1.Which address is used in an internet employing the TCP/IP protocols?

a.physical address and logical address

b.port address

c.specific address

d.all of the mentioned

2.Which address identifies a process on a host?

a.physical address

b.logical address

c.port address

d.specific address

3.Transmission data rate is decided by

a.network layer

b.physical layer

c.data link layer

d.transport layer

4.When collection of various computers seems a single coherent system to its client, then it is called

a.computer network

b.distributed system

c.both (a) and (b)

d.none of the mentioned

5.Which one of the following computer network is built on the top of another network?

a.prior network

b.chief network

c.prime network

d.overlay network

6.Bluetooth is an example of

a.personal area network

b.local area network

c.virtual private network

d.none of the mentioned

7.A _____ is a device that forwards packets between networks by processing the routing information included in the packet.

a.bridge

b.firewall

c.router

d.all of the mentioned

8.A list of protocols used by a system, one protocol per layer, is called

a.protocol architecture

b.protocol stack

c.protocol suit

d.none of the mentioned

9.Network congestion occurs

a.in case of traffic overloading

b.when a system terminates

c.when connection between two nodes terminates

d.none of the mentioned

10.Which one of the following extends a private network across public networks?

a.local area network

b.virtual private network

c.enterprise private network

d.storage area network

11.The structure or format of data is called

a.Syntax

b.Semantics

c.Struct

d.None of the mentioned

12.Communication between a computer and a keyboard involves ______________ transmission

a.Automatic

b.Half-duplex

c.Half-duplex

d.Simplex

13.The first Network was

a.CNNET

b.NSFNET

c.ASAPNET

d.ARPANET

14.Which of this is not a network edge device?

a.PC

b.Smartphones

c.Servers

d.Switch

15.Delimiting and synchronization of data exchange is provided by

a.Application layer

b.Session layer

c.Transport layer

d.Link layer

16.The_____ address identifies a process on a host.

a.physical

b.IP

c.port

d.specific

17.The ____ address uniquely defines a host on the Internet.

a.physical

b.IP

c.port

d.specific

18.IPv6 has _______ -bit addresses.

a.32

b.64

c.128

d.variable

19.The Mobile Application Protocol (MAP) typically runs on top of which protocol ?

a.SNMP (Simple Network Management Protocol)

b.SMTP (Simple Mail Transfer Protocol)

c.SS7 (Signalling System 7)

d.HTTP (Hyper Text Transfer Protocol)

20.A _______ connection provides a dedicated link between two devices.

a.point-to-point

b.multipoint

c.primary

d.secondary

21.Devices may be arranged in a _____ topology.

a.ring

b.mesh

c.bus

d.all of the above

22.A _______ is a data communication system within a building, plant, or campus, or between nearby buildings.

a.LAN

b.MAN

c.WAN

d.none of the above

23.Which of the following is required to communicate between two computers?

a.communications software

b.protocol

c.communication hardware

d.all of above including access to transmission medium

24. What is NIC used for?

a.To remotely access PC

b.To connect computer to a network

c.It is used in junipers routers for gateway card

d.None

25.In a type of computer network, what does MAN stands for?

a.Major area network

b.Mini area network

c.Metropolitan area network

d.Micro area network

26.Which of the following is not the network edge device?

a.Switch

b.Server

c.PC

d.MAC

27.Which of the following is the type of the computer network?

a.Metropolitan area network (MAN)

b.Local area network (LAN)

c.Personal area network (PAN)

d.All of the above

28.How many layers does OSI have?

a.4

b.7

c.5

d.6

29.Collection of network or networks is called

a.Intranet

b.Internet

c.Extranet

d.LAN network

30.What is the size of the IP version 4?

a.22 bytes

b.32 bits

c.32 bytes

d.99 bytes

31.What is a Firewall in Computer Network?

a.The physical boundary of Network

b.An operating System of Computer Network

c.A system designed to prevent unauthorized access

d.A web browsing Software

32.What is the meaning of Bandwidth in Network?

a.Transmission capacity of a communication channels

b.Connected Computers in the Network

c.Class of IP used in Network

d.None of Above

33. ADSL is the abbreviation of

a.Asymmetric Dual Subscriber Line

b.Asymmetric Digital System Line

c.Asymmetric Dual System Line

d.Asymmetric Digital Subscriber Line

34.The Internet is an example of

a.Cell switched network

b.circuit switched network

c.Packet switched network

d.All of above

35.Which of the following includes the benefit of the Networking?

a.File Sharing

b.Easier access to Resources

c.Easier Backups

d.All of the Above

36.Which of the following is not the Networking Devices?

a.Gateways

b.Linux

c.Routers

d.Firewalls

37.We can divide today's networks into ____ broad categories based on switching.

a.four

b.three

c.five

d.two

38.A _______ is a device that operates only in the physical layer.

a.passive hub

b.repeater

c.bridge

d.router

39._______ is a first-generation cellular phone system.

a.AMPS

b.D-AMPS

c.GSM

d.none of the above

40.Which protocol assigns IP address to the client connected in the internet?

a.DHCP

b.IP

c.RPC

d.none of the above

41.______ is a network that covers geographic areas that are larger, such as districts or cities.

a.LAN

b.MAN

c.WAN

d.None of these

42.HTTP is the acronym of ...............

a.Hyper Text Transfer Protocol

b.Hyper Test Transfer Protocol

c.Hyper Text Transport Protocol

d.Hyper Text Transport Program

43. Computer Network is
A.  Collection of hardware components and computers
B.  Interconnected by communication channels
C.  Sharing of resources and information

D.  All of the Above

44. DHCP is the abbreviation of
A.  Dynamic Host Control Protocol

B.  Dynamic Host Configuration Protocol
C.  Dynamic Hyper Control Protocol
D.  Dynamic Hyper Configuration Protocol

45. What is the size of MAC Address?
A. 16-bits
B. 32-bits

C. 48-bits
D. 64-bits

46. Which of the following can be Software?
A. Routers

B. Firewalls
C. Gateway
D. Modems

47. In DSL telco provides these services
a) Wired phone access
b) ISP

c) All of the mentioned
d) None of the mentioned

48. Physical or logical arrangement of network is __________
a) Topology
b) Routing
c) Networking
d) None of the mentioned

49. In which topology there is a central controller or hub?
a) Star
b) Mesh
c) Ring
d) Bus

50. This topology requires multi point connection
a) Star
b) Mesh
c) Ring

d) Bus

51. Data communication system within a building or campus is________
a) LAN
b) WAN
c) MAN
d) None of the mentioned

52. _______ allows you to connect and login to a remote computer
a) Telnet
b) FTP
c) HTTP
d) None of the mentioned