My Youtube Classes All Notes at One Place Cyberpoint9

Computer Networks Questions & Answers (MCQs)

Top 10 Most Important MCQs For Computer Science and Engenering.

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on

                                                    CLASS-ONE

1. The first Network
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
View Answer

Answer: d
Explanation: ARPANET – Advanced Research Projects Agency Networks was the first network to be implemented which used the TCP/IP protocol.

2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
a) Added
b) Removed
c) Rearranged
d) Modified
View Answer

Answer: a
Explanation: Every layer adds its own header to the packet from the previous layer.

3. The structure or format of data is called
a) Syntax
b) Semantics
c) Struct
d) None of the mentioned
View Answer

Answer: a
Explanation: The structure and format of data are defined using syntax. Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.

4. Communication between a computer and a keyboard involves ______________ transmission
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
View Answer

Answer: d
Explanation: Data flows in single direction.

5. The IETF standards documents are called
a) RFC
b) RCF
c) ID
d) None of the mentioned
View Answer

Answer: a
Explanation: The basic formal definition of the IETF standards process is RFC 2026 (BCP 9). However, this document has been amended several times. The intellectual property rules are now separate, in RFC 5378 (BCP 78) (rights in contributions) and RFC 3979 (BCP 79) (rights in technology).

6. The _______ is the physical path over which a message travels
a) Path
b) Medium
c) Protocol
d) Route
View Answer

Answer: b
Explanation: Message travel from sender to reciever via a medium using a protocol.

7. Which organization has authority over interstate and international commerce in the communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
View Answer

Answer: c
Explanation: FCC is the abbreviation for Federal Communications Commission. FCC is responsible for regulating all interstate communications originating or terminating in USA.

8. Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch
View Answer

Answer: d
Explanation: Network egde devices refer to host systems, which can host applications like web browser.

9. A set of rules that governs data communication
a) Protocols
b) Standards
c) RFCs
d) None of the mentioned
View Answer

Answer: a
Explanation: In communications, a protocol refers to a set of rules and regulations that allow a network of nodes to transmit and receive information.

10. Three or more devices share a link in ________ connection
a) Unipoint
b) Multipoint
c) Point to point
d) None of the mentioned
View Answer

Answer: b
Explanation: A multipoint communication is established when three or many network nodes are connected to each other.


Computer Networks Questions & Answers (MCQs)

Top 10 Most Important MCQs For Computer Science and Engenering.

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on

                                                CLASS- TWO

1. When collection of various computers seems a single coherent system to its client, then it is called

a) computer network
b) distributed system
c) networking system
d) none of the mentioned
View Answer

Answer: b
Explanation: Computer networks is defined as a collection of interconnected computers which uses a single technology for connection.
A distributed system is also the same as computer network but the main difference is that the whole collection of computers appears to its users as a single coherent system
Example :- World wide web

2. Two devices are in network if
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) none of the mentioned
View Answer

Answer: a
Explanation: A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, computing devices exchange data with each other using connections between nodes.

3. Which one of the following computer network is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
View Answer

Answer: d
Explanation: An overlay network is a computer network that is built on top of another network.

4. In computer network nodes are
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
View Answer

Answer: d
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to the destination.

5. Communication channel is shared by all the machines on the network in
a) broadcast network
b) unicast network
c) multicast network
d) none of the mentioned
View Answer

Answer: a
Explanation: In a broadcast network, an information is sent to all station in a network whereas in a multicast network the data or information is sent to a group of stations in the network. In unicast network, information is sent to only one specific station.

6. Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) none of the mentioned
View Answer

Answer: a
Explanation: A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters.

7. A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
a) bridge
b) firewall
c) router
d) all of the mentioned
View Answer

Answer: c
Explanation: A router[a] is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.

8. A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suite
d) none of the mentioned
View Answer

Answer: b
Explanation: A protocol stack refers to a group of protocols that are running concurrently that are employed for the implementation of network protocol suite.

9. Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) none of the mentioned
View Answer

Answer: a
Explanation: A network congestion occurs when traffic in the network is more than the network could handle.

10. Which one of the following extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer

Answer: b
Explanation: A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.


Digital subscriber line

Digital subscriber line (DSL; originally digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines

Computer Networks Questions & Answers – Access Networks (MCQs)

Top 10 Most Important MCQs For Computer Science and Engenering.

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on

                                                CLASS- Three

1. Which of this is not a constituent of residential telephone line?
a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) None of the mentioned
View Answer

Answer: c
Explanation: The third part is ordinary two way telephone channel.

2. In DSL telco provides these services
a) Wired phone access
b) ISP
c) All of the mentioned
d) None of the mentioned
View Answer

Answer: c
Explanation: The same company which provides phone connection is also its ISP in DSL.

3. The function of DSLAM is
a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) None of the mentioned
View Answer

Answer: a
Explanation: The DSLAM located in telco’s Central Office does this function.

DSLAM:-A digital subscriber line access multiplexer (DSLAM, often pronounced DEE-slam) is a network device, often located in telephone exchanges, that connects multiple customer digital subscriber line (DSL) interfaces to a high-speed digital communications channel using multiplexing techniques.

4. The following term is not associted with DSL
a) DSLAM
b) CO
c) Splitter
d) CMTS
View Answer

Answer: d
Explanation: Cable modem termination system is used in cable internet access.

5. HFC contains
a) Fibre cable
b) Coaxial cable
c) Both Fibre cable and Coaxial cable
d) None of the mentioned
View Answer

Answer: c
Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that combines optical fiber and coaxial cable.

6. Choose the statement which is not applicable for cable internet access
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
View Answer

Answer: d
Explanation: In cable access analog signal is converted to digital signal by CMTS.

7. Among the optical-distribution architectures that are essentially switched ethernet is
a) AON
b) PON
c) NON
d) None of the mentioned
View Answer

Answer:a
Explanation: Active optical networks are essentially switched ethernets.

8. StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
View Answer

Answer: d
Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015.

9. Home Access is provided by
a) DSL
b) FTTP
c) Cable
d) All of the mentioned
View Answer

Answer: d
Explanation: Home Access is provided by DSL, FTTP, Cable.

10. ONT is connected to splitter using
a) High speed fibre cable
b) HFC
c) Optical cable
d) None of the mentioned
View Answer

Answer: c
Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with an optical fibre cable.


Computer Networks Questions & Answers – Reference Models – 1

                                                                  Class – Four

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Reference Models – 1”.

1. The number of layers in Internet protocol stack
a) 5
b) 7
c) 6
d) None of the mentioned
View Answer

Answer: a
Explanation: There are five layers in the Internet Protocol stack. The five layers in Internet Protocol stack is Application, Transport, Network, Data link and Physical layer.

2. The number of layers in ISO OSI reference model
a) 5
b) 7
c) 6
d) None of the mentioned
View Answer

Answer: b
Explanation: The seven layers in ISO OSI reference model is Application, Presentation, Session, Transport, Network, Data link and Physical layer.

3. This layer is an addition to OSI model when compared with TCP IP model
a) Application layer
b) Presentation layer
c) Session layer
d) Both Session and Presentation layer
View Answer

Answer: d
Explanation: The only difference between OSI model and TCP/IP model is that in OSI model two layers namely Presentation and Session layer have been added.

4. Application layer is implemented in
a) End system
b) NIC
c) Ethernet
d) None of the mentioned
View Answer

Answer: a
Explanation: Not only application layer, but presentation layer, session layer and transport layer are also implemented in the end system.

5. Transport layer is implemented in
a) End system
b) NIC
c) Ethernet
d) None of the mentioned
View Answer

Answer: a
Explanation: Application, Presentation, Session and Transport layer are implemented in the end system.

6. The functionalities of presentation layer includes
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
View Answer

Answer: d
Explanation: Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation.

7. Delimiting and synchronization of data exchange is provided by
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
View Answer

Answer: b
Explanation: The session layer provides the mechanism for opening, closing and managing a session between end-user application processes. The session layer 5 is responsible for establishing managing synchronizing and terminating sessions.

8. In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer

Answer: d
Explanation: In OSI reference model, the fifth layer is Session layer. Session layer provides the mechanism for opening, closing and managing a session between end-user application processes.

9. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
View Answer

Answer: a
Explanation: In TCP/IP model, the fifth layer is application layer. when data is sent from device A to device B, the 5th layer to receive data at B is application layer.

10. In the OSI model, as a data packet moves from the lower to the upper layers, headers are _______
a) Added
b) Removed
c) Rearranged
d) None of the mentioned
View Answer

Answer: b
Explanation: In OSI reference model, when data packet moves from lower layers to higher layer, headers get removed. Whereas when data packet move from higher layer to lower layers, headers are added.


Class -Five

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Reference Models – 2”.

1. OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) none of the mentioned
View Answer

Answer: a
Explanation: OSI is the abbreviation for Open System Interconnection. OSI model provides a structured plan on how applications communicate over a network, which also helps us to have a structured plan for troubleshooting.

2. The OSI model has _______ layers.
a) 4
b) 5
c) 6
d) 7
View Answer

Answer: d
Explanation: In OSI reference model, there are 7 layers namely Application, Presentation, Session, Transport, Network, Data Link and Physical layer.

3. TCP/IP model does not have ______ layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) None of the mentioned
View Answer

Answer: a
Explanation: In OSI reference model, there are two layers which are not present in TCP/IP model. They are Presentation and Session layer.

4. Which layer links the network support layers and user support layers
a) session layer
b) data link layer
c) transport layer
d) network layer
View Answer

Answer: c
Explanation: Physical, data link and network layers are network support layers and session, presentation and application layers are user support layers.

5. Which address is used in an internet employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
View Answer

Answer: d
Explanation: All of the mentioned above addresses are used in TCP/IP protocol. All the addressing scheme, that is physical (MAC) and logical address, port address and specific address are employed in both TCP/IP model and OSI model.

6. TCP/IP model was developed _____ the OSI model.
a) prior to
b) after
c) simultaneous to
d) none of the mentioned
View Answer

Answer: a
Explanation: Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983, whereas OSI reference model was developed in the year 1984.

7. Which layer is responsible for process to process delivery?
a) network layer
b) transport layer
c) session layer
d) data link layer
View Answer

Answer: b
Explanation: The role of Transport layer (Layer 4) is to establish a logical end to end connection between two system in a network. The protocols used in Transport layer is TCP and UDP.

8. Which address identifies a process on a host?
a) physical address
b) logical address
c) port address
d) specific address
View Answer

Answer: c
Explanation: A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.

9. Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) none of the mentioned
View Answer

Answer: a
Explanation: In networking, a user mainly interacts with application layer to create and send information to other computer or network.

10. Transmission data rate is decided by
a) network layer
b) physical layer
c) data link layer
d) transport layer
View Answer

Answer: b
Explanation: Physical layer is a layer 1 device which deals with network cables or the standards in use like connectors, pins, electric current used etc. Basically the transmission speed is determined by the cables and connectors used. Hence it is physical layer that determines the transmission speed in network.


Computer Networks Questions & Answers – Cryptography

    CLASS-SIX

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Cryptography”.

 

1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
d) none of the mentioned
View Answer

Answer: a

2. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
View Answer

Answer: b

3. Which one of the following algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
View Answer

Answer: c

4. In cryptography, the order of the letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) none of the mentioned
View Answer

Answer: a

5. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
View Answer

Answer: a

6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
View Answer

Answer: a

7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol

View Answer 

Answer: b

8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
View Answer

Answer: a

9. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
View Answer

Answer: b

10. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) none of the mentioned
View Answer

Answer: a


Computer Networks Questions & Answers – Ports

CLASS-SIX

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Ports”.

1. Multiple object can be sent over a TCP connection between client and server in
a) Persistent HTTP
b) Ponpersistent HTTP
c) Both Persistent HTTP and Ponpersistent HTTP
d) None of the mentioned
View Answer

Answer: a
Explanation: hypertext transfer protocol is used for sending multiple objects over TCP connection.

2. HTTP is ________ protocol.
a) Application layer
b) Transport layer
c) Network layer
d) None of the mentioned
View Answer

Answer: a
Explanation: HTTP works on application layer.

3. In the network HTTP resources are located by
a) Uniform resource identifier
b) Unique resource locator
c) Unique resource identifier
d) None of the mentioned
View Answer

Answer: a
Explanation: HTTP resources are located by uniform resource identifier.

4. HTTP client requests by establishing a __________ connection to a particular port on the server.
a) User datagram protocol
b) Transmission control protocol
c) Broader gateway protocol
d) None of the mentioned
View Answer

Answer: b
Explanation:HTTP client requests by establishing TCP connection to a particular port on the server.

5. In HTTP pipelining
a) Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses
b) Multiple HTTP requests cannot be sent on a single TCP connection
c) Multiple HTTP requests are sent in a queue on a single TCP connection
d) None of the mentioned
View Answer

Answer: a
Explanation: Multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses in HTTP pipelining.

6. FTP server listens for connection on port number
a) 20
b) 21
c) 22
d) 23
View Answer

Answer: b
Explanation: 21 is the port number of FTP.

7. In FTP protocol, client contacts server using _________ as the transport protocol.
a) Transmission control protocol
b) User datagram protocol
c) Datagram congestion control protocol
d) Stream control transmission protocol
View Answer

Answer: a
Explanation: Client contacts server using TCP as the transport protocol.

8. In which mode FTP, the client initiates both the control and data connections.
a) Active mode
b) Passive mode
c) Both Active mode and Passive mode
d) None of the mentioned
View Answer

Answer: b
Explanation: In passive mode the client initiates both the control and data connections.

9. The file transfer protocol is built on
a) Data centric architecture
b) Service oriented architecture
c) Client server architecture
d) None of the mentioned
View Answer

Answer: c
Explanation: FTP is built on client server architecture.

10. In file transfer protocol, data transfer can be done in
a) Stream mode
b) Block mode
c) Compressed mode
d) All of the mentioned
View Answer

Answer: d
Explanation: Data transfer can be done in stream, block and compressed modes.


INTERNET:-

The Introduction   of   the Internet  has  led   to the creation Of  revolutionary  means of  sharing  knowledge  across  the globe.  But how much  knowledge  do we  possess  regarding the internet?  Do  we  have  a through  understanding   of, say The undertakings  that  characterize   in the cyberpoint9.com

SURFACE WEB 

DEEP WEB

DARK WEB

RED ROOMS 

MARIANA’S ROOM

 

 


 

Linus Torvalds

Linux Foundation
Android & Supercomputers won’t be possible without him

67% of internet, runs on Linux

The history of Linux began in 1991 with the commencement of a personal project by Finnish student Linus Torvalds to create a new free operating system kernel

Linus Benedict Torvalds is a Finnish–American software engineer who is the creator, and historically, the principal developer of the Linux kernel, which became the kernel for many Linux distributions and operating systems such as Android and Chrome OS

Born28 December 1969 (age 49 years), Helsinki, Finland
Full nameLinus Benedict Torvalds
SpouseTove Torvalds (m. 1997)
Talk is cheap. Show me the code.
Software is like sex: it’s better when it’s free.

Steve Jobs

Apple.inc

(1 April 1976, Cupertino, California, United States)

Revolutnied Computing Gadgets

Most artist & Designers won’t be existed without him.

Steven Paul Jobs was an American business magnate and investor. He was the chairman, chief executive officer, and co-founder of Apple Inc.; chairman and majority shareholder of Pixar; a member of The …Wikipedia

SpouseLaurene Powell (m. 1991–2011)
EducationReed College (1972–1974), MORE
I want to put a ding in the universe.
Design is not just what it looks like and feels like. Design is how it works.
Innovation distinguishes between a leader and a follower.

Bill Gates


Microsoft

(4 April 1975, Albuquerque, New Mexico, United States)

Made Computers possible for Everyone

he is the reason that most of you having a pc at home

 

William Henry Gates III is an American business magnate, investor, author, philanthropist, and humanitarian. He is best known as the principal founder of Microsoft Corporation. Wikipedia

Net worth9,780 crores USD (2019) Trending
Born28 October 1955 (age 63 years), Seattle, Washington, United States
SpouseMelinda Gates (m. 1994)
Your most unhappy customers are your greatest source of learning.
Success is a lousy teacher. It seduces smart people into thinking they can’t lose.
Life is not fair; get used to it.

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*