Data Communication And Computer Network 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Harry.hot02
H
Harry.hot02
Community Contributor
Quizzes Created: 6 | Total Attempts: 959
Questions: 25 | Attempts: 166

SettingsSettingsSettings
Data Communication And Computer Network 2 - Quiz

INSTRUCTIONS
1. NUMBER OF QUESTIONS 25
2. HAS A TIME LIMIT OF 15 MINUTES
3. HAS A PASS MARKS OF 30%
4. QUESTIONS PER PAGE 1
5. EACH QUESTIONS HAS 1 MARKS
6. NEGATIVE MARKING FOR EACH QUESTIONS 0.25
7. WILL ALLOW TO YOU GO BACK ,SKIP AND CHANGE YOUR ANSWERS
8. WILL ALLOW TO YOU PRINT OUT YOUR RESULT AND CERTIFICATE
9. WILL ALLOW TO YOU PRINT OUT YOURS RESPONSE SHEET WITH CORRECT ANSWER KEY AND EXPLANATION
10. WE WILL PROVIDE YOURS RESULT,CERTIFICATE AND YOUR RESPONSE SHEET TO YOURS EMAIL ID AT END OF ONLINE TEST


.
.
.
.


Questions and Answers
  • 1. 

    What is the use of Bridge in Network ?

    • A.

      to connect LANs

    • B.

      to separate LANs

    • C.

      to control Network Speed

    • D.

      all of these

    Correct Answer
    A. to connect LANs
    Explanation
    A bridge in a network is used to connect LANs. It acts as a link between different local area networks, allowing them to communicate and share resources. By connecting LANs, a bridge helps in expanding the network coverage and improving connectivity between devices in different LANs. This enables efficient data transmission and facilitates the sharing of files, printers, and other network resources. Therefore, the use of a bridge in a network is to connect LANs.

    Rate this question:

  • 2. 

    Router operates in which layer of OSI Reference Model?

    • A.

      Layer 1

    • B.

      Layer 3

    • C.

      Layer 4

    • D.

      Layer 7

    Correct Answer
    B. Layer 3
    Explanation
    Routers operate in Layer 3 of the OSI Reference Model, which is the Network layer. This layer is responsible for routing and forwarding data packets between different networks. Routers make decisions based on IP addresses to determine the best path for data transmission. They use routing tables and protocols to determine the next hop for each packet, ensuring efficient and reliable communication between networks.

    Rate this question:

  • 3. 

    Each IP packet must contain

    • A.

      Only source address

    • B.

      Only Destination address

    • C.

      Source and Destination address

    • D.

      Source or Destination address

    Correct Answer
    C. Source and Destination address
    Explanation
    Each IP packet must contain both the source and destination address. The source address indicates the sender of the packet, while the destination address indicates the intended recipient. These addresses are necessary for the proper routing and delivery of the packet across the network. Without both addresses, the packet would not be able to reach its intended destination.

    Rate this question:

  • 4. 

    Bridge works in which layer of the OSI model

    • A.

      Application layer

    • B.

      Transport layer

    • C.

      Network layer

    • D.

      Data link layer

    Correct Answer
    D. Data link layer
    Explanation
    The correct answer is Data link layer. The data link layer is the second layer of the OSI model and is responsible for the reliable transfer of data between two adjacent nodes on a network. It provides error detection and correction, as well as flow control and sequencing of frames. Bridges operate at this layer as they connect two local area networks (LANs) and forward data packets between them based on their physical addresses.

    Rate this question:

  • 5. 

    Which provides a connetion-oriented reliable service of sending messages

    • A.

      TCP

    • B.

      IP

    • C.

      UDP

    • D.

      all of these

    Correct Answer
    A. TCP
    Explanation
    TCP (Transmission Control Protocol) provides a connection-oriented reliable service of sending messages. It ensures that the data sent over the network is received accurately and in the correct order. TCP establishes a connection between the sender and receiver, breaks the data into packets, and reassembles them at the destination. It also includes mechanisms for error detection, flow control, and congestion control. TCP is widely used for applications that require reliable and ordered delivery of data, such as web browsing, file transfer, and email.

    Rate this question:

  • 6. 

    Which layers of OSI model are host-to-host layers?

    • A.

      Transport,Session,Presentation,Application

    • B.

      Network,Transport,Session,Presentation

    • C.

      Data link,Network,Transport,Session

    • D.

      Physical,Data link,Network,Transport

    Correct Answer
    A. Transport,Session,Presentation,Application
    Explanation
    The host-to-host layers of the OSI model are responsible for establishing and maintaining communication between two end systems. These layers include the Transport layer, which ensures reliable delivery of data between hosts; the Session layer, which manages the session between hosts; the Presentation layer, which handles data formatting and encryption; and the Application layer, which provides network services to applications. These layers work together to enable end-to-end communication between hosts.

    Rate this question:

  • 7. 

    Which of the following IP address class is Mulitcast

    • A.

      Class A

    • B.

      Class B

    • C.

      Class C

    • D.

      Class D

    Correct Answer
    D. Class D
    Explanation
    Class D IP addresses are reserved for multicast addresses. Multicast is a communication method where a single packet can be sent to multiple destinations simultaneously. It is commonly used for streaming media, online gaming, and other applications where multiple recipients need to receive the same data. Class D addresses range from 224.0.0.0 to 239.255.255.255.

    Rate this question:

  • 8. 

    The last address of IP address represents

    • A.

      Unicast address

    • B.

      Network address

    • C.

      Broadcast address

    • D.

      none of these

    Correct Answer
    C. Broadcast address
    Explanation
    The last address of an IP address represents the broadcast address. The broadcast address is used to send a message to all devices on a network. When a device sends a message to the broadcast address, it is received by all devices on the network. This is useful for sending information that needs to be received by all devices, such as network announcements or updates.

    Rate this question:

  • 9. 

    How many bits are there in the Ethernet address

    • A.

      64 bits

    • B.

      48 bits

    • C.

      32 bits

    • D.

      16 bits

    Correct Answer
    B. 48 bits
    Explanation
    The Ethernet address, also known as the MAC address, is a unique identifier assigned to network interfaces. It consists of 48 bits, which are typically represented as 12 hexadecimal digits separated by colons or hyphens. This address is used to identify devices on an Ethernet network and is essential for communication between devices.

    Rate this question:

  • 10. 

    How many layers are in the TCP/IP model

    • A.

      4 layers

    • B.

      5 layers

    • C.

      6 layers

    • D.

      7 layers

    Correct Answer
    A. 4 layers
    Explanation
    The TCP/IP model consists of four layers: the network interface layer, the internet layer, the transport layer, and the application layer. Each layer is responsible for specific functions in the communication process. The network interface layer handles the physical connection between devices, the internet layer deals with addressing and routing packets across networks, the transport layer ensures reliable data delivery between hosts, and the application layer supports various applications and services. Therefore, the correct answer is 4 layers.

    Rate this question:

  • 11. 

    Which of the following layer of OSI model also called end-to -end layer?

    • A.

      Presentation layer

    • B.

      Network layer

    • C.

      Session layer

    • D.

      Transport layer

    Correct Answer
    D. Transport layer
    Explanation
    The transport layer of the OSI model is also known as the end-to-end layer because it is responsible for the end-to-end delivery of data between the source and destination. It ensures that the data is delivered reliably and in the correct order by establishing a connection, breaking the data into smaller packets, and reassembling them at the destination. It also handles error detection and correction, flow control, and congestion control to optimize the transmission of data.

    Rate this question:

  • 12. 

    What is the benefit of the Networking?

    • A.

      File sharing

    • B.

      Easier access to resources

    • C.

      Easier Backups

    • D.

      All of these

    Correct Answer
    D. All of these
    Explanation
    Networking provides several benefits, including file sharing, easier access to resources, and easier backups. File sharing allows users to easily exchange files and collaborate on projects. Easier access to resources means that users can access shared files, printers, and other devices from any location within the network. Networking also facilitates easier backups by allowing centralized backup systems to be implemented, ensuring that important data is protected and easily recoverable. Therefore, the correct answer is "all of these."

    Rate this question:

  • 13. 

    Which of the following is not in the Networking Devices

    • A.

      Gateways

    • B.

      Linux

    • C.

      Routers

    • D.

      Firewalls

    Correct Answer
    B. Linux
    Explanation
    Linux is an operating system and not a networking device. It is a popular open-source operating system that can be used on various devices, including networking devices, but it itself is not a networking device. Gateways, routers, and firewalls are all examples of networking devices that are used to facilitate communication and network connectivity.

    Rate this question:

  • 14. 

    What is the size of MAC Address ?

    • A.

      16-bits

    • B.

      32-bits

    • C.

      48-bits

    • D.

      64-bits

    Correct Answer
    C. 48-bits
    Explanation
    A MAC address is a unique identifier assigned to network interfaces for communications on a network. It is usually represented as a series of six groups of two hexadecimal digits, totaling 48 bits. Therefore, the correct answer is 48-bits.

    Rate this question:

  • 15. 

    Which of the following can be software?

    • A.

      Routers

    • B.

      Firewalls

    • C.

      Gateways

    • D.

      Modems

    Correct Answer
    B. Firewalls
    Explanation
    Firewalls can be considered software because they are designed to monitor and control incoming and outgoing network traffic based on predetermined security rules. They are typically installed on computer systems and act as a barrier between a trusted internal network and an untrusted external network, preventing unauthorized access and protecting against potential threats. Firewalls can be implemented as software programs running on operating systems or as dedicated hardware devices, making them a valid option for the given question.

    Rate this question:

  • 16. 

    What is the use of Ping command?

    • A.

      To test a device on the network is reachable

    • B.

      To test a hard disk fault

    • C.

      To test a bug in a application

    • D.

      to test a printer quality

    Correct Answer
    A. To test a device on the network is reachable
    Explanation
    The Ping command is used to test the reachability of a device on a network. It sends a small packet of data to the specified device and waits for a response. If the device responds, it indicates that the device is reachable and functioning properly. This command is commonly used by network administrators to troubleshoot network connectivity issues and check if a device is online or not.

    Rate this question:

  • 17. 

    MAC Address is the example of

    • A.

      Transport Layer

    • B.

      Data link layer

    • C.

      application layer

    • D.

      Physical layer

    Correct Answer
    B. Data link layer
    Explanation
    A MAC address is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It operates at the data link layer of the OSI model, which is responsible for the reliable transfer of data between directly connected devices on a network. The data link layer is responsible for framing data into frames, error detection and correction, and controlling access to the physical medium. Therefore, a MAC address is an example of a data link layer concept.

    Rate this question:

  • 18. 

    Routing table of a router keeps track of

    • A.

      MAC address assignments

    • B.

      port assignments to network devices

    • C.

      Distribute IP address to network devices

    • D.

      Routes to use for forwarding data to its destination

    Correct Answer
    D. Routes to use for forwarding data to its destination
    Explanation
    The routing table of a router is used to keep track of the routes that the router can use to forward data to its destination. It contains information about the network addresses and the corresponding next hop or interface that the router should use to reach each destination. By consulting the routing table, the router can determine the most appropriate route for forwarding data packets based on factors such as network topology, link costs, and routing protocols.

    Rate this question:

  • 19. 

    Layer-2 switch is also called

    • A.

      Multiport Hub

    • B.

      Multiport Switch

    • C.

      Multiport Bridge

    • D.

      Miultiport NIC

    Correct Answer
    C. Multiport Bridge
    Explanation
    A Layer-2 switch is also called a multiport bridge because it operates at the data link layer (Layer 2) of the OSI model. Like a bridge, it forwards data packets between different network segments based on the MAC addresses of the devices connected to it. It has multiple ports to connect different devices and can make forwarding decisions based on the destination MAC address in the Ethernet frames. Therefore, the term "multiport bridge" accurately describes the functionality of a Layer-2 switch.

    Rate this question:

  • 20. 

    The meanig of Straight-through Cable is-

    • A.

      Four pairs connect to the same pin on each end

    • B.

      The cable which Directly connects computer to computer

    • C.

      Four wire pairs not twisted with each other

    • D.

      The cable which is not twisted

    Correct Answer
    A. Four pairs connect to the same pin on each end
    Explanation
    The correct answer is "Four pairs connect to the same pin on each end." This means that all four pairs of wires in the cable are connected to the same pin on both ends of the cable. This type of cable is commonly used for Ethernet connections, where each pair of wires carries a different signal. By connecting all four pairs to the same pin, the cable allows for faster and more efficient data transmission.

    Rate this question:

  • 21. 

    What is the maximum header size of an IP packet

    • A.

      32 bytes

    • B.

      64 bytes

    • C.

      30bytes

    • D.

      60 bytes

    Correct Answer
    D. 60 bytes
    Explanation
    The maximum header size of an IP packet is 60 bytes. The IP header contains important information such as source and destination IP addresses, protocol version, packet length, and other control information. This header is necessary for routing and delivering the packet to its intended destination. A larger header size would consume more bandwidth and processing power, so it is important to keep it as small as possible while still accommodating all the necessary information.

    Rate this question:

  • 22. 

    What is the size of Host bits in Class B of IP address?

    • A.

      4

    • B.

      8

    • C.

      16

    • D.

      32

    Correct Answer
    C. 16
    Explanation
    In Class B of IP address, the size of Host bits is 16. Class B addresses have a network portion of 16 bits and a host portion of 16 bits. This means that the first 16 bits of the IP address are used to identify the network, while the remaining 16 bits are used to identify the host within that network.

    Rate this question:

  • 23. 

    Which of the following is/are Protocols of Application?

    • A.

      FTP

    • B.

      DNS

    • C.

      Telnet

    • D.

      All of above all of these

    Correct Answer
    D. All of above all of these
    Explanation
    The correct answer is "All of above" because FTP, DNS, and Telnet are all protocols of application. FTP (File Transfer Protocol) is used for transferring files between a client and a server over a network. DNS (Domain Name System) is responsible for translating domain names into IP addresses. Telnet is a protocol that allows remote login to a computer over a network.

    Rate this question:

  • 24. 

    Which of the following protocol is/are defined in Transport layer

    • A.

      FTP

    • B.

      TCP

    • C.

      UDP

    • D.

      Both UDP &TCP

    Correct Answer
    D. Both UDP &TCP
    Explanation
    Both UDP and TCP are protocols that are defined in the Transport layer of the OSI model. UDP (User Datagram Protocol) is a connectionless protocol that provides a simple and lightweight method of delivering data packets. It does not guarantee the delivery or order of packets. TCP (Transmission Control Protocol), on the other hand, is a connection-oriented protocol that ensures reliable and ordered delivery of data packets. It establishes a connection between the sender and receiver before transferring data. Both protocols play a crucial role in facilitating communication between devices over a network.

    Rate this question:

  • 25. 

    ADSL is the abbreviation of

    • A.

      Asymmetric Dual Subscriber line

    • B.

      Asymmetric Digital system Line

    • C.

      Asymmetric Dual system Line

    • D.

      Asymmetric Digital Subscriber Line

    Correct Answer
    D. Asymmetric Digital Subscriber Line
    Explanation
    ADSL stands for Asymmetric Digital Subscriber Line. This technology allows for high-speed data transmission over existing telephone lines. The term "asymmetric" refers to the fact that the upload and download speeds are not equal. In ADSL, the download speed is typically faster than the upload speed. This makes it ideal for activities such as web browsing, streaming, and downloading large files. The other options, Asymmetric Dual Subscriber Line, Asymmetric Digital system Line, and Asymmetric Dual system Line, are not the correct abbreviations for ADSL.

    Rate this question:

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.