Skip to main content

COMMUNICATION AND NETWORK MCQS

 What is the basic purpose of computer networking?

a. To enhance computer performance

b. To connect computers for data sharing and communication

c. To secure computer data

d. To perform complex mathematical calculations


Answer: b. To connect computers for data sharing and communication


What does LAN stand for in computer networking?

a. Local Access Network

b. Large Area Network

c. Local Area Network

d. Long Access Network


Answer: c. Local Area Network


Which of the following is an example of a wireless communication technology used in LANs?

a. Ethernet

b. Bluetooth

c. Fiber optics

d. DSL


Answer: b. Bluetooth


What does WAN stand for in computer networking?

a. Wireless Area Network

b. Wide Area Network

c. Wired Area Network

d. Web Area Network


Answer: b. Wide Area Network


Which network topology connects all devices in a linear sequence?

a. Bus

b. Star

c. Ring

d. Mesh


Answer: a. Bus


What is the purpose of a router in a computer network?

a. To connect devices within a LAN

b. To connect multiple LANs and route data between them

c. To connect devices to the internet

d. To connect a computer to a printer


Answer: b. To connect multiple LANs and route data between them


What is an IP address used for in networking?

a. To identify a specific website

b. To identify a specific computer or device on a network

c. To encrypt data transmitted over the internet

d. To send and receive emails


Answer: b. To identify a specific computer or device on a network


Which of the following is a commonly used protocol for sending emails?

a. HTTP

b. FTP

c. SMTP

d. TCP


Answer: c. SMTP


What does DNS stand for in computer networking?

a. Domain Name System

b. Data Network Server

c. Digital Naming Service

d. Dynamic Network System


Answer: a. Domain Name System


What is the primary role of a router in a computer network?

a) Transmit data within the same network

b) Connect multiple networks together

c) Filter spam emails

d) Execute arithmetic operations


Answer: b) Connect multiple networks together


Which network device operates at the Data Link Layer of the OSI model and forwards data based on MAC addresses?

a. Router

b. Switch

c. Hub

d. Firewall


Answer: b. Switch


What is a firewall used for in network security?

a. To filter and control network traffic based on security rules

b. To speed up internet connections

c. To connect multiple networks together

d. To store and manage network data


Answer: a. To filter and control network traffic based on security rules


Which of the following is an example of a public IP address?

a. 10.0.0.1

b. 172.16.0.1

c. 192.168.0.1

d. 203.0.113.1


Answer: d. 203.0.113.1


What does HTTP stand for in web addresses?

a. HyperText Transfer Protocol

b. Hyperlink and Text Transmission Protocol

c. High-Tech Text Transfer Procedure

d. Hypertext Transfer Privacy


Answer: a. HyperText Transfer Protocol

Which OSI model layer is responsible for routing and forwarding data packets between different networks?

a) Physical Layer

b) Data Link Layer

c) Network Layer

d) Transport Layer


Answer: c) Network Layer

Which network protocol is used for securely transferring files over a network?

a. HTTP

b. FTP

c. SMTP

d. POP3


Answer: b. FTP


What is the purpose of the ping command in networking?

a. To send email messages

b. To test network connectivity and measure response time

c. To access web pages

d. To transfer files between computers


Answer: b. To test network connectivity and measure response time


Which networking device is used to connect multiple network segments together and operates at the Network Layer of the OSI model?

a. Hub

b. Switch

c. Router

d. Gateway


Answer: c. Router


Which of the following is NOT a top-level domain (TLD) for internet domain names?

a. .com

b. .net

c. .org

d. .exe


Answer: d. .exe


In the context of IP addressing, what is the purpose of subnetting?

a. To divide a network into smaller, more manageable subnetworks

b. To encrypt data transmissions

c. To assign unique IP addresses to devices

d. To filter and block unwanted internet traffic


Answer: a. To divide a network into smaller, more manageable subnetworks


Which network protocol is responsible for translating domain names (e.g., www.example.com) into IP addresses?

a. FTP

b. HTTP

c. DNS

d. SMTP


Answer: c. DNS


Which of the following is NOT a type of network cable?

a. Ethernet cable

b. Fiber optic cable

c. Coaxial cable

d. Bluetooth cable


Answer: d. Bluetooth cable


What is the purpose of NAT (Network Address Translation) in networking?

a. To create virtual private networks (VPNs)

b. To assign unique IP addresses to devices on a private network

c. To map private IP addresses to a single public IP address for internet access

d. To secure email communication


Answer: c. To map private IP addresses to a single public IP address for internet access


Which network protocol is used for real-time voice and video communication over the internet?

a. HTTP

b. SMTP

c. VoIP

d. FTP


Answer: c. VoIP (Voice over Internet Protocol)


What is a DDoS attack in the context of network security?

a. A type of malware

b. A method of encrypting data

c. A distributed denial of service attack that overwhelms a network or website with traffic

d. A type of network cable


Answer: c. A distributed denial of service attack that overwhelms a network or website with traffic


Which of the following is a widely used network operating system?

a. Windows

b. Microsoft Office

c. Adobe Photoshop

d. Skype


Answer: a. Windows


Which networking technology allows devices to communicate over short distances without wires?

a. Ethernet

b. Bluetooth

c. Fiber optics

d. DSL


Answer: b. Bluetooth


What does VoIP stand for in networking?

a. Voice Over Internet Protocol

b. Video Output and Input Protocol

c. Virtual Office Information Processing

d. Virtual Operating and Integration Platform


Answer: a. Voice Over Internet Protocol


What is the purpose of a proxy server in network communication?

a. To route data between different networks

b. To filter and cache web content for improved performance

c. To assign IP addresses to devices on a LAN

d. To secure email communication


Answer: b. To filter and cache web content for improved performance


Which network topology connects all devices to a central hub or switch?

a. Bus

b. Star

c. Ring

d. Mesh


Answer: b. Star


Which network protocol is commonly used for secure remote access to a network?

a. HTTP

b. HTTPS

c. FTP

d. Telnet


Answer: b. HTTPS (Hypertext Transfer Protocol Secure)


What is the purpose of a VPN (Virtual Private Network)?

a. To provide high-speed internet access

b. To filter and block unwanted internet traffic

c. To encrypt and secure communication over a public network

d. To map private IP addresses to public IP addresses


Answer: c. To encrypt and secure communication over a public network


What does IoT stand for in the context of networked devices?

a. Internet of Things

b. Input and Output Technology

c. Integrated Online Testing

d. Internet of Telecommunications


Answer: a. Internet of Things


What is the purpose of a MAC address in networking?

a. To identify a device on the internet

b. To encrypt data transmissions

c. To uniquely identify a network interface controller (NIC)

d. To assign IP addresses to devices


Answer: c. To uniquely identify a network interface controller (NIC)


Which of the following is a wireless communication technology commonly used for connecting IoT devices?

a. Ethernet

b. Zigbee

c. Fiber optics

d. DSL


Answer: b. Zigbee


What is the purpose of a modem in computer networking?

a. To connect multiple LANs

b. To encrypt data transmissions

c. To convert digital data into analog signals for transmission

d. To secure email communication


Answer: c. To convert digital data into analog signals for transmission


Which networking technology allows for high-speed data transmission over existing telephone lines?

a. Ethernet

b. Fiber optics

c. DSL (Digital Subscriber Line)

d. Coaxial cable


Answer: c. DSL (Digital Subscriber Line)


What does SSID stand for in wireless networking?

a. Secure System Identifier

b. Service Set Identifier

c. System Security Identifier

d. Signal Strength Indicator


Answer: b. Service Set Identifier


Which of the following is NOT a commonly used wireless encryption protocol for securing Wi-Fi networks?

a. WEP

b. WPA

c. SSL

d. WPA3


Answer: c. SSL (Secure Sockets Layer)


What is a MAC filtering used for in wireless networking?

a. To filter and block unwanted internet traffic

b. To map private IP addresses to public IP addresses

c. To restrict access to a Wi-Fi network based on MAC addresses

d. To encrypt data transmissions


Answer: c. To restrict access to a Wi-Fi network based on MAC addresses


Which of the following is a commonly used port number for secure web traffic (HTTPS)?

a. 80

b. 25

c. 443

d. 110


Answer: c. 443


What is the purpose of a WEP key in wireless networking?

a. To identify a Wi-Fi network

b. To encrypt data transmissions

c. To assign IP addresses to devices

d. To filter and block internet traffic


Answer: b. To encrypt data transmissions


What is a subnet mask used for in IP addressing?

a. To identify the network portion of an IP address

b. To encrypt data transmissions

c. To assign unique IP addresses to devices

d. To assign DNS server addresses


Answer: a. To identify the network portion of an IP address


Which of the following is NOT a commonly used network port?

a. Port 25 (SMTP)

b. Port 53 (DNS)

c. Port 80 (HTTP)

d. Port 1000 (Bluetooth)


Answer: d. Port 1000 (Bluetooth)


What is the purpose of QoS (Quality of Service) in networking?

a. To prioritize and manage network traffic to ensure a certain level of service quality

b. To secure email communication

c. To assign IP addresses to devices

d. To filter and block internet traffic


Answer: a. To prioritize and manage network traffic to ensure a certain level of service quality


Which network protocol is commonly used for remotely logging into a computer system over a network connection?

a. HTTP

b. FTP

c. SSH

d. POP3


Answer: c. SSH (Secure Shell)


What is the purpose of a VLAN (Virtual LAN) in networking?

a. To create a physical separation between network segments

b. To assign IP addresses to devices

c. To secure email communication

d. To create logical network segments within a physical network


Answer: d. To create logical network segments within a physical network


What does SNMP stand for in network management?

a. Simple Network Management Protocol

b. Secure Network Management Protocol

c. System Network Management Procedure

d. Structured Network Monitoring Protocol


Answer: a. Simple Network Management Protocol


Which of the following is a commonly used protocol for retrieving email messages from a mail server?

a. SMTP

b. POP3

c. IMAP

d. HTTP


Answer: b. POP3 (Post Office Protocol version 3)


In networking, what is the purpose of NAT (Network Address Translation)?

a. To assign public IP addresses to devices

b. To map private IP addresses to a single public IP address

c. To encrypt data transmissions

d. To assign MAC addresses to devices


Answer: b. To map private IP addresses to a single public IP address


Which of the following is NOT a commonly used network top-level domain (TLD)?

a. .com

b. .net

c. .org

d. .exe


Answer: d. .exe


What is the purpose of a MAC (Media Access Control) address in networking?

a. To identify a device on the internet

b. To filter and block internet traffic

c. To uniquely identify a network interface controller (NIC)

d. To encrypt data transmissions


Answer: c. To uniquely identify a network interface controller (NIC)





Comments

Popular posts from this blog

Software Process Model(SPM)

  Explain spiral development model with advantages and disadvantages The Spiral Development Model is a risk-driven software development approach that combines iterative and waterfall models. It involves repeated cycles (or spirals) to incrementally refine the software project. Each spiral consists of four major phases: Planning , Risk Analysis , Engineering , and Evaluation .                                                           Fig: Spiral Software development model Phases in the Spiral Model: Planning : Requirements are gathered and objectives are set for the project. Risk Analysis : Risks are identified, analyzed, and mitigation strategies are developed. Develop/Engineering : The actual development and testing of the product take place. Evaluation : Stakeholders/users review the progress and provide feedback, inf...

Solution of NEB model quetions

 solution to model questions are : 

DBMS-SQL

SQL DDL and DML Examples Examples of DDL (Data Definition Language) and DML (Data Manipulation Language) commands in SQL. DDL (Data Definition Language) Examples: 1. Create a new database: CREATE DATABASE SchoolDB;  2. Create a table: CREATE TABLE Students ( StudentID INT PRIMARY KEY, FirstName VARCHAR(50), LastName VARCHAR(50), Age INT );  3. Alter a table to add a new column: ALTER TABLE Students ADD Email VARCHAR(100);  4. Drop a table: DROP TABLE Students;  5. Rename a table: ALTER TABLE OldTableName RENAME TO NewTableName;  DML (Data Manipulation Language) Examples: 1. Insert data into a table:  INSERT INTO Students (StudentID, FirstName, LastName, Age) VALUES (1, 'John', 'Doe', 20);  2. Update data in a table: UPDATE Students SET Age = 21 WHERE StudentID = 1;  3. Delete data from a table: DELETE FROM Students WHERE StudentID = 1;  4. Select data from a table: SELECT * FROM Students;  5. Select data with conditions: SELECT FirstName...