Multiple Choice Questions of Computer Networking and
computer fundamentals
1 .What is a Firewall in Computer Network?
A.
The physical boundary of Network
B.
A system designed to prevent unauthorized access
C. An operating System of Computer Network
D. A
web browsing Software
Answer:b
2 .How many layers are in
the TCP/IP model?
A. 4
B. 5
C. 6
D. 7
Answer:a
3.
IPV4 Address is
A.
8 bit
B.
16 bit
C.
32 bit
D.
64 bit
Answer:c
4 .What is the use of Bridge in Network?
A. to connect LANs
B. to separate LANs
C.
to control Network Speed
D. All of the above
Answer:c
5 .Router operates in which layer of OSI Reference Model?
A.
Physical Layer
B.
Network Layer
C.
Transport Layer
D.
Application Layer
Answer:b
6 .Bridge works in which layer of the OSI model?
A.
Appliation layer
B.
Transport layer
C. Datalink layer
D.
Network layer
Answer:C
7_______ provides a connection-oriented reliable service
for sending messages
A.
TCP
B.
IP
C.
UDP
D.
All of the above
Answer:a
8.Which layers of the OSI model are host-to-host layers?
A.
Transport, Session, Persentation, Application
B. Network, Transport, Session, Presentation
C.
Datalink, Network, Transport, Session
D.
Physical, Datalink, Network, Transport
Answer:d
9. Which of the following IP address class is Multicast
A. Class D
B. Class B
C. Class C
D. Class A
Answer:A
10. Which of the following is correct regarding Class B
Address of IP address
A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
D. Network bit – 12, Host bit – 14
Answer:a
11.The last address of IP address represents
A.
Unicast address
B.
Network address
C.
Broadcast address
D.
None of above
Answer:c
12 .How many bits are there in the Ethernet address?
A.
64 bits
B.
32 bits
C.
48 bits
D.
16 bits
Answer:C
13. How many layers does OSI MODEL HAS?
A. 4 layers
B. 5 layers
C. 6 layers
D.
7 layers
Answer:d
14. Which of the following layer of OSI model also called
end-to-end layer?
A.
Presentation layer
B.
Network layer
C.
Session layer
D.
Transport layer
Answer:d
15.Which of following provides reliable communication?
A.
TCP
B. IP
C.
UDP
D.
All of the above
Answer:a
16. What is the address size of IPv6 ?
A.
32 bit
B.
128 bit
C.
64 bit
D.
256 bit
Answer:b
17. What is the size of Network bits & Host bits of
Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
Answer:a
18. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
Answer:c
19. The Internet is an example of
A.
Cell switched network
B.
circuit switched network
C.
Packet switched network
D.
All of above
Answer:c
20. What does protocol defines?
A.
Protocol defines what data is communicated.
B.
Protocol defines how data is communicated.
C.
Protocol defines when data is communicated.
D.
All of above
Answer:d
21. What is the uses of subnetting?
A.
It divides one large network into several smaller ones
B.
It divides network into network classes
C.
It speeds up the speed of network
D.
None of above
Answer:a
22. Repeater operates in which layer of the OSI model?
A.
Physical layer
B.
Data link layer
C.
Network layer
D.
Transport layer
Answer:a
23.
What is the benefit of the Networking?
A.
File Sharing
B.
Easier access to Resources
C.
Easier Backups
D.
All of the Above
Answer:d
24. Which of the following is not the Networking Devices?
A.
Gateways
B.
Linux
C.
Routers
D.
Firewalls
Answer:b
25. What is the size of MAC Address?
A.
16-bits
B.
32-bits
C.64-bits
D.
48-bits
Answer:d
26. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
Answer:b
27. What is the use of Ping command?
A.
To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
Answer:a
28. MAC Address is the example of
A.
Transport Layer
B.
Data Link Layer
C.
Application Layer
D.
Physical Layer
Answer:b
29
What is the size of Host bits in Class B of IP address?
A.
04
B.
08
C.32
D.
16
Answer:d
30 What is the usable size of Network bits in Class B of
IP address?
A.
14
B.
08
C.
04
D.
16
Answer:a
31 Which of the following is/are Protocols of
Application?
A.
FTP
B.
DNS
C.
Telnet
D.
All of above
Answer:d
32 Which of the following protocol is/are defined in
Transport layer?
A.
FTP
B.
TCP
C.
UDP
D.
B & C
Answer:d
33. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
Answer:a
34. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255
Answer:b
35. A _____ is a device that forwards
packets between networks by processing
the routing information included in the
packet.
A .bridge
b. firewall
c. router
d.all of the mentioned
Answer:c
36. FTP server listens for connection on
port number
a. 20
b. 22
c. 21
d 23
Answer:c
37 In this topology there is a central
controller or hub
a. Star
b. Mesh
c .Ring
d. Bus
Answer: a
38 This topology requires multipoint
connection
a. Star
b. Mesh
c. Ring
d. Bus
Answer: d
39 Data communication system spanning
states, countries, or the whole world is
a. LAN
b. WAN
c. MAN
d. None of the mentioned
Answer: b
40 Data communication system within a
building or campus is
a. LAN
b. WAN
c. MAN
d. None of the mentioned
Answer: a
41. Which one of the following protocol is
not used in internet?
a. HTTP
b. DHCP
c. DNS
d. none of the mentioned
Answer:d
42. DHCP uses UDP port ____ for sending
data to the server.
a. 66
b. 67
c. 68
d. 69
Answer:b
43 In DSL telco provides these services
a. Wired phone access
b. ISP
c. All
of the mentioned
d. None of the mentioned
Answer: c
44. One nibble is equivalent to how many bits?
a)
2 b) 4 c) 8 d) 1 ----
Answer: b
44. Which of the following is a function of the input
Unit?
a) It produces results that can be easily
understood by the user
b) It accepts the results produced by the computer
c) It supplies the data and instructions to the outside world
d)
It supplies the data and instructions to the computer for further processing
----
Answer: d
45. The two basic types of memory in a computer
are ________
a)
Primary and major
b) Primary and Secondary c) Minor and
Major d) Main and virtual ----
Answer: b
46. Which of the following is non-volatile
storage?
a) Backup b) Secondary c) Primary d) Cache ----
Answer: b
47. The ‘heart’ of the processor which performs
many different operations _____________
a) Arithmetic and logic unit b)
Motherboard c) Control Unit d) Memory ----
Answer: a
48.
The ALU gives the output of the operations and the output is stored in the
________
a)
Memory Devices b) Registers c) Flags d) Output Unit ----
Answer: b
49. The value of base in a decimal number system
is ____________
a)
10 b) 2 c) 8 d)
16 ----
Answer: a
50. Convert : (110)2 = ( __ )10 .
a) 4
b) 5 c) 6 d) 9 ----
Answer: c
50. The 2’s complement of 15 is ____________
a)
0000 b) 0001
c) 0010 d) 0100 ----
Answer: b
51. The hexadecimal representation of 14 is
_______________
a)
A b) F c) D d) E ----
Answer: d
52. The binary equivalent of the decimal number
10 is __________
a)
0010 b) 10 c) 1010 d) 010 ----
Answer: c
53. Interpreter is used as a translator for
__________
a) Low level language b) High Level
Language c) COBOL d) C ----
Answer: b
54. The memory unit is made up of _____ bytes.
a)
256 b) 124 c) 4096
d) 3096 ----
Answer: c
55. The physical devices of a computer:
a)
Software b) Package c) Hardware d) System Software ----
Answer: c
56. Which of the following is designed to control
the operations of a computer?
a)
Application Software b) System Software c) Utility Software
d) User ----
Answer: b
57. Which of the following is not an example of
system software?
a) Language Translator b) Utility Software c)
Communication Software d) Word Processors ----
Answer: d
58.
___________________ is designed to solve a specific problem or to do a specific
task.
a) System Software b) Application Software c) Utility Software d) User ----
Answer: b