Networking Miscellaneous(Networking ) Questions and Answers

Question 1. Error rate is
  1.    an error-detecting code based on a summation operation performed on the bits to be checked.
  2.    a check bit appended to an array of binary digits to make the sum of all the binary digits.
  3.    a code in which each expression conforms to specific rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and
  4.    the ratio of the number of data units in error to the total number of data units
  5.    None of the above
Explanation:-
Answer: Option D. -> the ratio of the number of data units in error to the total number of data units

Question 2. Communication network is
  1.    one or more conductors that serve as a common connection for a related group of devices
  2.    a continuous frequency capable of being modulated or impressed with a second signal
  3.    the condition with two or more stations attempt to use the same channel at the same time
  4.    a collection of interconnected functional units that provides a data communications service among stations attached to the network
  5.    None of the above
Explanation:-
Answer: Option D. -> a collection of interconnected functional units that provides a data communications service among stations attached to the network

Question 3. Modem is used in data transmission. When was it invented and in which country?
  1.    1963, USA
  2.    1965, Germany
  3.    1950, USA
  4.    1950, Japan
  5.    None of the above
Explanation:-
Answer: Option C. -> 1950, USA

Question 4. Which of the following technique is used for Time-To-Line (TTL)?
  1.    a technique used in best-effort delivery system to avoid endlessly looping packets.
  2.    a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
  3.    One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
  4.    All of the above
  5.    None of the above
Explanation:-
Answer: Option A. -> a technique used in best-effort delivery system to avoid endlessly looping packets.

Question 5. Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
  1.    Network Server
  2.    Virtual Private Network
  3.    Network operating system
  4.    OSI
Explanation:-
Answer: Option B. -> Virtual Private Network

Question 6. The method of communication in which transmission takes place in both directions, but only one direction at a time is called
  1.    Simplex
  2.    Four wire circuit
  3.    Full Duplex
  4.    Half Duplex
Explanation:-
Answer: Option D. -> Half Duplex

Question 7. Which of the following is a wrong example of network layer?
  1.    Internet Protocol (IP) - ARPANET
  2.    X.25 Packet Level Protocol (PLP)-ISO
  3.    Source routing and domain naming-USENet
  4.    X.25 level 2-ISO
Explanation:-
Answer: Option D. -> X.25 level 2-ISO

Question 8. Protocols are
  1.    Agreements on how communication components and DTE
  2.    Logical communication channels used for transferri
  3.    Physical communication channels used for transferr
  4.    None of the above
Explanation:-
Answer: Option A. -> Agreements on how communication components and DTE

Question 9. Error detection at the data link level is achieved by
  1.    Bit Stuffing
  2.    Cyclic Redundancy Code
  3.    Hamming Code
  4.    Equalization
Explanation:-
Answer: Option B. -> Cyclic Redundancy Code

Question 10. The topology with highest reliability is:
  1.    Bus topology
  2.    Star topology
  3.    Ring topology
  4.    Mesh topology
Explanation:-
Answer: Option D. -> Mesh topology
Mess Topology is a network setup where each computer and network device is interconnected with one another, allowing for most transmissions to be distributed, even if one of the connections go down. This topology is not commonly used for most computer networks as it is difficult and expensive to have redundant connection to every computer. However, this topology is commonly used for wireless networks.