent over the connection is numbered and the data link layer guarantees that each frame sent is indeed received
Ans. Connection-Oriented Service
23. The ___ service primitives provide a way for the data link layer on the requesting site to learn whether the request was successfully carried out and if not, why.
24. ___ is the process in which the receiver tries to guess the message by using redundant bits
Ans. Forward error correction
25. The ___ is a unidirectional protocol that has no flow or error control.
Ans. Simplest or Simplex
26. The detection of errors in ___ protocol is manifested by the silence of the receiver.
Ans. Stop-and-Wait Automatic Repeat Request
27. The maximum size of the window in a Sliding Window Protocol is ___
a) 2m – 1
b) 2m + 1
28. The bit size of the checksum field of HDLC frame format is ___
29. The bit sequence of frame delimiters used in HDLC frames to detect the end or beginning of the frames is ____
30. The ___ is the NCP for IP
Ans. IP Control Protocol (IPCP)
31. The ___ layer is the topmost layer in the subnet.
32. The ___ routing is also referred to as non-adaptive.
33. The subnet gets increasingly loaded with packets causing the increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called ___.
34. The ___ routing algorithms change their routing decisions to reflect changes in topology and usually the traffic as well.
Ans. Dynamic or adaptive
35. The set of optimal routes from source to a given destination form a tree rooted at the destination called a ___ tree.
36. ___ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates the vast number of duplicate packets.
37. In the ___ routing algorithm, each router knows all details about how to route packets to destinations within its own region. But it does not have any idea about the internal structure of other regions.
38. The Internet addresses are ___ bits in length in the IPV4 addressing scheme.
39. The number of network segments on which the datagram is allowed to travel before a router should discard it is called ___.
Ans. Time to Live (TTL)
40. The IPV4 address is a ___ address because it is assigned at the Internet layer.
41. As an example, the IPV4 address prefix 18.104.22.168/16 specifies a range of ___ addresses.
42. A ___ is a 16-bit number used by the host-to-host protocol to identify to which higher-level protocol or application program (process) it must deliver incoming messages.
43. A ___ is a special type of filehandle, which is used by a process to request network services from the operating system.
44. The ___ is basically an application interface to IP.
45. A UDP datagram of ___ bytes is acceptable to all implementations.
46. In ___ the application does not have to bother with chopping the data into basic blocks or datagrams.
47. In addresses for ___ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.
a) class A
b) class C
c) class B
d) class D
48. The ___ header field of IPV6 indicates the number of links on which the packet is allowed to travel before being discarded by a router.
Ans. Hop Limit
49. The ___ is a set of ICMPv6 messages and processes that determine relationships between neighbouring nodes.
Ans. ND (Neighbor Discovery)
50. An application process is assigned a process identifier number (process ID), which is likely to be ___ each time that process is started.
51. The service access points in Session Layer are called _____.
Ans. Session Service Access Points (SSAPs)
52. Sessions are ended with ___ primitive.
53. In principle, all OSI connections are ___.
54. The process wherein the session users can split the text up into pages and insert a synchronization point between each page, and in case of trouble, it is possible to reset the state of the session to a previous synchronization point and continue from there is called ___.
55. A procedure included in the caller’s address space by the linker is known as ___.
Ans. local procedure
56. Packing parameters into a message is called ___.
Ans. parameter marshalling
57. The ___ protocol is based on end-to-end delivery.
58. The client SMTP uses the ___ to determine the IP address of the destination mailbox.
Ans. Domain Name System
59. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ___ Service ready message.
60. ___ is a command-line tool designed for most UNIX-like operating systems.
61. To avoid ambiguity, the names assigned to machines must be carefully selected from a ___ with complete control over the binding between the names and IP addresses.
62. A name in the ___ namespace is a sequence of characters without structure.
63. The ___ namespace is based on a hierarchical and logical tree structure.
64. The ___ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers.
65. In a ___ query, the queried name server is requested to respond with the requested data or with an error stating that data of the requested type or the specified domain name does not exist.
66. Sendmail uses a ___ system to manage inbound and outbound mail.
67. A MIME-compliant message must contain a header field with the ___ verbatim text.
Ans. MIME-Version: 1.0
68. A ___ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks.
69. The ___ is a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.
70. In ___ mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
Ans. Tunnelling or encapsulation
71. The ___ is used to provide integrity and authentication to IP datagrams.
Ans. Authentication Header (AH)
72. The next header t is an ___ field of Authentication Header that identifies the type of what follows.
73. The ___ is used to provide integrity check, authentication, and encryption to IP datagrams.
74. The primary goal of the ___ protocol is to provide a private channel between communicating applications, which ensures privacy of data, authentication of the partners, and integrity.
75. The client code recognizes the SSL request and establishes a connection through TCP port ___ to the SSL code on the server.
Download Top 75 Computer Networks Questions and Answers in pdf
- Computer Network MCQs with Answers Model Test Paper – I
- Advanced Computer Networks MCQ sample papers with answers
The Top 75 Computer Networks Questions and Answers pdf Notes provide a comprehensive resource for anyone looking to expand their knowledge in this field. From basic concepts to advanced topics, these notes cover a wide range of information that will be valuable for students, professionals, and enthusiasts alike.
By sharing this resource on social media, you can help others discover and benefit from these valuable notes as well.
So don’t hesitate to spread the word and let others know about this valuable resource. Together, we can foster a community of learners who are passionate about computer networks and eager to expand their understanding in this ever-evolving field.