Explore topic-wise MCQs in UGC-NET.

This section includes 1917 Mcqs, each offering curated multiple-choice questions to sharpen your UGC-NET knowledge and support exam preparation. Choose a topic below to get started.

451.

Consider the following statement :(i) The bandwidth of the A.M., wave depends on the band width of the modulating signal.(ii) The bandwidth of the A.M., wave depends on the modulation index.(iii) The bandwidth of the F.M, wave for all practical purpose depends on the amplitude of the carrier. Of these statements the correct statements are

A. (i, ii)
B. (i, iii)
C. (ii, iii)
D. All of the above
Answer» C. (ii, iii)
452.

What is the size (in terms of bits) of Header length field in IPV4 header ?

A. 2
B. 4
C. 8
D. 16
Answer» C. 8
453.

What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields ?

A. 1 byte
B. 1 bit
C. 4 bits
D. 16 bits
Answer» B. 1 bit
454.

Binary symmetric channel uses

A. Half duplex protocol
B. Full duplex protocol
C. Bit oriented protocol
D. None of the above
Answer» B. Full duplex protocol
455.

Which of the following TCP/IP Internet protocol is diskless machine uses to obtain its IP address from a server ?

A. RAP
B. RIP
C. ARP
D. X.25
Answer» D. X.25
456.

Which of the following techniques are used to control data flow?1. Windowing   2. Routing     3. RPCs         4. Buffering

A. 1, 4
B. 2, 3, 4
C. 1, 3, 4
D. 1, 2, 3, 4
Answer» B. 2, 3, 4
457.

Which of the following network access standard disassembler is used for connection station to a packet switched network?

A. X.3
B. X.21
C. X.25
D. X.75
Answer» D. X.75
458.

Match the following with link quality measurement and handoff initiation :(a) Networked-Controlled Handoff(NCHO)            (i) MS connect to BS(b) Mobile-Assisted Handoff(MAHO)           (ii) Process via channel the target BS(c) Forward Handoff                            (iii) First Generation Analog Cellular System(d) Hard Handoff                                 (iv) Second Generation Digital Cellular System      (a)   (b)   (c)  (d)

A. (iii)  (iv)   (ii)   (i)
B. (ii)   (iii)   (i)   (iv)
C. (ii)   (i)    (iv)  (iii)
D. (iv)  (iii)   (i)   (ii)
Answer» B. (ii)   (iii)   (i)   (iv)
459.

Which of the following are Data link layer standard?(1) Ethernet      (2) HSSI         (3) Frame Relay(4) 10-base T    (5)Token ring

A. 1, 2
B. 1, 3, 5
C. 1, 3, 4, 5
D. 1, 2, 3, 4, 5
Answer» D. 1, 2, 3, 4, 5
460.

In electronic mail, which of the following protocols allows the transfer of multimedia messages?

A. IMAP
B. SMTP
C. POP 3
D. MIME
Answer» E.
461.

Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ...................

A. 25
B. 27
C. 53
D. 72
Answer» B. 27
462.

Which of the following layer of OSI Reference model is also called end-to-end layer?

A. Network layer
B. Datalink layer
C. Session layer
D. Transport layer
Answer» E.
463.

Which of the following is a bit rate of an 8-PSK signal having 2500 Hz bandwidth ?

A. 2500 bps
B. 5000 bps
C. 7500 bps
D. 20000 bps
Answer» D. 20000 bps
464.

X.25 is …………… Network.

A. Connection Oriented Network
B. Connection Less Network
C. Either Connection Oriented or Connection Less
D. Neither Connection Oriented nor Connection Less
Answer» B. Connection Less Network
465.

In a CDMA system, a code for a certain system should have:

A. Good auto correlation with other codes
B. Orthogonality to other codes
C. High standard deviation
D. Both a and b
Answer» E.
466.

Identify the correct sequence in which the following packets are transmitted on the network by a host when a browser requests a webpage from a remote server, assuming that the host has just been restarted.

A. HTTP GET request, DNS query, TCP SYN
B. DNS query, HTTP GET request, TCP SYN
C. TCP SYN, DNS query, HTTP GET request
D. DNS query, TCP SYN, HTTP GET request
Answer» E.
467.

A conventional LAN bridge specifies only the functions of OSI:

A. layers 1 and 2
B. layers 1 through 3
C. all layers
D. none of the above
Answer» B. layers 1 through 3
468.

Which protocol is used to encapsulate a data packet created of a higher OSI model layer ?

A. HDLC
B. SDLC
C. LAPB
D. LAPD
Answer» E.
469.

What is the maximum length of CAT-5 UTP cable in Fast Ethernet network?

A. 100 meters
B. 200 meters
C. 1000 meters
D. 2000 meters
Answer» B. 200 meters
470.

Networks that use different technologies can be connected by using

A. Packets
B. Switches
C. Bridges
D. Routers
Answer» E.
471.

What is the maximum window size in sliding window protocol used in a computer network?

A. 4
B. 8
C. 15
D. 16
Answer» B. 8
472.

Which of the following addresses is used to deliver a message to the correct application program running on a host?

A. Port
B. IP
C. Logical
D. Physical
Answer» B. IP
473.

A host is connected to a department network which is part of a university network. The university network, in turn, is part of the Internet. The largest network, in which the Ethernet address of the host is unique, is

A. the Internet
B. the university network
C. the department network
D. the subnet to which the host belongs
Answer» B. the university network
474.

Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224. What is the subnet address ?

A. 201.14.78.32
B. 201.14.78.64
C. 201.14.78.65
D. 201.14.78.224
Answer» C. 201.14.78.65
475.

Suppose that everyone in a group of N people wants to communicate secretly with (N−1) other people using symmetric key cryptographic system. The communication between any two persons should not be decodable by the others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

A. N(N−1)
B. N(N−1)/2
C. 2N
D. (N−1)^2
Answer» C. 2N
476.

With reference to hierarchical routing, the optimum number of levels for an m router subnet is:

A. m^2
B. m
C. ln m
D. √m
Answer» D. √m
477.

A leased special high-speed connection from the local telephone carrier for business users that transmits at 1.544 mbps is known as ……………. carrier.

A. T1
B. T2
C. T3
D. T4
Answer» B. T2
478.

Match the following :List-I(i) Ethernet(ii) Token Ring(iii) Cut-through switch(iv) Spanning treeList-I(a) Deterministic(b) Utilize the full wire speed(c) Prevent looping(d) Checking valid address

A. i – d, ii – a, iii – b, iv – c
B. i – a, ii – d, iii – b, iv – c
C. i – d, ii – d, iii – c, iv – b
D. i – d, ii – c, iii – b, iv – a
Answer» B. i – a, ii – d, iii – b, iv – c
479.

Infrared signals can be used for short range communication in a closed area using ................... propagation.

A. ground
B. sky
C. line of sight
D. space
Answer» D. space
480.

Given code word 1110001010 is to be transmitted with even parity check bit. The encoded word to be transmitted for this code is

A. 11100010101
B. 11100010100
C. 1110001010
D. 111000101
Answer» B. 11100010100
481.

If a code is ‘t’ error detecting, the minimum hamming distance should be equal to:

A. t-1
B. t
C. t+1
D. 2t+1
Answer» D. 2t+1
482.

A networking device used to connect similar types of LANs

A. Bridge
B. Repeater
C. Hub
D. Modem
Answer» B. Repeater
483.

Which of the following transmission media is used in Bluetooth technology ?

A. Radio links
B. Microwave links
C. VSAT communication
D. Fiber-optic
Answer» B. Microwave links
484.

A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ?

A. 50
B. 200
C. 400
D. 800
Answer» D. 800
485.

Hidden terminals in a wireless network may cause:

A. Delay
B. Collisions
C. Drain of battery charge
D. Reduction of Signal Strength
Answer» C. Drain of battery charge
486.

The four byte IP address consists of

A. Network Address
B. Host Address
C. Both Network and Host Addresses
D. Neither Network nor Host Addresses
Answer» D. Neither Network nor Host Addresses
487.

For slotted ALOHA, the maximum channel utilization is :

A. 100%
B. 50%
C. 36%
D. 18%
Answer» D. 18%
488.

Which of the following statements are true?(a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.(b) IS - 95 is a second generation cellular phone system based on CDMA and DSSS.(c) The Third generation cellular phone system will provide universal personnel communication.

A. (a) and (b) only
B. (b) and (c) only
C. (a), (b) and (c)
D. (a) and (c) only
Answer» C. (a), (b) and (c)
489.

Both hosts and routers are TCP/IP protocol software. However, routers do not use protocol from all layers. The layer for which protocol software is not needed by a router is

A. Layer – 5 (Application)
B. Layer – 1 (Physical)
C. Layer – 3 (Internet)
D. Layer – 2 (Network Interface)
Answer» B. Layer – 1 (Physical)
490.

DHCP stands for:

A. Dynamic Host Configuration Protocol
B. Dynamic Host Control Protocol
C. Dynamic Heap Control Protocol
D. Dynamic Heap Configuration Protocol
Answer» B. Dynamic Host Control Protocol
491.

The maximum data rate of binary signals on a noiseless 3 KHz channel is:

A. 3000 bps
B. 6000 bps
C. 9000 bps
D. 12,000 bps
Answer» C. 9000 bps
492.

In ................ CSMA protocol, after the station finds the line idle, it sends or refrains from sending based on the outcome of a random number generator.

A. Non-persistent
B. 0-persistent
C. 1-persistent
D. p-persistent
Answer» E.
493.

Not an example of a network debugging utility:

A. ping
B. nslookup
C. traceroute
D. telnet
Answer» E.
494.

A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200 Kbps bandwidth. Find the throughput of the system, if the system (all stations put together) produces 250 frames per second:

A. 49
B. 368
C. 149
D. 151
Answer» B. 368
495.

For pure ALOHA, the maximum channel utilization is:

A. 100%
B. 50%
C. 36%
D. 18%
Answer» E.
496.

Four channels are multiplexed using TDM. If each channel sends 100 bytes/second and we multiplex 1 byte per channel, then the bit rate for the link is ...............

A. 400 bps
B. 800 bps
C. 1600 bps
D. 3200 bps
Answer» E.
497.

To employ multi-access in GSM, users are given different:

A. time slots
B. bandpass filters
C. handsets
D. frequency bands
Answer» C. handsets
498.

Which of the following statements are true?(a) Three broad categories of Networks are (i) Circuit Switched Networks (ii) Packet Switched Networks (iii) Message Switched Networks(b) Circuit Switched Network resources need not be reserved during the set up phase.(c) In packet switching there is no resource allocation for packets.

A. (a) and (b) only
B. (b) and (c) only
C. (a) and (c) only
D. (a), (b) and (c)
Answer» D. (a), (b) and (c)
499.

A technique in which system resources are shared among multiple users:

A. Multiplexing
B. Demultiplexing
C. Modulation
D. Demodulation
Answer» B. Demultiplexing
500.

Which type of links are used for a connection between two DTE devices ?

A. X.21
B. Frame Relay
C. ATM
D. Modem
Answer» E.