MCA/Computer Network MCA Question MCQ Set 3 Sample Test,Sample questions

Question:
 For a 10Mbps Ethernet link, if the length of the packet is 32bits, the transmission delay is ____________ (in microseconds)

1. 3.2

2.32

3. 0.32

4. 320


Question:
 If end to end delay is given by dend-end = N(dproc + dtrans + dprop) is a non congested network. The number of routers between source and destination is?

1.N/2

2. N

3.N-1

4.2n


Question:
 Most packet switches use this principle _____

1.Stop and wait

2. Store and forward

3. Store and wait

4.Stop and forward


Question:
 Radio channels are attractive medium because ______

1. Radio channels are attractive medium because ______

2.Connectivity can be given to mobile user

3.Can carry signals for long distance

4.All of the mentioned


Question:
 Terrestrial radio channels are broadly classifed into _____ groups.

1.2

2.3

3.4

4.1


Question:
 The attacker using a network of compromised devices is known as _______

1.Internet

2.Botnet

3. Telnet

4. D-net


Question:
 The required resources for communication between end systems are reserved for the duration of the session between end systems in ________ method.

1.Packet switching

2. Circuit switching

3.Line switching

4.Frequency switching


Question:
 The time required to examine the packet’s header and determine where to direct the packet is part of _______

1. Processing delay

2. Queuing delay

3.Transmission delay

4.Propagation delay


Question:
 Transmission delay does not depend on ______

1. Packet length

2. Distance between the routers

3.Transmission rate

4. Bandwi Bandwidth of mediumdth of medium


Question:
A local telephone network is an example of a _______ network.

1.Packet switched

2. Circuit switched

3.Bit switched

4. Line switched


Question:
A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of _______

1. LAN intrinsic software

2.LAN aware software

3.Groupware

4.LAN ignorant software


Question:
As the resources are reserved between two communicating end systems in circuit switching, ___________ is achieved.

1.authentication

2.guaranteed constant rate

3.reliability

4.store and forward


Question:
Coaxial cable consists of _______ concentric copper conductors.

1.1

2.2

3.3

4.4


Question:
Fiber optics posses following properties _______

1. Immune electromagnetic interference

2.Very less signal attenuation

3.Very hard to tap

4. All of the mentioned


Question:
Firewalls are often configured to block _____

1.UDP traffic

2.TCP traffic

3.Sensitive traffic

4.Best-effort traffic


Question:
Geostationary satellites _______

1.Are placed at a fixed point above the earth

2.Rotate the earth about a fixed axis

3.Rotate the earth about a varying axis

4. All of the mentioned


Question:
Given L = number of bits in the packet, a = average rate and R = transmission rate. The Traffic intensity in the network is given by _________

1. La/R

2. LR/a

3. R/La

4. Ra/L


Question:
If an Optical Carrier is represented as OC-n, generally the link speed equals(in Mbps) ______

1.n*39.8

2. n*51.8

3.2n*51.8

4.none of the mentioned


Question:
If link transmits 4000frames per second, and each slot has 8 bits, the transmission rate of circuit this TDM is ____

1. 32kbps

2.500bps

3.500kbps

4. 32bps


Question:
If there are N routers from source to destination, the total end to end delay in sending packet P(L-> number of bits in the packet R-> transmission rate) is equal to ____

1.N

2. (N*L)/R

3.(2N*L)/R

4.L/R


Question:
If there are n signal sources of same data rate, then the TDM link has _______ slots.

1.n

2.n/2

3.n*2

4.2n


Question:
In a network, If P is the only packet being transmitted and there was no earlier transmission, which of the following delays could be zero?

1. Propagation delay

2.Queuing delay

3.Transmission delay

4. Processing delay


Question:
In TDM, the transmission rate of a multiplexed path is always _______ the sum of the transmission rates of the signal sources.

1. Greater than

2. Lesser than

3.Equal to

4.Equal to or greater than


Question:
In the transfer of file between server and client, if the transmission rates along the path is 10Mbps, 20Mbps, 30Mbps, 40Mbps. The throughput is usually ________

1. 20Mbps

2. 10Mbps

3.40Mbps

4. 50Mbps


Question:
Multiplexing is used in _______

1.Packet switching

2.Circuit switching

3.Data switching

4.Packet & Circuit switching


Question:
Multiplexing provides ________

1.Efficiency

2. Privacy

3.Anti jamming

4. Both Efficiency & Privacy


Question:
Packet sniffers involve _______

1.Active receiver

2. Passive receiver

3.Legal receiver

4.Partially-active receiver


Question:
Propagation delay depends on _______

1. Packet length

2.Transmission rate

3.Distance between the routers

4. Speed of the CPU


Question:
Sniffers can be prevented by using ________

1.Wired environment

2.WiFi

3.Ethernet LAN

4.Switched network


Question:
Sniffers can be prevented by using __________

1.Wired environment

2.WiFi

3.Ethernet LAN

4.Switched network


Question:
The DoS attack, in which the attacker establishes a large number of half-open or fully open TCP connections at the target host is ________

1. Vulnerability attack

2. Bandwidth flooding

3.Connection flooding

4. UDP flooding


Question:
The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________

1. Vulnerability attack

2.Bandwidth flooding

3.Connection flooding

4.UDP flooding


Question:
The sharing of a medium and its link by two or more devices is called _____

1. Fully duplexing

2.Multiplexing

3.Micropleixng

4.Duplexing


Question:
The state when dedicated signals are idle are called _____

1.Death period

2.Poison period

3.Silent period

4.Stop period


Question:
The total nodal delay is given by _______

1.dnodal = dproc – dqueue + dtrans + dprop

2.dnodal = dproc + dtrans – dqueue

3.dnodal = dproc + dqueue + dtrans + dprop

4.dnodal = dproc + dqueue – dtrans – dprop


Question:
The __________ portion of LAN management software restricts access, records user activities and audit data, etc.

1. Configuration management

2.Security management

3.Performance management

4.Recovery management


Question:
UTP is commonly used in _____

1. DSL

2. FTTP

3.HTTP

4.none of the mentioned


Question:
What are the Methods to move data through a network of links and switches?

1.Packet switching and Line switching

2.Circuit switching and Line switching

3. Line switching and bit switching

4.Packet switching and Circuit switching


Question:
What is the central device in star topology?

1.STP server

2. Hub/switch

3.PDC

4.Router


Question:
What is the max data transfer rate for optical fiber cable?

1. 10 Mbps

2.100 Mbps

3.1000 Mbps

4.10000 Mbps


Question:
What is the max data transfer rate of STP cables?

1. 10 Mbps

2.100 Mbps

3.1000 Mbps

4.10000 Mbps


Question:
What is the max length of the Shielded twisted pair cable?

1. 100 ft

2. 200 ft

3.100 m

4.200 m


Question:
Which connector does the STP cable use?

1.BNC

2. RJ-11

3.RJ-45

4.RJ-69


Question:
Which multiplexing technique used to transmit digital signals?

1.FDM

2.TDM

3.WDM

4.FDM & WDM


Question:
Which of the following architecture uses the CSMA/CD access method?

1.ARC net

2.Ethernet

3.Router

4.STP server


Question:
Which of the following delay is faced by the packet in travelling from one end system to another?

1.Propagation delay

2.Queuing delay

3.Transmission delay

4.all of the mentioned


Question:
Which of the following is a form of DoS attack?

1.Vulnerability attack

2.Bandwidth flooding

3.Connection flooding

4.all of the mentioned


Question:
Which of this is not a guided media?

1. Fiber optical cable

2.Coaxial cable

3. Wireless LAN

4.Copper wire


Question:
With respect to physical media, STP cables stands for _________

1.Shielded Twisted Pair Cable

2.Spanning Tree Protocol Cable

3.Static Transport Protocol Cable

4.Shielded Two Power Cable


Question:
________ allows LAN users to share computer programs and data.

1. Communication server

2.Print server

3.File server

4.network


More MCQS

  1. Computer Network MCA Question MCQ Set 1
  2. Computer Network MCA Question MCQ Set 2
  3. Computer Network MCA Question MCQ Set 3
  4. Computer Network MCA Question MCQ Set 4
  5. Computer Network MCA Question MCQ Set 5
  6. Computer Network MCA Question MCQ Set 6
  7. Computer Network MCA Question MCQ Set 7
  8. Computer Network MCA Question MCQ Set 8
  9. Computer Network MCA Question MCQ Set 9
  10. Computer Network MCA Question MCQ Set 10
  11. Computer Network MCA Question MCQ Set 11
  12. Computer Network MCA Question MCQ Set 12
  13. Computer Network MCA Question MCQ Set 13
  14. Computer Network MCA Question MCQ Set 14
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!