computer networking and computer fundamental MCQ with answers

 

Multiple Choice Questions of Computer Networking and computer fundamentals

 

1 .What is a Firewall in Computer Network?

A.   The physical boundary of Network

B.   A system designed to prevent unauthorized access

        C. An operating System of Computer Network

        D. A web browsing Software

   Answer:b

2 .How many layers are  in the TCP/IP model?

      A. 4

      B. 5

      C. 6

       D. 7

     Answer:a

 

3. IPV4 Address is

    A. 8 bit

    B. 16 bit

   C. 32 bit

   D. 64 bit

    Answer:c

 

4 .What is the use of Bridge in Network?

       A. to connect LANs

       B. to separate LANs

     C. to control Network Speed

       D. All of the above

        Answer:c

 

5 .Router operates in which layer of OSI Reference Model?

    A. Physical Layer

   B. Network Layer

   C. Transport Layer

   D. Application Layer

    Answer:b

6 .Bridge works in which layer of the OSI model?

     A. Appliation layer

     B. Transport layer

     C. Datalink layer

     D. Network layer

      Answer:C

 

7_______ provides a connection-oriented reliable service for sending messages

    A. TCP

     B. IP

     C. UDP

     D. All of the above

     Answer:a

 

8.Which layers of the OSI model are host-to-host layers?

     A. Transport, Session, Persentation, Application

      B. Network, Transport, Session, Presentation

     C. Datalink, Network, Transport, Session

     D. Physical, Datalink, Network, Transport

      Answer:d

 

9. Which of the following IP address class is Multicast

       A. Class D

        B. Class B

        C. Class C

        D. Class A

       Answer:A

 

10. Which of the following is correct regarding Class B Address of IP address

       A. Network bit – 14, Host bit – 16

       B. Network bit – 16, Host bit – 14

      C. Network bit – 18, Host bit – 16

       D. Network bit – 12, Host bit – 14

     Answer:a

11.The last address of IP address represents

     A. Unicast address

     B. Network address

     C. Broadcast address

     D. None of above

     Answer:c

 

12 .How many bits are there in the Ethernet address?

     A. 64 bits

     B. 32 bits

     C. 48 bits

     D. 16 bits

     Answer:C

 

13. How many layers does OSI  MODEL HAS?

      A. 4 layers

      B. 5 layers

      C. 6 layers

     D. 7 layers

     Answer:d

 

14. Which of the following layer of OSI model also called end-to-end layer?

     A. Presentation layer

     B. Network layer

     C. Session layer

     D. Transport layer

     Answer:d

 

15.Which of following provides reliable communication?

     A. TCP

      B. IP

     C. UDP

     D. All of the above

    Answer:a

 

16. What is the address size of IPv6 ?

    A. 32 bit

    B. 128 bit

    C. 64 bit

    D. 256 bit

   Answer:b

 

17. What is the size of Network bits & Host bits of Class A of IP address?

      A. Network bits 7, Host bits 24

      B. Network bits 8, Host bits 24

      C. Network bits 7, Host bits 23

      D. Network bits 8, Host bits 23

      Answer:a

18. What does Router do in a network?

      A. Forwards a packet to all outgoing links

      B. Forwards a packet to the next free outgoing link

       C. Determines on which outing link a packet is to be forwarded

       D. Forwards a packet to all outgoing links except the originated link

       Answer:c

 

19. The Internet is an example of

    A. Cell switched network

    B. circuit switched network

    C. Packet switched network

    D. All of above

    Answer:c

 

20. What does protocol defines?

   A. Protocol defines what data is communicated.

   B. Protocol defines how data is communicated.

   C. Protocol defines when data is communicated.

   D. All of above

    Answer:d

21. What is the uses of subnetting?

    A. It divides one large network into several smaller ones

    B. It divides network into network classes

    C. It speeds up the speed of network

    D. None of above

      Answer:a

22. Repeater operates in which layer of the OSI model?

    A. Physical layer

    B. Data link layer

   C. Network layer

    D. Transport layer

     Answer:a

23. What is the benefit of the Networking?

    A. File Sharing

    B. Easier access to Resources

    C. Easier Backups

    D. All of the Above

    Answer:d

24. Which of the following is not the Networking Devices?

    A. Gateways

     B. Linux

     C. Routers

     D. Firewalls

     Answer:b

25. What is the size of MAC Address?

    A. 16-bits

     B. 32-bits

     C.64-bits

     D. 48-bits

     Answer:d

26. Which of the following can be Software?

      A. Routers

      B. Firewalls

      C. Gateway

      D. Modems

       Answer:b

27. What is the use of Ping command?

     A. To test a device on the network is reachable

      B. To test a hard disk fault

      C. To test a bug in a Application

      D. To test a Pinter Quality

  Answer:a

28. MAC Address is the example of

     A. Transport Layer

     B. Data Link Layer

     C. Application Layer

    D. Physical Layer

    Answer:b

29 What is the size of Host bits in Class B of IP address?

    A. 04

    B. 08

    C.32

    D. 16

   Answer:d

 

30 What is the usable size of Network bits in Class B of IP address?

     A. 14

     B. 08

     C. 04

     D. 16

     Answer:a

31 Which of the following is/are Protocols of Application?

    A. FTP

    B. DNS

    C. Telnet

    D. All of above

      Answer:d

32 Which of the following protocol is/are defined in Transport layer?

     A. FTP

     B. TCP

     C. UDP

    D. B & C

    Answer:d

 

33. Which of the following is reliable communication?

      A. TCP

       B. IP

       C. UPD

       D. All of them

    Answer:a

34. What is the natural mask for a class C Network?

        A. 255.255.255.1

        B. 255.255.255.0

        C. 255.255.255.254

        D. 255.255.255.255

      Answer:b

 

 

35. A _____ is a device that forwards packets between networks by processing

the routing information included in the packet.

       A .bridge

       b. firewall

      c. router

     d.all of the mentioned

     Answer:c

36. FTP server listens for connection on port number

        a.  20

       b.  22

       c.  21

       d  23

      Answer:c

37 In this topology there is a central controller or hub

      a.  Star

       b.  Mesh

      c .Ring

      d. Bus

        Answer: a

38 This topology requires multipoint connection

       a.  Star

       b.  Mesh

       c.  Ring

       d.  Bus

         Answer: d

39 Data communication system spanning states, countries, or the whole world is

       a.  LAN

       b.  WAN

       c.  MAN

      d.  None of the mentioned

         Answer: b

40 Data communication system within a building or campus is

        a.  LAN

        b.  WAN

        c.  MAN

       d.  None of the mentioned

        Answer: a

41. Which one of the following protocol is not used in internet?

        a. HTTP

       b.  DHCP

      c.  DNS

      d.  none of the mentioned

      Answer:d

42. DHCP uses UDP port ____ for sending data to the server.

          a.  66

           b.  67

           c.  68

           d.  69

          Answer:b

 

43 In DSL telco provides these services

                a.  Wired phone access

                b. ISP

                c.  All of the mentioned

               d.  None of the mentioned

                 Answer: c

44. One nibble is equivalent to how many bits?

               a) 2 b) 4 c) 8 d) 1 ----

               Answer: b

44. Which of the following is a function of the input Unit?

            a) It produces results that can be easily understood by the user

            b) It accepts the results produced by the computer

            c) It supplies the data and instructions to the outside world

           d) It supplies the data and instructions to the computer for further processing ----

           Answer: d

45. The two basic types of memory in a computer are ________

           a) Primary and major

          b) Primary and Secondary c) Minor and Major d) Main and virtual ----

           Answer: b

46. Which of the following is non-volatile storage?

            a) Backup b) Secondary c) Primary d) Cache ----

            Answer: b

47. The ‘heart’ of the processor which performs many different operations _____________

              a) Arithmetic and logic unit b) Motherboard c) Control Unit d) Memory ----

              Answer: a

48. The ALU gives the output of the operations and the output is stored in the ________

         a) Memory Devices b) Registers c) Flags d) Output Unit ----

         Answer: b

49. The value of base in a decimal number system is ____________

         a) 10  b) 2  c) 8  d) 16 ----

         Answer: a

50. Convert : (110)2 = ( __ )10 .

       a) 4 b) 5 c) 6 d) 9 ----

        Answer: c

50. The 2’s complement of 15 is ____________

        a) 0000 b) 0001

          c) 0010 d) 0100 ----

           Answer: b

51. The hexadecimal representation of 14 is _______________

           a) A b) F c) D d) E ----

            Answer: d

52. The binary equivalent of the decimal number 10 is __________

       a) 0010 b) 10 c) 1010 d) 010 ----

        Answer: c

53. Interpreter is used as a translator for __________

        a) Low level language b) High Level Language c) COBOL d) C ----

          Answer: b

54. The memory unit is made up of _____ bytes.

           a) 256 b) 124 c) 4096

        d) 3096 ----

         Answer: c

55. The physical devices of a computer:

        a) Software b) Package c) Hardware d) System Software ----

         Answer: c

56. Which of the following is designed to control the operations of a computer?

       a) Application Software b) System Software c) Utility Software

          d) User ----

         Answer: b

57. Which of the following is not an example of system software?

       a) Language Translator b) Utility Software c) Communication Software d) Word Processors     ----

        Answer: d

58. ___________________ is designed to solve a specific problem or to do a specific task.

           a) System Software  b) Application Software  c) Utility Software d) User ----

             Answer: b

 

 

Previous Post Next Post