Bca - Cn - MCQ 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Cr4satya
C
Cr4satya
Community Contributor
Quizzes Created: 3 | Total Attempts: 17,301
Questions: 20 | Attempts: 602

SettingsSettingsSettings
Bca - Cn - MCQ 1 - Quiz

MCQ Test on
Networking Technologies Networking Concepts
Created by

Satyajit Mukherjee
Satyajit's Classes
Email- satyajit. Mukherjee@gmail. Com
Website- https://satyajit. Page4. Me


Questions and Answers
  • 1. 

    A ___________ is basically all of the components, hardware and software, involved in connecting computers across small and large distances.

    • A.

      LAN

    • B.

      WAN

    • C.

      Network

    • D.

      SAN

    Correct Answer
    C. Network
    Explanation
    A network refers to the collection of components, both hardware and software, that are used to connect computers over small or large distances. This includes devices such as routers, switches, cables, and protocols that enable communication between computers. A network can be a local area network (LAN) within a small area, a wide area network (WAN) that spans across larger distances, or even a storage area network (SAN) that is specifically designed for data storage and retrieval.

    Rate this question:

  • 2. 

    _________ describe(s) users that can connect to a network from any location.

    • A.

      SOHO

    • B.

      Branch office

    • C.

      Mobile users

    • D.

      Corporate office

    Correct Answer
    C. Mobile users
    Explanation
    Mobile users are the correct answer because they are able to connect to a network from any location. This term refers to individuals who are not restricted to a specific physical location and can access the network using mobile devices such as smartphones, tablets, or laptops. They can connect to the internet and access resources or services regardless of their location, making them highly flexible and adaptable in terms of network connectivity.

    Rate this question:

  • 3. 

    ___________ has both physical and logical ring topologies.

    • A.

      Ethernet

    • B.

      FDDI

    • C.

      Token Ring

    Correct Answer
    B. FDDI
    Explanation
    FDDI (Fiber Distributed Data Interface) is the correct answer because it is a networking technology that supports both physical and logical ring topologies. FDDI uses fiber optic cables to create a high-speed network with a ring structure, allowing data to flow in both directions. It also utilizes a token passing protocol to control access to the network, ensuring fair and efficient data transmission. Ethernet, on the other hand, is typically based on a bus or star topology, while Token Ring is a purely logical ring topology.

    Rate this question:

  • 4. 

    Ethernet ___________ has/have both a physical and logical bus topology.

    • A.

      10BaseT

    • B.

      10Base2 and 10Base5

    • C.

      10BaseT and 10Base2

    • D.

      10BaseT, 10Base2, and 10Base5

    Correct Answer
    B. 10Base2 and 10Base5
    Explanation
    Ethernet 10Base2 and 10Base5 have both a physical and logical bus topology. This means that the physical layout of the network resembles a bus, with all devices connected to a single cable. Additionally, the logical topology is also a bus, as data is transmitted in a linear fashion along the cable. Both 10Base2 and 10Base5 use coaxial cables to connect devices in a bus configuration, allowing for multiple devices to share the same cable.

    Rate this question:

  • 5. 

    A ________ topology describes how devices communicate with each other.

    • A.

      Physical

    • B.

      Logical

    Correct Answer
    B. Logical
    Explanation
    A logical topology describes how devices communicate with each other. Unlike a physical topology, which focuses on the physical layout and connections of devices, a logical topology defines the flow of data between devices and the logical paths that data takes. It determines how devices are logically connected and how they exchange information, regardless of their physical location or connection type.

    Rate this question:

  • 6. 

    _________ has a physical star topology but a logical ring topology.

    • A.

      Ethernet

    • B.

      FDDI

    • C.

      Token Ring

    • D.

      FDDI and Token Ring

    Correct Answer
    C. Token Ring
    Explanation
    Token Ring is a networking technology that uses a physical star topology, where each device is connected to a central hub or switch. However, it implements a logical ring topology, where data is transmitted in a circular manner from one device to the next until it reaches its destination. This is achieved through the use of a token passing mechanism, where a special token is passed from one device to another to control access to the network.

    Rate this question:

  • 7. 

    A _________ is used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment

    • A.

      WAN

    • B.

      LAN

    • C.

      MAN

    • D.

      LAN and MAN

    Correct Answer
    B. LAN
    Explanation
    A LAN (Local Area Network) is used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment. LANs are typically used in small to medium-sized networks and provide high-speed connections for computers and other devices within the same area. They allow for the sharing of resources such as files, printers, and internet connections among connected devices.

    Rate this question:

  • 8. 

    A _________ uses Gigabit Ethernet as a media type

    • A.

      WAN

    • B.

      LAN

    • C.

      MAN

    • D.

      LAN and MAN

    Correct Answer
    D. LAN and MAN
    Explanation
    A LAN (Local Area Network) and MAN (Metropolitan Area Network) both use Gigabit Ethernet as a media type. Gigabit Ethernet is a high-speed networking technology that allows for data transmission at a rate of 1 gigabit per second. LANs are typically used within a small geographical area, such as an office building or campus, while MANs cover a larger area, such as a city or metropolitan area. Both types of networks require fast and reliable communication, making Gigabit Ethernet an ideal choice for their media type.

    Rate this question:

  • 9. 

    A _________ provides a high-speed infrastructure to move data between storage devices and file servers

    • A.

      SAN

    • B.

      LAN

    • C.

      CN

    • D.

      SAN and CN

    Correct Answer
    A. SAN
    Explanation
    A Storage Area Network (SAN) is a specialized network that provides a high-speed infrastructure to move data between storage devices and file servers. It allows multiple servers to access and share storage resources, enabling efficient data transfer and storage management. A SAN is designed to handle large amounts of data and provide high-speed connectivity, making it an ideal solution for organizations that require fast and reliable data storage and retrieval. A Local Area Network (LAN) and a Campus Network (CN) are not specifically designed for storage purposes and may not offer the same level of performance and scalability as a SAN.

    Rate this question:

  • 10. 

    Which of the following is a disadvantage of SANs?

    • A.

      Distance limitation

    • B.

      Cost

    • C.

      Overhead

    • D.

      Management

    Correct Answer
    B. Cost
    Explanation
    The correct answer is Cost. SANs (Storage Area Networks) can be expensive to implement and maintain. They require specialized hardware and software, as well as skilled personnel to manage and troubleshoot them. The initial setup costs, including the purchase of storage devices, switches, and other infrastructure, can be high. Additionally, ongoing maintenance and upgrades can also add to the overall cost of SANs. Therefore, cost is a significant disadvantage of SANs.

    Rate this question:

  • 11. 

    A _________ looks at OSI Reference Model layers 4–7 to make intelligent decisions about how to obtain information for a user.

    • A.

      SAN

    • B.

      LAN

    • C.

      CN

    • D.

      SAN and CN

    Correct Answer
    C. CN
    Explanation
    A CN (Content Network) looks at OSI Reference Model layers 4-7 to make intelligent decisions about how to obtain information for a user.

    Rate this question:

  • 12. 

    Which of the following standards or protocols are used by the session layer?

    • A.

      JPEG

    • B.

      NFS

    • C.

      TCP

    • D.

      Ethernet

    Correct Answer
    B. NFS
    Explanation
    NFS (Network File System) is a protocol used by the session layer. It allows a user on a client computer to access files over a network as if they were located on the local computer. NFS provides a transparent and efficient way for remote file sharing and access, making it a suitable choice for the session layer.

    Rate this question:

  • 13. 

    The _________ layer provides for hardware addressing

    • A.

      Transport

    • B.

      Network

    • C.

      Data link

    • D.

      Physical

    Correct Answer
    C. Data link
    Explanation
    The Data link layer provides for hardware addressing. This layer is responsible for the reliable transfer of data between nodes on a network. It adds a header to the data packet, including the source and destination MAC addresses, which are unique hardware addresses assigned to network devices. This addressing allows the data to be correctly delivered to the intended recipient at the physical layer.

    Rate this question:

  • 14. 

    CSMA/CD stands for ________.

    • A.

      Collision Sense Multiple Access/Carrier Detection

    • B.

      Carrier Sense Multiple Access/Collision Detection

    • C.

      Collision Sense Media Access/Carrier Detection

    • D.

      Carrier Sense Media Access/Collision Detection

    Correct Answer
    B. Carrier Sense Multiple Access/Collision Detection
    Explanation
    CSMA/CD stands for Carrier Sense Multiple Access/Collision Detection. This is a networking protocol used in Ethernet networks to control access to the network medium. "Carrier Sense" refers to the process of checking if the network medium is currently in use before transmitting data. "Multiple Access" means that multiple devices can access the network at the same time. "Collision Detection" is the mechanism used to detect and resolve collisions that occur when two or more devices transmit data simultaneously.

    Rate this question:

  • 15. 

    MAC addresses are _________ bits in length and are represented in a ___________ format.

    Correct Answer
    48
    hexadecimal
    Explanation
    MAC addresses are 48 bits in length and are represented in a hexadecimal format. The 48-bit length of MAC addresses allows for a large number of unique addresses to be assigned to network devices. The hexadecimal format is used to represent the MAC address because it is a base-16 number system that uses digits 0-9 and letters A-F. This format provides a concise and easily readable representation of the MAC address.

    Rate this question:

  • 16. 

    Ethernet ________ uses a type field.

    • A.

      II

    • B.

      802.3

    • C.

      802.2

    Correct Answer
    A. II
    Explanation
    Ethernet II uses a type field. The Ethernet II frame format is the most commonly used Ethernet frame format and includes a type field that specifies the protocol being used in the data section of the frame. This allows the receiver to correctly interpret and process the data. The other options, 802.3 and 802.2, are different Ethernet frame formats that do not use a type field.

    Rate this question:

  • 17. 

    Which component of the data link layer for IEEE specifies network protocols?

    • A.

      LLC

    • B.

      MAC

    • C.

      802.5

    • D.

      802.3

    Correct Answer
    A. LLC
    Explanation
    The LLC (Logical Link Control) component of the data link layer for IEEE specifies network protocols. It provides services such as flow control, error control, and addressing. LLC is responsible for managing communication between the network layer and the MAC (Media Access Control) sublayer. It ensures that data is properly transmitted and received, and handles the organization and synchronization of data frames.

    Rate this question:

  • 18. 

    The network layer solves all of the following problems except ___________.

    • A.

      Broadcast problems

    • B.

      Conversion between media types

    • C.

      Hierarchy through the use of physical addresses

    • D.

      Collision problems

    Correct Answer
    C. Hierarchy through the use of pHysical addresses
    Explanation
    The network layer is responsible for routing packets across different networks, ensuring that they reach their intended destination. It addresses broadcast problems by using techniques like IP multicast to efficiently send data to multiple recipients. It also handles conversion between media types by encapsulating data from higher layers into packets that can be transmitted over different types of physical media. Additionally, it deals with collision problems through protocols like Ethernet that implement collision detection and avoidance mechanisms. However, the network layer does not solve the problem of hierarchy through the use of physical addresses. This is typically addressed at higher layers of the network stack, such as the application or transport layer.

    Rate this question:

  • 19. 

    Reliable connections go through a three-way handshake. Place the following in the correct order: ACK (1), SYN, (2), SYN/ACK (3).

    • A.

      2, 1, 3

    • B.

      3, 2, 1

    • C.

      2, 3, 1

    • D.

      1, 2, 3

    Correct Answer
    C. 2, 3, 1
    Explanation
    The correct order for the three-way handshake is 2, 3, 1. The first step is the SYN packet, which is sent by the client to the server to initiate the connection. The server then responds with the SYN/ACK packet, indicating that it has received the request and is willing to establish a connection. Finally, the client sends an ACK packet to acknowledge the server's response and complete the handshake process.

    Rate this question:

  • 20. 

    Connection multiplexing is done through the use of a ________ number.

    • A.

      Socket

    • B.

      Hardware

    • C.

      Network

    • D.

      Session

    Correct Answer
    A. Socket
    Explanation
    Connection multiplexing is done through the use of a socket number. A socket is a software endpoint that enables communication between two computers over a network. It allows multiple connections to be established and managed simultaneously, enabling connection multiplexing. By assigning a unique socket number to each connection, the system can distinguish between different connections and route data packets accordingly. Therefore, using a socket number is essential for connection multiplexing.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 10, 2011
    Quiz Created by
    Cr4satya
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.