Computer Network MCQ With Answer for BCA, MCA, GATE Exam

Are you preparing for your BCA or MCA exams and looking to master Computer Network MCQ With Answer? Whether studying online or through distance learning, a firm grasp of networking concepts is crucial for success. To help you excel, we've compiled a comprehensive list of over 110 multiple-choice questions (MCQs) covering key computer network topics. 

These Computer Network MCQ With Answer are designed to test your knowledge and enhance your understanding of fundamental networking principles. From protocols and routing to congestion control and traffic shaping, our Computer Network MCQ collection is tailored to provide a robust review of essential concepts. Dive in now to solidify your grasp of computer networks and ace your exams with confidence!

MCQ Questions On Computer Networks With Answers for BCA, MCA, GATE Exam

Computer Network MCQ With Answer

1. Two types of services provided by a TCP/IP network are known as service ___________ and service ___________.

  • Connection-less, connection-oriented
  • Connection lost, connection gained
  • IP, connection-oriented
  • ALL

2. Hosts can be further divided into two categories, they are ________ and ________________.

  • Clients, servers
  • Node, PC
  • PC, End system
  • ALL

3. _____________, the Internet's connection-oriented service.

  • UDP
  • HTTP
  • TCP
  • Telnet

4. OSI Reference model has _____ Layers.

  • 9
  • 8
  • 7
  • 4

5. ____ layer is concerned with transmitting raw bits over a communication channel.

  • Physical
  • Data Link
  • Application
  • Session

6. ______ layer deals with the syntax and semantics of information transformed.

  • Presentation
  • Session
  • Application
  • Physical

7. A device that is used to connect LANs.

  • HUB
  • BRIDGE
  • SWITCH
  • ROUTER

8. Router works at _____ Layer.

  • Network
  • Application
  • Session
  • Physical

9. Switch is working at _____ Layer.

  • Data Link
  • Application
  • Presentation
  • Transport

10. Hub works at ______ layer.

  • Presentation
  • Data Link
  • Physical
  • Application

11. PAN Stands For _____.

  • Postal address network
  • Prime area network
  • Personal area network
  • All

12. A-frame header contains ___________

  • Addressing information
  • Head
  • Title
  • All

13. ___________ is represented by older protocols such as BISYNC, PPP, and DDCMP.

  • Protocol
  • Bit oriented protocols
  • Byte-oriented protocols
  • All

14. DDCMP is the abbreviation of ___________

  • Digital Data Communication Message Protocol
  • Disc Data Communication Message Protocol
  • Data-driven Communication Message Protocol
  • All

15. SONET is the abbreviation of ____________.

  • Synchronous Optical Network
  • Synchronous open Network
  • Synchronous Optimum Network
  • All

16. How error detection and correction is done

  • Bypassing it through an equalizer
  • By amplifying it
  • By adding a Parity bit
  • All

17. What is the purpose of the MAC address in the Data Link Layer?

  • To uniquely identify a device on a local network
  • To route data packets across different networks
  • To provide error detection and correction
  • To establish a secure connection

18. In the context of the Data Link Layer, what does CSMA/CD stand for?

  • Connection-Oriented Service with Media Access Control
  • Collision Suppression with Multiple Access Detection
  • Control Signal Management with Data Division
  • Carrier Sense Multiple Access with Collision Detection

19. Which error detection technique is commonly used in the Data Link Layer?

  • Hamming Code
  • Huffman Coding
  • Lempel-Ziv-Welch Compression
  • CRC (Cyclic Redundancy Check)

20. Which sublayer of the Data Link Layer is responsible for the framing of data packets?

  • Logical Link Control (LLC)
  • Media Access Control (MAC)
  • Flow Control
  • Error Detection

21. In a wireless LAN (Wi-Fi) environment, which technology is commonly used for collision avoidance?

  • CSMA/CD
  • Token Ring
  • Ethernet
  • CSMA/CA

22. What is the role of the LLC (Logical Link Control) sublayer in the Data Link Layer?

  • Media access control
  • Flow control
  • Error detection and correction
  • Interface between upper layers and MAC sublayer

23. ___ is an example of an Acknowledged connectionless service

  • Wi-Fi (802.11)
  • LAN
  • WAN
  • MAN

24. In bit stuffing, each frame begins and ends with a special bit pattern called ____________

  • Flag byte
  • Byte
  • Flag
  • All

25. Measures should be taken by the data link layer when there is a fast sender and slow receiver called ____

  • Flow control
  • Error
  • Error control
  • All

26. Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding is called ___________.

  • Stop and Wait protocol
  • Wait protocol
  • Stop protocol
  • CSMA/CA

27. What is the purpose of the "ACK" frame in Flow Control?

  • To acknowledge the receipt of data frames
  • To request more data from the sender
  • To indicate the start of a data transmission
  • To provide error checking for the entire frame

28. What happens in Flow Control if a frame is lost or corrupted during transmission?

  • The receiver retransmits the lost frame
  • The sender continues sending data without waiting for acknowledgement
  • The connection is terminated
  • All

29. In Flow Control, what is the purpose of the "timeout" period?

  • To indicate the maximum allowable data transmission rate
  • To specify the duration of data frame transmission
  • To set the interval for waiting for an acknowledgement
  • To determine the physical distance between devices

30. Which Flow Control method is commonly used in TCP/IP communication to ensure reliable data transmission?

  • Stop-and-Wait
  • Sliding Window
  • Token Passing
  • Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

31. Which layer provides services to the network layer?

  • Datalink layer
  • transport layer
  • physical layer
  • session layer

32. A ____________ is composed of four fields: kind, seq, ack, and info.

  • Frame
  • Chunks
  • Packet
  • Module

33. Protocols in which the sender sends one frame and then waits for an acknowledgement before proceeding is called ___________.

  • Stop and Wait protocol
  • CSMA
  • ALOHA
  • ALL

34. Protocols in which the sender waits for a positive acknowledgement before advancing to the next data item are often called _________________.

  • ARQ (Automatic Repeat request)
  • Simplex protocol
  • CSMA
  • Slotted ALOHA

35. Which protocols define a window that slides from left to right over time?

  • Stop and Wait
  • Sliding Window Protocol
  • Simplex
  • All

36. The technique of temporarily delaying outgoing acknowledgements so that they can be hooked onto the next outgoing data frame is known as ___________.

  • Piggy Backing
  • Transporting
  • Messaging
  • Piggy

37. A sliding window protocol with a window size of 1 uses _____________ since the sender transmits a frame and waits for its acknowledgement before sending the next one.

  • Stop and Wait
  • Stop
  • Wait
  • Simplex

38. In _____ protocol, the receiver simply discards all subsequent frames, sending no acknowledgements for the discarded frames.

  • Stop and Wait
  • Simplex protocol
  • Go-Back-N
  • All

39. In ___________ protocol, a bad frame that is received is discarded, but any good frames received after it are accepted and buffered.

  • Selective Repeat
  • Go Back N
  • Stop and Wait
  • Stop

40. The technique of keeping multiple frames in trajectory is an example of__________.

  • Queuing
  • Windowing
  • Pipelining
  • All

41. Which sliding window protocol is most suitable for high-error-rate channels, such as wireless communication?

  • Stop-and-Wait
  • Go-Back-N
  • Selective Repeat
  • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

42. In concurrent logical channels protocol, the sender keeps ______________ bits of state for each channel.

  • Three
  • Two
  • Four
  • Seven

43. The technique to multiplex several logical channels onto a single point-to-point link and to run the stop-and-wait algorithm on each of these logical channels is called ____________.

  • Concurrent Logical Channels
  • Selective Repeat
  • Cumulative Acknowledgement
  • All

44. When an acknowledgement comes in for frame n, frames n + 1, n + 2, and so on are also automatically acknowledged. This type of acknowledgement is called ______________.

  • Concurrent Logical Channels
  • Selective Repeat
  • Cumulative Acknowledgement
  • All

45. Computer networks that provide only a connection-oriented service at the network layer are called:

  • Virtual Circuit Network (VC)
  • Datagram
  • Data
  • Gram

46. Computer networks that provide only a connectionless service at the network layer are called _____.

  • Datagram
  • Virtual Circuit Network
  • Virtual
  • Network

47. Each packet is routed independently in _________ networks.

  • Datagram
  • Virtual Circuit
  • Data
  • All

48. The network layer is ____ layer of OSI.

  • 3
  • 5
  • 7
  • 4

49. Data in the network layer is transferred in the form of:

  • Packets
  • Frames
  • Chunks
  • Information

50. Network layer provides _____ delivery.

  • Host to Host
  • End to End
  • HOST TO END
  • End to Host

51. Mechanism that decides the best route for data transmission:

  • Switching
  • Framing
  • Packeting
  • All

52. What is the fundamental unit of data in packet switching?

  • Circuit
  • Frame
  • Packet
  • Cell

53. Which technology is most commonly associated with circuit switching for voice calls?

  • Ethernet
  • ATM (Asynchronous Transfer Mode)
  • PSTN (Public Switched Telephone Network)
  • MPLS (Multiprotocol Label Switching)

54. In circuit switching, what is the main advantage of dedicated circuits?

  • Reduced call setup time
  • Efficient use of network resources
  • Flexibility to transmit any type of data
  • Support for dynamic routing

55. What is Go-Back-N (GBN) in data communication?

  • A type of error-correcting code
  • A data link layer protocol for flow control
  • A routing protocol for the network layer
  • A physical layer modulation technique

56. What is a datagram in networking?

  • A dedicated, high-speed network connection
  • A packet of data sent over a network without a dedicated connection
  • A protocol for establishing secure connections
  • A network topology commonly used in LANs

57. A routing algorithm that does not establish its routing decisions on measurements or estimates of the current topology and traffic is known as __________________.

  • Non-Adaptive Routing Algorithm
  • Adaptive Routing
  • Flooding
  • All

58. __________________ is responsible for deciding the output line for an incoming packet to reach a particular destination.

  • Routing Algorithm
  • Algorithm
  • Traffic Control System
  • All

59. In IPv4, addresses are __________________ bits in length.

  • 45
  • 33
  • 32
  • 17

60. Internet addressing and forwarding are important components of ______________.

  • IP Protocol (IP)
  • TCP
  • UDP
  • ARP

61. In IPv6, addresses are ___________________ bits in length.

  • 128
  • 33
  • 142
  • 23

62. Addresses which are used for one-to-one communication is known as ________________.

  • Unicast
  • Multicast
  • Broadcast
  • All

63. Addresses used for one-to-everyone on a subnet communication is called:

  • Broadcast
  • Multicast
  • Unicast
  • All

64. Which field in an IP (Internet Protocol) header is used to identify the destination address of a datagram?

  • Source Port
  • Destination Port
  • IP Address
  • All

65. When hierarchical routing is used, the routers are divided into:

  • Regions
  • Vectors
  • Areas
  • Districts

66. Sending a packet to all destinations simultaneously is called:

  • Broadcasting
  • Unicasting
  • Double casting
  • Multicasting

67. Sending a message to a group is called:

  • Broadcasting
  • Unicasting
  • Multicasting
  • Typecasting

68. RIP Response messages are also known as:

  • RIP Advertisements
  • Message Passing
  • Broadcast
  • Unicast

69. __________________ is an example of an inter-AS Routing Protocol:

  • Autonomous Protocol
  • Border Protocol
  • BGP (Border Gateway Protocol)
  • Network

70. __________ routing protocols have been used for routing within an autonomous system on the Internet:

  • SPR
  • DVR
  • LSR
  • Routing Information Protocol (RIP)

71. _____ is an Internet routing protocol:

  • SPss
  • ISRP
  • OSPF
  • OSPP

72. What is the primary purpose of routing protocols in an intranet?

  • To encrypt data traffic within the network
  • To ensure end-to-end data transmission security
  • To determine the best path for data packets within the network
  • To authenticate users accessing the intranet

73. Which type of intranet routing protocol typically uses metrics such as hop count or cost to determine the best path?

  • Distance Vector
  • Link State
  • Path Vector
  • BGP (Border Gateway Protocol)

74. In an intranet using OSPF, how are routers categorized into areas?

  • By their physical location in the network
  • By their MAC addresses
  • By their IP addresses
  • In their administrative roles

75. Which of the following is a characteristic of an Intranet?

  • Available to anyone on the internet
  • Limited access to authorized users
  • Publicly accessible

76. The transport layer is a ____layer of OSI model:

  • 4th
  • 6th
  • 7th
  • 12th

77. Transport layer is responsible ______ delivery:

  • Process to Process
  • Host to Host
  • Node to Node
  • All

78. Port numbers range is____:

  • 0-35
  • 0-32732
  • 0-65535
  • 0-1

79. Which protocol was designed to provide a reliable end-to-end byte stream over an unreliable internetwork:

  • TCP
  • UDP
  • FTP
  • HTTPS

80. __________________ is a connectionless transport protocol:

  • UDP
  • TCP
  • HTTPS
  • FTP

81. Three-Way Handshake is used in:

  • UDP
  • ARP
  • TCP
  • FTP

82. RTP stands for:

  • Real Transport Protocol
  • Rajasthan Tamilnadu Punjab
  • Real-time Transport Protocol
  • All

83. RTP is in widespread use for _______ applications:

  • Text
  • Image
  • Multimedia
  • Audio

84. RTP has a sibling protocol called ___________:

  • RTCP (Real-time Transport Control Protocol)
  • SMTP
  • RARP
  • ARP

85. The presence of many packets in the network causes packet delay and loss that degrades performance, this situation is called____:

  • Congestion
  • Traffic
  • Cloud
  • All

86. Token bucket is a ____ control algorithm:

  • Routing
  • Congestion
  • Trafficking
  • All

87. Transport layer is responsible for______ delivery:

  • Process to Process
  • Hop to Hop
  • Host to Host
  • Node to Node

88. The idea of ______________ is that the first packet that arrives at a router is the first packet to be transmitted:

  • LIFO queuing
  • HIFO queuing
  • FIFO queuing
  • Priority

89. In _______________ queuing, the idea is to mark each packet with a priority:

  • LIFO queuing
  • HIFO queuing
  • FIFO queuing
  • Priority

90. In _______________ queuing, the idea is to maintain a separate queue for each flow currently being handled by the router:

  • LIFO queuing
  • HIFO queuing
  • FAIR
  • Priority

91. Traffic-aware routing adapted to changes in topology, but not to changes in load:

  • TRUE
  • False
  • May be
  • 50-50 chances

92. The policy in which the old packet is better than the new one is often called __________________:

  • Wine
  • MILK
  • Water
  • Petrol

93. The new packet is better than the old one is called __________________:

  • Wine
  • MILK
  • Water
  • Petrol

94. Two solutions for congestion control are, and ______________:

  • Increase the resources, decrease the load
  • Decrease the resources, decrease the load
  • Decrease the resources, Increase the load
  • Increase the resources, Increase the load

95. One example of an admission control approach is_________:

  • Leaky bucket algorithm
  • ARP
  • RARP
  • ALL

96. The strategy in which prediction is done when congestion is about to happen and then to reduce the rate at which hosts send data just before packets start being discarded, is called:

  • Congestion avoidance
  • Trafficking
  • Congestion Control
  • all

97. _______ Mechanism was developed for use in the Digital Network Architecture:

  • DECbit
  • Dbit
  • Advanced Congestion Control
  • all

98. RED, invented by _____ and _______ in the early 1990s:

  • Sally Floyd, Van Jacobson
  • Sachin and Sehwag
  • dennis ritchie and bjarne stroustrup
  • All are Involved

99. Describe a strategy for detecting the nascent stages of congestion before losses occur from the end hosts:

  • Source-based congestion avoidance
  • Destination-based congestion avoidance
  • Node-based
  • All

100. In a _____ design, the end hosts observe the network conditions and adjust their behaviour accordingly:

  • Host Centric
  • Router Centric
  • Hop Centric
  • Hop

101. Which of the following systems, some entity asks the network for a certain amount of capacity to be allocated for a flow:

  • Reservation-based
  • Host-based
  • Router-based
  • Bridge based

102. __________ is an example of window-based transport protocols:

  • TCP
  • UDP
  • TELNET
  • IP

103. To evaluate the effectiveness of a resource allocation scheme, we have to consider the two principal metrics of networking. They are _____________ and ____________:

  • Throughput, delay
  • source, destination
  • input, output
  • Host, end system

104. An easy solution to provide good quality of service is to build a network with enough capacity for whatever traffic will be thrown at it. This is known as:

  • Over congestion
  • Overprovisioning
  • Routing
  • Congestion

105. __________ is a technique for regulating the average rate and burstiness of a flow of data that enters the network:

  • Traffic shaping
  • Traffic loading
  • Traffic constructing
  • Traffic Destroying

106. Monitoring traffic flow is called:

  • Traffic Guiding
  • Traffic controlling
  • Traffic identifying
  • Traffic policing

107. Algorithms that allocate router resources among the packets of a flow and between competing flows are called:

  • Packet scheduling algorithm
  • Routing
  • Signalling
  • Prioritizing

108. Which of the following protocols are utilized by the Transport Layer?

  • TCP and UDP
  • HTTP and UDP
  • UDP and HTTP
  • FTP and TCP

109. What does TCP stand for?

  • Transmission Control Protocol
  • Transfer Character Protocol
  • Transmission Character Protocol
  • Transfer Control Protocol

110. The Transport Layer receives data in the form of:

  • Byte streams
  • Bitstream
  • Packets
  • All

These questions cover a wide range of topics within computer networking, ensuring that you are well-prepared for both theoretical and practical aspects of the subject. Use this resource to test your knowledge and boost your confidence as you approach your exams. Happy studying!