With each visit of this Computer Networking online Quiz / Practice Test, the list of MCQs / Objective Questions presented will be different, offering you a diverse set of practice opportunities. This variability encourages you to practice extensively, refining the accuracy of your answers and your overall grasp of the content. By utilizing this resource, you can hone your skills and become more adept at managing time constraints during actual exams.
Test Instructions
Question type
Randomized MCQs.Changes every time you visit the test
Total Number of Questions
30
Time Limit
20 Minutes
Points
1 Point for each Question
Remaining Time: 0 MINUTES
0 of 30 questions completed
Questions:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Information
You have already completed the test before. Hence you can not start it again.
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Question 1 of 30
Q-1.TCP uses _________________ to check the safe and sound arrival of data.
Your Answer:Correct
Your Answer:Incorrect
Question 2 of 30
Q-2.The HFC network uses _______ cable.
Your Answer:Correct
Your Answer:Incorrect
Question 3 of 30
Q-3.In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
Your Answer:Correct
Your Answer:Incorrect
Question 4 of 30
Q-4.In Bluetooth, the current data rate is ____ Mbps
Your Answer:Correct
Your Answer:Incorrect
Question 5 of 30
Q-5.The ATM standard defines ______ layers.
Your Answer:Correct
Your Answer:Incorrect
Question 6 of 30
Q-6.An ATM data unit is a cell composed of ______ bytes.
Your Answer:Correct
Your Answer:Incorrect
Question 7 of 30
Q-7.To use the services of UDP, we need ________ socket addresses.
Your Answer:Correct
Your Answer:Incorrect
Question 8 of 30
Q-8.Which of the following is not a guided medium?
Your Answer:Correct
Your Answer:Incorrect
Question 9 of 30
Q-9.In the TCP/IP protocol suite, a logical address is the identifier at the _______________.
Your Answer:Correct
Your Answer:Incorrect
Question 10 of 30
Q-10.Which of the following functions are performed by UDP?
Your Answer:Correct
Your Answer:Incorrect
Question 11 of 30
Q-11.If the ASCII character H is sent and the character L is received, what type of error is this?
Your Answer:Correct
Your Answer:Incorrect
Question 12 of 30
Q-12.In TCP/IP, a packet at the third layer carries data belonging to the ________ layer and the header belonging to the _________ layer.
Your Answer:Correct
Your Answer:Incorrect
Question 13 of 30
Q-13.In ATM, a(n) ______ is the interface between a user and an ATM switch.
Your Answer:Correct
Your Answer:Incorrect
Question 14 of 30
Q-14.___________ is a second-generation cellular phone system used in Europe.
Your Answer:Correct
Your Answer:Incorrect
Question 15 of 30
Q-15.In TCP's ________ algorithm the size of the congestion window increases exponentially until it reaches a threshold.
Your Answer:Correct
Your Answer:Incorrect
Question 16 of 30
Q-16.In IEEE 802.11, a station with ________ mobility can move from one BSS to another, but the movement is confined inside one ESS.
Your Answer:Correct
Your Answer:Incorrect
Question 17 of 30
Q-17.____________ is used to compress images.
Your Answer:Correct
Your Answer:Incorrect
Question 18 of 30
Q-18.Baseband transmission of a digital signal is possible only if we have a ____ channel.
Your Answer:Correct
Your Answer:Incorrect
Question 19 of 30
Q-19.In OSPF, a ________ link connects two routers without any other host or router in between.
Your Answer:Correct
Your Answer:Incorrect
Question 20 of 30
Q-20.The _____ sublayer is responsible for the operation of the CSMA/CD access method and framing.
Your Answer:Correct
Your Answer:Incorrect
Question 21 of 30
Q-21.Network programming in any language definitely needs to deal with ____________ and _______________.
Your Answer:Correct
Your Answer:Incorrect
Question 22 of 30
Q-22.The use of hierarchy in routing tables can ________ the size of the routing tables.
Your Answer:Correct
Your Answer:Incorrect
Question 23 of 30
Q-23.In the asymmetric-key method used for confidentiality, which key is publicly known?
Your Answer:Correct
Your Answer:Incorrect
Question 24 of 30
Q-24.The __________________ technique is one of the close-loop congestion policy
Your Answer:Correct
Your Answer:Incorrect
Question 25 of 30
Q-25.The CSMA/CD algorithm does not work in wireless LAN because
Your Answer:Correct
Your Answer:Incorrect
Question 26 of 30
Q-26.___________ is an interdomain routing protocol using path vector routing.
Your Answer:Correct
Your Answer:Incorrect
Question 27 of 30
Q-27.Which of the following method is a scheduling technique?
Your Answer:Correct
Your Answer:Incorrect
Question 28 of 30
Q-28.The ________________ class is used to create datagram packets.
Your Answer:Correct
Your Answer:Incorrect
Question 29 of 30
Q-29.We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.
Your Answer:Correct
Your Answer:Incorrect
Question 30 of 30
Q-30.________ is normally referred to as mB/nB coding; it replaces each m-bit group with an n-bit group.
Your Answer:Correct
Your Answer:Incorrect
Practice More Online Tests