Top 75 Computer Networks Questions and Answers pdf Notes

Top 75 Computer Networks Questions and Answers pdf Notes for the preparation of MCA, BCA, IT competitive exams.

In today’s fast-paced digital world, computer networks play a crucial role in connecting devices and facilitating seamless communication. Whether you’re an aspiring network engineer or simply curious about how these intricate systems work, having access to a comprehensive set of questions and answers is essential.

Look no further! In this article, we have compiled the top 75 computer networks questions and answers pdf notes that will provide you with a deep understanding of the subject matter. So, get ready to expand your knowledge and dive into the world of computer networking like never before!

Top 75 Computer Networks Questions and Answers pdf Notes

Top 75 Computer Networks Questions and Answers

1. A group of computers and other devices connected together is called a network, and the concept of connected computers sharing resources is called ___.
Ans. Networking

2. A simple cabling method, known as the ___ Topology, allows about 30 computers on a maximum cable length of about 600 feet.
Ans. Bus

3. ___ is a set of connecting links between LANs.
Ans. WAN

4. A ___ line considered as a fast WAN link, transmits at 1.5 Mbps, or 1 million bits per second.
Ans. T1

5. The ___ elements are specialized computers to connect two or more transmission lines.
Ans. Switching

6. In ___, the network contains numerous cables or leased telephone line, each one connecting a pair of IMPs.
Ans. Point-to-Point channels

7. The entities comprising the corresponding layers on different machines are called ___ processes
Ans. Peer

8. The period of a signal is 100 ms. What is its frequency in Kilohertz?
a) 10-2 KHz
b) 10-4 KHz
c) 102 KHz
d) 104 KHz
Ans. a

9. If the value of a signal changes over a very short span of time, its frequency is ___
Ans. high

10. The term ___ describes the position of the waveform relative to time 0.
a) Frequency
b) Phase
c) Phase Shift
d) Time Period
Ans. b

11. The wavelength of red light whose frequency is 4 x 1014 m is ___
Ans. 0.75mm

12. If a periodic signal is decomposed into five sine waves with frequencies 100, 300, 500, 700, and 900 Hz, what is its bandwidth?
Ans. B = 800 Hz

13. Consider an extremely noisy channel in which the value of the signal to noise ratio is almost zero. i.e. the noise is so strong that the signal is faint. Calculate the capacity C of this channel.
a) 100
b) 1000
c) 0
d) 1
Ans. c (C = B log2(1+SNR) = B log2 (1 + 0) = B log21 = B x 0 = 0)

14. The Data Link Layer of the ISO OSI model is divided into ___ sublayers
a) 1
b) 4
c) 3
d) 2
Ans. d

15. The ___ layer is responsible for resolving access to shared media or resources.
a) Physical
b) MAC sublayer
c) Network
d) Transport
Ans. b

16. A WAN typically spans a set of countries that have data rates less than ___ Mbps
a) 2
b) 1
c) 4
d) 100
Ans. b

17. The ___ model consists of N users or independent stations.
Ans. Station

18. The Aloha protocol is an OSI ___ protocol for LAN networks with broadcast topology
Ans. layer 2

19. In the ___ method, each contention period consists of exactly N slots
Ans. A Bit Map Protocol

20. The ___ layer provides a well-defined service interface to the network layer, determining how the bits of the physical layer are grouped into frames,
a) Data Link
b) Physical
c) Network
d) Session
Ans. a

21. In the ___ type of service, no connection is established beforehand or afterwards.
Ans. Unacknowledged Connectionless Service

22. In ___ type of service, each frame sent over the connection is numbered and the data link layer guarantees that each frame sent is indeed received
Ans. Connection-Oriented Service

23. The ___ service primitives provide a way for the data link layer on the requesting site to learn whether the request was successfully carried out and if not, why.
a) Request
b) Indication
c) Response
d) Confirm
Ans. Confirm

24. ___ is the process in which the receiver tries to guess the message by using redundant bits
Ans. Forward error correction

25. The ___ is a unidirectional protocol that has no flow or error control.
Ans. Simplest or Simplex

26. The detection of errors in ___ protocol is manifested by the silence of the receiver.
Ans. Stop-and-Wait Automatic Repeat Request

27. The maximum size of the window in a Sliding Window Protocol is ___
a) 2m – 1
b) 2m + 1
c) 2m
d) 2m-1
Ans. a

28. The bit size of the checksum field of HDLC frame format is ___
a) 24
b) 16
c) 8
d) 32
Ans. b

29. The bit sequence of frame delimiters used in HDLC frames to detect the end or beginning of the frames is ____
Ans. 01111110

30. The ___ is the NCP for IP
Ans. IP Control Protocol (IPCP)

31. The ___ layer is the topmost layer in the subnet.
Ans. Network

32. The ___ routing is also referred to as non-adaptive.
Ans. Static

33. The subnet gets increasingly loaded with packets causing the increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called ___.
Ans. Congestion

34. The ___ routing algorithms change their routing decisions to reflect changes in topology and usually the traffic as well.
Ans. Dynamic or adaptive

35. The set of optimal routes from source to a given destination form a tree rooted at the destination called a ___ tree.
Ans. sink

36. ___ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates the vast number of duplicate packets.
Ans. Flooding

37. In the ___ routing algorithm, each router knows all details about how to route packets to destinations within its own region. But it does not have any idea about the internal structure of other regions.
Ans. Hierarchical

38. The Internet addresses are ___ bits in length in the IPV4 addressing scheme.
a) 16
b) 64
c) 32
d) 48
Ans. c

39. The number of network segments on which the datagram is allowed to travel before a router should discard it is called ___.
Ans. Time to Live (TTL)

40. The IPV4 address is a ___ address because it is assigned at the Internet layer.
Ans. logical

41. As an example, the IPV4 address prefix specifies a range of ___ addresses.
Ans. 65,536

42. A ___ is a 16-bit number used by the host-to-host protocol to identify to which higher-level protocol or application program (process) it must deliver incoming messages.
Ans. port

43. A ___ is a special type of filehandle, which is used by a process to request network services from the operating system.
Ans. socket

44. The ___ is basically an application interface to IP.
Ans. UDP

45. A UDP datagram of ___ bytes is acceptable to all implementations.
a) 256
b) 512
c) 516
d) 1024
Ans. c

46. In ___ the application does not have to bother with chopping the data into basic blocks or datagrams.
Ans. TCP

47. In addresses for ___ networks, the first 16 bits specify a particular network, and the last 16 bits specify a particular host.
a) class A
b) class C
c) class B
d) class D
Ans. c

48. The ___ header field of IPV6 indicates the number of links on which the packet is allowed to travel before being discarded by a router.
Ans. Hop Limit

49. The ___ is a set of ICMPv6 messages and processes that determine relationships between neighbouring nodes.
Ans. ND (Neighbor Discovery)

50. An application process is assigned a process identifier number (process ID), which is likely to be ___ each time that process is started.
Ans. different

51. The service access points in Session Layer are called _____.
Ans. Session Service Access Points (SSAPs)

52. Sessions are ended with ___ primitive.
Ans. S-RELEASE.request

53. In principle, all OSI connections are ___.
Ans. full-duplex

54. The process wherein the session users can split the text up into pages and insert a synchronization point between each page, and in case of trouble, it is possible to reset the state of the session to a previous synchronization point and continue from there is called ___.
Ans. re-synchronization

55. A procedure included in the caller’s address space by the linker is known as ___.
Ans. local procedure

56. Packing parameters into a message is called ___.
Ans. parameter marshalling

57. The ___ protocol is based on end-to-end delivery.
b) TCP
c) IP
Ans. a

58. The client SMTP uses the ___ to determine the IP address of the destination mailbox.
Ans. Domain Name System

59. The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ___ Service ready message.
a) 420
b) 320
c) 220
d) 120
Ans. c

60. ___ is a command-line tool designed for most UNIX-like operating systems.
Ans. Sendmail

61. To avoid ambiguity, the names assigned to machines must be carefully selected from a ___ with complete control over the binding between the names and IP addresses.
Ans. namespace

62. A name in the ___ namespace is a sequence of characters without structure.
Ans. Flat

63. The ___ namespace is based on a hierarchical and logical tree structure.
Ans. DNS

64. The ___ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers.
Ans. Resolvers

65. In a ___ query, the queried name server is requested to respond with the requested data or with an error stating that data of the requested type or the specified domain name does not exist.
Ans. recursive

66. Sendmail uses a ___ system to manage inbound and outbound mail.
Ans. queuing

67. A MIME-compliant message must contain a header field with the ___ verbatim text.
Ans. MIME-Version: 1.0

68. A ___ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks.
Ans. firewall

69. The ___ is a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.
Ans. IPSec

70. In ___ mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
Ans. Tunnelling or encapsulation

71. The ___ is used to provide integrity and authentication to IP datagrams.
Ans. Authentication Header (AH)

72. The next header t is an ___ field of Authentication Header that identifies the type of what follows.
a) 16-bit
b) 32-bit
c) 64-bit
d) 8-bit
Ans. d

73. The ___ is used to provide integrity check, authentication, and encryption to IP datagrams.
Ans. ESP

74. The primary goal of the ___ protocol is to provide a private channel between communicating applications, which ensures privacy of data, authentication of the partners, and integrity.
Ans. SSL

75. The client code recognizes the SSL request and establishes a connection through TCP port ___ to the SSL code on the server.
a) 402
b) 1023
c) 443
d) 8080
Ans. c

Download Top 75 Computer Networks Questions and Answers in pdf


The Top 75 Computer Networks Questions and Answers pdf Notes provide a comprehensive resource for anyone looking to expand their knowledge in this field. From basic concepts to advanced topics, these notes cover a wide range of information that will be valuable for students, professionals, and enthusiasts alike.

By sharing this resource on social media, you can help others discover and benefit from these valuable notes as well.

So don’t hesitate to spread the word and let others know about this valuable resource. Together, we can foster a community of learners who are passionate about computer networks and eager to expand their understanding in this ever-evolving field.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *