Computer Network MCQ With Answer for BCA, MCA, GATE Exam
Are you preparing for your BCA or MCA exams and looking to master Computer Network MCQ With Answer? Whether studying online or through distance learning, a firm grasp of networking concepts is crucial for success. To help you excel, we've compiled a comprehensive list of over 110 multiple-choice questions (MCQs) covering key computer network topics.
These Computer Network MCQ With Answer are designed to test your knowledge and enhance your understanding of fundamental networking principles. From protocols and routing to congestion control and traffic shaping, our Computer Network MCQ collection is tailored to provide a robust review of essential concepts. Dive in now to solidify your grasp of computer networks and ace your exams with confidence!
Computer Network MCQ With Answer
1. Two types of services provided by a TCP/IP network are known as service ___________ and service ___________.
- Connection-less, connection-oriented
- Connection lost, connection gained
- IP, connection-oriented
- ALL
2. Hosts can be further divided into two categories, they are ________ and ________________.
- Clients, servers
- Node, PC
- PC, End system
- ALL
3. _____________, the Internet's connection-oriented service.
- UDP
- HTTP
- TCP
- Telnet
4. OSI Reference model has _____ Layers.
- 9
- 8
- 7
- 4
5. ____ layer is concerned with transmitting raw bits over a communication channel.
- Physical
- Data Link
- Application
- Session
6. ______ layer deals with the syntax and semantics of information transformed.
- Presentation
- Session
- Application
- Physical
7. A device that is used to connect LANs.
- HUB
- BRIDGE
- SWITCH
- ROUTER
8. Router works at _____ Layer.
- Network
- Application
- Session
- Physical
9. Switch is working at _____ Layer.
- Data Link
- Application
- Presentation
- Transport
10. Hub works at ______ layer.
- Presentation
- Data Link
- Physical
- Application
11. PAN Stands For _____.
- Postal address network
- Prime area network
- Personal area network
- All
12. A-frame header contains ___________
- Addressing information
- Head
- Title
- All
13. ___________ is represented by older protocols such as BISYNC, PPP, and DDCMP.
- Protocol
- Bit oriented protocols
- Byte-oriented protocols
- All
14. DDCMP is the abbreviation of ___________
- Digital Data Communication Message Protocol
- Disc Data Communication Message Protocol
- Data-driven Communication Message Protocol
- All
15. SONET is the abbreviation of ____________.
- Synchronous Optical Network
- Synchronous open Network
- Synchronous Optimum Network
- All
16. How error detection and correction is done
- Bypassing it through an equalizer
- By amplifying it
- By adding a Parity bit
- All
17. What is the purpose of the MAC address in the Data Link Layer?
- To uniquely identify a device on a local network
- To route data packets across different networks
- To provide error detection and correction
- To establish a secure connection
18. In the context of the Data Link Layer, what does CSMA/CD stand for?
- Connection-Oriented Service with Media Access Control
- Collision Suppression with Multiple Access Detection
- Control Signal Management with Data Division
- Carrier Sense Multiple Access with Collision Detection
19. Which error detection technique is commonly used in the Data Link Layer?
- Hamming Code
- Huffman Coding
- Lempel-Ziv-Welch Compression
- CRC (Cyclic Redundancy Check)
20. Which sublayer of the Data Link Layer is responsible for the framing of data packets?
- Logical Link Control (LLC)
- Media Access Control (MAC)
- Flow Control
- Error Detection
21. In a wireless LAN (Wi-Fi) environment, which technology is commonly used for collision avoidance?
- CSMA/CD
- Token Ring
- Ethernet
- CSMA/CA
22. What is the role of the LLC (Logical Link Control) sublayer in the Data Link Layer?
- Media access control
- Flow control
- Error detection and correction
- Interface between upper layers and MAC sublayer
23. ___ is an example of an Acknowledged connectionless service
- Wi-Fi (802.11)
- LAN
- WAN
- MAN
24. In bit stuffing, each frame begins and ends with a special bit pattern called ____________
- Flag byte
- Byte
- Flag
- All
25. Measures should be taken by the data link layer when there is a fast sender and slow receiver called ____
- Flow control
- Error
- Error control
- All
26. Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding is called ___________.
- Stop and Wait protocol
- Wait protocol
- Stop protocol
- CSMA/CA
27. What is the purpose of the "ACK" frame in Flow Control?
- To acknowledge the receipt of data frames
- To request more data from the sender
- To indicate the start of a data transmission
- To provide error checking for the entire frame
28. What happens in Flow Control if a frame is lost or corrupted during transmission?
- The receiver retransmits the lost frame
- The sender continues sending data without waiting for acknowledgement
- The connection is terminated
- All
29. In Flow Control, what is the purpose of the "timeout" period?
- To indicate the maximum allowable data transmission rate
- To specify the duration of data frame transmission
- To set the interval for waiting for an acknowledgement
- To determine the physical distance between devices
30. Which Flow Control method is commonly used in TCP/IP communication to ensure reliable data transmission?
- Stop-and-Wait
- Sliding Window
- Token Passing
- Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
31. Which layer provides services to the network layer?
- Datalink layer
- transport layer
- physical layer
- session layer
32. A ____________ is composed of four fields: kind, seq, ack, and info.
- Frame
- Chunks
- Packet
- Module
33. Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding is called ___________.
- Stop and Wait protocol
- CSMA
- ALOHA
- ALL
34. Protocols in which the sender waits for a positive acknowledgement before advancing to the next data item are often called _________________.
- ARQ (Automatic Repeat request)
- Simplex protocol
- CSMA
- Slotted ALOHA
35. Which protocols define a window that slides from left to right over time?
- Stop and Wait
- Sliding Window Protocol
- Simplex
- All
36. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as ___________.
- Piggy Backing
- Transporting
- Messaging
- Piggy
37. A sliding window protocol with a window size of 1 uses _____________ since the sender transmits a frame and waits for its acknowledgement before sending the next one.
- Stop and Wait
- Stop
- Wait
- Simplex
38. In _____ protocol, the receiver simply discards all subsequent frames, sending no acknowledgements for the discarded frames.
- Stop and Wait
- Simplex protocol
- Go-Back-N
- All
39. In ___________ protocol, a bad frame that is received is discarded, but any good frames received after it are accepted and buffered.
- Selective Repeat
- Go Back N
- Stop and Wait
- Stop
40. The technique of keeping multiple frames in trajectory is an example of__________.
- Queuing
- Windowing
- Pipelining
- All
41. Which sliding window protocol is most suitable for high-error-rate channels, such as wireless communication?
- Stop-and-Wait
- Go-Back-N
- Selective Repeat
- Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
42. In concurrent logical channels protocol, the sender keeps ______________ bits of state for each channel.
- Three
- Two
- Four
- Seven
43. The technique to multiplex several logical channels onto a single point-to-point link and to run the stop-and-wait algorithm on each of these logical channels is called ____________.
- Concurrent Logical Channels
- Selective Repeat
- Cumulative Acknowledgement
- All
44. When an acknowledgement comes in for frame n, frames n + 1, n + 2, and so on are also automatically acknowledged. This type of acknowledgement is called ______________.
- Concurrent Logical Channels
- Selective Repeat
- Cumulative Acknowledgement
- All
45. Computer networks that provide only a connection-oriented service at the network layer are called:
- Virtual Circuit Network (VC)
- Datagram
- Data
- Gram
46. Computer networks that provide only a connectionless service at the network layer are called _____.
- Datagram
- Virtual Circuit Network
- Virtual
- Network
47. Each packet is routed independently in _________ networks.
- Datagram
- Virtual Circuit
- Data
- All
48. The network layer is ____ layer of OSI.
- 3
- 5
- 7
- 4
49. Data in the network layer is transferred in the form of:
- Packets
- Frames
- Chunks
- Information
50. Network layer provides _____ delivery.
- Host to Host
- End to End
- HOST TO END
- End to Host
51. Mechanism that decides the best route for data transmission:
- Switching
- Framing
- Packeting
- All
52. What is the fundamental unit of data in packet switching?
- Circuit
- Frame
- Packet
- Cell
53. Which technology is most commonly associated with circuit switching for voice calls?
- Ethernet
- ATM (Asynchronous Transfer Mode)
- PSTN (Public Switched Telephone Network)
- MPLS (Multiprotocol Label Switching)
54. In circuit switching, what is the main advantage of dedicated circuits?
- Reduced call setup time
- Efficient use of network resources
- Flexibility to transmit any type of data
- Support for dynamic routing
55. What is Go-Back-N (GBN) in data communication?
- A type of error-correcting code
- A data link layer protocol for flow control
- A routing protocol for the network layer
- A physical layer modulation technique
56. What is a datagram in networking?
- A dedicated, high-speed network connection
- A packet of data sent over a network without a dedicated connection
- A protocol for establishing secure connections
- A network topology commonly used in LANs
57. A routing algorithm that does not establish its routing decisions on measurements or estimates of the current topology and traffic is known as __________________.
- Non-Adaptive Routing Algorithm
- Adaptive Routing
- Flooding
- All
58. __________________ is responsible for deciding the output line for an incoming packet to reach a particular destination.
- Routing Algorithm
- Algorithm
- Traffic Control System
- All
59. In IPv4, addresses are __________________ bits in length.
- 45
- 33
- 32
- 17
60. Internet addressing and forwarding are important components of ______________.
- IP Protocol (IP)
- TCP
- UDP
- ARP
61. In IPv6, addresses are ___________________ bits in length.
- 128
- 33
- 142
- 23
62. Addresses which are used for one-to-one communication is known as ________________.
- Unicast
- Multicast
- Broadcast
- All
63. Addresses used for one-to-everyone on a subnet communication is called:
- Broadcast
- Multicast
- Unicast
- All
64. Which field in an IP (Internet Protocol) header is used to identify the destination address of a datagram?
- Source Port
- Destination Port
- IP Address
- All
65. When hierarchical routing is used, the routers are divided into:
- Regions
- Vectors
- Areas
- Districts
66. Sending a packet to all destinations simultaneously is called:
- Broadcasting
- Unicasting
- Double casting
- Multicasting
67. Sending a message to a group is called:
- Broadcasting
- Unicasting
- Multicasting
- Typecasting
68. RIP Response messages are also known as:
- RIP Advertisements
- Message Passing
- Broadcast
- Unicast
69. __________________ is an example of an inter-AS Routing Protocol:
- Autonomous Protocol
- Border Protocol
- BGP (Border Gateway Protocol)
- Network
70. __________ routing protocols have been used for routing within an autonomous system on the Internet:
- SPR
- DVR
- LSR
- Routing Information Protocol (RIP)
71. _____ is an Internet routing protocol:
- SPss
- ISRP
- OSPF
- OSPP
72. What is the primary purpose of routing protocols in an intranet?
- To encrypt data traffic within the network
- To ensure end-to-end data transmission security
- To determine the best path for data packets within the network
- To authenticate users accessing the intranet
73. Which type of intranet routing protocol typically uses metrics such as hop count or cost to determine the best path?
- Distance Vector
- Link State
- Path Vector
- BGP (Border Gateway Protocol)
74. In an intranet using OSPF, how are routers categorized into areas?
- By their physical location in the network
- By their MAC addresses
- By their IP addresses
- In their administrative roles
75. Which of the following is a characteristic of an Intranet?
- Available to anyone on the internet
- Limited access to authorized users
- Publicly accessible
76. The transport layer is a ____layer of OSI model:
- 4th
- 6th
- 7th
- 12th
77. Transport layer is responsible ______ delivery:
- Process to Process
- Host to Host
- Node to Node
- All
78. Port numbers range is____:
- 0-35
- 0-32732
- 0-65535
- 0-1
79. Which protocol was designed to provide a reliable end-to-end byte stream over an unreliable internetwork:
- TCP
- UDP
- FTP
- HTTPS
80. __________________ is a connectionless transport protocol:
- UDP
- TCP
- HTTPS
- FTP
81. Three-Way Handshake is used in:
- UDP
- ARP
- TCP
- FTP
82. RTP stands for:
- Real Transport Protocol
- Rajasthan Tamilnadu Punjab
- Real-time Transport Protocol
- All
83. RTP is in widespread use for _______ applications:
- Text
- Image
- Multimedia
- Audio
84. RTP has a sibling protocol called ___________:
- RTCP (Real-time Transport Control Protocol)
- SMTP
- RARP
- ARP
85. The presence of many packets in the network causes packet delay and loss that degrades performance, this situation is called____:
- Congestion
- Traffic
- Cloud
- All
86. Token bucket is a ____ control algorithm:
- Routing
- Congestion
- Trafficking
- All
87. Transport layer is responsible for______ delivery:
- Process to Process
- Hop to Hop
- Host to Host
- Node to Node
88. The idea of ______________ is that the first packet that arrives at a router is the first packet to be transmitted:
- LIFO queuing
- HIFO queuing
- FIFO queuing
- Priority
89. In _______________ queuing, the idea is to mark each packet with a priority:
- LIFO queuing
- HIFO queuing
- FIFO queuing
- Priority
90. In _______________ queuing, the idea is to maintain a separate queue for each flow currently being handled by the router:
- LIFO queuing
- HIFO queuing
- FAIR
- Priority
91. Traffic-aware routing adapted to changes in topology, but not to changes in load:
- TRUE
- False
- May be
- 50-50 chances
92. The policy in which the old packet is better than the new one is often called __________________:
- Wine
- MILK
- Water
- Petrol
93. The new packet is better than the old one is called __________________:
- Wine
- MILK
- Water
- Petrol
94. Two solutions for congestion control are, and ______________:
- Increase the resources, decrease the load
- Decrease the resources, decrease the load
- Decrease the resources, Increase the load
- Increase the resources, Increase the load
95. One example of an admission control approach is_________:
- Leaky bucket algorithm
- ARP
- RARP
- ALL
96. The strategy in which prediction is done when congestion is about to happen and then to reduce the rate at which hosts send data just before packets start being discarded, is called:
- Congestion avoidance
- Trafficking
- Congestion Control
- all
97. _______ Mechanism was developed for use in the Digital Network Architecture:
- DECbit
- Dbit
- Advanced Congestion Control
- all
98. RED, invented by _____ and _______ in the early 1990s:
- Sally Floyd, Van Jacobson
- Sachin and Sehwag
- dennis ritchie and bjarne stroustrup
- All are Involved
99. Describe a strategy for detecting the nascent stages of congestion before losses occur from the end hosts:
- Source-based congestion avoidance
- Destination-based congestion avoidance
- Node-based
- All
100. In a _____ design, the end hosts observe the network conditions and adjust their behaviour accordingly:
- Host Centric
- Router Centric
- Hop Centric
- Hop
101. Which of the following systems, some entity asks the network for a certain amount of capacity to be allocated for a flow:
- Reservation-based
- Host-based
- Router-based
- Bridge based
102. __________ is an example of window-based transport protocols:
- TCP
- UDP
- TELNET
- IP
103. To evaluate the effectiveness of a resource allocation scheme, we have to consider the two principal metrics of networking. They are _____________ and ____________:
- Throughput, delay
- source, destination
- input, output
- Host, end system
104. An easy solution to provide good quality of service is to build a network with enough capacity for whatever traffic will be thrown at it. This is known as:
- Over congestion
- Overprovisioning
- Routing
- Congestion
105. __________ is a technique for regulating the average rate and burstiness of a flow of data that enters the network:
- Traffic shaping
- Traffic loading
- Traffic constructing
- Traffic Destroying
106. Monitoring traffic flow is called:
- Traffic Guiding
- Traffic controlling
- Traffic identifying
- Traffic policing
107. Algorithms that allocate router resources among the packets of a flow and between competing flows are called:
- Packet scheduling algorithm
- Routing
- Signalling
- Prioritizing
108. Which of the following protocols are utilized by the Transport Layer?
- TCP and UDP
- HTTP and UDP
- UDP and HTTP
- FTP and TCP
109. What does TCP stand for?
- Transmission Control Protocol
- Transfer Character Protocol
- Transmission Character Protocol
- Transfer Control Protocol
110. The Transport Layer receives data in the form of:
- Byte streams
- Bitstream
- Packets
- All
These questions cover a wide range of topics within computer networking, ensuring that you are well-prepared for both theoretical and practical aspects of the subject. Use this resource to test your knowledge and boost your confidence as you approach your exams. Happy studying!