Olete.in
Articles
Mock Tests
🧪 MCA MCQ Quiz Hub
Computer Network MCA Question MCQ Set 3
Choose a topic to test your knowledge and improve your MCA skills
1. The sharing of a medium and its link by two or more devices is called _____
Fully duplexing
Multiplexing
Micropleixng
Duplexing
2. Multiplexing is used in _______
Packet switching
Circuit switching
Data switching
Packet & Circuit switching
3. Which multiplexing technique used to transmit digital signals?
FDM
TDM
WDM
FDM & WDM
4. If there are n signal sources of same data rate, then the TDM link has _______ slots.
n
n/2
n*2
2n
5. If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is ____
32kbps
500bps
500kbps
32bps
6. The state when dedicated signals are idle are called _____
Death period
Poison period
Silent period
Stop period
7. Multiplexing provides ________
Efficiency
Privacy
Anti jamming
Both Efficiency & Privacy
8. In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.
Greater than
Lesser than
Equal to
Equal to or greater than
9. Which of the following delay is faced by the packet in travelling from one end system to another?
Propagation delay
Queuing delay
Transmission delay
all of the mentioned
10. For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)
3.2
32
0.32
320
11. The time required to examine the packet’s header and determine where to direct the packet is part of _______
Processing delay
Queuing delay
Transmission delay
Propagation delay
12. Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by _________
La/R
LR/a
R/La
Ra/L
13. In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ________
20Mbps
10Mbps
40Mbps
50Mbps
14. If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?
N/2
N
N-1
2n
15. The total nodal delay is given by _______
dnodal = dproc – dqueue + dtrans + dprop
dnodal = dproc + dtrans – dqueue
dnodal = dproc + dqueue + dtrans + dprop
dnodal = dproc + dqueue – dtrans – dprop
16. In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?
Propagation delay
Queuing delay
Transmission delay
Processing delay
17. Transmission delay does not depend on ______
Packet length
Distance between the routers
Transmission rate
Bandwi Bandwidth of mediumdth of medium
18. Propagation delay depends on _______
Packet length
Transmission rate
Distance between the routers
Speed of the CPU
19. ________ allows LAN users to share computer programs and data.
Communication server
Print server
File server
network
20. With respect to physical media, STP cables stands for _________
Shielded Twisted Pair Cable
Spanning Tree Protocol Cable
Static Transport Protocol Cable
Shielded Two Power Cable
21. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of _______
LAN intrinsic software
LAN aware software
Groupware
LAN ignorant software
22. The __________ portion of LAN management software restricts access, records user activities and audit data, etc.
Configuration management
Security management
Performance management
Recovery management
23. What is the max length of the Shielded twisted pair cable?
100 ft
200 ft
100 m
200 m
24. What is the max data transfer rate of STP cables?
10 Mbps
100 Mbps
1000 Mbps
10000 Mbps
25. Which connector does the STP cable use?
BNC
RJ-11
RJ-45
RJ-69
26. What is the central device in star topology?
STP server
Hub/switch
PDC
Router
27. What is the max data transfer rate for optical fiber cable?
10 Mbps
100 Mbps
1000 Mbps
10000 Mbps
28. Which of the following architecture uses the CSMA/CD access method?
ARC net
Ethernet
Router
STP server
29. The attacker using a network of compromised devices is known as _______
Internet
Botnet
Telnet
D-net
30. Which of the following is a form of DoS attack?
Vulnerability attack
Bandwidth flooding
Connection flooding
all of the mentioned
31. The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________
Vulnerability attack
Bandwidth flooding
Connection flooding
UDP flooding
32. The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
Vulnerability attack
Bandwidth flooding
Connection flooding
UDP flooding
33. Packet sniffers involve _______
Active receiver
Passive receiver
Legal receiver
Partially-active receiver
34. Sniffers can be prevented by using ________
Wired environment
WiFi
Ethernet LAN
Switched network
35. Sniffers can be prevented by using __________
Wired environment
WiFi
Ethernet LAN
Switched network
36. Firewalls are often configured to block _____
UDP traffic
TCP traffic
Sensitive traffic
Best-effort traffic
37. Which of this is not a guided media?
Fiber optical cable
Coaxial cable
Wireless LAN
Copper wire
38. UTP is commonly used in _____
DSL
FTTP
HTTP
none of the mentioned
39. Coaxial cable consists of _______ concentric copper conductors.
1
2
3
4
40. Fiber optics posses following properties _______
Immune electromagnetic interference
Very less signal attenuation
Very hard to tap
All of the mentioned
41. If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) ______
n*39.8
n*51.8
2n*51.8
none of the mentioned
42. Terrestrial radio channels are broadly classifed into _____ groups.
2
3
4
1
43. Radio channels are attractive medium because ______
Radio channels are attractive medium because ______
Connectivity can be given to mobile user
Can carry signals for long distance
All of the mentioned
44. Geostationary satellites _______
Are placed at a fixed point above the earth
Rotate the earth about a fixed axis
Rotate the earth about a varying axis
All of the mentioned
45. A local telephone network is an example of a _______ network.
Packet switched
Circuit switched
Bit switched
Line switched
46. Most packet switches use this principle _____
Stop and wait
Store and forward
Store and wait
Stop and forward
47. If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ____
N
(N*L)/R
(2N*L)/R
L/R
48. What are the Methods to move data through a network of links and switches?
Packet switching and Line switching
Circuit switching and Line switching
Line switching and bit switching
Packet switching and Circuit switching
49. The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.
Packet switching
Circuit switching
Line switching
Frequency switching
50. As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.
authentication
guaranteed constant rate
reliability
store and forward
Submit