Computer Networks Questions & Answers – Basics – 2 2021

Computer Networks Questions & Answers – Basics – 2 2021

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics – 2”.

A computer network is a collection of computers connected by digital interconnections and using a set of common communication protocols to share resources located on or provided by network nodes. Local-area networks (LANs) and wide-area networks (WANs) are the two most common network types (WANs). LANs use fast-transmitting links (wires, Ethernet cables, fibre optics, Wi-Fi) to connect computers and peripheral devices in a small physical space, such as a business office, laboratory, or college campus.

1. When collection of various computers seems a single coherent system to its client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system

Explanation:A computer network is a series of interconnected computers that communicate using a single technology.
A distributed system is similar to a computer network, but the key difference is that the users perceive the entire set of computers as a single coherent system.
For instance, consider the World Wide Web.

2. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive

Explanation: A computer network, also known as a data network, is a type of digital telecommunications network in which nodes can share resources. Computing devices communicate with one another via connections between nodes in computer networks. The nodes have processes in place that allow them to share a specific type of data through a specific protocol.

3. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network

Explanation: A computer network that is installed on top of another network is known as an overlay network. Virtual Private Networks (VPNs) and Peer-to-Peer Networks are examples of overlay networks (P2P).

4. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned

Explanation: A node in a computer network may be something that can send or receive data, as well as route data to its intended destination. Network nodes include routers, computers, and smartphones, to name a few.

5. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network

Explanation: Data or information is sent to all stations in a broadcast network, while data or information is sent to a group of stations in a multicast network. Information is sent to only one station in a unicast network. The network’s broadcast address is the network’s most recently assigned address.

6. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network

Explanation: Bluetooth is a wireless personal area network (WPAN) system that enables data to be transmitted over a distance of up to 10 metres. For transmission, it uses the 2.45 GHz frequency band.

7. A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
a) bridge
b) firewall
c) router
d) hub

Explanation: A router is a networking system that sends data packets from one computer network to another. On the Internet, routers are in charge of traffic steering. To find the cheapest route to the destination, they use routing protocols like RIP.

8. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system

Explanation: A protocol stack is a set of protocols that are used to implement a network protocol suite and are all running at the same time. Each layer of the network model must use one of the protocol stack’s protocols.

9. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure

Explanation: When a network’s traffic exceeds the capacity of the network, congestion occurs. Network management utilises a combination of open-loop and closed-loop congestion reduction strategies to avoid network congestion.

10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
View Answer

Explanation: A virtual private network (VPN) extends a private network through a public network, allowing users to send and receive data as if their computing devices were directly connected to the private network. Users on the internet will benefit from improved security and online anonymity thanks to VPNs. It’s also used to unblock websites that are blocked in certain areas.
A public data network (PDN) is a network that is set up and managed by a telecommunications administration or a recognised private operating entity for the purpose of providing data transmission services to the general public. RETD, the first network, was developed in Spain in 1972. During the 1980s and 1990s, the public data network was the collective name for a multinational collection of X.25 providers whose combined network had broad global reach and provided infrastructure for the early Internet.

Leave a Reply

Your email address will not be published. Required fields are marked *