MCQOPTIONS
Saved Bookmarks
This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.
| 451. |
Consider the following statement :(i) The bandwidth of the A.M., wave depends on the band width of the modulating signal.(ii) The bandwidth of the A.M., wave depends on the modulation index.(iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier. Of these statements the correct statements are |
| A. | (i, ii) |
| B. | (i, iii) |
| C. | (ii, iii) |
| D. | All of the above |
| Answer» C. (ii, iii) | |
| 452. |
What is the size (in terms of bits) of Header length field in IPV4 header ? |
| A. | 2 |
| B. | 4 |
| C. | 8 |
| D. | 16 |
| Answer» C. 8 | |
| 453. |
What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields ? |
| A. | 1 byte |
| B. | 1 bit |
| C. | 4 bits |
| D. | 16 bits |
| Answer» B. 1 bit | |
| 454. |
Binary symmetric channel uses |
| A. | Half duplex protocol |
| B. | Full duplex protocol |
| C. | Bit oriented protocol |
| D. | None of the above |
| Answer» B. Full duplex protocol | |
| 455. |
Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ? |
| A. | RAP |
| B. | RIP |
| C. | ARP |
| D. | X.25 |
| Answer» D. X.25 | |
| 456. |
Which of the following techniques are used to control data flow?1. Windowing 2. Routing 3. RPCs 4. Buffering |
| A. | 1, 4 |
| B. | 2, 3, 4 |
| C. | 1, 3, 4 |
| D. | 1, 2, 3, 4 |
| Answer» B. 2, 3, 4 | |
| 457. |
Which of the following network access standard disassembler is used for connection station to a packet switched network? |
| A. | X.3 |
| B. | X.21 |
| C. | X.25 |
| D. | X.75 |
| Answer» D. X.75 | |
| 458. |
Match the following with link quality measurement and handoff initiation :(a) Networked-Controlled Handoff(NCHO) (i) MS connect to BS(b) Mobile-Assisted Handoff(MAHO) (ii) Process via channel the target BS(c) Forward Handoff (iii) First Generation Analog Cellular System(d) Hard Handoff (iv) Second Generation Digital Cellular System (a) (b) (c) (d) |
| A. | (iii) (iv) (ii) (i) |
| B. | (ii) (iii) (i) (iv) |
| C. | (ii) (i) (iv) (iii) |
| D. | (iv) (iii) (i) (ii) |
| Answer» B. (ii) (iii) (i) (iv) | |
| 459. |
Which of the following are Data link layer standard?(1) Ethernet (2) HSSI (3) Frame Relay(4) 10-base T (5)Token ring |
| A. | 1, 2 |
| B. | 1, 3, 5 |
| C. | 1, 3, 4, 5 |
| D. | 1, 2, 3, 4, 5 |
| Answer» D. 1, 2, 3, 4, 5 | |
| 460. |
In electronic mail, which of the following protocols allows the transfer of multimedia messages? |
| A. | IMAP |
| B. | SMTP |
| C. | POP 3 |
| D. | MIME |
| Answer» E. | |
| 461. |
Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ................... |
| A. | 25 |
| B. | 27 |
| C. | 53 |
| D. | 72 |
| Answer» B. 27 | |
| 462. |
Which of the following layer of OSI Reference model is also called end-to-end layer? |
| A. | Network layer |
| B. | Datalink layer |
| C. | Session layer |
| D. | Transport layer |
| Answer» E. | |
| 463. |
Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ? |
| A. | 2500 bps |
| B. | 5000 bps |
| C. | 7500 bps |
| D. | 20000 bps |
| Answer» D. 20000 bps | |
| 464. |
X.25 is …………… Network. |
| A. | Connection Oriented Network |
| B. | Connection Less Network |
| C. | Either Connection Oriented or Connection Less |
| D. | Neither Connection Oriented nor Connection Less |
| Answer» B. Connection Less Network | |
| 465. |
In a CDMA system, a code for a certain system should have: |
| A. | Good auto correlation with other codes |
| B. | Orthogonality to other codes |
| C. | High standard deviation |
| D. | Both a and b |
| Answer» E. | |
| 466. |
Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host has just been restarted. |
| A. | HTTP GET request, DNS query, TCP SYN |
| B. | DNS query, HTTP GET request, TCP SYN |
| C. | TCP SYN, DNS query, HTTP GET request |
| D. | DNS query, TCP SYN, HTTP GET request |
| Answer» E. | |
| 467. |
A conventional LAN bridge specifies only the functions of OSI: |
| A. | layers 1 and 2 |
| B. | layers 1 through 3 |
| C. | all layers |
| D. | none of the above |
| Answer» B. layers 1 through 3 | |
| 468. |
Which protocol is used to encapsulate a data packet created of a higher OSI model layer ? |
| A. | HDLC |
| B. | SDLC |
| C. | LAPB |
| D. | LAPD |
| Answer» E. | |
| 469. |
What is the maximum length of CAT-5 UTP cable in Fast Ethernet network? |
| A. | 100 meters |
| B. | 200 meters |
| C. | 1000 meters |
| D. | 2000 meters |
| Answer» B. 200 meters | |
| 470. |
Networks that use different technologies can be connected by using |
| A. | Packets |
| B. | Switches |
| C. | Bridges |
| D. | Routers |
| Answer» E. | |
| 471. |
What is the maximum window size in sliding window protocol used in a computer network? |
| A. | 4 |
| B. | 8 |
| C. | 15 |
| D. | 16 |
| Answer» B. 8 | |
| 472. |
Which of the following addresses is used to deliver a message to the correct application program running on a host? |
| A. | Port |
| B. | IP |
| C. | Logical |
| D. | Physical |
| Answer» B. IP | |
| 473. |
A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is |
| A. | the Internet |
| B. | the university network |
| C. | the department network |
| D. | the subnet to which the host belongs |
| Answer» B. the university network | |
| 474. |
Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ? |
| A. | 201.14.78.32 |
| B. | 201.14.78.64 |
| C. | 201.14.78.65 |
| D. | 201.14.78.224 |
| Answer» C. 201.14.78.65 | |
| 475. |
Suppose that everyone in a group of N people wants to communicate secretly with (N−1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is |
| A. | N(N−1) |
| B. | N(N−1)/2 |
| C. | 2N |
| D. | (N−1)^2 |
| Answer» C. 2N | |
| 476. |
With reference to hierarchical routing, the optimum number of levels for an m router subnet is: |
| A. | m^2 |
| B. | m |
| C. | ln m |
| D. | √m |
| Answer» D. √m | |
| 477. |
A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ……………. carrier. |
| A. | T1 |
| B. | T2 |
| C. | T3 |
| D. | T4 |
| Answer» B. T2 | |
| 478. |
Match the following :List-I(i) Ethernet(ii) Token Ring(iii) Cut-through switch(iv) Spanning treeList-I(a) Deterministic(b) Utilize the full wire speed(c) Prevent looping(d) Checking valid address |
| A. | i – d, ii – a, iii – b, iv – c |
| B. | i – a, ii – d, iii – b, iv – c |
| C. | i – d, ii – d, iii – c, iv – b |
| D. | i – d, ii – c, iii – b, iv – a |
| Answer» B. i – a, ii – d, iii – b, iv – c | |
| 479. |
Infrared signals can be used for short range communication in a closed area using ................... propagation. |
| A. | ground |
| B. | sky |
| C. | line of sight |
| D. | space |
| Answer» D. space | |
| 480. |
Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is |
| A. | 11100010101 |
| B. | 11100010100 |
| C. | 1110001010 |
| D. | 111000101 |
| Answer» B. 11100010100 | |
| 481. |
If a code is ‘t’ error detecting, the minimum hamming distance should be equal to: |
| A. | t-1 |
| B. | t |
| C. | t+1 |
| D. | 2t+1 |
| Answer» D. 2t+1 | |
| 482. |
A networking device used to connect similar types of LANs |
| A. | Bridge |
| B. | Repeater |
| C. | Hub |
| D. | Modem |
| Answer» B. Repeater | |
| 483. |
Which of the following transmission media is used in Bluetooth technology ? |
| A. | Radio links |
| B. | Microwave links |
| C. | VSAT communication |
| D. | Fiber-optic |
| Answer» B. Microwave links | |
| 484. |
A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ? |
| A. | 50 |
| B. | 200 |
| C. | 400 |
| D. | 800 |
| Answer» D. 800 | |
| 485. |
Hidden terminals in a wireless network may cause: |
| A. | Delay |
| B. | Collisions |
| C. | Drain of battery charge |
| D. | Reduction of Signal Strength |
| Answer» C. Drain of battery charge | |
| 486. |
The four byte IP address consists of |
| A. | Network Address |
| B. | Host Address |
| C. | Both Network and Host Addresses |
| D. | Neither Network nor Host Addresses |
| Answer» D. Neither Network nor Host Addresses | |
| 487. |
For slotted ALOHA, the maximum channel utilization is : |
| A. | 100% |
| B. | 50% |
| C. | 36% |
| D. | 18% |
| Answer» D. 18% | |
| 488. |
Which of the following statements are true?(a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.(b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.(c) The Third generation cellular phone system will provide universal personnel communication. |
| A. | (a) and (b) only |
| B. | (b) and (c) only |
| C. | (a), (b) and (c) |
| D. | (a) and (c) only |
| Answer» C. (a), (b) and (c) | |
| 489. |
Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is |
| A. | Layer – 5 (Application) |
| B. | Layer – 1 (Physical) |
| C. | Layer – 3 (Internet) |
| D. | Layer – 2 (Network Interface) |
| Answer» B. Layer – 1 (Physical) | |
| 490. |
DHCP stands for: |
| A. | Dynamic Host Configuration Protocol |
| B. | Dynamic Host Control Protocol |
| C. | Dynamic Heap Control Protocol |
| D. | Dynamic Heap Configuration Protocol |
| Answer» B. Dynamic Host Control Protocol | |
| 491. |
The maximum data rate of binary signals on a noiseless 3 KHz channel is: |
| A. | 3000 bps |
| B. | 6000 bps |
| C. | 9000 bps |
| D. | 12,000 bps |
| Answer» C. 9000 bps | |
| 492. |
In ................ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator. |
| A. | Non-persistent |
| B. | 0-persistent |
| C. | 1-persistent |
| D. | p-persistent |
| Answer» E. | |
| 493. |
Not an example of a network debugging utility: |
| A. | ping |
| B. | nslookup |
| C. | traceroute |
| D. | telnet |
| Answer» E. | |
| 494. |
A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second: |
| A. | 49 |
| B. | 368 |
| C. | 149 |
| D. | 151 |
| Answer» B. 368 | |
| 495. |
For pure ALOHA, the maximum channel utilization is: |
| A. | 100% |
| B. | 50% |
| C. | 36% |
| D. | 18% |
| Answer» E. | |
| 496. |
Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is ............... |
| A. | 400 bps |
| B. | 800 bps |
| C. | 1600 bps |
| D. | 3200 bps |
| Answer» E. | |
| 497. |
To employ multi-access in GSM, users are given different: |
| A. | time slots |
| B. | bandpass filters |
| C. | handsets |
| D. | frequency bands |
| Answer» C. handsets | |
| 498. |
Which of the following statements are true?(a) Three broad categories of Networks are (i) Circuit Switched Networks (ii) Packet Switched Networks (iii) Message Switched Networks(b) Circuit Switched Network resources need not be reserved during the set up phase.(c) In packet switching there is no resource allocation for packets. |
| A. | (a) and (b) only |
| B. | (b) and (c) only |
| C. | (a) and (c) only |
| D. | (a), (b) and (c) |
| Answer» D. (a), (b) and (c) | |
| 499. |
A technique in which system resources are shared among multiple users: |
| A. | Multiplexing |
| B. | Demultiplexing |
| C. | Modulation |
| D. | Demodulation |
| Answer» B. Demultiplexing | |
| 500. |
Which type of links are used for a connection between two DTE devices ? |
| A. | X.21 |
| B. | Frame Relay |
| C. | ATM |
| D. | Modem |
| Answer» E. | |