This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on “Basics – 2”.
A computer network is a collection of computers connected by digital interconnections and using a set of common communication protocols to share resources located on or provided by network nodes. Local-area networks (LANs) and wide-area networks (WANs) are the two most common network types (WANs). LANs use fast-transmitting links (wires, Ethernet cables, fibre optics, Wi-Fi) to connect computers and peripheral devices in a small physical space, such as a business office, laboratory, or college campus.
1. When collection of various computers seems a single coherent system to its client, then it is called _________
a) computer network
b) distributed system
c) networking system
d) mail system
Explanation:A computer network is a series of interconnected computers that communicate using a single technology.
A distributed system is similar to a computer network, but the key difference is that the users perceive the entire set of computers as a single coherent system.
For instance, consider the World Wide Web.
2. Two devices are in network if __________
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
Explanation: A computer network, also known as a data network, is a type of digital telecommunications network in which nodes can share resources. Computing devices communicate with one another via connections between nodes in computer networks. The nodes have processes in place that allow them to share a specific type of data through a specific protocol.
3. Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Explanation: A computer network that is installed on top of another network is known as an overlay network. Virtual Private Networks (VPNs) and Peer-to-Peer Networks are examples of overlay networks (P2P).
4. In computer network nodes are _________
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
Explanation: A node in a computer network may be something that can send or receive data, as well as route data to its intended destination. Network nodes include routers, computers, and smartphones, to name a few.
5. Communication channel is shared by all the machines on the network in ________
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
Explanation: Data or information is sent to all stations in a broadcast network, while data or information is sent to a group of stations in a multicast network. Information is sent to only one station in a unicast network. The network’s broadcast address is the network’s most recently assigned address.
6. Bluetooth is an example of __________
a) personal area network
b) local area network
c) virtual private network
d) wide area network
Explanation: Bluetooth is a wireless personal area network (WPAN) system that enables data to be transmitted over a distance of up to 10 metres. For transmission, it uses the 2.45 GHz frequency band.
7. A __________ is a device that forwards packets between networks by processing the routing information included in the packet.
Explanation: A router is a networking system that sends data packets from one computer network to another. On the Internet, routers are in charge of traffic steering. To find the cheapest route to the destination, they use routing protocols like RIP.
8. A list of protocols used by a system, one protocol per layer, is called ________
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
Explanation: A protocol stack is a set of protocols that are used to implement a network protocol suite and are all running at the same time. Each layer of the network model must use one of the protocol stack’s protocols.
9. Network congestion occurs _________
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer failure
Explanation: When a network’s traffic exceeds the capacity of the network, congestion occurs. Network management utilises a combination of open-loop and closed-loop congestion reduction strategies to avoid network congestion.
10. Which of the following networks extends a private network across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network