Cs8591 Computer Networks Multiple Choice Questions (MCQ) Anna University Regulations 2017
Cs8591 Computer Networks Multiple Choice Questions (MCQ) Anna University Regulations 2017
Anna University
Regulations 2017
1
CS8591 COMPUTER NETWORKS
1. How many digits of the DNIC (Data Network Identification Code) identify
the country?
A. First three
B. First four
C. First five
D. First six
A. 802.2
B. 802.3
C. 802.5
D. 802.6
Ans: C. 802.5
3. The protocol data unit (PDU) for the application layer in the Internet stack is
A. Segment
B. Datagram
C. Message
D. Frame
Ans: C. Message
www.studymaterialz.in 2
CS8591 COMPUTER NETWORKS
A. Association
B. Disassociation
C. Error correction
D. Integration
A. Application layer
B. Transport layer
C. Network layer
D. None of above
www.studymaterialz.in 3
CS8591 COMPUTER NETWORKS
D. All of above
D. All of above
www.studymaterialz.in 4
CS8591 COMPUTER NETWORKS
A. network number
B. socket address
D. MAC address
A. TCP
B. IP
C. UPD
D. All of them
Ans: A. TCP
A. 04
B. 08
C. 16
D. 32
Ans: C. 16
16. Which of the following is not associated with the session layer?
A. Dialog control
B. Token management
D. Synchronization
www.studymaterialz.in 5
CS8591 COMPUTER NETWORKS
C. reports error conditions to the original source, the source must relate errors to
individual application programs and take action to correct the problem
18. Your company has a LAN in its downtown office and has now set up a LAN
in the manufacturing plant in the suburbs. To enable everyone to share data and
resources between the two LANs, what type of device(s) are needed to connect
them? Choose the most correct answer.
A. Modem
B. Cable
C. Hub
D. Router
Ans: D. Router
19. Which of the following TCP/IP protocol is used for transferring electronic
mail messages from one machine to another?
A. FTP
B. SNMP
C. SMTP
D. RPC
Ans: C. SMTP
www.studymaterialz.in 6
CS8591 COMPUTER NETWORKS
20. Which of the following device is used to connect two systems, especially if
the systems use different protocols?
A. hub
B. bridge
C. gateway
D. repeater
Ans: C. gateway
21. _______ can detect burst error of length less than or equal to degree of the
polynomial and detects burst errors that affect odd number of bits.
A. Hamming Code
B. CRC
C. VRC
Ans: B. CRC
A. packet switched
B. circuit switched
C. message switched
D. None of these
www.studymaterialz.in 7
CS8591 COMPUTER NETWORKS
24. Which one of the following routing algorithm can be used for network layer
design?
25. A subset of a network that includes all the routers but contains no loops is
called:
A. spanning tree
B. spider structure
C. spider tree
B. addressing
C. forwarding
www.studymaterialz.in 8
CS8591 COMPUTER NETWORKS
A. socket
B. pipe
C. port
Ans: A. socket
A. port
B. pipe
C. node
Ans: A. port
www.studymaterialz.in 9
CS8591 COMPUTER NETWORKS
32. The ____ translates internet domain and host names to IP address.
33. When displaying a web page, the application layer uses the:
A. HTTP protocol
B. FTP protocol
C. SMTP protocol
A. File transfer
B. File download
C. E-mail
D. Internet telephony
www.studymaterialz.in 10
CS8591 COMPUTER NETWORKS
A. Vulnerability attack
B. Bandwidth flooding
C. Connection flooding
A. Active receiver
B. Passive receiver
38. If 5 files are transferred from server A to client B in the same session. The
number of TCP connection between A and B is:
A. 5
B. 10
C. 2
D. 6
Ans: D. 6
www.studymaterialz.in 11
CS8591 COMPUTER NETWORKS
40. In an Ethernet local area network, which one of the following statements is
TRUE?
B. The purpose of the jamming signal is to pad the frames that are smaller than
the minimum frame size.
C. A station continues to transmit the packet even after the collision is detected.
A. CNNET
B. NSFNET
C. ASAPNET
D. ARPANET
Ans: D. ARPANET
42. Which organization has authority over interstate and international commerce
in the communications field?
A. ITU-T
B. IEEE
C. FCC
www.studymaterialz.in 12
CS8591 COMPUTER NETWORKS
D. ISOC
Ans: C. FCC
43. Which transmission media has the highest transmission speed in a network?
A. coaxial cable
C. optical fiber
D. electrical cable
A. Coaxial cable
C. Fiber-optic cable
D. Microwave
www.studymaterialz.in 13
CS8591 COMPUTER NETWORKS
47. Which of the following to keep track of the individual units of data (called
packets) that a message is divided into for efficient routing through the Internet.
48. The process of keeping addresses in memory for future use is called
A. Routing
B. Resolving
C. Caching
Ans: C. Caching
49. A small network making up the Internet and also having a small numbers of
computers within it is called
A. Host
B. Address
C. Subdomain
Ans: C. Subdomain
50. If a file consisting of 50,000 characters takes 40 seconds to send, then the
data rate is __________.
A. 1 kbps
www.studymaterialz.in 14
CS8591 COMPUTER NETWORKS
B. 1.25 kbps
C. 2 kbps
D. 10 kbps
Ans: D. 10 kbps
Explanation:
B. zero
C. nonzero
Ans: B. zero
A. Intranets
B. Switching alternating
D. Extranets
Ans: A. Intranets
53. Sending a file from your personal computer's primary memory or disk to
another computer is called
A. uploading
B. downloading
www.studymaterialz.in 15
CS8591 COMPUTER NETWORKS
C. logging on
D. hangs on
Ans: A. uploading
54. FDDI is a
A. ring network
B. star network
C. mesh network
A. 0.0.0.1
B. 127.0.0.0
C. 127.0.0.1
D. 255.255.255.255
Ans: C. 127.0.0.1
A. FSK; PSK
B. PSK; FSK
C. analog; digital
D. digital; analog
www.studymaterialz.in 16
CS8591 COMPUTER NETWORKS
B. CERN
C. ARPA
D. Netscape
Ans: B. CERN
A. 99
B. 86
C. 80
D. 23
Ans: C. 80
59. The communication mode that supports data in both directions at the same
time is
A. simplex
B. half-duplex
C. full-duplex
D. multiplex
Ans: C. full-duplex
A. access control
B. addressing
www.studymaterialz.in 17
CS8591 COMPUTER NETWORKS
62. ASK, PSK, FSK, and QAM are examples of _____ encoding.
A. digital-to-digital
B. digital-to-analog
C. analog-to-analog
D. analog-to-digital
Ans: B. digital-to-analog
A. 0.0.0.0
B. 255.0.0.0
C. 255.255.0.0
D. 255.255.255.0
Ans: D. 255.255.255.0
www.studymaterialz.in 18
CS8591 COMPUTER NETWORKS
A. NBTSTAT
B. Netstat
C. PING
D. Hostname
Ans: C. PING
A. Network Layer
C. Transport Layer
D. Application layer
A.16.4 %
B. 18.4 %
C. 7.4 %
D. 1 %
Ans: B. 18.4 %
D. all of these
Ans: C. All lines coming into a Hub must operate at a same speed.
www.studymaterialz.in 19
CS8591 COMPUTER NETWORKS
A. 192.166.200.50
B. 00056A:01A01A5CCA7FF60
72. What operates in the Data Link and the Network layer?
A. NIC
B. Bridge
C. Brouter
D. Router
Ans: C. Brouter
www.studymaterialz.in 20
CS8591 COMPUTER NETWORKS
A. NFS
B. TELNET
C. TFTP
D. FTP
Ans: C. TFTP
74. Which of the following network access standard is used for connecting
stations to a circuit-switched network?
A. X.3
B. X.21
C. X.25
D. X.75
Ans: B. X.21
75. In OSI model, which of the following layer provides error-free delivery of
data?
A. Data link
B. Network
C. transport
D. Session
Ans: C. transport
A. transmitting computer
B. receiving computer
www.studymaterialz.in 21
CS8591 COMPUTER NETWORKS
A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
E. 128 – 191
Ans: A. 1 - 126
A. 128 - 255
B. 1 - 127
C. 192 - 223
D. 128 - 191
E. 127 – 191
www.studymaterialz.in 22
CS8591 COMPUTER NETWORKS
B. a TCP/IP high level protocol for transferring files from one machine to
another
81. The 802.5 standard implements a way for preventing collisions on the
network. How are collisions prevented when using this standard?
A. CSMA/CD
B. Token passing
C. Collision detection
D. Time sharing
E. Switched repeaters
83. What OSI layer handles logical address to logical name resolution?
A. Transport
B. Physical
www.studymaterialz.in 23
CS8591 COMPUTER NETWORKS
C. Presentation
D. Data Link
Ans: A. Transport
85. One of the header fields in an IP datagram is the Time to Live (TTL) field.
Which of the following statements best explains the need for this field?
86. Which of the following system calls results in the sending of SYN packets?
A. socket
B. bind
C. listen
D. connect
www.studymaterialz.in 24
CS8591 COMPUTER NETWORKS
Ans: D. connect
87. In the slow start phase of the TCP congestion control algorithm, the size of
the congestion window
B. increases linearly
C. increases quadratically
D. increases exponentially
A. P – 2 Q – 1 R – 3 S – 5
B. P – 1 Q – 4 R – 2 S – 3
C. P – 1 Q – 4 R – 2 S – 5
D. P – 2 Q – 4 R – 1 S – 3
Ans: B. P – 1 Q – 4 R – 2 S – 3
89. What is the maximum size of data that the application layer can pass on to
the TCP layer below?
A. Any size
C. 2^16 bytes
D. 1500 bytes
www.studymaterialz.in 25
CS8591 COMPUTER NETWORKS
A. 1.6 seconds
B. 2 seconds
C. 5 seconds
D. 8 seconds
Ans: B. 2 seconds
Explanation:
Tokens are added at the rate of r bytes/sec which is 2Mbps in the given
question.
91. In Ethernet when Manchester encoding is used, the bit rate is:
www.studymaterialz.in 26
CS8591 COMPUTER NETWORKS
A. 12
B. 14
C. 16
D. 18
Ans: C. 16
Explanation:
Total 16 packets are sent. See following table for sequence of events. Since
go-back-n error control strategy is used, all packets after a lost packet are
sent again.
Sender Receiver
2 1
3 2
4 3
5 4
7 6
[Timeout for 5]
6 5
7 6
www.studymaterialz.in 27
CS8591 COMPUTER NETWORKS
[Timeout for 7]
8 7
9 8
[Timeout for 9]
93. Determine the maximum length of the cable (in km) for transmitting data at
a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume
the signal speed in the cable to be 2,00,000 km/s.
A.1
B.2
C.2.5
D.5
Ans: B.2
Explanation:
94. Let G(x) be the generator polynomial used for CRC checking. What is the
condition that should be satisfied by G(x) to detect odd number of bits in error?
B.G(x) does not divide 1+x^k, for any k not exceeding the frame length
www.studymaterialz.in 28
CS8591 COMPUTER NETWORKS
95. In serial data transmission, every byte of data is padded with a ‘0’ in the
beginning and one or two ‘1’ s at the end of byte because
B. Receiver recovers lost ‘0’ and ‘1’s from these padded bits
D. None of these
C. Packet switching requires more per packet processing than circuit switching
www.studymaterialz.in 29
CS8591 COMPUTER NETWORKS
98. In a packet switching network, if the message size is 48 bytes and each
packet contains a header of 3 bytes. If 24 packets are required to transmit the
message, the packet size is ________.
A. 2 bytes
B. 1 bytes
C. 4 bytes
D. 5 bytes
Ans: D. 5 bytes
Explanation:
99. In Ethernet CSMA/CD, the special bit sequence transmitted by media access
management to handle collision is called
A. Preamble
B. Post amble
C. Jam
Ans: C. Jam
100. What will be the efficiency of a Stop and Wait protocol, if the transmission
time for a frame is 20ns and the propagation time is 30ns?
A. 20%
B. 25%
C. 40%
D. 66%
Ans: B. 25%
www.studymaterialz.in 30
CS8591 COMPUTER NETWORKS
Explanation:
Efficiency = 1 / (1 + 2(30/20))
= 1/4 * 100
= 25 %
www.studymaterialz.in 31